WorldWideScience

Sample records for technology verification protocol

  1. ENVIRONMENTAL TECHNOLOGY PROTOCOL VERIFICATION REPORT, EMISSIONS OF VOCS AND ALDEHYDES FROM COMMERCIAL FURNITURE (WITH APPENDICES)

    Science.gov (United States)

    As part of a U.S. Environmental Protection Agency Environmental Technology Verification program, the Research Triangle Institute (RTI) developed a test protocol for measuring volatile organic compounds and aldehydes in a large chamber. RTI convened stakeholders for the commercial...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    Science.gov (United States)

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  3. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  4. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  5. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  6. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  7. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  8. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  9. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  10. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  11. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  12. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  13. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  14. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  16. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  17. INNOVATIVE TECHNOLOGY VERIFICATION REPORT XRF ...

    Science.gov (United States)

    The Niton XLt 700 Series (XLt) XRF Services x-ray fluorescence (XRF) analyzer was demonstrated under the U.S. Environmental Protection Agency (EPA) Superfund Innovative Technology Evaluation (SITE) Program. The field portion of the demonstration was conducted in January 2005 at the Kennedy Athletic, Recreational and Social Park (KARS) at Kennedy Space Center on Merritt Island, Florida. The demonstration was designed to collect reliable performance and cost data for the XLt analyzer and seven other commercially available XRF instruments for measuring trace elements in soil and sediment. The performance and cost data were evaluated to document the relative performance of each XRF instrument. This innovative technology verification report describes the objectives and the results of that evaluation and serves to verify the performance and cost of the XLt analyzer. Separate reports have been prepared for the other XRF instruments that were evaluated as part of the demonstration. The objectives of the evaluation included determining each XRF instrument’s accuracy, precision, sample throughput, and tendency for matrix effects. To fulfill these objectives, the field demonstration incorporated the analysis of 326 prepared samples of soil and sediment that contained 13 target elements. The prepared samples included blends of environmental samples from nine different sample collection sites as well as spiked samples with certified element concentrations. Accuracy

  18. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  19. Experiences in the formalisation and verification of medical protocols

    OpenAIRE

    Balser, Michael

    2003-01-01

    Experiences in the formalisation and verification of medical protocols / M. Balser ... - In: Artificial intelligence in medicine : 9th Conference on Artificial Intelligence in Medicine in Europe, AIME 2003, Protaras, Cyprus, October 18 - 22, 2003 ; proceedings / Michel Dojat ... (eds.). - Berlin u.a. : Springer, 2003. - S. 132-141. - (Lecture notes in computer science ; 2780 : Lecture notes in artificial intelligence)

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  1. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first......, that suffer from the state-explosion problem or that otherwise depend on parameters to the program itself. We experimentally evaluated our approach against state-of-the-art tools for MPI to conclude that our approach offers a scalable solution....

  2. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  3. Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Boyd, Brian [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, Taylor [Colorado Energy Office, Denver, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  4. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  5. The bakery protocol : a comparitive case-study in formal verification

    NARCIS (Netherlands)

    W.O.D. Griffioen; H.P. Korver

    1995-01-01

    textabstractA Comparative Case-Study in Formal Verification Groote and the second author verified (a version of) the Bakery Protocol in $muCRL$. Their process-algebraic verification is rather complex compared to the protocol. Now the question is: How do other verification techniques perform on this

  6. The Bakery Protocol: A Comparative Case-Study in Formal Verification

    NARCIS (Netherlands)

    Griffioen, D.; Korver, H.

    Groote and the second author verified (a version of) the Bakery Protocol in μCRL. Their process-algebraic verification is rather complex compared to the protocol. Now the question is: How do other verification techniques perform on this protocol? In this paper we present a new correctness proof by

  7. 76 FR 50164 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing...

    Science.gov (United States)

    2011-08-12

    ... in commenting must do so at this time. For further information, please see the information provided...-AQ06 Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing... correct certain portions of the Protocol Gas Verification Program and Minimum Competency Requirements for...

  8. Advanced Technologies for Design Information Verification

    Energy Technology Data Exchange (ETDEWEB)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-07-08

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  9. Subsurface barrier verification technologies, informal report

    International Nuclear Information System (INIS)

    Heiser, J.H.

    1994-06-01

    One of the more promising remediation options available to the DOE waste management community is subsurface barriers. Some of the uses of subsurface barriers include surrounding and/or containing buried waste, as secondary confinement of underground storage tanks, to direct or contain subsurface contaminant plumes and to restrict remediation methods, such as vacuum extraction, to a limited area. To be most effective the barriers should be continuous and depending on use, have few or no breaches. A breach may be formed through numerous pathways including: discontinuous grout application, from joints between panels and from cracking due to grout curing or wet-dry cycling. The ability to verify barrier integrity is valuable to the DOE, EPA, and commercial sector and will be required to gain full public acceptance of subsurface barriers as either primary or secondary confinement at waste sites. It is recognized that no suitable method exists for the verification of an emplaced barrier's integrity. The large size and deep placement of subsurface barriers makes detection of leaks challenging. This becomes magnified if the permissible leakage from the site is low. Detection of small cracks (fractions of an inch) at depths of 100 feet or more has not been possible using existing surface geophysical techniques. Compounding the problem of locating flaws in a barrier is the fact that no placement technology can guarantee the completeness or integrity of the emplaced barrier. This report summarizes several commonly used or promising technologies that have been or may be applied to in-situ barrier continuity verification

  10. Advanced Technologies for Design Information Verification

    International Nuclear Information System (INIS)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-01-01

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  12. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  13. Consortium for Verification Technology Fellowship Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sadler, Lorraine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    As one recipient of the Consortium for Verification Technology (CVT) Fellowship, I spent eight days as a visiting scientist at the University of Michigan, Department of Nuclear Engineering and Radiological Sciences (NERS). During this time, I participated in multiple department and research group meetings and presentations, met with individual faculty and students, toured multiple laboratories, and taught one-half of a one-unit class on Risk Analysis in Nuclear Arms control (six 1.5 hour lectures). The following report describes some of the interactions that I had during my time as well as a brief discussion of the impact of this fellowship on members of the consortium and on me/my laboratory’s technical knowledge and network.

  14. Environmental Technology Verification Report: Taconic Energy, Inc. TEA Fuel Additive

    Science.gov (United States)

    The Greenhouse Gas Technology Center (GHG Center) is one of six verification organizations operating under EPA’s ETV program. One sector of significant interest to GHG Center stakeholders is transportation - particularly technologies that result in fuel economy improvements. Taco...

  15. Technology for bolus verification in proton therapy

    Science.gov (United States)

    Shipulin, K. N.; Mytsin, G. V.; Agapov, A. V.

    2015-01-01

    To ensure the conformal depth-dose distribution of a proton beam within a target volume, complex shaped range shifters (so-called boluses), which account for the heterogeneous structure of patient tissue and organs in the beam path, were calculated and manufactured. The precise manufacturing of proton compensators used for patient treatment is a vital step in quality assurance in proton therapy. In this work a software-hardware complex that verifies the quality and precision of bolus manufacturing at the Medico-Technical Complex (MTC) was developed. The boluses consisted of a positioning system with two photoelectric biosensors. We evaluated 20 boluses used in proton therapy of five patients. A total number of 2562 experimental points were measured, of which only two points had values that differed from the calculated value by more than 0.5 mm. The other data points displayed a deviation within ±0.5 mm from the calculated value. The technology for bolus verification developed in this work can be used for the high precision testing of geometrical parameters of proton compensators in radiotherapy.

  16. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without an...

  17. A verification of the bakery protocol combining algebraic and model-oriented techniques

    NARCIS (Netherlands)

    C. Brovedani; A.S. Klusener (Steven)

    1996-01-01

    textabstractIn this paper we give a specification of the so called Bakery protocol in an extension of the process algebra ACP with abstract datatypes. We prove that this protocol is equal to a Queue, modulo branching bisimulation equivalence. The verification is as follows. First we give a linear

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  19. Verification of authentication protocols for mobile satellite communication systems

    Directory of Open Access Journals (Sweden)

    Reham Abdellatif Abouhogail

    2014-12-01

    Full Text Available In recent times, many protocols have been proposed to provide security for mobile satellite communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Many security protocols for the mobile satellite communication system have been presented. This paper analyzes three of the most famous authentication protocols for mobile satellite communication system from the security viewpoint of data desynchronization attack. Based on strand spaces testing model, data desynchronization attacks on these protocols were tested and analyzed. Furthermore, improvements to overcome the security vulnerabilities of two protocols are mentioned.

  20. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  1. Verification of authentication protocols for mobile satellite communication systems

    OpenAIRE

    Reham Abdellatif Abouhogail

    2014-01-01

    In recent times, many protocols have been proposed to provide security for mobile satellite communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Many security protocols for the mobile satellite communication system have been presented. This paper analyzes three of the most famous authentication protocols for mobile satellite communication system from the security viewpoint of data desynchronization attack. Based on strand spac...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT LASER TOUCH AND TECHNOLOGIES, LLC LASER TOUCH MODEL LT-B512

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Laser Touch model LT-B512 targeting device manufactured by Laser Touch and Technologies, LLC, for manual spray painting operations. The relative transfer efficiency (TE) improved an avera...

  3. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  4. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  5. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC., PNEUMATIC BLADDER PUMP GW 1400 SERIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  8. A Formal Verification of the Alternating Bit Protocol in the Calculus of Constructions

    NARCIS (Netherlands)

    Bezem, M.A.; Groote, J.F.

    We report on a formal verification of the Alternating Bit Protocol (ABP) in the Calculus of Constructions. We outline a semi-formal correctness proof of the ABP with sufficient detail to be formalised. Thereafter we show by examples how the formalised proof has been verified by the automated proof

  9. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  10. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  11. Formal verification of communication protocols using quantized Horn clauses

    Science.gov (United States)

    Balu, Radhakrishnan

    2016-05-01

    The stochastic nature of quantum communication protocols naturally lends itself for expression via probabilistic logic languages. In this work we describe quantized computation using Horn clauses and base the semantics on quantum probability. Turing computable Horn clauses are very convenient to work with and the formalism can be extended to general form of first order languages. Towards this end we build a Hilbert space of H-interpretations and a corresponding non commutative von Neumann algebra of bounded linear operators. We demonstrate the expressive power of the language by casting quantum communication protocols as Horn clauses.

  12. A timed verification of the IEEE 1394 leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe IEEE 1394 architecture standard defines a high performance serial multimedia bus that allows several components in a network to communicate with each other at high speed. In the physical layer of the architecture, a leader election protocol is used to find a spanning tree with a

  13. Certificateless Public Auditing Protocol with Constant Verification Time

    Directory of Open Access Journals (Sweden)

    Dongmin Kim

    2017-01-01

    Full Text Available To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI, they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal security models and prove the security of our scheme under the three security models.

  14. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION (POSTER)

    Science.gov (United States)

    ETV is presenting a poster at the EPA's 2005 Science Forum from May 16-18, 2005 in Washington, DC. This poster will contain a summary of the performance results realized by the six verified diesel retrofit technologies, as well as potential impacts that could be realized if sigi...

  15. Security protocol specification and verification with AnBx

    DEFF Research Database (Denmark)

    Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian Alexander

    2016-01-01

    Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose...... with a novel notion of forwarding channels, enforcing specific security guarantees from the message originator to the final recipient along a number of intermediate forwarding agents. We give a formal semantics of AnBx in terms of a state transition system expressed in the AVISPA Intermediate Format. We devise...

  16. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  17. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    Science.gov (United States)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION--FUELCELL ENERGY, INC.: DFC 300A MOLTEN CARBONATE FUEL CELL COMBINED HEAT AND POWER SYSTEM

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  19. Battery Technology Life Verification Test Manual Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Jon P. Christophersen

    2012-12-01

    The purpose of this Technology Life Verification Test (TLVT) Manual is to help guide developers in their effort to successfully commercialize advanced energy storage devices such as battery and ultracapacitor technologies. The experimental design and data analysis discussed herein are focused on automotive applications based on the United States Advanced Battery Consortium (USABC) electric vehicle, hybrid electric vehicle, and plug-in hybrid electric vehicle (EV, HEV, and PHEV, respectively) performance targets. However, the methodology can be equally applied to other applications as well. This manual supersedes the February 2005 version of the TLVT Manual (Reference 1). It includes criteria for statistically-based life test matrix designs as well as requirements for test data analysis and reporting. Calendar life modeling and estimation techniques, including a user’s guide to the corresponding software tool is now provided in the Battery Life Estimator (BLE) Manual (Reference 2).

  20. Can legality verification enhace local rights to forest resources? Piloting the policy learning protocol in the Peruvian forest context

    Science.gov (United States)

    B. Cashore; I. Visseren-Hamakers; P. Caro Torres; W. de Jong; A. Denvir; D. Humphreys; Kathleen McGinley; G. Auld; S. Lupberger; C. McDermott; S. Sax; D. Yin

    2016-01-01

    This report, “Can Legality Verification Enhance Local Rights to Forest Resources? Piloting the policy learning protocol in the Peruvian forest context,” reports on the testing of the application of the 11-step Policy Learning Protocol in Peru in 2015-16. The Protocol (Cashore et al. 2014) enables actors to draw from international policy initiatives in order to improve...

  1. Test/QA Plan for Verification of Leak Detection and Repair Technologies

    Science.gov (United States)

    The purpose of the leak detection and repair (LDAR) test and quality assurance plan is to specify procedures for a verification test applicable to commercial LDAR technologies. The purpose of the verification test is to evaluate the performance of participating technologies in b...

  2. Task Force Report: Assessment of Nuclear Monitoring and Verification Technologies

    Science.gov (United States)

    2014-01-01

    UNCLASSIFIED  Recommendation:  State/Bureau  of  Arms  Control,  Verification  and  Compliance  ( AVC )  (diplomatic), DOE/National Nuclear Security...Department.     Recommendation:  State/ AVC ,  DOE/NNSA,  and  DoD/Acquisition,  Technology,  and  Logistics  (AT&L)  should  review  current U.S.  facility...agencies, State/ AVC , ASD(NCB), NNSA and NCPC should create  the processes and oversee the following steps:       Establish  a  “White  Team”  whose

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SHARPE MANUFACTURING TITANIUM T1-CG SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ANEST IWATA CORPORATION W400-LV SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BIOQUELL, INC. CLARIS C HYDROGEN PEROXIDE GAS GENERATOR

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Clarus C Hydrogen Peroxide Gas Generator, a biological decontamination device manufactured by BIOQUELL, Inc. The unit was tested by evaluating its ability to decontaminate seven types...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - MENARDI-CRISWELL 50-504 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - STANDARD FILTER CORPORATION PE16ZU FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - INSPEC FIBRES 5512BRF FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - AIR PURATOR CORPORATION HUYGLAS 1405M FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - BHA GROUP, INC. QG061 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - ALBANY INTERNATIONAL CORP. INDUSTRIAL PROCESS TECHNOLOGIES PRIMATEX PLUS I FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  12. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  13. A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards

    Directory of Open Access Journals (Sweden)

    M. Henzl

    2016-04-01

    Full Text Available We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ensured that the implementation does not contain any vulnerabilities. High level application specifications may lead to different implementations. Protocol that is proved to be secure on high level and that uses secure smart card can be implemented in more than one way, some of these implementations are secure, some of them introduce vulnerabilities to the application. The goal of this paper is to provide a method that can be used to create a model of arbitrary smart card, with focus on contactless smart cards, to create a model of the protocol, and to use model checking to find attacks in this model. AVANTSSAR Platform was used for the formal verification, the models are written in the ASLan++ language. Examples demonstrate the usability of the proposed method.

  14. A New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Glaser,; Alexander, [Princeton University

    2012-05-16

    Warhead verification systems proposed to date fundamentally rely on the use of information barriers to prevent the release of classified design information. Measurements with information carriers significantly increase the complexity of inspection systems, make their certification and authentication difficult, and may reduce the overall confidence in the verifiability of future arms- control agreements. This talk presents a proof-of-concept of a new approach to nuclear warhead verification that minimizes the role of information barriers from the outset and envisions instead an inspection system that a priori avoids leakage of sensitive information using a so-called zero-knowledge protocol. The proposed inspection system is based on the template-matching approach and relies on active interrogation of a test object with 14-MeV neutrons. The viability of the method is examined with MCNP Monte Carlo neutron transport calculations modeling the experimental setup, an investigation of different diversion scenarios, and an analysis of the simulated data showing that it does not contain information about the properties of the inspected object.

  15. Implementation of the Additional Protocol: Verification activities at uranium mines and mills

    International Nuclear Information System (INIS)

    Bragin, V.; Carlson, J.; Leslie, R.

    2001-01-01

    Full text: The mining and milling of uranium is the first in a long chain of processes required to produce nuclear materials in a form suitable for use in nuclear weapons. Misuse of a declared uranium mining/milling facility, in the form of understatement of production, would be hard to detect with the same high level of confidence as afforded by classical safeguards on other parts of the nuclear fuel cycle. For these reasons, it would not be cost-effective to apply verification techniques based on classical safeguards concepts to a mining/milling facility in order to derive assurance of the absence of misuse. Indeed, these observations have been recognised in the Model Protocol (INFCIRC/540): 'the Agency shall not mechanistically or systematically seek to verify' information provided to it by States (Article 4.a.). Nevertheless, complementary access to uranium mining/milling sites 'on a selective basis in order to assure the absence of undeclared nuclear material and activities' (Article 4.a.(i)) is provided for. On this basis, therefore, this paper will focus predominantly on options other than site access, which are available to the Agency for deriving assurance that declared mining/milling operations are not misused. Such options entail the interpretation and analysis of information provided to the Agency including, for example, from declarations, monitoring import/export data, open source reports, commercial satellite imagery, aerial photographs, and information provided by Member States. Uranium mining techniques are diverse, and the inventories, flows and uranium assays which arise at various points in the process will vary considerably between mines, and over the operating cycle of an individual mine. Thus it is essentially impossible to infer any information, which can be used precisely to confirm, or otherwise, declared production by measuring or estimating any of those parameters at points within the mining/milling process. The task of attempting to

  16. Development of evaluation and performance verification technology for radiotherapy radiation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. Y.; Jang, S. Y.; Kim, B. H. and others

    2005-02-15

    No matter how much the importance is emphasized, the exact assessment of the absorbed doses administered to the patients to treat the various diseases such as lately soaring malignant tumors with the radiotherapy practices is the most important factor. In reality, several over-exposed patients from the radiotherapy practice become very serious social issues. Especially, the development of a technology to exactly assess the high doses and high energies (In general, dose administered to the patients with the radiotherapy practices are very huge doses, and they are about three times higher than the lethal doses) generated by the radiation generators and irradiation equipment is a competing issue to be promptly conducted. Over fifty medical centers in Korea operate the radiation generators and irradiation equipment for the radiotherapy practices. However, neither the legal and regulatory systems to implement a quality assurance program are sufficiently stipulated nor qualified personnel who could run a program to maintain the quality assurance and control of those generators and equipment for the radiotherapy practices in the medical facilities are sufficiently employed. To overcome the above deficiencies, a quality assurance program such as those developed in the technically advanced countries should be developed to exactly assess the doses administered to patients with the radiotherapy practices and develop the necessary procedures to maintain the continuing performance of the machine or equipment for the radiotherapy. The QA program and procedures should induce the fluent calibration of the machine or equipment with quality, and definitely establish the safety of patients in the radiotherapy practices. In this study, a methodology for the verification and evaluation of the radiotherapy doses is developed, and several accurate measurements, evaluations of the doses delivered to patients and verification of the performance of the therapy machine and equipment are

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: MOBILE SOURCE RETROFIT AIR POLLUTION CONTROL DEVICES: CLEAN CLEAR FUEL TECHNOLOGIES, INC.’S, UNIVERSAL FUEL CELL

    Science.gov (United States)

    The U.S. EPA's Office of Research and Development operates the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative technologies through performance verification and information dissemination. Congress funds ETV in response to the belief ...

  18. Transparencies used in describing the CTBT verification regime and its four monitoring technologies

    International Nuclear Information System (INIS)

    Basham, P.

    1999-01-01

    This presentation includes description of the CTBT verification regime and its four monitoring technologies, (namely, seismic monitoring, hydro acoustic monitoring, infrasound monitoring and radionuclides monitoring) CTBT global verification system, sequence of steps needed for installing an international monitoring system station which includes: site survey, site preparation and construction, equipment procurement and installation, final tests and certification

  19. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

    Science.gov (United States)

    Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-03-02

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  20. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

    Directory of Open Access Journals (Sweden)

    Alexandre Pinheiro

    2018-03-01

    Full Text Available Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  1. Technology verification phase. Dynamic isotope power system. Final report

    International Nuclear Information System (INIS)

    Halsey, D.G.

    1982-01-01

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance

  2. Technology verification phase. Dynamic isotope power system. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.G.

    1982-03-10

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance. (LCL)

  3. Integrating Requirements Engineering, Modeling, and Verification Technologies into Software and Systems Engineering

    National Research Council Canada - National Science Library

    Broy, Manfred; Leucker, Martin

    2007-01-01

    The objective of this project is the development of an integrated suite of technologies focusing on end-to-end software development supporting requirements analysis, design, implementation, and verification...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION: ALLIED PHOTOCHEMICAL KROHNZONE 7014 UV-CURABLE COATING

    Science.gov (United States)

    This Environmental Technology Verification report reports on reasearch done on a UV-curable automotive paint. The paint was tested for thickness, appearance, gloss, salt spray resistance, humidity resistance, adhesion, impact, mandrel bend, MEK rub, and abrasion resistance.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: NEW CONDENSATOR, INC.--THE CONDENSATOR DIESEL ENGINE RETROFIT CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    EPA's Environmental Technology Verification Program has tested New Condensator Inc.'s Condensator Diesel Engine Retrofit Crankcase Ventilation System. Brake specific fuel consumption (BSFC), the ratio of engine fuel consumption to the engine power output, was evaluated for engine...

  6. Dynamic Isotope Power System: technology verification phase, program plan, 1 October 1978

    International Nuclear Information System (INIS)

    1979-01-01

    The technology verification phase program plan of the Dynamic Isotope Power System (DIPS) project is presented. DIPS is a project to develop a 0.5 to 2.0 kW power system for spacecraft using an isotope heat source and a closed-cycle Rankine power-system with an organic working fluid. The technology verification phase's purposes are to increase the system efficiency to over 18%, to demonstrate system reliability, and to provide an estimate for flight test scheduling. Progress toward these goals is reported

  7. 4C technology: protocols and data analysis

    NARCIS (Netherlands)

    van de Werken, H.J.; de Vree, P.J.; Splinter, E.; Holwerda, S.J.; Klous, P.; de Wit, E.; de Laat, W.

    2012-01-01

    Chromosome conformation capture (3C) technology and its genome-wide derivatives have revolutionized our knowledge on chromatin folding and nuclear organization. 4C-seq Technology combines 3C principles with high-throughput sequencing (4C-seq) to enable for unbiased genome-wide screens for DNA

  8. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  9. TEST DESIGN FOR ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) OF ADD-ON NOX CONTROL UTILIZING OZONE INJECTION

    Science.gov (United States)

    The paper discusses the test design for environmental technology verification (ETV) of add-0n nitrogen oxides (NOx) control utilizing ozone injection. (NOTE: ETV is an EPA-established program to enhance domestic and international market acceptance of new or improved commercially...

  10. ENVIORNMENTAL TECHNOLOGY VERIFICATION REPORT: ANEST IWATA CORPORATION LPH400-LV HVLP SPRAY GUN

    Science.gov (United States)

    This Enviornmental Technology Verification reports on the characteristics of a paint spray gun. The research showed that the spray gun provided absolute and relative increases in transfer efficiency over the base line and provided a reduction in the use of paint.

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, TETRATEC PTFE PRODUCTS, TETRATEX 6212 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, BHA GROUP, INC., QP131 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, POLYMER GROUP, INC., DURAPEX PET FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - W.L. GORE & ASSOCIATES, INC. L4347 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - BASF CORPORATION AX/BA-14/9-SAXP FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, FLINT HILLS RESOURCES, LP, CCD15010 DIESEL FUEL FORMULATION WITH HITEC4121 ADDITIVE

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  17. Update on Monitoring Technologies for International Safeguards and Fissile Material Verification

    International Nuclear Information System (INIS)

    Croessmann, C. Dennis; Glidewell, Don D.; Mangan, Dennis L.; Smathers, Douglas C.

    1999-01-01

    Monitoring technologies are playing an increasingly important part in international safeguards and fissile material verification. The developments reduce the time an inspector must spend at a site while assuring continuity of knowledge. Monitoring technologies' continued development has produced new seal systems and integrated video surveillance advances under consideration for Trilateral Initiative use. This paper will present recent developments for monitoring systems at Embalse, Argentina, VNHEF, Sarov, Russian, and Savannah River Site, Aiken, South Carolina

  18. Operational Concept of the NEXTSat-1 for Science Mission and Space Core Technology Verification

    Directory of Open Access Journals (Sweden)

    Goo-Hwan Shin

    2014-03-01

    Full Text Available The next generation small satellite-1 (NEXTSat-1 program has been kicked off in 2012, and it will be launched in 2016 for the science missions and the verification of space core technologies. The payloads for these science missions are the Instrument for the Study of Space Storms (ISSS and NIR Imaging Spectrometer for Star formation history (NISS. The ISSS and the NISS have been developed by Korea Advanced Institute of Science and Technology (KAIST and Korea Astronomy and Space science Institute (KASI respectively. The ISSS detects plasma densities and particle fluxes of 10 MeV energy range near the Earth and the NISS uses spectrometer. In order to verify the spacecraft core technologies in the space, the total of 7 space core technologies (SCT will be applied to the NEXTSat-1 for space verification and those are under development. Thus, the operation modes for the ISSS and the NISS for space science missions and 7 SCTs for technology missions are analyzed for the required operation time during the NEXTSat-1’s mission life time of 2 years. In this paper, the operational concept of the NEXTSat-1’s science missions as well as the verification of space core technologies are presented considering constraints of volume, mass, and power after launch.

  19. Independent Verification Survey Report For Zone 1 Of The East Tennessee Technology Park In Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    King, David A.

    2012-01-01

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs)

  20. PET Scanning Protocols for In-Situ Dose Delivery Verification of Proton Therapy

    NARCIS (Netherlands)

    Buitenhuis, H.J.T.; Dendooven, P.; Biegun, A.K.; van der Borden, A.J.; Diblen, F.; van Goethem, M.-J.; van der Schaaf, A.A.; van t Veld, Aart; Brandenburg, S.

    2016-01-01

    Positron emission tomography is so far the only method for in-vivo dose delivery verification in hadron therapy that is in clinical use. A PET scanner placed in the treatment position (in-situ) will be able to obtain the highest number of counts, as it minimizes the decay of the positron emitting

  1. Verification of a Proposed Clinical Electroacoustic Test Protocol for Personal Digital Modulation Receivers Coupled to Cochlear Implant Sound Processors.

    Science.gov (United States)

    Nair, Erika L; Sousa, Rhonda; Wannagot, Shannon

    Guidelines established by the AAA currently recommend behavioral testing when fitting frequency modulated (FM) systems to individuals with cochlear implants (CIs). A protocol for completing electroacoustic measures has not yet been validated for personal FM systems or digital modulation (DM) systems coupled to CI sound processors. In response, some professionals have used or altered the AAA electroacoustic verification steps for fitting FM systems to hearing aids when fitting FM systems to CI sound processors. More recently steps were outlined in a proposed protocol. The purpose of this research is to review and compare the electroacoustic test measures outlined in a 2013 article by Schafer and colleagues in the Journal of the American Academy of Audiology titled "A Proposed Electroacoustic Test Protocol for Personal FM Receivers Coupled to Cochlear Implant Sound Processors" to the AAA electroacoustic verification steps for fitting FM systems to hearing aids when fitting DM systems to CI users. Electroacoustic measures were conducted on 71 CI sound processors and Phonak Roger DM systems using a proposed protocol and an adapted AAA protocol. Phonak's recommended default receiver gain setting was used for each CI sound processor manufacturer and adjusted if necessary to achieve transparency. Electroacoustic measures were conducted on Cochlear and Advanced Bionics (AB) sound processors. In this study, 28 Cochlear Nucleus 5/CP810 sound processors, 26 Cochlear Nucleus 6/CP910 sound processors, and 17 AB Naida CI Q70 sound processors were coupled in various combinations to Phonak Roger DM dedicated receivers (25 Phonak Roger 14 receivers-Cochlear dedicated receiver-and 9 Phonak Roger 17 receivers-AB dedicated receiver) and 20 Phonak Roger Inspiro transmitters. Employing both the AAA and the Schafer et al protocols, electroacoustic measurements were conducted with the Audioscan Verifit in a clinical setting on 71 CI sound processors and Phonak Roger DM systems to

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP), FINAL TECHNOLOGY APPLICATIONS GROUP TAGNITE--TESTING AND QUALITY ASSURANCE PLAN (T/QAP)

    Science.gov (United States)

    The overall objective of the Environmental Testing and Verification Coatings and Coating Equipment Program is to verify pollution prevention and performance characteristics of coating technologies and make the results of the testing available to prospective coating technology use...

  3. Modelling, Verification, and Comparative Performance Analysis of the B.A.T.M.A.N. Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Mehta, Vinay; Hermanns, Holger; Höfner, Peter

    2017-01-01

    This paper considers on a network routing protocol known as Better Approach to Mobile Ad hoc Networks (B.A.T.M.A.N.). The protocol serves two aims: first, to discover all bidirectional links, and second, to identify the best-next-hop for every other node in the network. A key element is that each

  4. RAPID FREEFORM SHEET METAL FORMING: TECHNOLOGY DEVELOPMENT AND SYSTEM VERIFICATION

    Energy Technology Data Exchange (ETDEWEB)

    Kiridena, Vijitha [Ford Scientific Research Lab., Dearborn, MI (United States); Verma, Ravi [Boeing Research and Technology (BR& T), Seattle, WA (United States); Gutowski, Timothy [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Roth, John [Pennsylvania State Univ., University Park, PA (United States)

    2018-03-31

    The objective of this project is to develop a transformational RApid Freeform sheet metal Forming Technology (RAFFT) in an industrial environment, which has the potential to increase manufacturing energy efficiency up to ten times, at a fraction of the cost of conventional technologies. The RAFFT technology is a flexible and energy-efficient process that eliminates the need for having geometry-specific forming dies. The innovation lies in the idea of using the energy resource at the local deformation area which provides greater formability, process control, and process flexibility relative to traditional methods. Double-Sided Incremental Forming (DSIF), the core technology in RAFFT, is a new concept for sheet metal forming. A blank sheet is clamped around its periphery and gradually deformed into a complex 3D freeform part by two strategically aligned stylus-type tools that follow a pre-described toolpath. The two tools, one on each side of the blank, can form a part with sharp features for both concave and convex shapes. Since deformation happens locally, the forming force at any instant is significantly decreased when compared to traditional methods. The key advantages of DSIF are its high process flexibility, high energy-efficiency, low capital investment, and the elimination of the need for massive amounts of die casting and machining. Additionally, the enhanced formability and process flexibility of DSIF can open up design spaces and result in greater weight savings.

  5. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    OpenAIRE

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  6. Radio-xenon monitoring technology for CTBT verification

    Energy Technology Data Exchange (ETDEWEB)

    An, J. S.; Yoon, W. K.; Shin, J. S.; Kim, J. S.; Lee, Y. G.; Na, W. W

    1998-03-01

    To help ensure compliance with a comprehensive nuclear test ban treaty (CTBT), it is important that monitoring technologies for detecting covert nuclear testing be available. Monitoring methods are included seismic, hydroacoustic, infra-sound, and radionuclide technologies. Conducting a test underground, underwater, under such condition, gaseous radionuclides detection would be useful method for detecting of nuclear detonation. This report described on as to performance of detecting equipment and detecting principle of radioactive described on as to performance of detecting equipment and detecting principle of radioactive noble gas detection for CTBT. Although the quantity of xenon radionuclides entering the atmosphere from a nuclear detonation may be very large, the combination of dilution in the atmosphere plus radioactive decay requires very sensitive measurements to detect these radionuclides. Furthermore, xenon radionuclides can be enter the atmosphere from sources other than nuclear detonation, including operating nuclear reactors, producing and using medical isotopes and nuclear fuel reprocessing. Since measurement of the activity ratios of xenon radionuclides is important for determine of their origin. (author). 19 refs., 13 tabs., 18 figs

  7. VZLUSAT-1: verification of new materials and technologies for space

    Science.gov (United States)

    Daniel, Vladimir; Urban, Martin; Nentvich, Ondrej; Stehlikova, Veronika

    2016-09-01

    CubeSats are a good opportunity to test new technologies and materials on orbit. These innovations can be later used for improving of properties and life length of Cubesat or other satellites as well. VZLUSAT-1 is a small satellite from the CubeSat family, which will carry a wide scale of payloads with different purposes. The poster is focused on measuring of degradation and properties measurement of new radiation hardened composite material in orbit due to space environment. Material properties changes can be studied by many methods and in many disciplines. One payload measures mechanical changes in dependence on Young's modulus of elasticity which is got from non-destructive testing by mechanical vibrations. The natural frequencies we get using Fast Fourier Transform. The material is tested also by several thermometers which measure heat distribution through the composite, as well as reflectivity in dependence on different coatings. The satellite also will measure the material radiation shielding properties. There are PIN diodes which measure the relative shielding efficiency of composite and how it will change in time in space environment. Last one of material space testing is measurement of outgassing from tested composite material. It could be very dangerous for other parts of satellite, like detectors, when anything was outgassing, for example water steam. There are several humidity sensors which are sensitive to steam and other gases and measures temperatures as well.

  8. A comparison of the use of bony anatomy and internal markers for offline verification and an evaluation of the potential benefit of online and offline verification protocols for prostate radiotherapy.

    Science.gov (United States)

    McNair, Helen A; Hansen, Vibeke N; Parker, Christopher C; Evans, Phil M; Norman, Andrew; Miles, Elizabeth; Harris, Emma J; Del-Acroix, Louise; Smith, Elizabeth; Keane, Richard; Khoo, Vincent S; Thompson, Alan C; Dearnaley, David P

    2008-05-01

    To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. The systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion.

  9. New Approaches and New Technologies for the Verification of Nuclear Disarmament

    International Nuclear Information System (INIS)

    Keir, David

    2013-01-01

    ESARDA’s New Approaches/Novel Technologies Working group has recently begun to take a great interest in technology for use in arms control verification, in parallel with a focus on Nuclear Safeguards technology. A topic-based meeting of members of the NA/NT Subgroup was hosted at Joint Research Centre (JRC), ITU-Nuclear Security Unit in Ispra (Italy), to further explore the technical issues and opportunities presented by the need for new approaches and technologies in a future verified nuclear weapons dismantlement regime. Nuclear warheads must contain radioactive material and, by their nature, gamma rays and neutrons are likely to penetrate to the outside of the warhead casing and even metal containers. Therefore radiation signatures should be detectable by appropriate pieces of equipment. For this reason, researchers in the field of technical verification of nuclear warhead dismantlement have studied and developed technologies for Non-Destructive Assay (NDA). This paper presents a generic dismantlement pathway for verified nuclear warhead dismantlement, based on the scenario employed by the UK-Norway initiative for their exercise in 2008/9. Using this as a framework the types of measurement challenge likely to be presented to a verifying inspector are discussed. The problem of intrusiveness of measurements in relation to the issue of proliferative release of classified information about the warhead attributes is discussed and the concept of ‘information barriers is introduced as a possible solution to this issue. A list of candidate technologies for use in verification activities, with or without information barriers is then presented and, since most of these are new or novel approaches to the issue, an already-established system for classifying them – in terms of state of development and complexity of use in this context – is proposed. Finally, the concept of capturing this information as a library of ‘data sheets’, designed for periodic review as

  10. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  11. DOE/LLNL verification symposium on technologies for monitoring nuclear tests related to weapons proliferation

    International Nuclear Information System (INIS)

    Nakanishi, K.K.

    1993-01-01

    The rapidly changing world situation has raised concerns regarding the proliferation of nuclear weapons and the ability to monitor a possible clandestine nuclear testing program. To address these issues, Lawrence Livermore National Laboratory's (LLNL) Treaty Verification Program sponsored a symposium funded by the US Department of Energy's (DOE) Office of Arms Control, Division of Systems and Technology. The DOE/LLNL Symposium on Technologies for Monitoring Nuclear Tests Related to Weapons Proliferation was held at the DOE's Nevada Operations Office in Las Vegas, May 6--7,1992. This volume is a collection of several papers presented at the symposium. Several experts in monitoring technology presented invited talks assessing the status of monitoring technology with emphasis on the deficient areas requiring more attention in the future. In addition, several speakers discussed proliferation monitoring technologies being developed by the DOE's weapons laboratories

  12. Status and Application of Spatial Information Technology as a Nuclear Verification Tool

    Energy Technology Data Exchange (ETDEWEB)

    Jo, Seong Youn; Shin, Jang Soo [Korea Institute of Nuclear Non-proliferation And Control, Daejeon (Korea, Republic of)

    2010-05-15

    The spatial information like satellite imagery and GIS data has been widely used for site development planning and monitoring in the area where the access is not allowed with any reason. The IAEA adopts this new method of analysis for enhancing its verification capability and is utilizing to search if there is any undeclared nuclear activities in the nuclear facilities worldwide. The ROK entered the group of the leading countries in the field of space technology with the successful launching of the KompSat I and II, and holds its high position in the IT technology which can draw useful analytic results from the satellite imagery. It implies that the ROK has some potential and related infra required for using the satellite imagery for the purpose of nuclear safeguards. However, we are in the very early stage to apply these advanced techniques to nuclear verification, because we don't have enough work forces enough to deal with these useful tools. It is necessary to review some previous examples about establishing satellite imagery analysis system like the IAEA. In this report, the IAEA's activities related verification using satellite imagery is reviewed and some examples on safeguards application is presented. A way to use satellite images for national inspection also is suggested

  13. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services †

    Science.gov (United States)

    2018-01-01

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641

  14. 75 FR 33391 - Amendments to the Protocol Gas Verification Program and Minimum Competency Requirements for Air...

    Science.gov (United States)

    2010-06-11

    ... requirements of the Traceability Protocol or such revised procedure as approved by the Administrator. All of... believes that this requirement would better assure NIST traceability, regardless of whether NO or NO X is... Competency Requirements for Air Emission Testing; Proposed Rule #0;#0;Federal Register / Vol. 75, No. 112...

  15. Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Delzanno, Giorgio; Esparza, Javier; Srba, Jiri

    2006-01-01

    Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e. by adding an active intruder capable of storing all exchanged messages including full analysis and synthesis...

  16. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Fagerland Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    2015-01-01

    PetriCode is a tool that supports automated generation of protocol software from a restricted class of Coloured Petri Nets (CPNs) called Pragmatics Annotated Coloured Petri Nets (PA-CPNs). Petri-Code and PA-CPNs have been designed with five main requirements in mind, which include the same model...

  17. Pragmatics annotated coloured petri nets for protocol software generation and verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge Fagerland; Kristensen, Lars M.; Kindler, Ekkart

    2016-01-01

    Pragmatics Annotated Coloured Petri Nets (PA-CPNs) are a restricted class of Coloured Petri Nets (CPNs) developed to support automated generation of protocol software. The practical application of PA-CPNs and the supporting PetriCode software tool have been discussed and evaluated in earlier papers...

  18. International Performance Measurement & Verification Protocol: Concepts and Practices for Improved Indoor Environmental Quality, Volume II (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    2002-03-01

    This protocol serves as a framework to determine energy and water savings resulting from the implementation of an energy efficiency program. It is also intended to help monitor the performance of renewable energy systems and to enhance indoor environmental quality in buildings.

  19. Non proliferation regimes undertakings: Benefits and limits of synergies in verification technologies and procedures

    International Nuclear Information System (INIS)

    Richard, M.

    2001-01-01

    Full text: Thirty years ago the NPT was entering into force. Therewith, when a State became party to the NPT, it had, in accordance with article III.1 of the Treaty, an undertaking to conclude a Comprehensive Safeguards agreement with the IAEA and accept safeguards verification on source or special fissionable material in all peaceful nuclear activities within its territories in order to verify that such material is not diverted. This multilateral instrument was the foundation stone of the non-proliferation regime and marked the actual birth of internationally accepted measures to verily compliance with politically stringent agreements. Since that time several important multilateral or bilateral instruments on non-proliferation and disarmament have been negotiated and adopted to curb the development and the acquisition of Weapons of Mass Destruction (WMD) most of them since the middle of the eighties and the collapse of the Soviet Union. Amongst the multilateral instruments are the Convention on the Prohibition of Bacteriological Weapon and Toxin Weapons (1972), the Convention on the Prohibition of Chemical Weapons (1993), the Comprehensive Test Ban Treaty (1996), the Strengthening of the IAEA Safeguards and the Additional Protocol (1997), with some still in negotiation like the Protocol of the Convention on the Prohibition of Bacteriological and Toxin Weapons, and some on which negotiation is still a wish like the Fissile Material Cut-off Treaty. Bilateral disarmament agreements between the United States of America and the Russian Federation such as the INF Treaty, START I and II, the agreements on the elimination of excess defence nuclear material as well as the Trilateral Initiative with the IAEA pave the way to nuclear disarmament with the reduction of both the number of nuclear weapons arsenal and the fissile material inventories. The politically stringent undertakings of States that have become parties to those agreements would not be possible without the

  20. Working Group 2: Future Directions for Safeguards and Verification, Technology, Research and Development

    International Nuclear Information System (INIS)

    Zykov, S.; Blair, D.

    2013-01-01

    For traditional safeguards it was recognized that the hardware presently available is, in general, addressing adequately fundamental IAEA needs, and that further developments should therefore focus mainly on improving efficiencies (i.e. increasing cost economies, reliability, maintainability and user-friendliness, keeping abreast of continual advancements in technologies and of the evolution of verification approaches). Specific technology areas that could benefit from further development include: -) Non-destructive measurement systems (NDA), in particular, gamma-spectroscopy and neutron counting techniques; -) Containment and surveillance tools, such as tamper indicating seals, video-surveillance, surface identification methods, etc.; -) Geophysical methods for design information verification (DIV) and safeguarding of geological repositories; and -) New tools and methods for real-time monitoring. Furthermore, the Working Group acknowledged that a 'building block' (or modular) approach should be adopted towards technology development, enabling equipment to be upgraded efficiently as technologies advance. Concerning non-traditional safeguards, in the area of satellite-based sensors, increased spatial resolution and broadened spectral range were identified as priorities. In the area of wide area surveillance, the development of LIDAR-like tools for atmospheric sensing was discussed from the perspective of both potential benefits and certain limitations. Recognizing the limitations imposed by the human brain in terms of information assessment and analysis, technologies are needed that will enable the more effective utilization of all information, regardless of its format and origin. The paper is followed by the slides of the presentation. (A.C.)

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES/CLEAN DIESEL TECHNOLOGIES FUEL BORNE CATALYST WITH CLEANAIR SYSTEM'S DIESEL OXIDATION CATALYST

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with CleanAir System's Diesel Oxidation Catalyst manufactured by Clean Diesel Technologies, Inc. The technology is a fuel-borne catalyst used in ultra low sulfur d...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES: CLEAN DIESEL TECHNOLOGIES FUEL-BORNE CATALYST WITH MITSUI/PUREARTH CATALYZED WIRE MESH FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with Mitsui/PUREarth Catalyzed Wire Mesh Filter manufactured by Clean Diesel Technologies, Inc. The technology is a platinum/cerium fuel-borne catalyst in commerci...

  3. A Comparison of the Use of Bony Anatomy and Internal Markers for Offline Verification and an Evaluation of the Potential Benefit of Online and Offline Verification Protocols for Prostate Radiotherapy

    International Nuclear Information System (INIS)

    McNair, Helen A.; Hansen, Vibeke N.; Parker, Christopher; Evans, Phil M.; Norman, Andrew; Miles, Elizabeth; Harris, Emma J.; Del-Acroix, Louise; Smith, Elizabeth; Keane, Richard; Khoo, Vincent S.; Thompson, Alan C.; Dearnaley, David P.

    2008-01-01

    Purpose: To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Methods and Materials: Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. Results: The systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to <1 mm. Intrafraction motion had greater impact on the effectiveness of the online protocol than the offline protocols. Conclusions: An offline protocol using gold markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion

  4. Protocol for the quality control systems of electronic portal imaging used in verification of radiotherapy treatment

    International Nuclear Information System (INIS)

    Silvestre, Ileana; Alfonso, Rodolfo; Garcia, Fernando

    2009-01-01

    Following the approach of quality control of radiotherapy equipment, conceived in the IAEA TECDOC-1151, we analyzed the different tests must be to an EPID to guarantee levels of accuracy required in the administration of radiation treatments, including the study of the impact of different parameters, geometric and dosimetric imaging, involved in the process. Established the types and frequency of checks, as well as procedures for their implementation, the allowable tolerances set of values records and forms for recording . Was carried out assessment protocol in various services based on amorphous silicon EPID for its applicability and scope. Was designed and validated in clinical practice protocol for EPID quality control, demonstrating its applicability with a minimum of material and human resources. It We concluded that with proper and systematic quality control program, tests including dosimetry, the EPID can provide valuable information about physico-beam dosimetry, and ensure adequate accuracy geometric in the patient's location. (author)

  5. US monitoring and verification technology: on-site inspection experience and future challenges

    International Nuclear Information System (INIS)

    Gullickson, R.L.; Carlson, D.; Ingraham, J.; Laird, B.

    2013-01-01

    The United States has a long and successful history of cooperation with treaty partners in monitoring and verification. For strategic arms reduction treaties, our collaboration has resulted in the development and application of systems with limited complexity and intrusiveness. As we progress beyond New START (NST) along the 'road to zero', the reduced number of nuclear weapons is likely to require increased confidence in monitoring and verification techniques. This may place increased demands on the technology to verify the presence of a nuclear weapon and even confirm the presence of a certain type. Simultaneously, this technology must include the ability to protect each treaty partner's sensitive nuclear weapons information. Mutual development of this technology by treaty partners offers the best approach for acceptance in treaty negotiations. This same approach of mutual cooperation and development is essential for developing nuclear test monitoring technology in support of the Comprehensive Nuclear Test Ban Treaty (CTBT). Our ability to detect low yield and evasive testing will be enhanced through mutually developed techniques and experiments using laboratory laser experiments and high explosives tests in a variety of locations and geologies. (authors)

  6. Technology Foresight and nuclear test verification: a structured and participatory approach

    Science.gov (United States)

    Noack, Patrick; Gaya-Piqué, Luis; Haralabus, Georgios; Auer, Matthias; Jain, Amit; Grenard, Patrick

    2013-04-01

    As part of its mandate, the CTBTO's nuclear explosion monitoring programme aims to maintain its sustainability, effectiveness and its long-term relevance to the verification regime. As such, the PTS is conducting a Technology Foresight programme of activities to identify technologies, processes, concepts and ideas that may serve said purpose and become applicable within the next 20 years. Through the Technology Foresight activities (online conferences, interviews, surveys, workshops and other) we have involved the wider science community in the fields of seismology, infrasound, hydroacoustics, radionuclide technology, remote sensing and geophysical techniques. We have assembled a catalogue of over 200 items, which incorporate technologies, processes, concepts and ideas which will have direct future relevance to the IMS (International Monitoring System), IDC (International Data Centre) and OSI (On-Site Inspection) activities within the PTS. In order to render this catalogue as applicable and useful as possible for strategy and planning, we have devised a "taxonomy" based on seven categories, against which each technology is assessed through a peer-review mechanism. These categories are: 1. Focus area of the technology in question: identify whether the technology relates to (one or more of the following) improving our understanding of source and source physics; propagation modelling; data acquisition; data transport; data processing; broad modelling concepts; quality assurance and data storage. 2. Current Development Stage of the technology in question. Based on a scale from one to six, this measure is specific to PTS needs and broadly reflects Technology Readiness Levels (TRLs). 3. Impact of the technology on each of the following capabilities: detection, location, characterization, sustainment and confidence building. 4. Development cost: the anticipated monetary cost of validating a prototype (i.e. Development Stage 3) of the technology in question. 5. Time to

  7. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    This paper presents the formal definition of Pragmatics Annotated Coloured Petri Nets (PA-CPNs). PA-CPNs represent a class of Coloured Petri Nets (CPNs) that are designed to support automated code genera-tion of protocol software. PA-CPNs restrict the structure of CPN models and allow Petri net...... elements to be annotated with so-called pragmatics, which are exploited for code generation. The approach and tool for gen-erating code is called PetriCode and has been discussed and evaluated in earlier work already. The contribution of this paper is to give a formal def-inition for PA-CPNs; in addition...

  8. CTBT verification-related technologies for peaceful purposes: the French experiences of international cooperation

    International Nuclear Information System (INIS)

    Massinon, B.

    1999-01-01

    The French experience concerning CTBT verification-related technologies for peaceful purposes as well a the international cooperation in this field are presented. Possible objectives and cooperation program needs are cited. French experience in international cooperation is related to seismology and seismic hazards in Bolivia, Madagascar, Nepal and Indonesia and is considered as very constructive, meaning that technical experience is developed, consistent scientific results are obtained, and a considerable yield to the CTBT task is achieved. Large scientific benefits are expected from the CTBTO

  9. A verification protocol for the probe sequences of Affymetrix genome arrays reveals high probe accuracy for studies in mouse, human and rat

    Directory of Open Access Journals (Sweden)

    Nap Jan-Peter

    2007-04-01

    Full Text Available Abstract Background The Affymetrix GeneChip technology uses multiple probes per gene to measure its expression level. Individual probe signals can vary widely, which hampers proper interpretation. This variation can be caused by probes that do not properly match their target gene or that match multiple genes. To determine the accuracy of Affymetrix arrays, we developed an extensive verification protocol, for mouse arrays incorporating the NCBI RefSeq, NCBI UniGene Unique, NIA Mouse Gene Index, and UCSC mouse genome databases. Results Applying this protocol to Affymetrix Mouse Genome arrays (the earlier U74Av2 and the newer 430 2.0 array, the number of sequence-verified probes with perfect matches was no less than 85% and 95%, respectively; and for 74% and 85% of the probe sets all probes were sequence verified. The latter percentages increased to 80% and 94% after discarding one or two unverifiable probes per probe set, and even further to 84% and 97% when, in addition, allowing for one or two mismatches between probe and target gene. Similar results were obtained for other mouse arrays, as well as for human and rat arrays. Based on these data, refined chip definition files for all arrays are provided online. Researchers can choose the version appropriate for their study to (reanalyze expression data. Conclusion The accuracy of Affymetrix probe sequences is higher than previously reported, particularly on newer arrays. Yet, refined probe set definitions have clear effects on the detection of differentially expressed genes. We demonstrate that the interpretation of the results of Affymetrix arrays is improved when the new chip definition files are used.

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: UTC FUEL CELLS' PC25C POWER PLANT - GAS PROCESSING UNIT PERFORMANCE FOR ANAEROBIC DIGESTER GAS

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system based on the UTC Fuel Cell's PC25C Fuel Cell Power Plant was evaluated. The...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT-A AND A ENVIRONMENTAL SEALS, INC., SEAL ASSIST SYSTEM (SAS) PHASE II REPORT

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Seal Assist System (SAS) for natural gas reciprocating compressor rod packing manufactured by A&A Environmental Seals, Inc. The SAS uses a secondary containment gland to collect natural g...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: RESIDENTIAL ELECTRIC POWER GENERATION USING THE PLUG POWER SU1 FUEL CELL SYSTEM

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Plug Power SU1 Fuel Cell System manufactured by Plug Power. The SU1 is a proton exchange membrane fuel cell that requires hydrogen (H2) as fuel. H2 is generally not available, so the ...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, CUMMINS EMISSION SOLUTIONS AND CUMMINS FILTRATION DIESEL OXIDATION CATALYST AND CLOSED CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) Program. ETV seeks to provide high-quality, peer-reviewed data on technology performance. The Air Pollution Control Technology (APCT) Verification Center, a center under the ETV Program, is operated by Res...

  15. Sandia technology. Volume 13, number 2 Special issue: verification of arms control treaties

    International Nuclear Information System (INIS)

    1989-01-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  16. Sandia technology. Volume 13, number 2 Special issue : verification of arms control treaties.

    Energy Technology Data Exchange (ETDEWEB)

    1989-03-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, BWF AMERICA, INC. GRADE 700 MPS POLYESTER FELT FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size for particles equal to or smaller than...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, W.L. GORE & ASSOCIATES, INC. LYSB3 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size for particles equal to or smaller than...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, W.L. GORE & ASSOCIATES, INC., L4427 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - LEAD IN DUST WIPE MEASUREMENT TECHNOLOGY, PALINTEST, SCANNING ANALYZER , SA-5000 SYSTEM

    Science.gov (United States)

    ETV works in partnership with recognized standards and testing organizations and stakeholder groups consisting of regulators, buyers, and vendor organizations, with the full participation of individual technology developers. The program evaluates the performance of innovative

  1. Students' Use of Technological Tools for Verification Purposes in Geometry Problem Solving

    Science.gov (United States)

    Papadopoulos, Ioannis; Dagdilelis, Vassilios

    2008-01-01

    Despite its importance in mathematical problem solving, verification receives rather little attention by the students in classrooms, especially at the primary school level. Under the hypotheses that (a) non-standard tasks create a feeling of uncertainty that stimulates the students to proceed to verification processes and (b) computational…

  2. Research on key technology of the verification system of steel rule based on vision measurement

    Science.gov (United States)

    Jia, Siyuan; Wang, Zhong; Liu, Changjie; Fu, Luhua; Li, Yiming; Lu, Ruijun

    2018-01-01

    The steel rule plays an important role in quantity transmission. However, the traditional verification method of steel rule based on manual operation and reading brings about low precision and low efficiency. A machine vison based verification system of steel rule is designed referring to JJG1-1999-Verificaiton Regulation of Steel Rule [1]. What differentiates this system is that it uses a new calibration method of pixel equivalent and decontaminates the surface of steel rule. Experiments show that these two methods fully meet the requirements of the verification system. Measuring results strongly prove that these methods not only meet the precision of verification regulation, but also improve the reliability and efficiency of the verification system.

  3. Determination of multi-GNSS pseudo-absolute code biases and verification of receiver tracking technology

    Science.gov (United States)

    Villiger, Arturo; Schaer, Stefan; Dach, Rolf; Prange, Lars; Jäggi, Adrian

    2017-04-01

    It is common to handle code biases in the Global Navigation Satellite System (GNSS) data analysis as conventional differential code biases (DCBs): P1-C1, P1-P2, and P2-C2. Due to the increasing number of signals and systems in conjunction with various tracking modes for the different signals (as defined in RINEX3 format), the number of DCBs would increase drastically and the bookkeeping becomes almost unbearable. The Center for Orbit Determination in Europe (CODE) has thus changed its processing scheme to observable-specific signal biases (OSB). This means that for each observation involved all related satellite and receiver biases are considered. The OSB contributions from various ionosphere analyses (geometry-free linear combination) using different observables and frequencies and from clock analyses (ionosphere-free linear combination) are then combined on normal equation level. By this, one consistent set of OSB values per satellite and receiver can be obtained that contains all information needed for GNSS-related processing. This advanced procedure of code bias handling is now also applied to the IGS (International GNSS Service) MGEX (Multi-GNSS Experiment) procedure at CODE. Results for the biases from the legacy IGS solution as well as the CODE MGEX processing (considering GPS, GLONASS, Galileo, BeiDou, and QZSS) are presented. The consistency with the traditional method is confirmed and the new results are discussed regarding the long-term stability. When processing code data, it is essential to know the true observable types in order to correct for the associated biases. CODE has been verifying the receiver tracking technologies for GPS based on estimated DCB multipliers (for the RINEX 2 case). With the change to OSB, the original verification approach was extended to search for the best fitting observable types based on known OSB values. In essence, a multiplier parameter is estimated for each involved GNSS observable type. This implies that we could

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT, PERFORMANCE OF INDUCTION MIXERS FOR DISINFECTION OF WET WEATHER FLOWS, US FILTER/STRANCO PRODUCTS WATER CHAMP R F SERIES CHEMICAL INDUCTION SYSTEM

    Science.gov (United States)

    The Wet-Weather Flow Technologies Pilot of the EPA's Technology Verification (ETV) Program under a partnership with NSF International has verified the performawnce of the USFilter/Stranco Products chemical induction mixer used for disinfection of wet-weather flows. The USFilter t...

  5. Quality Assurance in Environmental Technology Verification (ETV): Analysis and Impact on the EU ETV Pilot Programme Performance

    Science.gov (United States)

    Molenda, Michał; Ratman-Kłosińska, Izabela

    2018-03-01

    Many innovative environmental technologies never reach the market because they are new and cannot demonstrate a successful track record of previous applications. This fact is a serious obstacle on their way to the market. Lack of credible data on the performance of a technology causes mistrust of investors in innovations, especially from public sector, who seek effective solutions however without compromising the technical and financial risks associated with their implementation. Environmental technology verification (ETV) offers a credible, robust and transparent process that results in a third party confirmation of the claims made by the providers about the performance of the novel environmental technologies. Verifications of performance are supported by high quality, independent test data. In that way ETV as a tool helps establish vendor credibility and buyer confidence. Several countries across the world have implemented ETV in the form of national or regional programmes. ETV in the European Union was implemented as a voluntary scheme if a form of a pilot programme. The European Commission launched the Environmental Technology Pilot Programme of the European Union (EU ETV) in 2011. The paper describes the European model of ETV set up and put to operation under the Pilot Programme of Environmental Technologies Verification of the European Union. The goal, objectives, technological scope, involved entities are presented. An attempt has been made to summarise the results of the EU ETV scheme performance available for the period of 2012 when the programme has become fully operational until the first half of 2016. The study was aimed at analysing the overall organisation and efficiency of the EU ETV Pilot Programme. The study was based on the analysis of the documents the operation of the EU ETV system. For this purpose, a relevant statistical analysis of the data on the performance of the EU ETV system provided by the European Commission was carried out.

  6. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  7. Generic Protocol for the Verification of Ballast Water Treatment Technology. Version 5.1

    Science.gov (United States)

    2010-09-01

    analytical measurements, vital stains and dyes , and molecular probes. The inclusion or substitution of these techniques to those described above is acceptable...freshwater at various times using a Hach DREL/ 2010 spectrophotometer with Ozone Accuvac ampoules that measure the formation of indigo (US EPA Method

  8. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author).

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES--PUREM NORTH AMERICA LLC, PMF GREENTEC 1004205.00.0 DIESEL PARTICULATE FILTER

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) program to provide high quality, peer reviewed data on technology performance to those involved in the design, distribution, financing, permitting, purchase, and use of environmental technologies. The Air Po...

  10. Evaluation of detector array technology for the verification of advanced intensity-modulated radiotherapy

    Science.gov (United States)

    Hussien, Mohammad

    Purpose: Quality assurance (QA) for intensity modulated radiotherapy (IMRT) has evolved substantially. In recent years, various ionization chamber or diode detector arrays have become commercially available, allowing pre-treatment absolute dose verification with near real-time results. This has led to a wide uptake of this technology to replace point dose and film dosimetry and to facilitate QA streamlining. However, arrays are limited by their spatial resolution giving rise to concerns about their response to clinically relevant deviations. The common factor in all commercial array systems is the reliance on the gamma index (γ) method to provide the quantitative evaluation of the measured dose distribution against the Treatment Planning System (TPS) calculated dose distribution. The mathematical definition of the gamma index presents computational challenges that can cause a variation in the calculation in different systems. The purpose of this thesis was to evaluate the suitability of detector array systems, combined with their implementation of the gamma index, in the verification and dosimetry audit of advanced IMRT. Method: The response of various commercial detector array systems (Delta4®, ArcCHECK®, and the PTW 2D-Array seven29™ and OCTAVIUS II™ phantom combination, Gafchromic® EBT2 and composite EPID measurements) to simulated deliberate changes in clinical IMRT and VMAT plans was evaluated. The variability of the gamma index calculation in the different systems was also evaluated by comparing against a bespoke Matlab-based gamma index analysis software. A novel methodology for using a commercial detector array in a dosimetry audit of rotational radiotherapy was then developed. Comparison was made between measurements using the detector array and those performed using ionization chambers, alanine and radiochromic film. The methodology was developed as part of the development of a national audit of rotational radiotherapy. Ten cancer centres were

  11. Verification of an altitude decompression sickness prevention protocol for Shuttle operations utilizing a 10.s psi pressure stage

    Science.gov (United States)

    Waligora, J. M.; Horrigan, D. J., Jr.; Conkin, J.; Hadley, A. T., III

    1984-01-01

    Three test series involving 173-man tess were conducted to define and verify a pre-extravehicular activity (EVA) denitrogenation procedure that would provide acceptable protection against altitude decompression sickness while minimizing the required duration of oxygen (O2) prebreathe in the suit prior to EVA. The tests also addressed the safety, in terms of incidence of decompression sickness, of conducting EVA's on consecutive days rather than on alternate days. The tests were conducted in an altitude chamber, subjects were selected as representative of the astronaut population, and EVA periods were simulated by reducing the chamber pressure to suit pressure while the subjects breathed O2 with masks and worked at EVA representative work rates. A higher than anticipated incidence of both venous bubbles (55%) and symptoms (26%) was measured following all denitrogenation protocols in this test. For the most part, symptoms were very minor and stabilized, diminished, or disappeared in the six-hour tests. Instances of clear, possible, or potential systemic symptoms were encountered only after use of the unmodified 10.2 psi protocol and not after the modified 10.2 psi protocol, the 3.5-hour O2 prebreathed protocol, or the 4.0-hour O2 prebreathe protocol. The high incidence of symptoms is ascribed to the type and duration of exercise and the sensitivity of the reporting technique to minor symptoms. Repeated EVA exposures after only 17 hours did not increase symptom or bubble incidence.

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: IN-DRAIN TREATMENT DEVICE. HYDRO INTERNATIONAL UP-FLO™ FILTER

    Science.gov (United States)

    Verification testing of the Hydro International Up-Flo™ Filter with one filter module and CPZ Mix™ filter media was conducted at the Penn State Harrisburg Environmental Engineering Laboratory in Middletown, Pennsylvania. The Up-Flo™ Filter is designed as a passive, modular filtr...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, MIRATECH CORPORATIONM GECO 3001 AIR/FUEL RATIO CONTROLLER

    Science.gov (United States)

    Details on the verification test design, measurement test procedures, and Quality assurance/Quality Control (QA/QC) procedures can be found in the test plan titled Testing and Quality Assurance Plan, MIRATECH Corporation GECO 3100 Air/Fuel Ratio Controller (SRI 2001). It can be d...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HVLP COATING EQUIPMENT, SHARPE MANUFACTURING COMPANY PLATINUM 2012 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the Sharpe Platinum 2013 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the Sharpe Platinum, which is designed for use in automotive refinishing. The test coating chosen by Sharpe Manufacturi...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DEVILBISS JGHV-531-46FF HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss JGHV-531-46FF high-volume, low-pressure pressure-feed spray gun, hereafter referred to as the DeVilbiss JGHV, which is designed for use in industrial finishing. The test coating chosen by ITW Industrial Fi...

  16. An overview of CTBT verification technologies and status of IMS networks

    International Nuclear Information System (INIS)

    Basham, P.

    2002-01-01

    The CTBT history is described in brief. Nuclear test environments and verification regime are presented with illustrations. Geographical location of seismic, hydroacoustic, infrasound and radionuclide monitoring networks are indicated on globe maps. Benefits of the International Monitoring System (IMS) to host countries are listed

  17. Verification of an algorithm of cono collapsed through the IAEA TECDOC 1583 protocol and dosimetry with radiochromic films

    International Nuclear Information System (INIS)

    Martin-Viera Cueto, J. A.; Benitez Villegas, E. M.; Bodineau Gil, C.; Parra Osorio, V.; Garcia Pareja, S.; Casado Villalon, F. J.

    2013-01-01

    The objective of this study is to verify the characterization of the collapsed cone algorithm of an SP using this Protocol. In addition, given that it only offers details of dose values measured at discrete points, measures are complemented by a gamma test distributions 2D of doses in different cases using film radiochromic. (Author)

  18. International Performance Measurement and Verification Protocol: Concepts and Options for Determining Energy and Water Savings, Volume I (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    2002-03-01

    This protocol serves as a framework to determine energy and water savings resulting from the implementation of an energy efficiency program. It is also intended to help monitor the performance of renewable energy systems and to enhance indoor environmental quality in buildings.

  19. The sentence verification task: a reliable fMRI protocol for mapping receptive language in individual subjects

    International Nuclear Information System (INIS)

    Sanjuan, Ana; Avila, Cesar; Forn, Cristina; Ventura-Campos, Noelia; Rodriguez-Pujadas, Aina; Garcia-Porcar, Maria; Belloch, Vicente; Villanueva, Vicente

    2010-01-01

    To test the capacity of a sentence verification (SV) task to reliably activate receptive language areas. Presurgical evaluation of language is useful in predicting postsurgical deficits in patients who are candidates for neurosurgery. Productive language tasks have been successfully elaborated, but more conflicting results have been found in receptive language mapping. Twenty-two right-handed healthy controls made true-false semantic judgements of brief sentences presented auditorily. Group maps showed reliable functional activations in the frontal and temporoparietal language areas. At the individual level, the SV task showed activation located in receptive language areas in 100% of the participants with strong left-sided distributions (mean lateralisation index of 69.27). The SV task can be considered a useful tool in evaluating receptive language function in individual subjects. This study is a first step towards designing the fMRI task which may serve to presurgically map receptive language functions. (orig.)

  20. The sentence verification task: a reliable fMRI protocol for mapping receptive language in individual subjects

    Energy Technology Data Exchange (ETDEWEB)

    Sanjuan, Ana; Avila, Cesar [Universitat Jaume I, Departamento de Psicologia Basica, Clinica y Psicobiologia, Castellon de la Plana (Spain); Hospital La Fe, Unidad de Epilepsia, Servicio de Neurologia, Valencia (Spain); Forn, Cristina; Ventura-Campos, Noelia; Rodriguez-Pujadas, Aina; Garcia-Porcar, Maria [Universitat Jaume I, Departamento de Psicologia Basica, Clinica y Psicobiologia, Castellon de la Plana (Spain); Belloch, Vicente [Hospital La Fe, Eresa, Servicio de Radiologia, Valencia (Spain); Villanueva, Vicente [Hospital La Fe, Unidad de Epilepsia, Servicio de Neurologia, Valencia (Spain)

    2010-10-15

    To test the capacity of a sentence verification (SV) task to reliably activate receptive language areas. Presurgical evaluation of language is useful in predicting postsurgical deficits in patients who are candidates for neurosurgery. Productive language tasks have been successfully elaborated, but more conflicting results have been found in receptive language mapping. Twenty-two right-handed healthy controls made true-false semantic judgements of brief sentences presented auditorily. Group maps showed reliable functional activations in the frontal and temporoparietal language areas. At the individual level, the SV task showed activation located in receptive language areas in 100% of the participants with strong left-sided distributions (mean lateralisation index of 69.27). The SV task can be considered a useful tool in evaluating receptive language function in individual subjects. This study is a first step towards designing the fMRI task which may serve to presurgically map receptive language functions. (orig.)

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: STORMWATER SOURCE AREA TREATMENT DEVICE — BAYSAVER TECHNOLOGIES, INC. BAYSAVER SEPARATION SYSTEM, MODEL 10K

    Science.gov (United States)

    Verification testing of the BaySaver Separation System, Model 10K was conducted on a 10 acre drainage basin near downtown Griffin, Georgia. The system consists of two water tight pre-cast concrete manholes and a high-density polyethylene BaySaver Separator Unit. The BaySaver Mod...

  2. Comments for A Conference on Verification in the 21st Century

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  3. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  4. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  5. The monitoring, evaluation, reporting, and verification of climate change mitigation projects: Discussion of issues and methodologies and review of existing protocols and guidelines

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.; Sathaye, J.

    1997-12-01

    Because of concerns with the growing threat of global climate change from increasing emissions of greenhouse gases, the US and other countries are implementing, by themselves or in cooperation with one or more other nations (i.e., joint implementation), climate change mitigation projects. These projects will reduce greenhouse gas (GHG) emissions or sequester carbon, and will also result in non-GHG impacts (i.e., environmental, economic, and social impacts). Monitoring, evaluating, reporting, and verifying (MERV) guidelines are needed for these projects in order to accurately determine their net GHG, and other, benefits. Implementation of MERV guidelines is also intended to: (1) increase the reliability of data for estimating GHG benefits; (2) provide real-time data so that mid-course corrections can be made; (3) introduce consistency and transparency across project types and reporters; and (4) enhance the credibility of the projects with stakeholders. In this paper, the authors review the issues and methodologies involved in MERV activities. In addition, they review protocols and guidelines that have been developed for MERV of GHG emissions in the energy and non-energy sectors by governments, nongovernmental organizations, and international agencies. They comment on their relevance and completeness, and identify several topics that future protocols and guidelines need to address, such as (1) establishing a credible baseline; (2) accounting for impacts outside project boundaries through leakage; (3) net GHG reductions and other impacts; (4) precision of measurement; (5) MERV frequency; (6) persistence (sustainability) of savings, emissions reduction, and carbon sequestration; (7) reporting by multiple project participants; (8) verification of GHG reduction credits; (9) uncertainty and risk; (10) institutional capacity in conducting MERV; and (11) the cost of MERV.

  6. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  7. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    Science.gov (United States)

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  8. Verification of organ doses calculated by a dose monitoring software tool based on Monte Carlo Simulation in thoracic CT protocols.

    Science.gov (United States)

    Guberina, Nika; Suntharalingam, Saravanabavaan; Naßenstein, Kai; Forsting, Michael; Theysohn, Jens; Wetter, Axel; Ringelstein, Adrian

    2018-03-01

    Background The importance of monitoring of the radiation dose received by the human body during computed tomography (CT) examinations is not negligible. Several dose-monitoring software tools emerged in order to monitor and control dose distribution during CT examinations. Some software tools incorporate Monte Carlo Simulation (MCS) and allow calculation of effective dose and organ dose apart from standard dose descriptors. Purpose To verify the results of a dose-monitoring software tool based on MCS in assessment of effective and organ doses in thoracic CT protocols. Material and Methods Phantom measurements were performed with thermoluminescent dosimeters (TLD LiF:Mg,Ti) using two different thoracic CT protocols of the clinical routine: (I) standard CT thorax (CTT); and (II) CTT with high-pitch mode, P = 3.2. Radiation doses estimated with MCS and measured with TLDs were compared. Results Inter-modality comparison showed an excellent correlation between MCS-simulated and TLD-measured doses ((I) after localizer correction r = 0.81; (II) r = 0.87). The following effective and organ doses were determined: (I) (a) effective dose = MCS 1.2 mSv, TLD 1.3 mSv; (b) thyroid gland = MCS 2.8 mGy, TLD 2.5 mGy; (c) thymus = MCS 3.1 mGy, TLD 2.5 mGy; (d) bone marrow = MCS 0.8 mGy, TLD 0.9 mGy; (e) breast = MCS 2.5 mGy, TLD 2.2 mGy; (f) lung = MCS 2.8 mGy, TLD 2.7 mGy; (II) (a) effective dose = MCS 0.6 mSv, TLD 0.7 mSv; (b) thyroid gland = MCS 1.4 mGy, TLD 1.8 mGy; (c) thymus = MCS 1.4 mGy, TLD 1.8 mGy; (d) bone marrow = MCS 0.4 mGy, TLD 0.5 mGy; (e) breast = MCS 1.1 mGy, TLD 1.1 mGy; (f) lung = MCS 1.2 mGy, TLD 1.3 mGy. Conclusion Overall, in thoracic CT protocols, organ doses simulated by the dose-monitoring software tool were coherent to those measured by TLDs. Despite some challenges, the dose-monitoring software was capable of an accurate dose calculation.

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: BROME AGRI SALES, LTD., MAXIMIZER SEPARATOR, MODEL MAX 1016 - 03/01/WQPC-SWP

    Science.gov (United States)

    Verification testing of the Brome Agri Sales Ltd. Maximizer Separator, Model MAX 1016 (Maximizer) was conducted at the Lake Wheeler Road Field Laboratory Swine Educational Unit in Raleigh, North Carolina. The Maximizer is an inclined screen solids separator that can be used to s...

  10. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    International Nuclear Information System (INIS)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D.

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs

  11. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D. [and others

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs.

  12. Economic and Environmental Effectiveness of a Technology-based Climate Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Buchner, B.; Cersosimo, I. [Fondazione Eni Enrico Mattei, Venice (Italy); Carraro, C. [University of Venice and Fondazione Eni Enrico Mattei, Campo Santa Maria Formosa, Palazzo Querini Stampalia, Castello 5252, 30122, Venice (Italy)

    2004-04-01

    The present stalemate in climate negotiations has led policy analysts and economists to explore the possible emergence of alternative climate regimes. This paper explores the idea of replacing international cooperation on greenhouse gas emission control with international cooperation on climate-related technological innovation and diffusion. This idea - recently proposed among others by Barrett (2001) and Benedick (2001) - is based on the insight that incentives to free-ride are much smaller in the case of technological cooperation than in the case of cooperation on emission control. This paper provides a first applied game theory analysis of a technology-based climate protocol by assessing: (1) the self-enforcingness (namely, the absence of incentives to free ride) of the coalition that would form when countries negotiate on climate-related technological cooperation; (2) the environmental effectiveness of a technology-based climate protocol. The analysis is carried out by using a model in which endogenous and induced technical change are explicitly modelled and in which international technological spillovers are also quantified. The results of our analysis partly support Barrett's and Benedick's conjecture. On the one hand, a self-enforcing agreement is more likely to emerge when countries cooperate on environmental technological innovation and diffusion than when they cooperate on emission abatement. However, technological cooperation - without any commitment to emission control - may not lead to a sufficient abatement of greenhouse gas concentrations.

  13. Biosafety assessment protocols for new organisms in New Zealand: Can they apply internationally to emerging technologies?

    International Nuclear Information System (INIS)

    Barratt, B.I.P.; Moeed, A.; Malone, L.A.

    2006-01-01

    An analysis of established biosafety protocols for release into the environment of exotic plants and biological control agents for weeds and arthropod pests has been carried out to determine whether such protocols can be applied to relatively new and emerging technologies intended for the primary production industries, such as transgenic plants. Example case studies are described to indicate the scope of issues considered by regulators who make decisions on new organism releases. No transgenic plants have been released to date in New Zealand, but two field test approvals are described as examples. An analysis of the biosafety protocols has shown that, while many of the risk criteria considered for decision-making by regulators are similar for all new organisms, a case-by-case examination of risks and potential impacts is required in order to fully assess risk. The value of post-release monitoring and validation of decisions made by regulators is emphasised

  14. MAGMAsoft simulation applied in verification of technology to produce new range of alloy steel castings

    Directory of Open Access Journals (Sweden)

    A. Gwiżdż

    2010-07-01

    Full Text Available The article presents the results of MAGMAsoft application in simulation of the pouring and solidfication of castings made fromGS20Mn5 steel, basing on some principles adopted in the starting technology. The results of simulation were disclosed in the form of 3Ddrawings, showing the technology of pouring, selected stages of solidification, and porosity in castings made by the examined technology. Using simulation results, some modifications were introduced to the pouring technology, the simulation was repeated, and the results obtained for the technology before and after the modification were compared. Based on the guidelines provided in new technology, the pattern tooling was made. The process of mould preparation was described, along with the process of steel melting and pouring. Castings made by the new technology were X-rayed and subjected to heat treatment according to the newly developed cycle. Together with the main casting, test wedges were poured. Mechanical tests and structure examinations were performed. The results of the tests and investigations were evaluated.

  15. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  16. The experimental verification of the condition of the magnetic material caused by different technological processes

    CERN Document Server

    Tumanski, S

    2000-01-01

    The changes of electrical steel parameters caused by different technological processes have been tested using the magnetovision method. The effects of cutting into the strips, stamping the shape, laser scribing, annealing, bending and stressing have been investigated.

  17. Research on Digital Output Verification Technology of Electronic DC Current Transformer

    Science.gov (United States)

    Chen, Yuanjie; Wang, Bin; Hu, Haoliang; Xiong, Qianzhu; Yang, Chunyan

    2017-05-01

    Aiming at the error of calibration system when conducting field calibration by electronic DC current transformer’s digital calibration system, an electronic DC current transformer’s digital calibration system based on protocol conversion is proposed and researched. Data frames outputted from merging unit are collected and converted by the system, the digital synchronization is realized by using the synchronous clock device to trigger the second pulse, and it is verified by the virtual instrument design software. The field calibration is conducted to some converter station digital dc current transformer under the rated current of 500A by using the calibration system. By calibrating and analyzing errors, the error is less than 0.075% when tested current is more than 40% of the rated current. According the standard in literature[1], performance of the calibration system is perfect, measured results perfectly meet the requirements of design, and the calibration system has great practical application value.

  18. Test/QA Plan for Verification of Coliform Detection Technologies for Drinking Water

    Science.gov (United States)

    The coliform detection technologies to be tested use chromatogenic and fluorogenic growth media to detect coliforms and E. coli based on the enzymatic activity of these organisms. The systems consist of single-use sample containers that contain pre-measured reagents and can be u...

  19. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A; Arreaza-Rubin, Guillermo; Burk, Robert D; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W

    2016-05-01

    Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled "Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program" is attached as supplementary material. This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. © 2015 Diabetes Technology Society.

  20. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  1. Mechanical Verification of Cryptographic Protocols

    Science.gov (United States)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  2. Satellite Power Systems (SPS) concept definition study. Volume 6: SPS technology requirements and verification

    Science.gov (United States)

    Hanley, G.

    1978-01-01

    Volume 6 of the SPS Concept Definition Study is presented and also incorporates results of NASA/MSFC in-house effort. This volume includes a supporting research and technology summary. Other volumes of the final report that provide additional detail are as follows: (1) Executive Summary; (2) SPS System Requirements; (3) SPS Concept Evolution; (4) SPS Point Design Definition; (5) Transportation and Operations Analysis; and Volume 7, SPS Program Plan and Economic Analysis.

  3. INNOVATIVE TECHNOLOGY VERIFICATION REPORT "FIELD MEASUREMENT TECHNOLOGIES FOR TOTAL PETROLEUM HYDROCARBONS IN SOIL" DEXSIL CORPORATION PETROFLAG SYSTEM

    Science.gov (United States)

    The PetroFLAGTm System developed by Dexsilo Corporation (Dexsil) was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Hueneme, California. The purpose o...

  4. Integration of multidisciplinary technologies for real time target visualization and verification for radiotherapy

    Directory of Open Access Journals (Sweden)

    Chang WC

    2014-06-01

    Full Text Available Wen-Chung Chang,1,* Chin-Sheng Chen,2,* Hung-Chi Tai,3 Chia-Yuan Liu,4,5 Yu-Jen Chen3 1Department of Electrical Engineering, National Taipei University of Technology, Taipei, Taiwan; 2Graduate Institute of Automation Technology, National Taipei University of Technology, Taipei, Taiwan; 3Department of Radiation Oncology, Mackay Memorial Hospital, Taipei, Taiwan; 4Department of Internal Medicine, Mackay Memorial Hospital, Taipei, Taiwan; 5Department of Medicine, Mackay Medical College, New Taipei City, Taiwan  *These authors contributed equally to this work Abstract: The current practice of radiotherapy examines target coverage solely from digitally reconstructed beam's eye view (BEV in a way that is indirectly accessible and that is not in real time. We aimed to visualize treatment targets in real time from each BEV. The image data of phantom or patients from ultrasound (US and computed tomography (CT scans were captured to perform image registration. We integrated US, CT, US/CT image registration, robotic manipulation of US, a radiation treatment planning system, and a linear accelerator to constitute an innovative target visualization system. The performance of this algorithm segmented the target organ in CT images, transformed and reconstructed US images to match each orientation, and generated image registration in real time mode with acceptable accuracy. This image transformation allowed physicians to visualize the CT image-reconstructed target via a US probe outside the BEV that was non-coplanar to the beam's plane. It allowed the physicians to remotely control the US probe that was equipped on a robotic arm to dynamically trace and real time monitor the coverage of the target within the BEV during a simulated beam-on situation. This target visualization system may provide a direct remotely accessible and real time way to visualize, verify, and ensure tumor targeting during radiotherapy. Keywords: ultrasound, computerized tomography

  5. Remote Sensing and the Kyoto Protocol: A Review of Available and Future Technology for Monitoring Treaty Compliance

    Science.gov (United States)

    Imhoff, Marc L.; Rosenquist, A.; Milne, A. K.; Dobson, M. C.; Qi, J.

    2000-01-01

    An International workshop was held to address how remote sensing technology could be used to support the environmental monitoring requirements of the Kyoto Protocol. An overview of the issues addressed and the findings of the workshop are discussed.

  6. CTBT verification-related technologies for peaceful purposes: Implementation of CTBT in Iran

    International Nuclear Information System (INIS)

    Ghafory-Ashtiany, M.; Hosseinie, Mohammad-Taghi

    1999-01-01

    Based on its strong policy on disarmament and non proliferation, Islamic Republic of Iran considers CTBT as one of the measures towards the safe world and free from nuclear weapons. It is believed that full implementation of this treaty increases international security as well as national security of every state signatory. It is also considered that it has many scientific and technological benefits for sustainable development of the countries. This paper deals with international monitoring system in Iran, including primary and auxiliary seismic stations, infrasound and radionuclides monitoring systems

  7. Nuclear cooperation targets global challenges. States back main pillars of the IAEA's work to strengthen nuclear safety, verification and technology transfer

    International Nuclear Information System (INIS)

    2000-01-01

    States meeting at the 44th IAEA General Conference in Vienna have set a challenging agenda for international nuclear cooperation into the 21st century that targets issues of global safety, security, and sustainable development. They adopted resolutions endorsing the Agency's programmes for strengthening activities under its three main pillars of work - nuclear verification, safety, and technology - that are closely linked to major challenges before the world. The document presents the main actions taken during the conference

  8. Verification of best available technology for the 300 Area Treated Effluent Disposal Facility (310 Facility)

    International Nuclear Information System (INIS)

    Wagner, R.N.

    1994-01-01

    This compilation of Project L-045H reference materials documents that the 300 Area Treated Effluent Disposal Facility (TEDF, also designated the 310 Facility) was designed, built, and will be operated in accordance with the best available technology (BAT) identified in the Engineering Summary Report. The facility is intended for treatment of 300 Area process sewer wastewater. The following unit operations for 300 Area process sewer water treatment are specified as: influent receipt; iron co-precipitation and sludge handling for removal of heavy metals and initial suspended solids; ion exchanged for removal of mercury and other heavy metals; ultraviolet (UV)/peroxide treatment for destruction of organic compounds, cyanide, coliforms, sulfide, and nitrite; and effluent discharge to the Columbia River with pH monitoring/control capability

  9. Development of the SEAtrace{trademark} barrier verification and validation technology. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Dunn, S.D.; Lowry, W.; Walsh, R.; Rao, D.V. [Science and Engineering Associates, Santa Fe, NM (United States); Williams, C. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.

    1998-08-01

    In-situ barrier emplacement techniques and materials for the containment of high-risk contaminants in soils are currently being developed by the Department of Energy (DOE). Because of their relatively high cost, the barriers are intended to be used in cases where the risk is too great to remove the contaminants, the contaminants are too difficult to remove with current technologies, or the potential movement of the contaminants to the water table is so high that immediate action needs to be taken to reduce health risks. Assessing the integrity of the barrier once it is emplaced, and during its anticipated life, is a very difficult but necessary requirement. Science and Engineering Associates, Inc., (SEA) and Sandia National Laboratories (SNL) have developed a quantitative subsurface barrier assessment system using gaseous tracers in support of the Subsurface Contaminants Focus Area barrier technology program. Called SEAtrace{trademark}, this system integrates an autonomous, multi-point soil vapor sampling and analysis system with a global optimization modeling methodology to locate and size barrier breaches in real time. The methodology for the global optimization code was completed and a prototype code written using simplifying assumptions. Preliminary modeling work to validate the code assumptions were performed using the T2VOC numerical code. A multi-point field sampling system was built to take soil gas samples and analyze for tracer gas concentration. The tracer concentration histories were used in the global optimization code to locate and size barrier breaches. SEAtrace{trademark} was consistently able to detect and locate leaks, even under very adverse conditions. The system was able to locate the leak to within 0.75 m of the actual value, and was able to determine the size of the leak to within 0.15 m.

  10. Testing and Demonstrating Speaker Verification Technology in Iraqi-Arabic as Part of the Iraqi Enrollment Via Voice Authentication Project (IEVAP) in Support of the Global War on Terrorism (GWOT)

    National Research Council Canada - National Science Library

    Withee, Jeffrey W; Pena, Edwin D

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment...

  11. Mobile Health Technology Interventions for Suicide Prevention: Protocol for a Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Melia, Ruth; Francis, Kady; Duggan, Jim; Bogue, John; O'Sullivan, Mary; Chambers, Derek; Young, Karen

    2018-01-26

    Previous research has reported that two of the major barriers to help-seeking for individuals at risk of suicide are stigma and geographical isolation. Mobile technology offers a potential means of delivering evidence-based interventions with greater specificity to the individual, and at the time that it is needed. Despite documented motivation by at-risk individuals to use mobile technology to track mental health and to support psychological interventions, there is a shortfall of outcomes data on the efficacy of mobile health (mHealth) technology on suicide-specific outcomes. The objective of this study is to develop a protocol for a systematic review and meta-analysis that aims to evaluate the effectiveness of mobile technology-based interventions for suicide prevention. The search includes the Cochrane Central Register of Controlled Trials (CENTRAL: The Cochrane Library), MEDLINE, Embase, PsycINFO, CRESP and relevant sources of gray literature. Studies that have evaluated psychological or nonpsychological interventions delivered via mobile computing and communication technology, and have suicidality as an outcome measure will be included. Two authors will independently extract data and assess the study suitability in accordance with the Cochrane Collaboration Risk of Bias Tool. Studies will be included if they measure at least one suicide outcome variable (ie, suicidal ideation, suicidal intent, nonsuicidal self-injurious behavior, suicidal behavior). Secondary outcomes will be measures of symptoms of depression. Where studies are sufficiently homogenous and reported outcomes are amenable for pooled synthesis, meta-analysis will be performed. A narrative synthesis will be conducted if the data is unsuitable for a meta-analysis. The review is in progress, with findings expected by summer 2018. To date, evaluations of mobile technology-based interventions in suicide prevention have focused on evaluating content as opposed to efficacy. Indeed, previous research has

  12. Early economic evaluation of emerging health technologies: protocol of a systematic review

    Science.gov (United States)

    2014-01-01

    Background The concept of early health technology assessment, discussed well over a decade, has now been collaboratively implemented by industry, government, and academia to select and expedite the development of emerging technologies that may address the needs of patients and health systems. Early economic evaluation is essential to assess the value of emerging technologies, but empirical data to inform the current practice of early evaluation is limited. We propose a systematic review of early economic evaluation studies in order to better understand the current practice. Methods/design This protocol describes a systematic review of economic evaluation studies of regulated health technologies in which the evaluation is conducted prior to regulatory approval and when the technology effectiveness is not well established. Included studies must report an economic evaluation, defined as the comparative analysis of alternatives with respect to their associated costs and health consequences, and must evaluate some regulated health technology such as pharmaceuticals, biologics, high-risk medical devices, or biomarkers. We will conduct the literature search on multiple databases, including MEDLINE, EMBASE, the Centre for Reviews and Dissemination Databases, and EconLit. Additional citations will be identified via scanning reference lists and author searching. We suspect that many early economic evaluation studies are unpublished, especially those conducted for internal use only. Additionally, we use a chain-referral sampling approach to identify authors of unpublished studies who work in technology discovery and development, starting out with our contact lists and authors who published relevant studies. Citation screening and full-text review will be conducted by pairs of reviewers. Abstracted data will include those related to the decision context and decision problem of the early evaluation, evaluation methods (e.g., data sources, methods, and assumptions used to

  13. Integrating addiction treatment into primary care using mobile health technology: protocol for an implementation research study.

    Science.gov (United States)

    Quanbeck, Andrew R; Gustafson, David H; Marsch, Lisa A; McTavish, Fiona; Brown, Randall T; Mares, Marie-Louise; Johnson, Roberta; Glass, Joseph E; Atwood, Amy K; McDowell, Helene

    2014-05-29

    Healthcare reform in the United States is encouraging Federally Qualified Health Centers and other primary-care practices to integrate treatment for addiction and other behavioral health conditions into their practices. The potential of mobile health technologies to manage addiction and comorbidities such as HIV in these settings is substantial but largely untested. This paper describes a protocol to evaluate the implementation of an E-Health integrated communication technology delivered via mobile phones, called Seva, into primary-care settings. Seva is an evidence-based system of addiction treatment and recovery support for patients and real-time caseload monitoring for clinicians. Our implementation strategy uses three models of organizational change: the Program Planning Model to promote acceptance and sustainability, the NIATx quality improvement model to create a welcoming environment for change, and Rogers's diffusion of innovations research, which facilitates adaptations of innovations to maximize their adoption potential. We will implement Seva and conduct an intensive, mixed-methods assessment at three diverse Federally Qualified Healthcare Centers in the United States. Our non-concurrent multiple-baseline design includes three periods - pretest (ending in four months of implementation preparation), active Seva implementation, and maintenance - with implementation staggered at six-month intervals across sites. The first site will serve as a pilot clinic. We will track the timing of intervention elements and assess study outcomes within each dimension of the Reach, Effectiveness, Adoption, Implementation, and Maintenance framework, including effects on clinicians, patients, and practices. Our mixed-methods approach will include quantitative (e.g., interrupted time-series analysis of treatment attendance, with clinics as the unit of analysis) and qualitative (e.g., staff interviews regarding adaptations to implementation protocol) methods, and assessment of

  14. Towards durable multistakeholder-generated solutions: The pilot application of a problem-oriented policy learning protocol to legality verification and community rights in Peru

    Science.gov (United States)

    D. Humphreys; B. Cashore; I.J. Visseren-Hamakers; W. De Jong; K. McGinley; A. Denvir; P. Caro Torres; S. Lupberger

    2017-01-01

    This paper reports and reflects on the pilot application of an 11-step policy learning protocol that was developed by Cashore and Lupberger (2015) based on several years of Cashore's multi-author collaborations. The protocol was applied for the first time in Peru in 2015 and 2016 by the IUFRO Working Party on Forest Policy Learning Architectures (hereinafter...

  15. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Today formal verification is finding increasing acceptance in some areas, especially model abstraction and functional verification. Other major chal- lenges, like timing verification, remain before this technology can be posed as a complete alternative to simulation. This special issue is devoted to presenting some of the ...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS FLG-631-318 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss FLG-631-318 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss FLG, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refi...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS GTI-600G, HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss GTi-600G high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss GTi, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refinis...

  18. Use of CCSDS and OSI Protocols on the Advanced Communications Technology Satellite

    Science.gov (United States)

    Chirieleison, Don

    1996-01-01

    Although ACTS (Advanced Communications Technology Satellite) provides an almost error-free channel during much of the day and under most conditions, there are times when it is not suitable for reliably error-free data communications when operating in the uncoded mode. Because coded operation is not always available to every earth station, measures must be taken in the end system to maintain adequate throughput when transferring data under adverse conditions. The most effective approach that we tested to improve performance was the addition of an 'outer' Reed-Solomon code through use of CCSDS (Consultative Committee for Space Data Systems) GOS 2 (a forward error correcting code). This addition can benefit all users of an ACTS channel including those applications that do not require totally reliable transport, but it is somewhat expensive because additional hardware is needed. Although we could not characterize the link noise statistically (it appeared to resemble uncorrelated white noise, the type that block codes are least effective in correcting), we did find that CCSDS GOS 2 gave an essentially error-free link at BER's (bit error rate) as high as 6x10(exp -4). For users that demand reliable transport, an ARQ (Automatic Repeat Queuing) protocol such as TCP (Transmission Control Protocol) or TP4 (Transport Protocol, Class 4) will probably be used. In this category, it comes as no surprise that the best choice of the protocol suites tested over ACTS was TP4 using CCSDS GOS 2. TP4 behaves very well over an error-free link which GOS 2 provides up to a point. Without forward error correction, however, TP4 service begins to degrade in the 10(exp -7)-10(exp -6) range and by 4x10(exp -6), it barely gives any throughput at all. If Congestion Avoidance is used in TP4, the degradation is even more pronounced. Fortunately, as demonstrated here, this effect can be more than compensated for by choosing the Selective Acknowledgment option. In fact, this option can enable TP4 to

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  20. Protocol of a Pilot Study of Technology-Enabled Coproduction in Pediatric Chronic Illness Care.

    Science.gov (United States)

    Kaplan, Heather C; Thakkar, Sunny Narendra; Burns, Lisa; Chini, Barbara; Dykes, Dana Mh; McPhail, Gary L; Moore, Erin; Saeed, Shehzad Ahmed; Eslick, Ian; Margolis, Peter A; Opipari-Arrigan, Lisa

    2017-04-28

    dramatic transformation to support more collaborative, effective, and patient-centered care. This study is unique in that it is testing not only the impact of technology, but also the necessary processes that facilitate patient and clinician collaboration. This pilot study is designed to examine how technology-enabled coproduction can be implemented in real-life clinical contexts. Once the Orchestra technology and intervention are optimized to ensure feasibility and acceptability, future studies can test the effectiveness of this approach to improve patient outcomes and health care value. ©Heather C Kaplan, Sunny Narendra Thakkar, Lisa Burns, Barbara Chini, Dana MH Dykes, Gary L McPhail, Erin Moore, Shehzad Ahmed Saeed, Ian Eslick, Peter A Margolis, Lisa Opipari-Arrigan. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 28.04.2017.

  1. Verification study on technology for preliminary investigation for HLW geological disposal. Part 2. Verification of surface geophysical prospecting through establishing site descriptive models

    International Nuclear Information System (INIS)

    Kondo, Hirofumi; Suzuki, Koichi; Hasegawa, Takuma; Goto, Keiichiro; Yoshimura, Kimitaka; Muramoto, Shigenori

    2012-01-01

    The Yokosuka demonstration and validation project using Yokosuka CRIEPI site has been conducted since FY 2006 as a cooperative research between NUMO (Nuclear Waste Management Organization of Japan) and CRIEPI. The objectives of this project are to examine and to refine the basic methodology of the investigation and assessment of properties of geological environment in the stage of Preliminary Investigation for HLW geological disposal. Within Preliminary Investigation technologies, surface geophysical prospecting is an important means of obtaining information from deep geological environment for planning borehole surveys. In FY 2010, both seismic prospecting (seismic reflection and vertical seismic profiling methods) for obtaining information about geological structure and electromagnetic prospecting (magneto-telluric and time domain electromagnetic methods) for obtaining information about resistivity structure reflecting the distribution of salt water/fresh water boundary to a depth of over several hundred meters were conducted in the Yokosuka CRIEPI site. Through these surveys, the contribution of geophysical prospecting methods in the surface survey stage to improving the reliability of site descriptive models was confirmed. (author)

  2. Nuclear disarmament verification

    Energy Technology Data Exchange (ETDEWEB)

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  3. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  4. Formal Methods Specification and Verification Guidebook for Software and Computer Systems. Volume 1; Planning and Technology Insertion

    Science.gov (United States)

    1995-01-01

    The Formal Methods Specification and Verification Guidebook for Software and Computer Systems describes a set of techniques called Formal Methods (FM), and outlines their use in the specification and verification of computer systems and software. Development of increasingly complex systems has created a need for improved specification and verification techniques. NASA's Safety and Mission Quality Office has supported the investigation of techniques such as FM, which are now an accepted method for enhancing the quality of aerospace applications. The guidebook provides information for managers and practitioners who are interested in integrating FM into an existing systems development process. Information includes technical and administrative considerations that must be addressed when establishing the use of FM on a specific project. The guidebook is intended to aid decision makers in the successful application of FM to the development of high-quality systems at reasonable cost. This is the first volume of a planned two-volume set. The current volume focuses on administrative and planning considerations for the successful application of FM.

  5. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  6. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  7. Generic Protocol for Optimization of Heterologous Protein Production Using Automated Microbioreactor Technology.

    Science.gov (United States)

    Hemmerich, Johannes; Freier, Lars; Wiechert, Wolfgang; von Lieres, Eric; Oldiges, Marco

    2017-12-15

    A core business in industrial biotechnology using microbial production cell factories is the iterative process of strain engineering and optimization of bioprocess conditions. One important aspect is the improvement of cultivation medium to provide an optimal environment for microbial formation of the product of interest. It is well accepted that the media composition can dramatically influence overall bioprocess performance. Nutrition medium optimization is known to improve recombinant protein production with microbial systems and thus, this is a rewarding step in bioprocess development. However, very often standard media recipes are taken from literature, since tailor-made design of the cultivation medium is a tedious task that demands microbioreactor technology for sufficient cultivation throughput, fast product analytics, as well as support by lab robotics to enable reliability in liquid handling steps. Furthermore, advanced mathematical methods are required for rationally analyzing measurement data and efficiently designing parallel experiments such as to achieve optimal information content. The generic nature of the presented protocol allows for easy adaption to different lab equipment, other expression hosts, and target proteins of interest, as well as further bioprocess parameters. Moreover, other optimization objectives like protein production rate, specific yield, or product quality can be chosen to fit the scope of other optimization studies. The applied Kriging Toolbox (KriKit) is a general tool for Design of Experiments (DOE) that contributes to improved holistic bioprocess optimization. It also supports multi-objective optimization which can be important in optimizing both upstream and downstream processes.

  8. Optimizing the Information Presentation on Mining Potential by using Web Services Technology with Restful Protocol

    Science.gov (United States)

    Abdillah, T.; Dai, R.; Setiawan, E.

    2018-02-01

    This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.

  9. Health information technology adoption: Understanding research protocols and outcome measurements for IT interventions in health care.

    Science.gov (United States)

    Colicchio, Tiago K; Facelli, Julio C; Del Fiol, Guilherme; Scammon, Debra L; Bowes, Watson A; Narus, Scott P

    2016-10-01

    To classify and characterize the variables commonly used to measure the impact of Information Technology (IT) adoption in health care, as well as settings and IT interventions tested, and to guide future research. We conducted a descriptive study screening a sample of 236 studies from a previous systematic review to identify outcome measures used and the availability of data to calculate these measures. We also developed a taxonomy of commonly used measures and explored setting characteristics and IT interventions. Clinical decision support is the most common intervention tested, primarily in non-hospital-based clinics and large academic hospitals. We identified 15 taxa representing the 79 most commonly used measures. Quality of care was the most common category of these measurements with 62 instances, followed by productivity (11 instances) and patient safety (6 instances). Measures used varied according to type of setting, IT intervention and targeted population. This study provides an inventory and a taxonomy of commonly used measures that will help researchers select measures in future studies as well as identify gaps in their measurement approaches. The classification of the other protocol components such as settings and interventions will also help researchers identify underexplored areas of research on the impact of IT interventions in health care. A more robust and standardized measurement system and more detailed descriptions of interventions and settings are necessary to enable comparison between studies and a better understanding of the impact of IT adoption in health care settings. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Generic Protocol for Optimization of Heterologous Protein Production Using Automated Microbioreactor Technology

    Science.gov (United States)

    Wiechert, Wolfgang; von Lieres, Eric; Oldiges, Marco

    2017-01-01

    A core business in industrial biotechnology using microbial production cell factories is the iterative process of strain engineering and optimization of bioprocess conditions. One important aspect is the improvement of cultivation medium to provide an optimal environment for microbial formation of the product of interest. It is well accepted that the media composition can dramatically influence overall bioprocess performance. Nutrition medium optimization is known to improve recombinant protein production with microbial systems and thus, this is a rewarding step in bioprocess development. However, very often standard media recipes are taken from literature, since tailor-made design of the cultivation medium is a tedious task that demands microbioreactor technology for sufficient cultivation throughput, fast product analytics, as well as support by lab robotics to enable reliability in liquid handling steps. Furthermore, advanced mathematical methods are required for rationally analyzing measurement data and efficiently designing parallel experiments such as to achieve optimal information content. The generic nature of the presented protocol allows for easy adaption to different lab equipment, other expression hosts, and target proteins of interest, as well as further bioprocess parameters. Moreover, other optimization objectives like protein production rate, specific yield, or product quality can be chosen to fit the scope of other optimization studies. The applied Kriging Toolbox (KriKit) is a general tool for Design of Experiments (DOE) that contributes to improved holistic bioprocess optimization. It also supports multi-objective optimization which can be important in optimizing both upstream and downstream processes. PMID:29286407

  11. Study protocol: mobile improvement of self-management ability through rural technology (mI SMART).

    Science.gov (United States)

    Mallow, Jennifer A; Theeke, Laurie A; Long, Dustin M; Whetsel, Tara; Theeke, Elliott; Mallow, Brian K

    2015-01-01

    There are 62 million Americans currently residing in rural areas who are more likely to have multiple chronic conditions and be economically disadvantaged, and in poor health, receive less recommended preventive services and attend fewer visits to health care providers. Recent advances in mobile healthcare (mHealth) offer a promising new approach to solving health disparities and improving chronic illness care. It is now possible and affordable to transmit health information, including values from glucometers, automated blood pressure monitors, and scales, through Bluetooth-enabled devices. Additionally, audio and video communications technologies can allow healthcare providers to conduct many parts of a physical exam remotely from varied settings. These technologies could remove geographical distance as a barrier to care and diminish the access to care issues faced by patients who live rurally. However, currently there is lack of studies that provide evidence of feasibility, acceptability, and effectiveness of mHealth initiatives on improved outcomes of care, a needed step to make the translation to implementation studies in healthcare systems. The purpose of this paper is to present the protocol for the first study of mI SMART (mobile Improvement of Self-Management Ability through Rural Technology), a new integrated mHealth intervention. Our objective is to provide evidence of feasibility and acceptability for the use of mI SMART in an underserved population and establish evidence for the refinement of mI SMART. The proposed study will take place at Milan Puskar Health Right, a free primary care clinic in the state of West Virginia. The clinic provides health care at no cost to uninsured, low income; adults aged 18-64 living in West Virginia. We will enroll 30 participants into this feasibility study with plans of implementing a longitudinal randomized, comparative effectiveness design in the future. Data collection will include tracking of barriers and

  12. A survey on the high reliability software verification and validation technology for instrumentation and control in NPP

    International Nuclear Information System (INIS)

    Kwon, Kee Choon; Lee, Chang Soo; Dong, In Sook

    1994-01-01

    This document presents the technical status of the software verification and validation (V and V) efforts to support developing and licensing digital instrumentation and control (I and C) systems in nuclear power plants. We have reviewed codes and standards to be concensus criteria among vendor, licensee and licenser. Then we have described the software licensing procedures under 10 CFR 50 and 10 CFR 52 of the United States cope with the licensing barrier. At last, we have surveyed the technical issues related to developing and licensing the high integrity software for digital I and C systems. These technical issues let us know the development direction of our own software V and V methodology. (Author) 13 refs., 2 figs.,

  13. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  14. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  15. HEART: heart exercise and remote technologies: A randomized controlled trial study protocol

    Directory of Open Access Journals (Sweden)

    Kira Geoffrey

    2011-05-01

    Full Text Available Abstract Background Cardiovascular disease (CVD is the leading cause of death worldwide. Cardiac rehabilitation (CR is aimed at improving health behaviors to slow or reverse the progression of CVD disease. Exercise is a central element of CR. Technologies such as mobile phones and the Internet (mHealth offer potential to overcome many of the psychological, physical, and geographical barriers that have been associated with lack of participation in exercise-based CR. We aim to trial the effectiveness of a mobile phone delivered exercise-based CR program to increase exercise capacity and functional outcomes compared with usual CR care in adults with CVD. This paper outlines the rationale and methods of the trial. Methods A single-blinded parallel two-arm randomized controlled trial is being conducted. A total of 170 people will be randomized at 1:1 ratio either to receive a mHealth CR program or usual care. Participants are identified by CR nurses from two metropolitan hospitals in Auckland, New Zealand through outpatient clinics and existing databases. Consenting participants are contacted to attend a baseline assessment. The intervention consists of a theory-based, personalized, automated package of text and video message components via participants' mobile phones and the Internet to increase exercise behavior, delivered over six months. The control group will continue with usual CR. Data collection occurs at baseline and 24 weeks (post-intervention. The primary outcome is change in maximal oxygen uptake from baseline to 24 weeks. Secondary outcomes include post-intervention measures on self-reported physical activity (IPAQ, cardiovascular risk factors (systolic blood pressure, weight, and waist to hip ratio, health related quality of life (SF-36, and cost-effectiveness. Discussion This manuscript presents the protocol for a randomized controlled trial of a mHealth exercise-based CR program. Results of this trial will provide much needed

  16. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  17. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  18. An Experimental Protocol for Assessing the Performance of New Ultrasound Probes Based on CMUT Technology in Application to Brain Imaging.

    Science.gov (United States)

    Matrone, Giulia; Ramalli, Alessandro; Savoia, Alessandro Stuart; Quaglia, Fabio; Castellazzi, Gloria; Morbini, Patrizia; Piastra, Marco

    2017-09-24

    The possibility to perform an early and repeatable assessment of imaging performance is fundamental in the design and development process of new ultrasound (US) probes. Particularly, a more realistic analysis with application-specific imaging targets can be extremely valuable to assess the expected performance of US probes in their potential clinical field of application. The experimental protocol presented in this work was purposely designed to provide an application-specific assessment procedure for newly-developed US probe prototypes based on Capacitive Micromachined Ultrasonic Transducer (CMUT) technology in relation to brain imaging. The protocol combines the use of a bovine brain fixed in formalin as the imaging target, which ensures both realism and repeatability of the described procedures, and of neuronavigation techniques borrowed from neurosurgery. The US probe is in fact connected to a motion tracking system which acquires position data and enables the superposition of US images to reference Magnetic Resonance (MR) images of the brain. This provides a means for human experts to perform a visual qualitative assessment of the US probe imaging performance and to compare acquisitions made with different probes. Moreover, the protocol relies on the use of a complete and open research and development system for US image acquisition, i.e. the Ultrasound Advanced Open Platform (ULA-OP) scanner. The manuscript describes in detail the instruments and procedures involved in the protocol, in particular for the calibration, image acquisition and registration of US and MR images. The obtained results prove the effectiveness of the overall protocol presented, which is entirely open (within the limits of the instrumentation involved), repeatable, and covers the entire set of acquisition and processing activities for US images.

  19. Telemedicine using free voice over internet protocol (VoIP) technology.

    Science.gov (United States)

    Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H

    2011-01-01

    Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.

  20. Verification of Timed-Arc Petri Nets

    DEFF Research Database (Denmark)

    Jacobsen, Lasse; Jacobsen, Morten; Møller, Mikael Harkjær

    2011-01-01

    of interesting theoretical properties distinguishing them from other time extensions of Petri nets. We shall give an overview of the recent theory developed in the verification of TAPN extended with features like read/transport arcs, timed inhibitor arcs and age invariants. We will examine in detail...... the boundaries of automatic verification and the connections between TAPN and the model of timed automata. Finally, we will mention the tool TAPAAL that supports modelling, simulation and verification of TAPN and discuss a small case study of alternating bit protocol....

  1. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  2. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  3. The development of verification and validation technology for instrumentation and control in NPPs - A study on the software development methodology of a highly reliable software

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Yong Rae; Cha, Sung Deok; Lee, Woo Jin; Chae, Hong Seok; Yoon, Kwang Sik; Jeong, Ki Suk [Korea Advanced Institute of Science and Technology,= Taejon (Korea, Republic of)

    1996-07-01

    Nuclear industries have tried to use the digital I and C technology in developing advanced nuclear power plants. However, because the industries did= not establish the highly reliable software development methodologies and standards applied to developing the highly reliable and safe software for digital I and C systems, they were confronted with the difficulties to avoid software common mode failures. To mitigate the difficulties, the highly reliable software development environments and methodologies and validation and verification techniques should be the cornerstone of all digital implementation in nuclear power plants. The objectives of this project is to establish the highly reliable software development methodology to support developing digital instrumentation and control systems in nuclear power plants. In this project, we have investigated the business-oriented and the real-time software development methods and techniques for ensuring safety and reliability of the software. Also we have studied standards related to licensing the software for digital I and C systems. 50 refs., 51 figs. (author)

  4. Strategies for merging microbial fuel cell technologies in water desalination processes: Start-up protocol and desalination efficiency assessment

    Science.gov (United States)

    Borjas, Zulema; Esteve-Núñez, Abraham; Ortiz, Juan Manuel

    2017-07-01

    Microbial Desalination Cells constitute an innovative technology where microbial fuel cell and electrodialysis merge in the same device for obtaining fresh water from saline water with no energy-associated cost for the user. In this work, an anodic biofilm of the electroactive bacteria Geobacter sulfurreducens was able to efficiently convert the acetate present in synthetic waste water into electric current (j = 0.32 mA cm-2) able to desalinate water. .Moreover, we implemented an efficient start-up protocol where desalination up to 90% occurred in a desalination cycle (water production:0.308 L m-2 h-1, initial salinity: 9 mS cm-1, final salinity: optimized for time but also simplifies operational procedures making it a more feasible strategy for future scaling-up of MDCs either as a single process or as a pre-treatment method combined with other well established desalination technologies such as reverse osmosis (RO) or reverse electrodialysis.

  5. Facilitating Administrators' Instructional Leadership through the Use of a Technology Integration Discussion Protocol

    Science.gov (United States)

    McLeod, Scott

    2015-01-01

    Digital learning tools are increasingly prevalent in classrooms, yet too often technology integration efforts by educators replicate rather than transform traditional instructional practices. Opportunities to take advantage of the new affordances that technologies bring to the learning environment thus become forfeit. Administrators' use of a…

  6. The Effect of Health Information Technology on Health Care Provider Communication: A Mixed-Method Protocol.

    Science.gov (United States)

    Manojlovich, Milisa; Adler-Milstein, Julia; Harrod, Molly; Sales, Anne; Hofer, Timothy P; Saint, Sanjay; Krein, Sarah L

    2015-06-11

    Communication failures between physicians and nurses are one of the most common causes of adverse events for hospitalized patients, as well as a major root cause of all sentinel events. Communication technology (ie, the electronic medical record, computerized provider order entry, email, and pagers), which is a component of health information technology (HIT), may help reduce some communication failures but increase others because of an inadequate understanding of how communication technology is used. Increasing use of health information and communication technologies is likely to affect communication between nurses and physicians. The purpose of this study is to describe, in detail, how health information and communication technologies facilitate or hinder communication between nurses and physicians with the ultimate goal of identifying how we can optimize the use of these technologies to support effective communication. Effective communication is the process of developing shared understanding between communicators by establishing, testing, and maintaining relationships. Our theoretical model, based in communication and sociology theories, describes how health information and communication technologies affect communication through communication practices (ie, use of rich media; the location and availability of computers) and work relationships (ie, hierarchies and team stability). Therefore we seek to (1) identify the range of health information and communication technologies used in a national sample of medical-surgical acute care units, (2) describe communication practices and work relationships that may be influenced by health information and communication technologies in these same settings, and (3) explore how differences in health information and communication technologies, communication practices, and work relationships between physicians and nurses influence communication. This 4-year study uses a sequential mixed-methods design, beginning with a

  7. Pilot study: Assessing the effect of continual position monitoring technology on compliance with patient turning protocols

    OpenAIRE

    Schutt, Suann Cirigliano; Tarver, Christine; Pezzani, Michelle

    2017-01-01

    Abstract Aim The study aim was to evaluate if continual patient position monitoring, taking into account self‐turns and clinician‐assisted turns, would increase the percentage of time a patient's position changed at least every 2 hr. Background While patient turning has clinical benefits, current models to help staff remember to turn patients, such as “turn clocks” and timers, have not resulted in high compliance with turning protocols. In addition, reminders are based on arbitrary 2‐hr windo...

  8. Effect of a tailored assistive technology intervention on older adults and their family caregiver: a pragmatic study protocol.

    Science.gov (United States)

    Demers, Louise; Mortenson, W Ben; Fuhrer, Marcus J; Jutai, Jeffrey W; Plante, Michelle; Mah, Jasmine; DeRuyter, Frank

    2016-05-13

    Many older adults with mobility limitations use assistive technology to help them perform daily activities. However, little attention has been paid to the impact on their family caregivers. This neglect produces an incomplete portrayal of the outcomes of assistive technology provision. This paper describes the protocol for a study that examines the impact of a tailored assistive technology intervention that is inclusive of assistance users and their family caregivers. This research will use a combination of quantitative and qualitative methods. The quantitative portion will be an experimental, single-blinded study in which participants are randomly assigned to either an experimental assistive technology intervention or a standard care group. We will enroll 240 participants (120 dyads) into the study from three Canadian sites. Participants will include older adults (>55) and family caregivers who provide ≥4 h per week of assistance with daily activities and social participation. The primary outcome measure for the older adults will be the Functional Autonomy Measurement System, and the primary outcome measure for the caregivers will be the Caregiver Assistive Technology Outcomes Measure. Qualitative data will be collected through detailed records of the therapists' interventions, as well as through interviews with dyads and therapists following the interventions. Data collection will occur at baseline (T0) with follow-ups at 6 weeks (T1), 22 weeks (T2), and 58 weeks (T3) after baseline evaluation. The findings from this study will help service providers and clinicians to move forward with assistive technology recommendations that are more attuned to the needs of both older adults with mobility limitations and their family caregivers. Additionally, the study's findings will enhance our conceptual understanding of the spectrum of assistive technology outcomes and set the stage for econometric studies assessing cost-effectiveness. ClinicalTrials.gov Identifier

  9. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  10. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, A.; Larsen, K.G.; Møller, M.H.

    2012-01-01

    of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  11. Pilot study: Assessing the effect of continual position monitoring technology on compliance with patient turning protocols.

    Science.gov (United States)

    Schutt, Suann Cirigliano; Tarver, Christine; Pezzani, Michelle

    2018-01-01

    The study aim was to evaluate if continual patient position monitoring, taking into account self-turns and clinician-assisted turns, would increase the percentage of time a patient's position changed at least every 2 hr. While patient turning has clinical benefits, current models to help staff remember to turn patients, such as "turn clocks" and timers, have not resulted in high compliance with turning protocols. In addition, reminders are based on arbitrary 2-hr windows (such as turning on "even" hours) rather than on individual patient activity, including self-turns. This is a first inpatient, non-randomized, pre-/postintervention study. Data collection occurred from May 2013-February 2014 on a 39-bed medical unit in a community hospital. Baseline patient turning data were recorded by a sensor; however, the patient data were not displayed at the nurses' station to establish compliance with the hospital's turning protocol. Postintervention, patient position information was wirelessly displayed on nurses' station computer monitors in real time. A Student t test was used to compare baseline to postintervention "mean time in compliance." Data from 138 patients ( N  =   7,854 hr of monitoring) were collected. The baseline phase yielded 4,322 hr of position monitoring data and the postintervention phase yielded 3,532 hr of data. Statistically significant improvement was demonstrated in the percentage of time a patient's position changed at least every 2 hr from baseline to postintervention.

  12. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  13. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    National Research Council Canada - National Science Library

    Vegter, Henry

    2002-01-01

    ..., reduced cost associated with toll calls and the merger of the telephone with the desktop will keep adoption of this technology on the path to ubiquitous use, Topics explored in the thesis include...

  14. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    National Research Council Canada - National Science Library

    Vegter, Henry

    2002-01-01

    ...) VoIP promises to be a widely accepted technology in the future, The issues of efficient use of bandwidth over network choke points, cost savings gained from a common data and voice infrastructure...

  15. Future directions of nuclear verification

    International Nuclear Information System (INIS)

    Blix, H.

    1997-01-01

    Future directions of nuclear verification are discussed including the following topics: verification of non-proliferation commitments; practicalities of strengthening safeguards; new tasks in nuclear verification

  16. Does assistive technology contribute to social inclusion for people with intellectual disability? A systematic review protocol.

    Science.gov (United States)

    Owuor, John; Larkan, Fiona; Kayabu, Bonnix; Fitzgerald, Geraldine; Sheaf, Greg; Dinsmore, John; McConkey, Roy; Clarke, Mike; MacLachlan, Malcolm

    2018-02-10

    The aim of this review is to answer the following question: Does assistive technology contribute to social inclusion for people with intellectual disability? Previous research on assistive technology has focused on socioeconomic impacts such as education, employment and access to healthcare by people with intellectual disability. There is a need to consolidate evidence on the interaction between intellectual disability, assistive technology, community living and social inclusion. The review will consider studies from all settings: geographical, socioeconomic and care (institutional and community care), published in English. Studies reported in other languages with abstracts in English will be included if they can be translated using Google Translate, otherwise such studies will be included in the appendix. The review will include both qualitative and quantitative studies. The intervention in this review refers to the use of assistive technology to promote community participation or interpersonal relationships (social inclusion) for people with intellectual disability. The outcomes will be behavioural and social benefits of using assistive technology by people with intellectual disability. Enhanced interpersonal relationships and community participation by people with intellectual disability. Data analysis will be in two phases. The first phase will involve analysis of individual study designs separately. The second phase will be narrative/thematic synthesis of all study groups. The review will not create any ethical or safety concerns. At least one peer-reviewed article in a leading journal such as the BMJ is planned. The findings will also be disseminated through a seminar session involving internal audience at Trinity College Dublin and within the Assistive Technologies for people with Intellectual Disability and Autism research programme. CRD42017065447; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article

  17. Modeling and Verification of the Bitcoin Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; van de Pol, Jan Cornelis; Stoelinga, Mariëlle Ida Antoinette; van Glabbeek, R.J.; Groote, J.F.; Höfner, P.

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double

  18. Cones and foci for protocol verification revisited

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2002-01-01

    textabstractWe define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between data objects. Compared to the original cones and foci method from Groote and Springintveld cite{GroSpr01},

  19. 10 CFR 300.11 - Independent verification.

    Science.gov (United States)

    2010-01-01

    ..., such as the California Climate Action Registry Certification Protocol, the Climate Leaders Inventory... DEPARTMENT OF ENERGY CLIMATE CHANGE VOLUNTARY GREENHOUSE GAS REPORTING PROGRAM: GENERAL GUIDELINES § 300.11... other members of the verification team are accredited by one or more independent and nationally...

  20. Independent verification survey report for exposure units Z2-24, Z2-31, Z2-32, AND Z2-36 in zone 2 of the East Tennessee technology park Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    King, David A. [Oak Ridge Inst. for Science and Education (ORISE), Oak Ridge, TN (United States)

    2013-10-01

    The U.S. Department of Energy (DOE) Oak Ridge Office of Environmental Management selected Oak Ridge Associated Universities (ORAU), through the Oak Ridge Institute for Science and Education (ORISE) contract, to perform independent verification (IV) at Zone 2 of the East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. ORAU has concluded IV surveys, per the project-specific plan (PSP) (ORAU 2013a) covering exposure units (EUs) Z2-24, -31, -32, and -36. The objective of this effort was to verify the target EUs comply with requirements in the Zone 2 Record of Decision (ROD) (DOE 2005), as implemented by using the dynamic verification strategy presented in the dynamic work plan (DWP) (BJC 2007); and confirm commitments in the DWP were adequately implemented, as verified via IV surveys and soil sampling.

  1. Utilizing 3D Printing Technology to Merge MRI with Histology: A Protocol for Brain Sectioning

    Science.gov (United States)

    Luciano, Nicholas J; Sati, Pascal; Nair, Govind; Guy, Joseph R; Ha, Seung-Kwon; Absinta, Martina; Chiang, Wen-Yang; Leibovitch, Emily C; Jacobson, Steven; Silva, Afonso C; Reich, Daniel S.

    2016-01-01

    Magnetic resonance imaging (MRI) allows for the delineation between normal and abnormal tissue on a macroscopic scale, sampling an entire tissue volume three-dimensionally. While MRI is an extremely sensitive tool for detecting tissue abnormalities, association of signal changes with an underlying pathological process is usually not straightforward. In the central nervous system, for example, inflammation, demyelination, axonal damage, gliosis, and neuronal death may all induce similar findings on MRI. As such, interpretation of MRI scans depends on the context, and radiological-histopathological correlation is therefore of the utmost importance. Unfortunately, traditional pathological sectioning of brain tissue is often imprecise and inconsistent, thus complicating the comparison between histology sections and MRI. This article presents novel methodology for accurately sectioning primate brain tissues and thus allowing precise matching between histology and MRI. The detailed protocol described in this article will assist investigators in applying this method, which relies on the creation of 3D printed brain slicers. Slightly modified, it can be easily implemented for brains of other species, including humans. PMID:28060281

  2. Utilizing 3D Printing Technology to Merge MRI with Histology: A Protocol for Brain Sectioning.

    Science.gov (United States)

    Luciano, Nicholas J; Sati, Pascal; Nair, Govind; Guy, Joseph R; Ha, Seung-Kwon; Absinta, Martina; Chiang, Wen-Yang; Leibovitch, Emily C; Jacobson, Steven; Silva, Afonso C; Reich, Daniel S

    2016-12-06

    Magnetic resonance imaging (MRI) allows for the delineation between normal and abnormal tissue on a macroscopic scale, sampling an entire tissue volume three-dimensionally. While MRI is an extremely sensitive tool for detecting tissue abnormalities, association of signal changes with an underlying pathological process is usually not straightforward. In the central nervous system, for example, inflammation, demyelination, axonal damage, gliosis, and neuronal death may all induce similar findings on MRI. As such, interpretation of MRI scans depends on the context, and radiological-histopathological correlation is therefore of the utmost importance. Unfortunately, traditional pathological sectioning of brain tissue is often imprecise and inconsistent, thus complicating the comparison between histology sections and MRI. This article presents novel methodology for accurately sectioning primate brain tissues and thus allowing precise matching between histology and MRI. The detailed protocol described in this article will assist investigators in applying this method, which relies on the creation of 3D printed brain slicers. Slightly modified, it can be easily implemented for brains of other species, including humans.

  3. Evidence on health-promoting lifestyle practices and information and communication technologies: scoping review protocol

    OpenAIRE

    Joseph-Shehu, Elizabeth M; Ncama, Busisiwe P

    2017-01-01

    Introduction Information and communication technologies (ICTs) play a key role in improving health and maintaining health promoting behaviours. ICTs are therefore one potential solution for promoting healthy lifestyles. In addition, they can assist in the reduction and control of the menace of both communicable and non-communicable diseases. This study will map evidence of interventions that demonstrate the effect of ICTs on health-promoting lifestyle practices that can prevent and control di...

  4. Participation of nurses in the execution of clinical research protocol about technological innovation

    OpenAIRE

    Cabral, Luciane Patrícia Andreani; Scheeren, Eduardo Mendonça; Cubas, Marcia Regina

    2015-01-01

    AbstractOBJECTIVETo report the nurse's experience of inclusion in interdisciplinary clinical study about technological innovation, involving people with spinal cord injury.METHODDescriptive experience report. The empirical support was based on notes about perspectives and practice of clinical research, with a multi-professional nursing, physical education, physiotherapy and engineering staff.RESULTThe qualification includes the elaboration of the document for the Ethics Committee, familiariza...

  5. Crypto-Verifying Protocol Implementations in ML

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F#

  6. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  7. Mithramycin encapsulated in polymeric micelles by microfluidic technology as novel therapeutic protocol for beta-thalassemia

    Directory of Open Access Journals (Sweden)

    Capretto L

    2012-01-01

    Full Text Available Lorenzo Capretto1, Stefania Mazzitelli2, Eleonora Brognara2, Ilaria Lampronti2, Dario Carugo1, Martyn Hill1, Xunli Zhang1, Roberto Gambari2, Claudio Nastruzzi31Engineering Sciences, University of Southampton, Southampton, UK; 2Department of Biochemistry and Molecular Biology, 3Department of Pharmaceutical Sciences, University of Ferrara, Ferrara, ItalyAbstract: This report shows that the DNA-binding drug, mithramycin, can be efficiently encapsulated in polymeric micelles (PM-MTH, based on Pluronic® block copolymers, by a new microfluidic approach. The effect of different production parameters has been investigated for their effect on PM-MTH characteristics. The compared analysis of PM-MTH produced by microfluidic and conventional bulk mixing procedures revealed that microfluidics provides a useful platform for the production of PM-MTH with improved controllability, reproducibility, smaller size, and polydispersity. Finally, an investigation of the effects of PM-MTH, produced by microfluidic and conventional bulk mixing procedures, on the erythroid differentiation of both human erythroleukemia and human erythroid precursor cells is reported. It is demonstrated that PM-MTH exhibited a slightly lower toxicity and more pronounced differentiative activity when compared to the free drug. In addition, PM-MTH were able to upregulate preferentially γ-globin messenger ribonucleic acid production and to increase fetal hemoglobin (HbF accumulation, the percentage of HbF-containing cells, and their HbF content without stimulating α-globin gene expression, which is responsible for the clinical symptoms of ß-thalassemia. These results represent an important first step toward a potential clinical application, since an increase in HbF could alleviate the symptoms underlying ß-thalassemia and sickle cell anemia. In conclusion, this report suggests that PM-MTH produced by microfluidic approach warrants further evaluation as a potential therapeutic protocol

  8. Verification of ceramic structures

    NARCIS (Netherlands)

    Behar-Lafenetre, S.; Cornillon, L.; Rancurel, M.; Graaf, D. de; Hartmann, P.; Coe, G.; Laine, B.

    2012-01-01

    In the framework of the "Mechanical Design and Verification Methodologies for Ceramic Structures" contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and

  9. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  10. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  11. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION

    Science.gov (United States)

    This presentation wil be given at the EPA Science Forum 2005 in Washington, DC. According to recent estimates, there are approximately 7.9 million heavy-duty diesel trucks and buses in use in the United States. Emissions from these vehicles account for substantial portions of t...

  12. Quantifying the Impacts of Timebased Rates, Enabling Technology, and Other Treatments in Consumer Behavior Studies: Protocols and Guidelines

    Energy Technology Data Exchange (ETDEWEB)

    Cappers, Peter [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Todd, Annika [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Perry, Michael [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Neenan, Bernie [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Boisvert, Richard [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States)

    2013-06-27

    This report offers guidelines and protocols for measuring the effects of time-based rates, enabling technology, and various other treatments on customers’ levels and patterns of electricity usage. Although the focus is on evaluating consumer behavior studies (CBS) that involve field trials and pilots, the methods can be extended to assessing the large-scale programs that may follow. CBSs are undertaken to resolve uncertainties and ambiguities about how consumers respond to inducements to modify their electricity demand. Those inducements include price structures; feedback and information; and enabling technologies embedded in programs such as: critical peak, time-of use, real-time pricing; peak time rebate or critical peak rebate; home energy reports and in-home displays; and all manner of device controls for appliances and plug loads. Although the focus of this report is on consumer studies—where the subjects are households—the behavioral sciences principles discussed and many of the methods recommended apply equally to studying commercial and industrial customer electricity demand.

  13. Making sense of health information technology implementation: A qualitative study protocol

    Directory of Open Access Journals (Sweden)

    McDaniel Reuben R

    2010-11-01

    Full Text Available Abstract Background Implementing new practices, such as health information technology (HIT, is often difficult due to the disruption of the highly coordinated, interdependent processes (e.g., information exchange, communication, relationships of providing care in hospitals. Thus, HIT implementation may occur slowly as staff members observe and make sense of unexpected disruptions in care. As a critical organizational function, sensemaking, defined as the social process of searching for answers and meaning which drive action, leads to unified understanding, learning, and effective problem solving -- strategies that studies have linked to successful change. Project teamwork is a change strategy increasingly used by hospitals that facilitates sensemaking by providing a formal mechanism for team members to share ideas, construct the meaning of events, and take next actions. Methods In this longitudinal case study, we aim to examine project teams' sensemaking and action as the team prepares to implement new information technology in a tiertiary care hospital. Based on management and healthcare literature on HIT implementation and project teamwork, we chose sensemaking as an alternative to traditional models for understanding organizational change and teamwork. Our methods choices are derived from this conceptual framework. Data on project team interactions will be prospectively collected through direct observation and organizational document review. Through qualitative methods, we will identify sensemaking patterns and explore variation in sensemaking across teams. Participant demographics will be used to explore variation in sensemaking patterns. Discussion Outcomes of this research will be new knowledge about sensemaking patterns of project teams, such as: the antecedents and consequences of the ongoing, evolutionary, social process of implementing HIT; the internal and external factors that influence the project team, including team composition

  14. Cholera diagnosis in human stool and detection in water: protocol for a systematic review of available technologies.

    Science.gov (United States)

    Diaconu, Karin; Falconer, Jennifer; O'May, Fiona; Jimenez, Miguel; Matragrano, Joe; Njanpop-Lafourcade, Betty; Ager, Alastair

    2018-02-20

    Cholera is a highly infectious diarrheal disease spread via fecal contamination of water and food sources; it is endemic in parts of Africa and Asia and recent outbreaks have been reported in Haiti, the Zambia and Democratic Republic of the Congo. If left untreated, the disease can be fatal in less than 24 h and result in case fatality ratios of 30-50%. Cholera disproportionately affects those living in areas with poor access to water and sanitation: the long-term public health response is focused on improving water and hygiene facilities and access. Short-term measures for infection prevention and control, and disease characterization and surveillance, are impaired by diagnostic delays: culture methods are slow and rely on the availability of infrastructure and specialist equipment. Rapid diagnostic tests have shown promise under field conditions and further innovations in this area have been proposed. This paper is the protocol for a systematic review focused on identifying current technologies and methods used for cholera diagnosis in stool, and detection in water. We will synthesize and appraise information on product technical specifications, accuracy and design features in order to inform infection prevention and control and innovation development. Embase, MEDLINE, CINAHL, Proquest, IndMed and the WHO and Campbell libraries will be searched. We will include studies reporting on field evaluations, including within-study comparisons against a reference standard, and laboratory evaluations reporting on product validation against field stool or water samples. We will extract data according to protocol and attempt meta-analyses if appropriate given data availability and quality. The systematic review builds on a previous scoping review in this field and expands upon this by synthesising data on both product technical characteristics and design features. The review will be of particular value to stakeholders engaged in diagnostic procurement and manufacturers

  15. Cholera diagnosis in human stool and detection in water: protocol for a systematic review of available technologies

    Directory of Open Access Journals (Sweden)

    Karin Diaconu

    2018-02-01

    Full Text Available Abstract Background Cholera is a highly infectious diarrheal disease spread via fecal contamination of water and food sources; it is endemic in parts of Africa and Asia and recent outbreaks have been reported in Haiti, the Zambia and Democratic Republic of the Congo. If left untreated, the disease can be fatal in less than 24 h and result in case fatality ratios of 30–50%. Cholera disproportionately affects those living in areas with poor access to water and sanitation: the long-term public health response is focused on improving water and hygiene facilities and access. Short-term measures for infection prevention and control, and disease characterization and surveillance, are impaired by diagnostic delays: culture methods are slow and rely on the availability of infrastructure and specialist equipment. Rapid diagnostic tests have shown promise under field conditions and further innovations in this area have been proposed. Methods This paper is the protocol for a systematic review focused on identifying current technologies and methods used for cholera diagnosis in stool, and detection in water. We will synthesize and appraise information on product technical specifications, accuracy and design features in order to inform infection prevention and control and innovation development. Embase, MEDLINE, CINAHL, Proquest, IndMed and the WHO and Campbell libraries will be searched. We will include studies reporting on field evaluations, including within-study comparisons against a reference standard, and laboratory evaluations reporting on product validation against field stool or water samples. We will extract data according to protocol and attempt meta-analyses if appropriate given data availability and quality. Discussion The systematic review builds on a previous scoping review in this field and expands upon this by synthesising data on both product technical characteristics and design features. The review will be of particular value to

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: PHASE 1-ADI PILOT TEST UNIT NO. 2002-09 WITH MEDIA G2®

    Science.gov (United States)

    Integrity verification testing of the ADI International Inc. Pilot Test Unit No. 2002-09 with MEDIA G2® arsenic adsorption media filter system was conducted at the Hilltown Township Water and Sewer Authority (HTWSA) Well Station No. 1 in Sellersville, Pennsylvania from October 8...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: ADI INTERNATIONAL INC. ADI PILOT TEST UNIT NO. 2002-09 WITH MEDIA G2®; PHASE II

    Science.gov (United States)

    Verification testing of the ADI International Inc. Unit No. 2002-09 with MEDIA G2® arsenic adsorption media filter system was conducted at the Hilltown Township Water and Sewer Authority (HTWSA) Well Station No. 1 in Sellersville, Pennsylvania from October 8, 2003 through May 28,...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: WATTS PREMIER M-SERIES M-15,000 REVERSE OSMOSIS TREATMENT SYSTEM

    Science.gov (United States)

    Verification testing of the Watts Premier M-Series M-15,000 RO Treatment System was conducted over a 31-day period from April 26, 2004, through May 26, 2004. This test was conducted at the Coachella Valley Water District (CVWD) Well 7802 in Thermal, California. The source water...

  19. Participation of nurses in the execution of clinical research protocol about technological innovation

    Directory of Open Access Journals (Sweden)

    Luciane Patrícia Andreani Cabral

    2015-10-01

    Full Text Available AbstractOBJECTIVETo report the nurse's experience of inclusion in interdisciplinary clinical study about technological innovation, involving people with spinal cord injury.METHODDescriptive experience report. The empirical support was based on notes about perspectives and practice of clinical research, with a multi-professional nursing, physical education, physiotherapy and engineering staff.RESULTThe qualification includes the elaboration of the document for the Ethics Committee, familiarization among the members of staff and with the studied topic, and also an immersion into English. The nurse's knowledge gave support to the uptake of participants and time adequacy for data collection, preparation and assistance of the participants during the intervention and after collection. Nursing theories and processes have contributed to reveal risky diagnoses and the plan of care. It was the nurse's role to monitor the risk of overlapping methodological strictness to the human aspect. The skills for the clinical research must be the object of learning, including students in multidisciplinary researches.CONCLUSIONTo qualify the nurse for clinical research and to potentialize its caregiver essence, some changes are needed in the educational system, professional behavior, attitude and educational assistance.

  20. A Qualitative Study of the Treatment Improvement Protocols (TIPs): An Assessment of the Use of TIPs by Individuals Affiliated with the Addiction Technology Transfer Centers (ATTCs).

    Science.gov (United States)

    Hayashi, Susan W.; Suzuki, Marcia; Hubbard, Susan M.; Huang, Judy Y.; Cobb, Anita M.

    2003-01-01

    Evaluated the Addiction Technology Transfer Centers (ATTCs) of the Center for Substance Abuse Treatment (CSAT) as a means of diffusion of innovations, focusing on use of the Treatment Improvement Protocols (TIPs). Qualitative studies at 6 ATTCs that included 57 interviews show that the CSAT is at the forefront of providing resources to the…

  1. Evidence on health-promoting lifestyle practices and information and communication technologies: scoping review protocol.

    Science.gov (United States)

    Joseph-Shehu, Elizabeth M; Ncama, Busisiwe P

    2017-03-29

    Information and communication technologies (ICTs) play a key role in improving health and maintaining health promoting behaviours. ICTs are therefore one potential solution for promoting healthy lifestyles. In addition, they can assist in the reduction and control of the menace of both communicable and non-communicable diseases. This study will map evidence of interventions that demonstrate the effect of ICTs on health-promoting lifestyle practices that can prevent and control diseases. It is anticipated that this study will help identify areas where there is need for primary research. The following electronic databases will be searched: PsycArticle (EBSCO), PsycINFO (EBSCO), Science direct, PubMed, Medline (EBSCO) and Google Scholar. The study will be conducted in two stages: the first stage will map out the studies descriptively while the second stage will map the additional inclusion criteria of quality assessment. Two independent reviewers will undertake the data extraction. Relevant outcomes of the studies will be analysed thematically using NVIvo computer software. The authors will code all evidence independently. Thereafter the authors will critically cross-examine the relationship of the research questions to the emerging themes from the selected articles. The authors hope to find a large number of studies on health-promoting lifestyles that encompass six-subscales of health-promoting activities (nutrition, stress management, interpersonal relation, self-actualisation, health responsibility, physical activity) and ICT. This study will be presented in conferences related to health promotion and health-promoting lifestyles. It will also be disseminated in print and electronically. CRD42016042568. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  2. A microsatellite panel for triploid verification in the abalone Haliotis ...

    African Journals Online (AJOL)

    A method for ploidy verification of triploid and diploid Haliotis midae was developed using molecular microsatellite markers. In all, 30 microsatellite loci were tested in control populations. A final micro satellite multiplex consisting of seven markers were optimised and a complete protocol is reported. This protocol was ...

  3. Impacts of information and communication technologies on nursing care: an overview of systematic reviews (protocol).

    Science.gov (United States)

    Rouleau, Geneviève; Gagnon, Marie-Pierre; Côté, José

    2015-05-23

    Information and communication technologies (ICTs) used in the health sector have well-known advantages. They can promote patient-centered healthcare, improve quality of care, and educate health professionals and patients. However, implementation of ICTs remains difficult and involves changes at different levels: patients, healthcare providers, and healthcare organizations. Nurses constitute the largest health provider group of the healthcare workforce. The use of ICTs by nurses can have impacts in their practice. The main objective of this review of systematic reviews is to systematically summarize the best evidence regarding the effects of ICTs on nursing care. We will include all types of reviews that aim to evaluate the influence of ICTs used by nurses on nursing care. We will consider four types of ICTs used by nurses as a way to provide healthcare: management systems, communication systems, information systems, and computerized decision support systems. We will exclude nursing management systems, educational systems, and telephone systems. The following types of comparisons will be carried out: ICT in comparison with usual care/practice, ICT compared to any other ICT, and ICT versus other types of interventions. The primary outcomes will include nurses' practice environment, nursing processes/scope of nursing practice, nurses' professional satisfaction as well as nursing sensitive outcomes, such as patient safety, comfort, and quality of life related to care, empowerment, functional status, satisfaction, and patient experience. Secondary outcomes will include satisfaction with ICT from the nurses and patients' perspective. Reviews published in English, French, or Spanish from 1 January 1995 will be considered. Two reviewers will independently screen the title and abstract of the papers in order to assess their eligibility and extract the following information: characteristics of the population and setting, type of interventions (e.g., type of ICTs and service

  4. Protocol between the National Laboratory of Industrial Engineering and Technology of Portugal and the Junta de Energia Nuclear of Spain on supply and transfer of technology on uranium extraction from phosphoric acid

    International Nuclear Information System (INIS)

    1982-01-01

    This Protocol was signed between the JEN and the LNETI, in the framework of the Agreement of 14th January 1971 between Spain and Portugal for co-operation in the peaceful uses of nuclear energy. It is provided that the JEN and the LNETI will promote the application of their respective technologies in the field in Portugal as well as that of technology jointly developed on such extraction. The Protocol, which became operational on its date of signature will remain in force for five years. (NEA) [fr

  5. Test/QA Plan for Verification of Cavity Ringdown Spectroscopy Systems for Ammonia Monitoring in Stack Gas

    Science.gov (United States)

    The purpose of the cavity ringdown spectroscopy (CRDS) technology test and quality assurance plan is to specify procedures for a verification test applicable to commercial cavity ringdown spectroscopy technologies. The purpose of the verification test is to evaluate the performa...

  6. Effect of affordable technology on physical activity levels and mobility outcomes in rehabilitation: a protocol for the Activity and MObility UsiNg Technology (AMOUNT) rehabilitation trial

    Science.gov (United States)

    Hassett, Leanne; van den Berg, Maayken; Lindley, Richard I; Crotty, Maria; McCluskey, Annie; van der Ploeg, Hidde P; Smith, Stuart T; Schurr, Karl; Killington, Maggie; Bongers, Bert; Howard, Kirsten; Heritier, Stephane; Togher, Leanne; Hackett, Maree; Treacy, Daniel; Dorsch, Simone; Wong, Siobhan; Scrivener, Katharine; Chagpar, Sakina; Weber, Heather; Pearson, Ross; Sherrington, Catherine

    2016-01-01

    Introduction People with mobility limitations can benefit from rehabilitation programmes that provide a high dose of exercise. However, since providing a high dose of exercise is logistically challenging and resource-intensive, people in rehabilitation spend most of the day inactive. This trial aims to evaluate the effect of the addition of affordable technology to usual care on physical activity and mobility in people with mobility limitations admitted to inpatient aged and neurological rehabilitation units compared to usual care alone. Methods and analysis A pragmatic, assessor blinded, parallel-group randomised trial recruiting 300 consenting rehabilitation patients with reduced mobility will be conducted. Participants will be individually randomised to intervention or control groups. The intervention group will receive technology-based exercise to target mobility and physical activity problems for 6 months. The technology will include the use of video and computer games/exercises and tablet applications as well as activity monitors. The control group will not receive any additional intervention and both groups will receive usual inpatient and outpatient rehabilitation care over the 6-month study period. The coprimary outcomes will be objectively assessed physical activity (proportion of the day spent upright) and mobility (Short Physical Performance Battery) at 6 months after randomisation. Secondary outcomes will include: self-reported and objectively assessed physical activity, mobility, cognition, activity performance and participation, utility-based quality of life, balance confidence, technology self-efficacy, falls and service utilisation. Linear models will assess the effect of group allocation for each continuously scored outcome measure with baseline scores entered as a covariate. Fall rates between groups will be compared using negative binomial regression. Primary analyses will be preplanned, conducted while masked to group allocation and use an

  7. Effect of affordable technology on physical activity levels and mobility outcomes in rehabilitation: a protocol for the Activity and MObility UsiNg Technology (AMOUNT) rehabilitation trial.

    Science.gov (United States)

    Hassett, Leanne; van den Berg, Maayken; Lindley, Richard I; Crotty, Maria; McCluskey, Annie; van der Ploeg, Hidde P; Smith, Stuart T; Schurr, Karl; Killington, Maggie; Bongers, Bert; Howard, Kirsten; Heritier, Stephane; Togher, Leanne; Hackett, Maree; Treacy, Daniel; Dorsch, Simone; Wong, Siobhan; Scrivener, Katharine; Chagpar, Sakina; Weber, Heather; Pearson, Ross; Sherrington, Catherine

    2016-06-06

    People with mobility limitations can benefit from rehabilitation programmes that provide a high dose of exercise. However, since providing a high dose of exercise is logistically challenging and resource-intensive, people in rehabilitation spend most of the day inactive. This trial aims to evaluate the effect of the addition of affordable technology to usual care on physical activity and mobility in people with mobility limitations admitted to inpatient aged and neurological rehabilitation units compared to usual care alone. A pragmatic, assessor blinded, parallel-group randomised trial recruiting 300 consenting rehabilitation patients with reduced mobility will be conducted. Participants will be individually randomised to intervention or control groups. The intervention group will receive technology-based exercise to target mobility and physical activity problems for 6 months. The technology will include the use of video and computer games/exercises and tablet applications as well as activity monitors. The control group will not receive any additional intervention and both groups will receive usual inpatient and outpatient rehabilitation care over the 6-month study period. The coprimary outcomes will be objectively assessed physical activity (proportion of the day spent upright) and mobility (Short Physical Performance Battery) at 6 months after randomisation. Secondary outcomes will include: self-reported and objectively assessed physical activity, mobility, cognition, activity performance and participation, utility-based quality of life, balance confidence, technology self-efficacy, falls and service utilisation. Linear models will assess the effect of group allocation for each continuously scored outcome measure with baseline scores entered as a covariate. Fall rates between groups will be compared using negative binomial regression. Primary analyses will be preplanned, conducted while masked to group allocation and use an intention-to-treat approach. The

  8. Fiscal 1997 report of the development of high efficiency waste power generation technology. No.2 volume. Pilot plant verification test; Kokoritsu haikibutsu hatsuden gijutsu kaihatsu (pilot plant jissho shiken). 1997 nendo hokokusho (daini bunsatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    As to a high efficiency waste power generation system using general waste as fuel, the details of the following were described: design/construction management and operational study of pilot plant, design/manufacture/construction of pilot plant, and study of an optimal total system. Concerning the construction management and operational study, the paper described the application for governmental/official inspection procedures and taking inspection, process management of pilot plant, site patrol, safety management, management of trial run of pilot plant, drawing-up of a verification test plan and test run, etc. Relating to the design/manufacture/construction of pilot plant, an outline of the pilot plant was described. The paper also stated points to be considered in design of furnace structure and boiler structure, points to be considered of the verification test, etc. As to the study of an optimal total system, the following were described: survey of waste gasification/slagging power generation technology, basic study on RDF production process, survey of trends of waste power generation technology in the U.S., etc. 52 refs., 149 figs., 121 tabs.

  9. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  10. Software verification and testing

    Science.gov (United States)

    1985-01-01

    General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

  11. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  12. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ...

  13. Proceedings of the Defense Nuclear Agency Conference on Arms Control and Verification Technology (ACT) Held in Williamsburg, Virginia on 1-4 June 1992

    Science.gov (United States)

    1993-12-01

    vapor recovery system or flare . For instance, under these regulations, sampling connecting systems must be equipped with a closed-purge system or closed...12% 233U/U) PWR BWR Total HM (kg) 460 188 460 460(130 U)a Charge (kg) 235U 13.5 5.5 10.6 0.9 233U - - 13.8 Pu - - 3.7 - Discharge (kg) 235U 3.5 1.6...early 1991.5 The purpose of the ARS experiments was to simulate CW verification measurements under realistic conditions and to determine the maximum

  14. Managing the Verification Trajectory

    NARCIS (Netherlands)

    Ruys, T.C.; Brinksma, Hendrik

    In this paper we take a closer look at the automated analysis of designs, in particular of verification by model checking. Model checking tools are increasingly being used for the verification of real-life systems in an industrial context. In addition to ongoing research aimed at curbing the

  15. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  16. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  17. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  18. Monitoring and verification R&D

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  19. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  20. Using a Delphi consensus process to develop an acupuncture treatment protocol by consensus for women undergoing Assisted Reproductive Technology (ART) treatment.

    Science.gov (United States)

    Smith, Caroline A; Grant, Suzanne; Lyttleton, Jane; Cochrane, Suzanne

    2012-07-07

    Assisted reproductive technologies (ART) are increasingly utilised for resolving difficulties conceiving. These technologies are expensive to both the public purse and the individual consumers. Acupuncture is widely used as an adjunct to ART with indications that it may assist reducing the time to conception and increasing live birth rates. Heterogeneity is high between treatment protocols. The aim of this study was to examine what fertility acupuncturists consider key components of best practice acupuncture during an ART cycle, and to establish an acupuncture protocol by consensus. Fifteen international acupuncturists with extensive experience treating women during ART interventions participated in 3 rounds of Delphi questionnaires. The first round focused on identifying the parameters of acupuncture treatment as adjunct to ART, the second round evaluated statements derived from the earlier round, and the third evaluated specific parameters for a proposed trial protocol. Consensus was defined as greater than 80% agreement. Significant agreement was achieved on the parameters of best practice acupuncture, including an acupuncture protocol suitable for future research. Study participants confirmed the importance of needling aspects relating to the dose of acupuncture, the therapeutic relationship, tailoring treatment to the individual, and the role of co-interventions. From two rounds of the Delphi a consensus was achieved on seven treatment parameters for the design of the acupuncture treatment to be used in a clinical trial of acupuncture as an adjunct to ART. The treatment protocol includes the use of the traditional Chinese medicine acupuncture, use of manual acupuncture, a first treatment administered between day 6-8 of the stimulated ART cycle which is individualised to the participant, two treatments will be administered on the day of embryo transfer, and will include points SP8, SP10, LR3, ST29, CV4, and post transfer include: GV20, KD3, ST36, SP6, and PC6

  1. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  2. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Mental distress and personality in women undergoing GnRH agonist versus GnRH antagonist protocols for assisted reproductive technology.

    Science.gov (United States)

    Stenbæk, D S; Toftager, M; Hjordt, L V; Jensen, P S; Holst, K K; Bryndorf, T; Holland, T; Bogstad, J; Pinborg, A; Hornnes, P; Frokjaer, V G

    2015-01-01

    Do mental distress and mood fluctuations in women undergoing GnRH agonist and GnRH antagonist protocols for assisted reproductive technology (ART) differ depending on protocol and the personality trait, neuroticism? ART treatment did not induce elevated levels of mental distress in either GnRH antagonist or agonist protocols but neuroticism was positively associated with increased mental distress, independent of protocols. ART treatment may increase mental distress by mechanisms linked to sex hormone fluctuations. General psychological characteristics, such as personality traits indexing negative emotionality, e.g. neuroticism, are likely to affect mental distress during ART treatment. A total of 83 women undergoing their first ART cycle were consecutively randomized 1:1 to GnRH antagonist (n = 42) or GnRH agonist (n = 41) protocol. The study population was a subgroup of a larger ongoing Danish clinical randomized trial and was established as an add-on in the period 2010-2012. Women in the GnRH antagonist protocol received daily injections with recombinant follicle-stimulating hormone, Puregon(®) and subcutaneous injections with GnRH antagonist, Orgalutran(®). Women in the GnRH agonist protocol received nasal administration of the GnRH agonist, Synarela(®) and subcutaneous injections with FSH, Puregon(®). The study design did not allow for a blinding procedure. All women self-reported the Profile of Mood States, the Perceived Stress Scale, the Symptom Checklist-92-Revised, and the Major Depression Inventory questionnaires, at baseline, at ART cycle day 35, on the day of oocyte pick-up, and on the day of hCG testing. Also, a series of Profile of Mood States were reported daily during pharmacological treatment to monitor mood fluctuations. The personality trait Neuroticism was assessed at baseline by the self-reported NEO-PI-R questionnaire. ART did not induce within- or between-protocol changes in any of the applied measures of mental distress. However, the Gn

  4. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  5. Mental distress and personality in women undergoing GnRH agonist versus GnRH antagonist protocols for assisted reproductive technology

    DEFF Research Database (Denmark)

    Stenbæk, D. S.; Toftager, M.; Hjordt, L. V.

    2015-01-01

    . Rather, our data highlight the potential importance of (i) rapid increases in ovarian steroids and (ii) addressing personality traits indexing negative emotionality, i.e. Neuroticism, in women undergoing ART treatment, to optimize both emotional adjustment and, possibly, the chances of obtaining......STUDY QUESTION: Do mental distress and mood fluctuations in women undergoing GnRH agonist and GnRH antagonist protocols for assisted reproductive technology (ART) differ depending on protocol and the personality trait, neuroticism? SUMMARY ANSWER: ART treatment did not induce elevated levels...... characteristics, such as personality traits indexing negative emotionality, e.g. neuroticism, are likely to affect mental distress during ART treatment. STUDY DESIGN, SIZE, DURATION: A total of 83 women undergoing their first ART cycle were consecutively randomized 1:1 to GnRH antagonist (n = 42) or GnRH agonist...

  6. Distributed Engine Control Empirical/Analytical Verification Tools, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — In this Phase I project, Impact Technologies, in collaboration with Prof. R.K. Yedavalli, propose a novel verification environment for eventual rapid certification...

  7. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  8. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  9. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  10. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  11. Verification of an algorithm of cono collapsed through the IAEA TECDOC 1583 protocol and dosimetry with radiochromic films; Verificacion de un algoritmo de cono colapso mediante en protocolo IAEA TECDOC 1583 y dosimetria con peliculas radiocromicas

    Energy Technology Data Exchange (ETDEWEB)

    Martin-Viera Cueto, J. A.; Benitez Villegas, E. M.; Bodineau Gil, C.; Parra Osorio, V.; Garcia Pareja, S.; Casado Villalon, F. J.

    2013-07-01

    The objective of this study is to verify the characterization of the collapsed cone algorithm of an SP using this Protocol. In addition, given that it only offers details of dose values measured at discrete points, measures are complemented by a gamma test distributions 2D of doses in different cases using film radiochromic. (Author)

  12. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    Science.gov (United States)

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  13. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  14. Formal Modeling and Verification for MVB

    Directory of Open Access Journals (Sweden)

    Mo Xia

    2013-01-01

    Full Text Available Multifunction Vehicle Bus (MVB is a critical component in the Train Communication Network (TCN, which is widely used in most of the modern train techniques of the transportation system. How to ensure security of MVB has become an important issue. Traditional testing could not ensure the system correctness. The MVB system modeling and verification are concerned in this paper. Petri Net and model checking methods are used to verify the MVB system. A Hierarchy Colored Petri Net (HCPN approach is presented to model and simulate the Master Transfer protocol of MVB. Synchronous and asynchronous methods are proposed to describe the entities and communication environment. Automata model of the Master Transfer protocol is designed. Based on our model checking platform M3C, the Master Transfer protocol of the MVB is verified and some system logic critical errors are found. Experimental results show the efficiency of our methods.

  15. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  16. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  17. The Importance of Trust in the Adoption and Use of Intelligent Assistive Technology by Older Adults to Support Aging in Place: Scoping Review Protocol.

    Science.gov (United States)

    McMurray, Josephine; Strudwick, Gillian; Forchuk, Cheryl; Morse, Adam; Lachance, Jessica; Baskaran, Arani; Allison, Lauren; Booth, Richard

    2017-11-02

    Intelligent assistive technologies that complement and extend human abilities have proliferated in recent years. Service robots, home automation equipment, and other digital assistant devices possessing artificial intelligence are forms of assistive technologies that have become popular in society. Older adults (>55 years of age) have been identified by industry, government, and researchers as a demographic who can benefit significantly from the use of intelligent assistive technology to support various activities of daily living. The purpose of this scoping review is to summarize the literature on the importance of the concept of "trust" in the adoption of intelligent assistive technologies to assist aging in place by older adults. Using a scoping review methodology, our search strategy will examine the following databases: ACM Digital Library, Allied and Complementary Medicine Database (AMED), Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medline, PsycINFO, Scopus, and Web of Science. Two reviewers will independently screen the initial titles obtained from the search, and these results will be further inspected by other members of the research team for inclusion in the review. This review will provide insights into how the concept of trust is actualized in the adoption of intelligent assistive technology by older adults. Preliminary sensitization to the literature suggests that the concept of trust is fluid, unstable, and intimately tied to the type of intelligent assistive technology being examined. Furthermore, a wide range of theoretical lenses that include elements of trust have been used to examine this concept. This review will describe the concept of trust in the adoption of intelligent assistive technology by older adults, and will provide insights for practitioners, policy makers, and technology vendors for future practice. ©Josephine McMurray, Gillian Strudwick, Cheryl Forchuk, Adam Morse, Jessica Lachance, Arani Baskaran, Lauren

  18. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  19. Remotely-Supervised Transcranial Direct Current Stimulation (tDCS for Clinical Trials: Guidelines for Technology and Protocols

    Directory of Open Access Journals (Sweden)

    Leigh E Charvet

    2015-03-01

    Full Text Available The effect of transcranial direct current stimulation (tDCS is cumulative. Treatment protocols typically require multiple consecutive sessions spanning weeks or months. However, traveling to clinic for a tDCS session can present an obstacle to subjects and their caregivers. With modified devices and headgear, tDCS treatment can be administered remotely under clinical supervision, potentially enhancing recruitment, throughput, and convenience. Here we propose standards and protocols for clinical trials utilizing remotely-supervised tDCS with the goal of providing safe, reproducible and well-tolerated stimulation therapy outside of the clinic. The recommendations include: 1 training of staff in tDCS treatment and supervision, 2 assessment of the user’s capability to participate in tDCS remotely, 3 ongoing training procedures and materials including assessments of the user and/or caregiver, 4 simple and fail-safe electrode preparation techniques and tDCS headgear, 5 strict dose control for each session, 6 ongoing monitoring to quantify compliance (device preparation, electrode saturation/placement, stimulation protocol, with corresponding corrective steps as required, 7 monitoring for treatment-emergent adverse effects, 8 guidelines for discontinuation of a session and/or study participation including emergency failsafe procedures tailored to the treatment population’s level of need. These guidelines are intended to provide a minimal level of methodological rigor for clinical trials seeking to apply tDCS outside a specialized treatment center. We outline indication-specific applications (Attention Deficit Hyperactivity Disorder, Depression, Multiple Sclerosis, Palliative Care following these recommendations that support a standardized framework for evaluating the tolerability and reproducibility of remote-supervised tDCS that, once established, will allow for translation of tDCS clinical trials to a greater size and range of patient populations.

  20. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  1. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  2. Open verification methodology cookbook

    CERN Document Server

    Glasser, Mark

    2009-01-01

    Functional verification is an art as much as a science. It requires not only creativity and cunning, but also a clear methodology to approach the problem. The Open Verification Methodology (OVM) is a leading-edge methodology for verifying designs at multiple levels of abstraction. It brings together ideas from electrical, systems, and software engineering to provide a complete methodology for verifying large scale System-on-Chip (SoC) designs. OVM defines an approach for developing testbench architectures so they are modular, configurable, and reusable. This book is designed to help both novic

  3. Requirement Assurance: A Verification Process

    Science.gov (United States)

    Alexander, Michael G.

    2011-01-01

    Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

  4. Accuracy Verification of Magnetic Resonance Imaging (MRI) Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    OpenAIRE

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silico...

  5. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  6. Environmental Technology Verification: Test Report of Mobile Source Emission Control Devices--Johnson Matthey PCRT2 1000, Version 2, Filter + Diesel Oxidation Catalyst

    Science.gov (United States)

    The Johnson Matthey PCRT2 1000, v.2 system is a partial continuously regenerating technology (PCRT) system that consists of a flow-through partial filter combined with a DOC. The system is designed for low temperature exhaust resulting from intermittent loads from medium and heav...

  7. Environmental Technology Verification Report and Statement for Baghouse Filtration Products, W. L. Gore & Associates, Inc. 5117 High Durability PPS Laminate Filtration Media (Tested March-April 2012)

    Science.gov (United States)

    Baghouses are air pollution control devices used to control particulate emissions from stationary sources and are among the technologies evaluated by the APCT Center. Baghouses and their accompanying filter media have long been one of the leading particulate control techniques fo...

  8. The MOBI-Kids study protocol: challenges in assessing childhood and adolescent exposure to electromagnetic fields from wireless telecommunication technologies and possible association with brain tumor risk

    Directory of Open Access Journals (Sweden)

    Siegal eSadetzki

    2014-09-01

    Full Text Available The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF, extremely low frequency (ELF electromagnetic fields (EMF. MOBI-Kids, a multinational case-control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10-24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: 1 the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; 2 investigating a young study population spanning a relatively wide age-range. 3 conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; 4 investigating a rare and potentially fatal disease; and 5 assessing exposure to EMF from communication technologies. Our experience thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people.

  9. The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Technologies and Possible Association with Brain Tumor Risk

    Science.gov (United States)

    Sadetzki, Siegal; Langer, Chelsea Eastman; Bruchim, Revital; Kundi, Michael; Merletti, Franco; Vermeulen, Roel; Kromhout, Hans; Lee, Ae-Kyoung; Maslanyj, Myron; Sim, Malcolm R.; Taki, Masao; Wiart, Joe; Armstrong, Bruce; Milne, Elizabeth; Benke, Geza; Schattner, Rosa; Hutter, Hans-Peter; Woehrer, Adelheid; Krewski, Daniel; Mohipp, Charmaine; Momoli, Franco; Ritvo, Paul; Spinelli, John; Lacour, Brigitte; Delmas, Dominique; Remen, Thomas; Radon, Katja; Weinmann, Tobias; Klostermann, Swaantje; Heinrich, Sabine; Petridou, Eleni; Bouka, Evdoxia; Panagopoulou, Paraskevi; Dikshit, Rajesh; Nagrani, Rajini; Even-Nir, Hadas; Chetrit, Angela; Maule, Milena; Migliore, Enrica; Filippini, Graziella; Miligi, Lucia; Mattioli, Stefano; Yamaguchi, Naohito; Kojimahara, Noriko; Ha, Mina; Choi, Kyung-Hwa; Mannetje, Andrea ’t; Eng, Amanda; Woodward, Alistair; Carretero, Gema; Alguacil, Juan; Aragones, Nuria; Suare-Varela, Maria Morales; Goedhart, Geertje; Schouten-van Meeteren, A. Antoinette Y. N.; Reedijk, A. Ardine M. J.; Cardis, Elisabeth

    2014-01-01

    The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: (1) the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; (2) investigating a young study population spanning a relatively wide age range; (3) conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; (4) investigating a rare and potentially fatal disease; and (5) assessing exposure to EMF from communication technologies. Our experience in thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people. PMID:25295243

  10. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  11. SoC Design Approach Using Convertibility Verification

    Directory of Open Access Journals (Sweden)

    Basu Samik

    2008-01-01

    Full Text Available Abstract Compositional design of systems on chip from preverified components helps to achieve shorter design cycles and time to market. However, the design process is affected by the issue of protocol mismatches, where two components fail to communicate with each other due to protocol differences. Convertibility verification, which involves the automatic generation of a converter to facilitate communication between two mismatched components, is a collection of techniques to address protocol mismatches. We present an approach to convertibility verification using module checking. We use Kripke structures to represent protocols and the temporal logic to describe desired system behavior. A tableau-based converter generation algorithm is presented which is shown to be sound and complete. We have developed a prototype implementation of the proposed algorithm and have used it to verify that it can handle many classical protocol mismatch problems along with SoC problems. The initial idea for -based convertibility verification was presented at SLA++P '07 as presented in the work by Roopak Sinha et al. 2008.

  12. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  13. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  14. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  15. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  16. MARATHON Verification (MARV)

    Science.gov (United States)

    2017-08-01

    the verification and "lessons learned " from the semantic and technical issues we discovered as we implemented the approach. 15. SUBJECT TERMS...any programming language at use at CAA for modeling or other data analysis applications, to include R, Python , Scheme, Common Lisp, Julia, Mathematica

  17. Seismic verification of underground explosions

    International Nuclear Information System (INIS)

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper

  18. Accuracy Verification of Magnetic Resonance Imaging (MRI Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Safari

    2012-01-01

    Full Text Available Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  19. Accuracy verification of magnetic resonance imaging (MRI) technology for lower-limb prosthetic research: utilising animal soft tissue specimen and common socket casting materials.

    Science.gov (United States)

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  20. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  1. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  2. Integrated testing and verification system for research flight software

    Science.gov (United States)

    Taylor, R. N.

    1979-01-01

    The MUST (Multipurpose User-oriented Software Technology) program is being developed to cut the cost of producing research flight software through a system of software support tools. An integrated verification and testing capability was designed as part of MUST. Documentation, verification and test options are provided with special attention on real-time, multiprocessing issues. The needs of the entire software production cycle were considered, with effective management and reduced lifecycle costs as foremost goals.

  3. Examining the ethical and social issues of health technology design through the public appraisal of prospective scenarios: a study protocol describing a multimedia-based deliberative method.

    Science.gov (United States)

    Lehoux, Pascale; Gauthier, Philippe; Williams-Jones, Bryn; Miller, Fiona A; Fishman, Jennifer R; Hivon, Myriam; Vachon, Patrick

    2014-06-21

    The design of health technologies relies on assumptions that affect how they will be implemented, such as intended use, complexity, impact on user autonomy, and appropriateness. Those who design and implement technologies make several ethical and social assumptions on behalf of users and society more broadly, but there are very few tools to examine prospectively whether such assumptions are warranted and how the public define and appraise the desirability of health innovations. This study protocol describes a three-year study that relies on a multimedia-based prospective method to support public deliberations that will enable a critical examination of the social and ethical issues of health technology design. The first two steps of our mixed-method study were completed: relying on a literature review and the support of our multidisciplinary expert committee, we developed scenarios depicting social and technical changes that could unfold in three thematic areas within a 25-year timeframe; and for each thematic area, we created video clips to illustrate prospective technologies and short stories to describe their associated dilemmas. Using this multimedia material, we will: conduct four face-to-face deliberative workshops with members of the public (n=40) who will later join additional participants (n=25) through an asynchronous online forum; and analyze and integrate three data sources: observation, group deliberations, and a self-administered participant survey. This study protocol will be of interest to those who design and assess public involvement initiatives and to those who examine the implementation of health innovations. Our premise is that using user-friendly tools in a deliberative context that foster participants' creativity and reflexivity in pondering potential technoscientific futures will enable our team to analyze a range of normative claims, including some that may prove problematic and others that may shed light over potentially more valuable

  4. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... to a transition semantics which can easily be implemented. (An existing SPL implementation bridges the gap that often exists between abstract protocol models on which verification of security properties is carried out and the implemented protocol.) SPL-nets are a particular kind of contextual Petri...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  5. Verification Survey of Uranium Mine Remediation

    International Nuclear Information System (INIS)

    Ron, Stager

    2009-01-01

    The Canadian Nuclear Safety Commission (CNSC) contracted an independent verification of an intensive gamma radiation survey conducted by a mining company to demonstrate that remediation of disturbed areas was complete. This site was the first of the recent mines being decommissioned in Canada and experience gained here may be applied to other mines being decommissioned in the future. The review included examination of the site-specific basis for clean-up criteria and ALARA as required by CNSC guidance. A paper review of the company report was conducted to determine if protocols were followed and that the summarized results could be independently reproduced. An independent verification survey was conducted on parts of the site and comparisons were made between gamma radiation measurements from the verification survey and the original company survey. Some aspects of data collection using rate meters linked to GPS data loggers are discussed as are aspects for data management and analyses methods required for the large amount of data collected during these surveys. Recommendations were made for implementation of future surveys and reporting the data from those surveys in order to ensure that remediation was complete. (authors)

  6. Assessment of unsaturated zone transport for shallow land burial of radioactive waste: summary report of technology needs, model verification, and measurement efforts (FY 1978 to FY 1983)

    International Nuclear Information System (INIS)

    Jones, T.L.; Gee, G.W.

    1984-01-01

    Two main topics are addressed in this report. The first topic relates to the assessment process for shallow land burial site design. This overview includes basic descriptions of water balance, transport processes and technology needs for waste management at an arid (dry) site. The second topic deals with specific results of research activities at PNL related to water and radionuclide transport under arid, shallow land burial conditions. Technology needs at arid-zone (dry) sites are summarized and unique features of radionuclide disposal at dry sites are explained. The report emphasizes the need to understand the interaction between climate, soil, plants, engineered barriers, and buried waste in order to evaluate performance of a waste disposal system at a dry site. Water balance data, collected since FY 1978 at the Buried Waste Test Facility (BWTF) at Hanford, are used to illustrate the influence of climate variables (rainfall distribution patterns and evaporative conditions) on soil water storage and drainage at an arid site. For dry site conditions, with no vegetation and coarse soil, significant deep drainage was measured. Deep drainage below the root zone was also measured at a grass-covered site on the Hanford site after early spring rains, which emphasizes the need to carefully monitor site water balances even at arid (dry) sites. The monitoring technology, water balance, and radionuclide transport at arid sites are discussed, and the use of neutron probes, electrical resistance units, tensiometers, and psychrometers are explained, and examples are given on their applications in arid-site monitoring. Measurements of water flow and radionuclide transport coefficients needed to describe movement in unsaturated soils are documented. 40 references, 21 figures, 5 tables

  7. Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana (REACCTING): study rationale and protocol.

    Science.gov (United States)

    Dickinson, Katherine L; Kanyomse, Ernest; Piedrahita, Ricardo; Coffey, Evan; Rivera, Isaac J; Adoctor, James; Alirigia, Rex; Muvandimwe, Didier; Dove, MacKenzie; Dukic, Vanja; Hayden, Mary H; Diaz-Sanchez, David; Abisiba, Adoctor Victor; Anaseba, Dominic; Hagar, Yolanda; Masson, Nicholas; Monaghan, Andrew; Titiati, Atsu; Steinhoff, Daniel F; Hsu, Yueh-Ya; Kaspar, Rachael; Brooks, Bre'Anna; Hodgson, Abraham; Hannigan, Michael; Oduro, Abraham Rexford; Wiedinmyer, Christine

    2015-02-12

    Cooking over open fires using solid fuels is both common practice throughout much of the world and widely recognized to contribute to human health, environmental, and social problems. The public health burden of household air pollution includes an estimated four million premature deaths each year. To be effective and generate useful insight into potential solutions, cookstove intervention studies must select cooking technologies that are appropriate for local socioeconomic conditions and cooking culture, and include interdisciplinary measurement strategies along a continuum of outcomes. REACCTING (Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana) is an ongoing interdisciplinary randomized cookstove intervention study in the Kassena-Nankana District of Northern Ghana. The study tests two types of biomass burning stoves that have the potential to meet local cooking needs and represent different "rungs" in the cookstove technology ladder: a locally-made low-tech rocket stove and the imported, highly efficient Philips gasifier stove. Intervention households were randomized into four different groups, three of which received different combinations of two improved stoves, while the fourth group serves as a control for the duration of the study. Diverse measurements assess different points along the causal chain linking the intervention to final outcomes of interest. We assess stove use and cooking behavior, cooking emissions, household air pollution and personal exposure, health burden, and local to regional air quality. Integrated analysis and modeling will tackle a range of interdisciplinary science questions, including examining ambient exposures among the regional population, assessing how those exposures might change with different technologies and behaviors, and estimating the comparative impact of local behavior and technological changes versus regional climate variability and change on local air quality and health outcomes

  8. Improving coronary heart disease self-management using mobile technologies (Text4Heart): a randomised controlled trial protocol

    OpenAIRE

    Dale, Leila Pfaeffli; Whittaker, Robyn; Jiang, Yannan; Stewart, Ralph; Rolleston, Anna; Maddison, Ralph

    2014-01-01

    Background Cardiac rehabilitation (CR) is a secondary prevention program that offers education and support to assist patients with coronary heart disease (CHD) make lifestyle changes. Despite the benefits of CR, attendance at centre-based sessions remains low. Mobile technology (mHealth) has potential to reach more patients by delivering CR directly to mobile phones, thus providing an alternative to centre-based CR. The aim of this trial is to evaluate if a mHealth comprehensive CR program ca...

  9. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  10. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  11. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  12. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  13. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  14. Impact of mobile phone-based technology to improve health, population and nutrition services in Rural Bangladesh: a study protocol.

    Science.gov (United States)

    Uddin, Jasim; Biswas, Tuhin; Adhikary, Gourab; Ali, Wazed; Alam, Nurul; Palit, Rajesh; Uddin, Nizam; Uddin, Aftab; Khatun, Fatema; Bhuiya, Abbas

    2017-07-06

    Mobile phone-based technology has been used in improving the delivery of healthcare services in many countries. However, data on the effects of this technology on improving primary healthcare services in resource-poor settings are limited. The aim of this study is to develop and test a mobile phone-based system to improve health, population and nutrition services in rural Bangladesh and evaluate its impact on service delivery. The study will use a quasi-experimental pre-post design, with intervention and comparison areas. Outcome indicators will include: antenatal care (ANC), delivery care, postnatal care (PNC), neonatal care, expanded programme on immunization (EPI) coverage, and contraceptive prevalence rate (CPR). The study will be conducted over a period of 30 months, using the existing health systems of Bangladesh. The intervention will be implemented through the existing service-delivery personnel at various primary-care levels, such as community clinic, union health and family welfare centre, and upazila health complex. These healthcare providers will be given mobile phones equipped with Apps for sending text and voice messages, along with the use of Internet and device for data-capturing. Training on handling of the Smartphones, data-capturing and monitoring will be given to selected service providers. They will also be trained on inputs, editing, verifying, and monitoring the outcome variables. Mobile phone-based technology has the potential to improve primary healthcare services in low-income countries, like Bangladesh. It is expected that our study will contribute to testing and developing a mobile phone-based intervention to improve the coverage and quality of services. The learning can be used in other similar settings in the low-and middle-income countries.

  15. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  16. Design of verification platform for wireless vision sensor networks

    Science.gov (United States)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  17. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  18. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  19. International monitoring of technology

    International Nuclear Information System (INIS)

    Fischer, W.; Stein, G.

    1990-01-01

    The monitoring of the civilian nuclear energy sector has been effected successfully by IAEA and EURATOM and has contributed to a reduction of fears within the communities of nations. Certainly, it will not be possible to subject the whole world and whole spectrum of technology to monitoring. However, the nations should be enabled to reduce their greatest fears concerning an abuse and a misuse of technology by verification, and to check the compliance with such international agreements which regulate the application of a number of technologies. There are some (as yet rudimentary) approaches to an international verification in the field of environmental protection and resource policies. Nuclear energy with its sophisticated verification procedure has taken one great step ahead of the other fields. The strengths and weaknesses of its verification regime should be learned from when filling the virgin fields of international technology monitoring and its instrument, i.e. international verification. (orig./HSCH) [de

  20. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  1. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  2. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  3. The effectiveness of technology-based strategies to promote engagement with digital interventions: a systematic review protocol.

    Science.gov (United States)

    Alkhaldi, Ghadah; Hamilton, Fiona L; Lau, Rosa; Webster, Rosie; Michie, Susan; Murray, Elizabeth

    2015-04-28

    Digital interventions provide effective and potentially cost-effective models for improving health outcomes as they deliver health information and services that are widely disseminated, confidential, and can be tailored to needs of the individual user. Digital interventions have been used successfully for health promotion, mental health, and for enabling self-management of long-term conditions. However, their effectiveness is limited by low usage rates, with non-engagement a major challenge. Hence, it is crucial to find effective strategies to increase user engagement with digital interventions. This systematic review will aim to evaluate the effectiveness of technology-based strategies to promote engagement with digital interventions. We will follow Cochrane Collaboration guidelines on systematic review methodology. The search strategy will be executed across seven e-databases (including MEDLINE, EMBASE, PsycINFO, CINAHL) using the concepts "digital intervention" and "engagement", limited by study type (randomized controlled trial). Grey literature and reference lists of included studies will be searched. Titles and abstracts will be independently screened by 2 authors. Then the full text of potentially eligible papers will be obtained and double screened. Data from eligible papers will be extracted by 1 author and checked for accuracy by another author. Bias will be assessed using the Cochrane bias assessment tool. Narrative synthesis will report on all included studies, and where appropriate, data will be pooled using meta-analysis. All findings will be reported according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. Sources of heterogeneity will be further investigated if required. Our research is in progress. The final draft of the systematic review is being written and will be submitted before the end of 2015. The review findings will inform researchers and digital intervention providers about optimal use of technology

  4. Public preferences for engagement in Health Technology Assessment decision-making: protocol of a mixed methods study.

    Science.gov (United States)

    Wortley, Sally; Tong, Allison; Lancsar, Emily; Salkeld, Glenn; Howard, Kirsten

    2015-07-14

    Much attention in recent years has been given to the topic of public engagement in health technology assessment (HTA) decision-making. HTA organizations spend substantial resources and time on undertaking public engagement, and numerous studies have examined challenges and barriers to engagement in the decision-making process however uncertainty remains as to optimal methods to incorporate the views of the public in HTA decision-making. Little research has been done to ascertain whether current engagement processes align with public preferences and to what extent their desire for engagement is dependent on the question being asked by decision-makers or the characteristics of the decision. This study will examine public preferences for engagement in Australian HTA decision-making using an exploratory mixed methods design. The aims of this study are to: 1) identify characteristics about HTA decisions that are important to the public in determining whether public engagement should be undertaken on a particular topic, 2) determine which decision characteristics influence public preferences for the extent, or type of public engagement, and 3) describe reasons underpinning these preferences. Focus group participants from the general community, aged 18-70 years, will be purposively sampled from the Australian population to ensure a wide range of demographic groups. Each focus group will include a general discussion on public engagement as well as a ranking exercise using a modified nominal group technique (NGT). The NGT will inform the design of a discrete choice study to quantitatively assess public preferences for engagement in HTA decision-making. The proposed research seeks to investigate under what circumstances and how the public would like their views and preferences to be considered in health technology assessments. HTA organizations regularly make decisions about when and how public engagement should occur but without consideration of the public's preferences on

  5. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  6. CTBT integrated verification system evaluation model supplement

    International Nuclear Information System (INIS)

    EDENBURN, MICHAEL W.; BUNTING, MARCUS; PAYNE, ARTHUR C. JR.; TROST, LAWRENCE C.

    2000-01-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0

  7. Optimization of a technology-supported physical activity intervention for breast cancer survivors: Fit2Thrive study protocol.

    Science.gov (United States)

    Phillips, Siobhan M; Collins, Linda M; Penedo, Frank J; Courneya, Kerry S; Welch, Whitney; Cottrell, Alison; Lloyd, Gillian R; Gavin, Kara; Cella, David; Ackermann, Ronald T; Siddique, Juned; Spring, Bonnie

    2018-03-01

    Fit2Thrive is a theory-guided physical activity promotion trial using the Multiphase Optimization Strategy (MOST) to test efficacy for improving physical activity of five technology-supported physical activity promotion intervention components among breast cancer survivors. This trial will recruit 256 inactive breast cancer survivors nationwide. All participants will receive the core intervention which includes a Fitbit and standard self-monitoring Fit2Thrive smartphone application which will be downloaded to their personal phone. Women will be randomized to one of 32 conditions in a factorial design involving five factors with two levels: support calls (No vs. Yes), app type (standard vs. deluxe), text messaging (No vs. Yes), online gym (No vs. Yes) and Fitbit Buddy (No vs. Yes). The proposed trial examines the effects of the components on physical activity at 12 and 24weeks. Results will support the selection of a final package of intervention components that has been optimized to maximize physical activity and is subject to an upper limit of cost. The optimized intervention will be tested in a future trial. Fit2Thrive is the first trial to use the MOST framework to develop and test a physical activity promotion intervention in breast cancer survivors and will lead to an improved understanding of how to effectively change survivors' physical activity. These findings could result in more scalable, effective physical activity interventions for breast cancer survivors, and, ultimately, improve health and disease outcomes. Copyright © 2018 Elsevier Inc. All rights reserved.

  8. Method and computer product to increase accuracy of time-based software verification for sensor networks

    Science.gov (United States)

    Foo Kune, Denis [Saint Paul, MN; Mahadevan, Karthikeyan [Mountain View, CA

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  9. Claims to success: advocacy for the protocol on the rights of women in Africa – solidarity for African women’s rights and the use of information and communication technologies

    NARCIS (Netherlands)

    K. Kemp (Karoline)

    2010-01-01

    textabstractThe goal of this particular research has been to examine the role of information and communication technologies (ICTs) in policy advocacy as applied by civil society. Taking the Solidarity for African Women’s Rights coalition and their work towards the ratification of the Protocol on

  10. The effectiveness of information and communication technology-based psychological interventions for paediatric chronic pain: protocol for a systematic review, meta-analysis and intervention content analysis.

    Science.gov (United States)

    Traynor, Angeline; Morrissey, Eimear; Egan, Jonathan; McGuire, Brian E

    2016-10-18

    Resource and geographic barriers are the commonly cited constraints preventing the uptake of psychological treatment for chronic pain management. For adults, there is some evidence to support the use of information and communication technology (ICT) as a mode of treatment delivery. However, mixed findings have been reported for the effectiveness and acceptability of psychological interventions delivered using information and communication technology for children and adolescents. This is a protocol for a review that aims to (i) evaluate the effectiveness of psychological interventions delivered using information and communication technology for children and adolescents with chronic pain and (ii) identify the intervention components and usability factors in technology-based treatments associated with behaviour change. We will conduct a systematic review to evaluate the effectiveness of psychological interventions for paediatric chronic pain delivered using ICT. We plan to directly compare ICT-based, psychological interventions with active control, treatment as usual or waiting list control conditions. This systematic review will be reported in line with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidance. Published and unpublished randomised controlled trials will be included and the literature search will comprise Ovid MEDLINE, Ovid Embase, PsycINFO and the Cochrane Library on Wiley, including CENTRAL and Cochrane Database of Systematic Reviews. Grey literature including theses, dissertations, technical and research reports will also be examined. Two review authors will independently conduct study selection, relevant data extraction and assessment of methodological quality. Risk of bias in included studies will be assessed using the Cochrane Collaboration risk of bias tool criteria. Two qualified coders will independently code behaviour change techniques according to the behaviour change taxonomy (v1) of 93 hierarchically

  11. Improving coronary heart disease self-management using mobile technologies (Text4Heart): a randomised controlled trial protocol.

    Science.gov (United States)

    Dale, Leila Pfaeffli; Whittaker, Robyn; Jiang, Yannan; Stewart, Ralph; Rolleston, Anna; Maddison, Ralph

    2014-03-04

    Cardiac rehabilitation (CR) is a secondary prevention program that offers education and support to assist patients with coronary heart disease (CHD) make lifestyle changes. Despite the benefits of CR, attendance at centre-based sessions remains low. Mobile technology (mHealth) has potential to reach more patients by delivering CR directly to mobile phones, thus providing an alternative to centre-based CR. The aim of this trial is to evaluate if a mHealth comprehensive CR program can improve adherence to healthy lifestyle behaviours (for example, physically active, fruit and vegetable intake, not smoking, low alcohol consumption) over and above usual CR services in New Zealand adults diagnosed with CHD. A two-arm, parallel, randomised controlled trial will be conducted at two Auckland hospitals in New Zealand. One hundred twenty participants will be randomised to receive a 24-week evidence- and theory-based personalised text message program and access to a supporting website in addition to usual CR care or usual CR care alone (control). The primary outcome is the proportion of participants adhering to healthy behaviours at 6 months, measured using a composite health behaviour score. Secondary outcomes include overall cardiovascular disease risk, body composition, illness perceptions, self-efficacy, hospital anxiety/depression and medication adherence. This study is one of the first to examine an mHealth-delivered comprehensive CR program. Strengths of the trial include quality research design and in-depth description of the intervention to aid replication. If effective, the trial has potential to augment standard CR practices and to be used as a model for other disease prevention or self-management programs. Australian New Zealand Clinical Trials Registry: ACTRN12613000901707.

  12. Ocean fertilization, carbon credits and the Kyoto Protocol

    Science.gov (United States)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  13. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  14. Parking Space Verification

    DEFF Research Database (Denmark)

    Høg Peter Jensen, Troels; Thomsen Schmidt, Helge; Dyremose Bodin, Niels

    2018-01-01

    With the number of privately owned cars increasing, the issue of locating an available parking space becomes apparant. This paper deals with the verification of vacant parking spaces, by using a vision based system looking over parking areas. In particular the paper proposes a binary classifier...... system, based on a Convolutional Neural Network, that is capable of determining if a parking space is occupied or not. A benchmark database consisting of images captured from different parking areas, under different weather and illumination conditions, has been used to train and test the system...

  15. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  16. Effectiveness of a Technology-Based Supportive Educational Parenting Program on Parental Outcomes in Singapore: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Shorey, Shefaly; Ng, Yvonne Peng Mei; Siew, An Ling; Yoong, Joanne; Mörelius, Evalotte

    2018-01-10

    Supportive educational programs during the perinatal period are scarce in Singapore. There is no continuity of care available in terms of support from community care nurses in Singapore. Parents are left on their own most of the time, which results in a stressful transition to parenthood. There is a need for easily accessible technology-based educational programs that can support parents during this crucial perinatal period. The aim of this study was to describe the study protocol of a randomized controlled trial on a technology-based supportive educational parenting program. A randomized controlled two-group pretest and repeated posttest experimental design will be used. The study will recruit 118 parents (59 couples) from the antenatal clinics of a tertiary public hospital in Singapore. Eligible parents will be randomly allocated to receive either the supportive educational parenting program or routine perinatal care from the hospital. Outcome measures include parenting self-efficacy, parental bonding, postnatal depression, social support, parenting satisfaction, and cost evaluation. Data will be collected at the antenatal period, immediate postnatal period, and at 1 month and 3 months post childbirth. Recruitment of the study participants commenced in December 2016 and is still ongoing. Data collection is projected to finish within 12 months, by December 2017. This study will identify a potentially clinically useful, effective, and cost-effective supportive educational parenting program to improve parental self-efficacy and bonding in newborn care, which will then improve parents' social support-seeking behaviors, emotional well-being, and satisfaction with parenting. It is hoped that better supported and satisfied parents will consider having more children, which may in turn influence Singapore's ailing birth rate. International Standard Randomized Controlled Trial Number (ISRCTN): 48536064; https://www.isrctn.com/ISRCTN48536064 (Archived by WebCite at http

  17. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  18. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    with a variant of the classic BGW protocol. The protocol is secure against a semi-honest adversary. In Chapter 4 we describe a new protocol for VIFF that is secure against malicious adversaries. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which...... systems hosted by an untrusted provider. It guarantees atomic read and write operations on the shared data when the service is correct and preserves fork-linearizability when the service is faulty. A prototype has been implemented on top of the Subversion revision control system; benchmarks show...

  19. Inventory of present verification techniques. Viewpoint of EURATOM

    International Nuclear Information System (INIS)

    Kloeckner, W.; Eecken, D. Van der; Gmelin, W.

    1998-01-01

    Starting from the role of Euratom as an established regional safeguards system, an overview is given of verification techniques currently practised by Euratom. In the stage-light of a rapidly changing and complex international safeguards scene, Euratom considers it has an important role to play. Having in mind the possibilities created by accelerating modern technology, recommendations are given for an enhanced use of technological means in safeguards. The viewpoint of Euratom is that the majority of methodologies and techniques in place may very well be copied to or used for a cut-off verification system currently under discussion

  20. Enhancing mHealth Technology in the Patient-Centered Medical Home Environment to Activate Patients With Type 2 Diabetes: A Multisite Feasibility Study Protocol.

    Science.gov (United States)

    Gimbel, Ronald; Shi, Lu; Williams, Joel E; Dye, Cheryl J; Chen, Liwei; Crawford, Paul; Shry, Eric A; Griffin, Sarah F; Jones, Karyn O; Sherrill, Windsor W; Truong, Khoa; Little, Jeanette R; Edwards, Karen W; Hing, Marie; Moss, Jennie B

    2017-03-06

    Diabetes Self-care Activities Measure scores, clinical measures, comorbid conditions, health services resource consumption, and technology system usage statistics. We have completed phase 1 data collection. Formal analysis of phase 1 data has not been completed. We have obtained institutional review board approval and began phase 1 research in late fall 2016. The study hypotheses suggest that patients can, and will, improve their activation in chronic care management. Improved activation should translate into improved diabetes self-care. Expected benefits of this research to the scientific community and health care services include improved understanding of how to leverage mHealth technology to activate patients living with type 2 diabetes in self-management behaviors. The research will shed light on implementation strategies in integrating mHealth into the clinical workflow of the PCMH setting. ClinicalTrials.gov NCT02949037. https://clinicaltrials.gov/ct2/show/NCT02949037. (Archived by WebCite at http://www.webcitation.org/6oRyDzqei). ©Ronald Gimbel, Lu Shi, Joel E Williams, Cheryl J Dye, Liwei Chen, Paul Crawford, Eric A Shry, Sarah F Griffin, Karyn O Jones, Windsor W Sherrill, Khoa Truong, Jeanette R Little, Karen W Edwards, Marie Hing, Jennie B Moss. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 06.03.2017.

  1. Plan for a laser weapon verification research program

    Energy Technology Data Exchange (ETDEWEB)

    Karr, T.J.

    1990-03-01

    Currently there is great interest in the question of how, or even whether, a treaty limiting the development and deployment of laser weapons could be verified. The concept of cooperative laser weapon verification is that each party would place monitoring stations near the other party's declared or suspect laser weapon facilities. The monitoring stations would measure the primary laser observables'' such as power or energy, either directly or by collecting laser radiation scattered from the air or the target, and would verify that the laser is operated within treaty limits. This concept is modeled along the lines of the seismic network recently activated in the USSR as a joint project of the United States Geologic Survey and the Soviet Academy of Sciences. The seismic data, gathered cooperatively, can be used by each party as it wishes, including to support verification of future nuclear test ban treaties. For laser weapon verification the monitoring stations are envisioned as ground-based, and would verify treaty limitations on ground-based laser anti-satellite (ASAT) weapons and on the ground-based development of other laser weapons. They would also contribute to verification of limitations on air-, sea- and space-based laser weapons, and the technology developed for cooperative verification could also be used in national technical means of verification. 2 figs., 4 tabs.

  2. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  3. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  4. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  5. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  6. A Type Theoretic Investigation of the Verification of Voting Protocols

    DEFF Research Database (Denmark)

    Gustafsson, Daniel

    As the world becomes more digital we see a greater push for digital elections, but we need to be cautious when we modernize to make sure we don't introduce issues that affect the election. These issues are related to trust, on the one hand, how can we trust that the result of the election is corr...... based on based on linear logic, extended with the possibility of depending on the actual messages sent. I prove the consistency of this extension by giving a model of it in Agda. These contributions are combined to form a library, which is named CryptoAgda, to reason about cryptography...

  7. Shear Ram Verification Test Protocol (VTP) Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    Lindley, Roy A. [Argonne National Lab. (ANL), Argonne, IL (United States); Braun, Joseph C. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-01-01

    A blowout preventer (BOP) is a critical component used on subsea oil and gas wells during drilling, completion, and workover operations on the U. S. outer continental shelf (OCS). The purpose of the BOP is to seal oil and gas wells, and in the case of an emergency well-control event, to prevent the uncontrolled release of hydrocarbons. One of the most important components of the BOP is the hydraulically operated blind shear ram (BSR) that shears drilling-related components, such as drill pipes, casings, tubings, and wire-related tools that may have been placed in the well. In addition to shearing these components, the BSR must form a seal to keep hydrocarbons within the well bore, even when under the highest well-fluid pressures expected. The purpose of this document is for Argonne National Laboratory (ANL) to provide an independent view, based on current regulations, and best practices for testing and confirming the operability and suitability of BSRs under realistic (or actual) well conditions.

  8. A Type Theoretic Investigation of the Verification of Voting Protocols

    DEFF Research Database (Denmark)

    Gustafsson, Daniel

    and calculation of probabilities, in particular ∑-types are used as they correspond to summation. Furthermore, I extend the type theory with process algebraic constructions in order to capture attack games as defined by semantic security in cryptography. To type these processes I propose a session type system...... the proofs used to justify both the correctness and security of such cryptographic constructions inside type theory. This requires a theory of probabilities in order to describe the probabilistic algorithms used. My contributions include, using types and type isomorphisms to simplify both specification...

  9. Analysis of Meeting Protocols by Formalisation, Simulation and Verification

    NARCIS (Netherlands)

    Jonker, C.M.; Schut, M.C.; Treur, J.; Yolum, P.

    2007-01-01

    Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and make decisions. However, many meetings suffer from unfocused discussions or irrelevant dialogues. To study meetings in

  10. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  11. Geneva protocols

    International Nuclear Information System (INIS)

    Kimminich, O.

    1990-01-01

    The First Protocol Additional to the Geneva Conventions of 1949 and relating to the Protection of Victims of International Armed Conflicts contains provisions prohibiting indiscriminate attacks. Nuclear warfare as such is not mentioned in the Protocol. It has been asserted that the Protocol does not apply to nuclear weapons for several reasons. However, close analysis shows that the rules governing the application of means and methods of warfare cannot exempt the nuclear weapons. If nuclear weapons are applied in a manner not consistent with article 51 of Protocol I, their use is forbidden by this article even in situations in which general international law might grant an exception from the ban on nuclear weapons, as in the case of reprisal. (orig./HSCH) [de

  12. Model Based Verification of Cyber Range Event Environments

    Science.gov (United States)

    2015-12-10

    built a software development environment that uses to support the development and verification of on-board software for spacecraft. Tanizaki et al...Technologies, Piscataway, 2011. [16] Hiroaki Tanizaki , Toshiaki Aoki, and Takuya Katayama, "A Variability Management Method for Software

  13. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  14. Assisted reproductive technology and risk of asthma and allergy in the offspring: protocol for a systematic review and meta-analysis.

    Science.gov (United States)

    Nwaru, Bright I; McCleary, Nicola; Erkkola, Maijaliisa; Kaila, Minna; Virtanen, Suvi M; Sheikh, Aziz

    2016-04-22

    The use of assisted reproductive technology (ART) procedures has increased globally over the last three decades. Recent observational studies suggest that children conceived through ART may be at increased risk of asthma and atopic disease compared with children conceived naturally, but findings are mixed. We aim to synthesise the evidence on the impact of ART on the risk of asthma and atopic disease in the offspring. We will identify relevant studies by searching MEDLINE, EMBASE, Cochrane Library, ISI Web of Science, CINAHL, Scopus, Google Scholar, AMED, Global Health, PsychINFO, CAB International and the WHO Global Health Library from 1978 to 2016. We will locate additional studies through searching databases of the proceedings of international conferences, contacting international experts in the field, and searching the references cited in identified studies. We will include analytic observational studies (cohort studies, case-control studies and cross-sectional studies) that have investigated the impact of any type of ART on offspring's asthma and atopic disease. Screening of identified records, data extraction from eligible studies and risk of bias assessment of eligible studies will be independently undertaken by two reviewers, with arbitration by a third reviewer. The Effective Public Health Practice Project will be employed for risk of bias assessment. Estimates from studies judged to be clinically, methodologically and statistically homogeneous will be synthesised using random-effects meta-analysis. As this study is based solely on the published literature, no ethics approval is required. We will publish our findings in a peer-reviewed scientific journal and present the results at national and international scientific conferences. We will register a detailed protocol for the review with the International Prospective Register of Systematic Reviews (PROSPERO) prior to starting the review. Published by the BMJ Publishing Group Limited. For permission to use

  15. Protocol for a cluster randomised controlled trial on information technology-enabled nutrition intervention among urban adults in Chandigarh (India): SMART eating trial.

    Science.gov (United States)

    Kaur, Jasvir; Kaur, Manmeet; Webster, Jacqui; Kumar, Rajesh

    2018-01-01

    Nutrition is an important determinant of health. At present, nutrition programs in India mainly emphasize improving maternal and child nutrition. Adult nutrition has not received due attention, though diseases like hypertension and diabetes are largely preventable through changes in dietary and physical activity behaviour. Little is known about the best approaches to improve dietary behaviours, especially the role of modern information technology (IT) in health education. We describe the protocol of the SMART Eating (Small, Measurable and Achievable dietary changes by Reducing fat, sugar and salt consumption and Trying different fruits and vegetables) health promotion intervention. A Cluster Randomised Controlled Trial will evaluate the effect of an IT-enabled intervention on nutrition behaviour among urban adults of Chandigarh, India. Formative research using a qualitative exploratory approach was undertaken to inform the intervention. The IT-enabled intervention programme includes website development, Short Message Service (SMS), e-mail reminders and interactive help by mobile and landline phones. The IT-enabled intervention will be compared to the traditional nutrition education program of distributing pamphlets in the control group. The primary outcome will be the percentage of study participants meeting the dietary intake guidelines of the National Institute of Nutrition, Hyderabad, India and the change in intake of fat, sugar, salt, fruit and vegetables after the intervention. The difference in differences method will be used to determine the net change in dietary intakes resulting from the interventions. Measurements will be made at baseline and at 6 months post-intervention, using a food frequency questionnaire. The formative research led to the development of a comprehensive intervention, focusing on five dietary components and using multi-channel communication approach including the use of IT to target urban North Indians from diverse socio

  16. Study Protocol of MINI SALTEN: a technology-based multi-component intervention in the school environment targeting healthy habits of first grade children and their parents.

    Science.gov (United States)

    Kovalskys, Irina; Rausch Herscovici, Cecile; Indart Rougier, Paula; De Gregorio, María José; Zonis, Luciana; Orellana, Liliana

    2017-05-06

    MINI SALTEN is a program developed to increase moderate to vigorous physical activity (PA) and improve eating habits at home and school in first grade children. It aims to assess the effects of a technology family-based and PA school-based intervention. The purpose of this manuscript is to describe the protocol design and the MINISALTEN intervention. This is cluster-randomized controlled trial designed to run from July 2015 to November 2016 in 12 public schools of the city of Buenos Aires, matched for socio-demographic characteristics. The intervention is based on two main components: (a) "active breaks" (AB): implemented during school breaks by a PA instructor; (b) "virtual" (V): web-based contents delivered to the families via a multiplatform application. Using a computer generated random sequence participants are allocated to one of four intervention conditions: (AB), (V), (AB + V), and control (C). Outcomes are measured at baseline and 12 months post intervention, and will include data collected from the child and her/his mother/father or guardian. Primary outcome measures are: PA and sedentary behaviour (measured with accelerometers). Secondary outcome measures related are: percentage of kilocalories (kcal) from added sugars, and from total and saturated fats; grams of fruits and vegetables; and number of snacks and kcal coming from their added sugars and total and saturated fats. Family socio-economic level, home environment, and school environment will also be assessed. Statistical analysis is on an intention-to-treat principle. Baseline characteristics are described using summary measures and mixed models (with school as random effect). The effect of the two interventions will be estimated using a generalized mixed linear model with link and distribution selected according to the type of outcome. Included random effects are: child (or mother/father or guardian) accounting for repeated measures; school accounting for cluster induced by school. The most

  17. System and Component Software Specification, Run-time Verification and Automatic Test Generation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The following background technology is described in Part 5: Run-time Verification (RV), White Box Automatic Test Generation (WBATG). Part 5 also describes how WBATG...

  18. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  19. IDEF method for designing seismic information system in CTBT verification

    International Nuclear Information System (INIS)

    Zheng Xuefeng; Shen Junyi; Jin Ping; Zhang Huimin; Zheng Jiangling; Sun Peng

    2004-01-01

    Seismic information system is of great importance for improving the capability of CTBT verification. A large amount of money has been appropriated for the research in this field in the U.S. and some other countries in recent years. However, designing and developing a seismic information system involves various technologies about complex system design. This paper discusses the IDEF0 method to construct function models and the IDEF1x method to make information models systemically, as well as how they are used in designing seismic information system in CTBT verification. (authors)

  20. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  1. FY 1995 report on verification of geothermal exploration technology. Development of fracture reservoir exploration technology (development of seismic exploration); 1995 nendo chinetsu tansa gijutsunado kensho chosa. Danretsugata choryuso tansaho kaihatsu (danseiha riyo tansaho kaihatsu) hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This report provides the development of new exploration technology using elastic waves, such as reflection seismic survey, VSP, and seismic tomography, for precisely characterizing subsurface fractures in geothermal reservoirs. In order to investigate and improve the effective data acquisition and analysis methods for detecting a fault type of fractures, an experiment of a seismic tomography method was conducted using wells drilled in the Ogiri geothermal field, Aira-gun, Kagoshima Prefecture. An experiment of propagation characteristics of piezo type underground seismic source in the volcanic field was also conducted as a trend survey of underground seismic sources. The fracture type in the model field was systematically analyzed by measuring the core samples obtained in the demonstration test field through remanence measurement, fluid inclusion measurement, and zircon measurement using test equipment, and by analyzing results obtained from cores and results of seismic tomography obtained from the wells. Based on these results, the effectiveness and practical application of exploration methods using elastic waves were investigated. 80 refs., 250 figs., 49 tabs.

  2. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  3. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  4. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  5. A Formal Approach to the Verification of Networks on Chip

    Directory of Open Access Journals (Sweden)

    Schmaltz Julien

    2009-01-01

    Full Text Available Abstract The current technology allows the integration on a single die of complex systems-on-chip (SoCs that are composed of manufactured blocks (IPs, interconnected through specialized networks on chip (NoCs. IPs have usually been validated by diverse techniques (simulation, test, formal verification and the key problem remains the validation of the communication infrastructure. This paper addresses the formal verification of NoCs by means of a mechanized proof tool, the ACL2 theorem prover. A metamodel for NoCs has been developed and implemented in ACL2. This metamodel satisfies a generic correctness statement. Its verification for a particular NoC instance is reduced to discharging a set of proof obligations for each one of the NoC constituents. The methodology is demonstrated on a realistic and state-of-the-art design, the Spidergon network from STMicroelectronics.

  6. Testing the implementation and sustainment facilitation (ISF) strategy as an effective adjunct to the Addiction Technology Transfer Center (ATTC) strategy: study protocol for a cluster randomized trial.

    Science.gov (United States)

    Garner, Bryan R; Zehner, Mark; Roosa, Mathew R; Martino, Steve; Gotham, Heather J; Ball, Elizabeth L; Stilen, Patricia; Speck, Kathryn; Vandersloot, Denna; Rieckmann, Traci R; Chaple, Michael; Martin, Erika G; Kaiser, David; Ford, James H

    2017-11-17

    Improving the extent to which evidence-based practices (EBPs)-treatments that have been empirically shown to be efficacious or effective-are integrated within routine practice is a well-documented challenge across numerous areas of health. In 2014, the National Institute on Drug Abuse funded a type 2 effectiveness-implementation hybrid trial titled the substance abuse treatment to HIV Care (SAT2HIV) Project. Aim 1 of the SAT2HIV Project tests the effectiveness of a motivational interviewing-based brief intervention (MIBI) for substance use as an adjunct to usual care within AIDS service organizations (ASOs) as part of its MIBI Experiment. Aim 2 of the SAT2HIV Project tests the effectiveness of implementation and sustainment facilitation (ISF) as an adjunct to the Addiction Technology Transfer Center (ATTC) model for training staff in motivational interviewing as part of its ISF Experiment. The current paper describes the study protocol for the ISF Experiment. Using a cluster randomized design, case management and leadership staff from 39 ASOs across the United States were randomized to receive either the ATTC strategy (control condition) or the ATTC + ISF strategy (experimental condition). The ATTC strategy is staff-focused and includes 10 discrete strategies (e.g., provide centralized technical assistance, conduct educational meetings, provide ongoing consultation). The ISF strategy is organization-focused and includes seven discrete strategies (e.g., use an implementation advisor, organize implementation team meetings, conduct cyclical small tests of change). Building upon the exploration-preparation-implementation-sustainment (EPIS) framework, the effectiveness of the ISF strategy is examined via three staff-level measures: (1) time-to-proficiency (i.e., preparation phase outcome), (2) implementation effectiveness (i.e., implementation phase outcome), and (3) level of sustainment (i.e., sustainment phase outcome). Although not without limitations, the ISF

  7. Testing the implementation and sustainment facilitation (ISF strategy as an effective adjunct to the Addiction Technology Transfer Center (ATTC strategy: study protocol for a cluster randomized trial

    Directory of Open Access Journals (Sweden)

    Bryan R. Garner

    2017-11-01

    Full Text Available Abstract Background Improving the extent to which evidence-based practices (EBPs—treatments that have been empirically shown to be efficacious or effective—are integrated within routine practice is a well-documented challenge across numerous areas of health. In 2014, the National Institute on Drug Abuse funded a type 2 effectiveness–implementation hybrid trial titled the substance abuse treatment to HIV Care (SAT2HIV Project. Aim 1 of the SAT2HIV Project tests the effectiveness of a motivational interviewing-based brief intervention (MIBI for substance use as an adjunct to usual care within AIDS service organizations (ASOs as part of its MIBI Experiment. Aim 2 of the SAT2HIV Project tests the effectiveness of implementation and sustainment facilitation (ISF as an adjunct to the Addiction Technology Transfer Center (ATTC model for training staff in motivational interviewing as part of its ISF Experiment. The current paper describes the study protocol for the ISF Experiment. Methods Using a cluster randomized design, case management and leadership staff from 39 ASOs across the United States were randomized to receive either the ATTC strategy (control condition or the ATTC + ISF strategy (experimental condition. The ATTC strategy is staff-focused and includes 10 discrete strategies (e.g., provide centralized technical assistance, conduct educational meetings, provide ongoing consultation. The ISF strategy is organization-focused and includes seven discrete strategies (e.g., use an implementation advisor, organize implementation team meetings, conduct cyclical small tests of change. Building upon the exploration–preparation–implementation–sustainment (EPIS framework, the effectiveness of the ISF strategy is examined via three staff-level measures: (1 time-to-proficiency (i.e., preparation phase outcome, (2 implementation effectiveness (i.e., implementation phase outcome, and (3 level of sustainment (i.e., sustainment phase outcome

  8. The NULevel trial of a scalable, technology-assisted weight loss maintenance intervention for obese adults after clinically significant weight loss: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Evans, Elizabeth H; Araújo-Soares, Vera; Adamson, Ashley; Batterham, Alan M; Brown, Heather; Campbell, Miglena; Dombrowski, Stephan U; Guest, Alison; Jackson, Daniel; Kwasnicka, Dominika; Ladha, Karim; McColl, Elaine; Olivier, Patrick; Rothman, Alexander J; Sainsbury, Kirby; Steel, Alison J; Steen, Ian Nicholas; Vale, Luke; White, Martin; Wright, Peter; Sniehotta, Falko F

    2015-09-22

    Effective weight loss interventions are widely available but, after weight loss, most individuals regain weight. This article describes the protocol for the NULevel trial evaluating the effectiveness and cost-effectiveness of a systematically developed, inexpensive, scalable, technology-assisted, behavioural intervention for weight loss maintenance (WLM) in obese adults after initial weight loss. A 12-month single-centre, two-armed parallel group, participant randomised controlled superiority trial is underway, recruiting a total of 288 previously obese adults after weight loss of ≥5 % within the previous 12 months. Participants are randomly assigned to intervention or control arms, with a 1:1 allocation, stratified by sex and percentage of body weight lost (<10 % vs ≥10 %). Change in weight (kg) from baseline to 12 months is the primary outcome. Weight, other anthropometric variables and 7-day physical activity (assessed via accelerometer) measures are taken at 0 and 12 months. Questionnaires at 0, 6 and 12 months assess psychological process variables, health service use and participant costs. Participants in the intervention arm initially attend an individual face-to-face WLM consultation with an intervention facilitator and then use a mobile internet platform to self-monitor and report their diet, daily activity (via pedometer) and weight through daily weighing on wirelessly connected scales. Automated feedback via mobile phone, tailored to participants' weight regain and goal progress is provided. Participants in the control arm receive quarterly newsletters (via links embedded in text messages) and wirelessly connected scales. Qualitative process evaluation interviews are conducted with a subsample of up to 40 randomly chosen participants. Acceptability and feasibility of procedures, cost-effectiveness, and relationships among socioeconomic variables and WLM will also be assessed. It is hypothesised that participants allocated to the intervention arm will

  9. Evaluation factors for verification and validation of low-level waste disposal site models

    International Nuclear Information System (INIS)

    Moran, M.S.; Mezga, L.J.

    1982-01-01

    The purpose of this paper is to identify general evaluation factors to be used to verify and validate LLW disposal site performance models in order to assess their site-specific applicability and to determine their accuracy and sensitivity. It is intended that the information contained in this paper be employed by model users involved with LLW site performance model verification and validation. It should not be construed as providing protocols, but rather as providing a framework for the preparation of specific protocols or procedures. A brief description of each evaluation factor is provided. The factors have been categorized according to recommended use during either the model verification or the model validation process. The general responsibilities of the developer and user are provided. In many cases it is difficult to separate the responsibilities of the developer and user, but the user is ultimately accountable for both verification and validation processes. 4 refs

  10. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    International Nuclear Information System (INIS)

    Betsill, J.D.; Gruebel, R.D.

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums

  11. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  12. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  13. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  14. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  15. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  16. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  17. CTBT Integrated Verification System Evaluation Model

    Energy Technology Data Exchange (ETDEWEB)

    Edenburn, M.W.; Bunting, M.L.; Payne, A.C. Jr.

    1997-10-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia`s Monitoring Systems and Technology Center and has been funded by the US Department of Energy`s Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, top-level, modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM`s unique features is that it integrates results from the various CTBT sensor technologies (seismic, infrasound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection) and location accuracy of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system`s performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. This report describes version 1.2 of IVSEM.

  18. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  19. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  20. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  1. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  2. Monitoring/Verification using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Stephan Weeks, Kevin Kyle, Manuel Manard

    2008-05-30

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations-management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. Fast GC is the leading field analytical method for gas phase separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  3. Monitoring/Verification Using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Kyle; Stephan Weeks

    2008-03-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operationsmanagement systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  4. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  5. A hardware-software system for the automation of verification and calibration of oil metering units secondary equipment

    Science.gov (United States)

    Boyarnikov, A. V.; Boyarnikova, L. V.; Kozhushko, A. A.; Sekachev, A. F.

    2017-08-01

    In the article the process of verification (calibration) of oil metering units secondary equipment is considered. The purpose of the work is to increase the reliability and reduce the complexity of this process by developing a software and hardware system that provides automated verification and calibration. The hardware part of this complex carries out the commutation of the measuring channels of the verified controller and the reference channels of the calibrator in accordance with the introduced algorithm. The developed software allows controlling the commutation of channels, setting values on the calibrator, reading the measured data from the controller, calculating errors and compiling protocols. This system can be used for checking the controllers of the secondary equipment of the oil metering units in the automatic verification mode (with the open communication protocol) or in the semi-automatic verification mode (without it). The peculiar feature of the approach used is the development of a universal signal switch operating under software control, which can be configured for various verification methods (calibration), which allows to cover the entire range of controllers of metering units secondary equipment. The use of automatic verification with the help of a hardware and software system allows to shorten the verification time by 5-10 times and to increase the reliability of measurements, excluding the influence of the human factor.

  6. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  7. VERIFICATION OF PARALLEL AUTOMATA-BASED PROGRAMS

    OpenAIRE

    M. A. Lukin

    2014-01-01

    The paper deals with an interactive method of automatic verification for parallel automata-based programs. The hierarchical state machines can be implemented in different threads and can interact with each other. Verification is done by means of Spin tool and includes automatic Promela model construction, conversion of LTL-formula to Spin format and counterexamples in terms of automata. Interactive verification gives the possibility to decrease verification time and increase the maxi...

  8. What Diplomacy in the Ancient Near East Can Tell Us About Blockchain Technology

    Directory of Open Access Journals (Sweden)

    Chris Berg

    2017-12-01

    Full Text Available A blockchain is an institutional technology—a protocol—that allows for economic coordination between agents separated by boundaries of possible mistrust. Blockchains are not the only technology in history to have these characteristics. The paper looks at the role of the diplomatic protocol at the very beginning of human civilisation in the ancient near east. These two protocols—diplomatic and blockchain—have significant similarities. They were created to address to similar economic problems using similar mechanisms: a permanent record of past dealings, public and ritualistic verification of transactions, and game-theoretic mechanisms of reciprocity. The development of the diplomatic protocol allowed for the creation of the first international community and facilitated patterns of peaceful trade and exchange. Some questions about a generalised ‘protocol economics’ are drawn.

  9. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  10. Hot cell verification facility update

    International Nuclear Information System (INIS)

    Titzler, P.A.; Moffett, S.D.; Lerch, R.E.

    1985-01-01

    The Hot Cell Verification Facility (HCVF) provides a prototypic hot cell mockup to check equipment for functional and remote operation, and provides actual hands-on training for operators. The facility arrangement is flexible and assists in solving potential problems in a nonradioactive environment. HCVF has been in operation for six years, and the facility is a part of the Hanford Engineering Development Laboratory

  11. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  12. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  13. Runtime Verification in Distributed Computing

    NARCIS (Netherlands)

    Malakuti Khah Olun Abadi, Somayeh; Park, Jong Hyuk; Obaidat, Mohammad; Aksit, Mehmet; Bockisch, Christoph

    2011-01-01

    Runtime verification aims to check whether an application executes its behaviour as specified. Thereby the active execution trace of an application is checked in terms of the actual execution context; diagnosis and, possibly, recovery actions are taken when the specification is violated. In today’s

  14. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  15. Verification and validation for CIPRNet

    NARCIS (Netherlands)

    Voogd, J.

    2016-01-01

    In this chapter it is shown that if an appreciable risk is present in the use of Modelling and Simulation (M&S), Verification and Validation (V&V) should be employed to manage and mitigate that risk. The use of M&S in the domain of critical infrastructure (CI) will always be accompanied by such a

  16. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impacts...... process can be applied to better capture opinions of different experts, thereby maximizing the evidential basis. Elaborating on manageability of invasive species is further needed to fully answer all risk analysis requirements. Tackling the issue of invasive species urges better handling of the acquired...

  17. Technology.

    Science.gov (United States)

    Online-Offline, 1998

    1998-01-01

    Focuses on technology, on advances in such areas as aeronautics, electronics, physics, the space sciences, as well as computers and the attendant progress in medicine, robotics, and artificial intelligence. Describes educational resources for elementary and middle school students, including Web sites, CD-ROMs and software, videotapes, books,…

  18. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  19. A study of applications scribe frame data verifications using design rule check

    Science.gov (United States)

    Saito, Shoko; Miyazaki, Masaru; Sakurai, Mitsuo; Itoh, Takahisa; Doi, Kazumasa; Sakurai, Norioko; Okada, Tomoyuki

    2013-06-01

    In semiconductor manufacturing, scribe frame data generally is generated for each LSI product according to its specific process design. Scribe frame data is designed based on definition tables of scanner alignment, wafer inspection and customers specified marks. We check that scribe frame design is conforming to specification of alignment and inspection marks at the end. Recently, in COT (customer owned tooling) business or new technology development, there is no effective verification method for the scribe frame data, and we take a lot of time to work on verification. Therefore, we tried to establish new verification method of scribe frame data by applying pattern matching and DRC (Design Rule Check) which is used in device verification. We would like to show scheme of the scribe frame data verification using DRC which we tried to apply. First, verification rules are created based on specifications of scanner, inspection and others, and a mark library is also created for pattern matching. Next, DRC verification is performed to scribe frame data. Then the DRC verification includes pattern matching using mark library. As a result, our experiments demonstrated that by use of pattern matching and DRC verification our new method can yield speed improvements of more than 12 percent compared to the conventional mark checks by visual inspection and the inspection time can be reduced to less than 5 percent if multi-CPU processing is used. Our method delivers both short processing time and excellent accuracy when checking many marks. It is easy to maintain and provides an easy way for COT customers to use original marks. We believe that our new DRC verification method for scribe frame data is indispensable and mutually beneficial.

  20. Methods of Verification, Accountability and Control of Special Nuclear Material

    International Nuclear Information System (INIS)

    Stewart, J.E.

    1999-01-01

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data

  1. Experimental verification of internal dosimetry calculations. Annual progress report

    International Nuclear Information System (INIS)

    1980-05-01

    During the past year a dosimetry research program has been established in the School of Nuclear Engineering at the Georgia Institute of Technology. The major objective of this program has been to provide research results upon which a useful internal dosimetry system could be based. The important application of this dosimetry system will be the experimental verification of internal dosimetry calculations such as those published by the MIRD Committee

  2. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  3. University of Washington/ Northwest National Marine Renewable Energy Center Tidal Current Technology Test Protocol, Instrumentation, Design Code, and Oceanographic Modeling Collaboration: Cooperative Research and Development Final Report, CRADA Number CRD-11-452

    Energy Technology Data Exchange (ETDEWEB)

    Driscoll, Frederick R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-11-01

    The University of Washington (UW) - Northwest National Marine Renewable Energy Center (UW-NNMREC) and the National Renewable Energy Laboratory (NREL) will collaborate to advance research and development (R&D) of Marine Hydrokinetic (MHK) renewable energy technology, specifically renewable energy captured from ocean tidal currents. UW-NNMREC is endeavoring to establish infrastructure, capabilities and tools to support in-water testing of marine energy technology. NREL is leveraging its experience and capabilities in field testing of wind systems to develop protocols and instrumentation to advance field testing of MHK systems. Under this work, UW-NNMREC and NREL will work together to develop a common instrumentation system and testing methodologies, standards and protocols. UW-NNMREC is also establishing simulation capabilities for MHK turbine and turbine arrays. NREL has extensive experience in wind turbine array modeling and is developing several computer based numerical simulation capabilities for MHK systems. Under this CRADA, UW-NNMREC and NREL will work together to augment single device and array modeling codes. As part of this effort UW NNMREC will also work with NREL to run simulations on NREL's high performance computer system.

  4. Evaluation of a lateral flow-based technology card for blood typing using a simplified protocol in a model of extreme blood sampling conditions.

    Science.gov (United States)

    Clavier, Benoît; Pouget, Thomas; Sailliol, Anne

    2018-02-01

    Life-threatening situations requiring blood transfusion under extreme conditions or in remote and austere locations, such as the battlefield or in traffic accidents, would benefit from reliable blood typing practices that are easily understood by a nonscientist or nonlaboratory technician and provide quick results. A simplified protocol was developed for the lateral flow-based device MDmulticard ABO-D-Rh subgroups-K. Its performance was compared to a reference method (PK7300, Beckman Coulter) in native blood samples from donors. The method was tested on blood samples stressed in vitro as a model of hemorrhage cases (through hemodilution using physiologic serum) and dehydration (through hemoconcentration by removing an aliquot of plasma after centrifugation), respectively. A total of 146 tests were performed on 52 samples; 126 in the hemodilution group (42 for each native, diluted 1/2, and diluted 1/4 samples) and 20 in the hemoconcentration group (10 for each native and 10% concentrated samples). Hematocrit in the tested samples ranged from 9.8% to 57.6% while hemoglobin levels ranged from 3.2 to 20.1 g/dL. The phenotype profile detected with the MDmulticard using the simplified protocol resulted in 22 A, seven B, 20 O, and three AB, of which nine were D- and five were Kell positive. No discrepancies were found with respect to the results obtained with the reference method. The simplified protocol for MDmulticard use could be considered a reliable method for blood typing in extreme environment or emergency situations, worsened by red blood cell dilution or concentration. © 2017 AABB.

  5. Technology

    Directory of Open Access Journals (Sweden)

    Xu Jing

    2016-01-01

    Full Text Available The traditional answer card reading method using OMR (Optical Mark Reader, most commonly, OMR special card special use, less versatile, high cost, aiming at the existing problems proposed a method based on pattern recognition of the answer card identification method. Using the method based on Line Segment Detector to detect the tilt of the image, the existence of tilt image rotation correction, and eventually achieve positioning and detection of answers to the answer sheet .Pattern recognition technology for automatic reading, high accuracy, detect faster

  6. Results of verifications of the control automatic exposure in equipment of RX with CR systems; Resultados de las verificaciones del control automatico de exposicion en equipos de RX con sistemas CR

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz Manzano, P.; Rivas Ballarin, M. A.; Ortega Pardina, P.; Villa Gazulla, D.; Calvo Carrillo, S.; Canellas Anoz, M.; Millan Cebrian, E.

    2013-07-01

    After the entry into force in 2012, the new Spanish Radiology quality control protocol lists and discusses the results obtained after verification of the automatic control of exposure in computed radiography systems. (Author)

  7. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    The purpose of this thesis is to develop a method for verifying timed temporal properties of continuous dynamical systems, and to develop a method for verifying the safety of an interconnection of continuous systems. The methods must be scalable in the number of continuous variables...... to the high complexity of both the dynamical system and the specification. Therefore, there is a need for methods capable of verifying complex specifications of complex systems. The verification of high dimensional continuous dynamical systems is the key to verifying general systems. In this thesis......, an abstraction approach is taken to the verification problem. A method is developed for abstracting continuous dynamical systems by timed automata. This method is based on subdividing the state space into cells by use of subdivisioning functions that are decreasing along the vector field. To allow...

  8. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  9. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  10. MUSE WFM AO Science Verification

    Science.gov (United States)

    Leibundgut, B.; Bacon, R.; Jaffé, Y. L.; Johnston, E.; Kuntschner, H.; Selman, F.; Valenti, E.; Vernet, J.; Vogt, F.

    2017-12-01

    The goal of Science Verification (SV) as part of the transition into operations is to carry out scientific observations to test the end-to-end operations of a new instrument or new instrument modes. The Multi Unit Spectroscopic Explorer, (MUSE; Bacon et al., 2010), at the Very Large Telescope (VLT) can be operated in several modes. The wide-field mode has been offered since Period 94 (October 2014) for natural-seeing observations. With the commissioning of the Adaptive Optics Facility (AOF; Arsenault et al., 2017) the wide-field mode can be supported by ground-layer adaptive optics through four artificial laser guide stars and the adaptive optics module, Ground Atmospheric Layer Adaptive OptiCs for Spectroscopic Imaging (GALACSI). The MUSE wide-field mode adaptive optics Science Verification (hereafter referred to MUSE WFM AO SV) was scheduled from 12–14 August 2017. Out of 41 submitted proposals, 19 observing programmes were scheduled, covering a wide range of science topics and amounting to an allocation of 42 hours. This included sufficient oversubscription to cover all expected observing conditions. Due to inclement weather during the original SV nights, two more nights were allocated on 16 and 17 September 2017 to observe more programmes. In total, seven programmes were completed, six programmes received partial data, and the remaining six projects could not be started. We summarise here the planning, execution and first results from the Science Verification.

  11. Applying State-of-the-Art Technologies to Reduce Escape Times from Fires Using Environmental Sensing, Improved Occupant Egress Guidance, and Multiple Communication Protocols

    National Research Council Canada - National Science Library

    Street, Thomas T; Hammond, Mark H; Williams, Frederick W

    2009-01-01

    ...) was tasked with investigating various technology and concepts--such as visual signals and unique audible sounds--that have the potential to improve residential occupant escape in the event of fire...

  12. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  13. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  14. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  15. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  16. SEMI-AUTOMATIC SPEAKER VERIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    E. V. Bulgakova

    2016-03-01

    Full Text Available Subject of Research. The paper presents a semi-automatic speaker verification system based on comparing of formant values, statistics of phone lengths and melodic characteristics as well. Due to the development of speech technology, there is an increased interest now in searching for expert speaker verification systems, which have high reliability and low labour intensiveness because of the automation of data processing for the expert analysis. System Description. We present a description of a novel system analyzing similarity or distinction of speaker voices based on comparing statistics of phone lengths, formant features and melodic characteristics. The characteristic feature of the proposed system based on fusion of methods is a weak correlation between the analyzed features that leads to a decrease in the error rate of speaker recognition. The system advantage is the possibility to carry out rapid analysis of recordings since the processes of data preprocessing and making decision are automated. We describe the functioning methods as well as fusion of methods to combine their decisions. Main Results. We have tested the system on the speech database of 1190 target trials and 10450 non-target trials, including the Russian speech of the male and female speakers. The recognition accuracy of the system is 98.59% on the database containing records of the male speech, and 96.17% on the database containing records of the female speech. It was also experimentally established that the formant method is the most reliable of all used methods. Practical Significance. Experimental results have shown that proposed system is applicable for the speaker recognition task in the course of phonoscopic examination.

  17. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  18. Achievement report on developing superconductor power applied technologies in fiscal 1999 (2). Research and development of superconductor wire materials, research and development of superconductor power generators, research of total systems, research and development of freezing systems, and verification tests; 1999 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. 2. Chodendo senzai no kenkyu kaihatsu / chodendo hatsudenki no kenkyu kaihatsu / total system no kenkyu / reito system no kenkyu kaihatsu / jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    With an objective to achieve higher efficiency, higher density, and higher stability in power systems, research and development has been performed on superconductor power generators. This paper summarizes the achievements thereof in fiscal 1999. A verification test was given on the rotor of an ultra high speed responding generator. In a sudden short circuit test using the different phase charging method, no anomalies were found such as quench generation and vibration changes, wherein the healthiness of the generator was verified. In the VVVF actuation test, knowledge was acquired on the actuation method when the ultra high speed responding generator is applied to a combined cycle plant. After the verification test has been completed, the disassembly inspections such as visual check and non-destructive test were performed. With regard to the vacuum leakage found in the rotor under very low temperatures, the causes were presumed and the countermeasures were discussed by observing the weld structures. In the design research, the conception design on the 200-MW pilot generator was reviewed by reflecting the results of the verification tests on the model generator. At the same time, trial design was made on a 600-MW target generator. In summarizing the overall research achievements, the achievements and evaluations were summarized on technological issues that have been allotted to each research member. (NEDO)

  19. Integrated safety management system verification: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, R.F.

    1998-08-12

    Department of Energy (DOE) Policy (P) 450.4, Safety Management System Policy, commits to institutionalizing an Integrated Safety Management System (ISMS) throughout the DOE complex. The DOE Acquisition Regulations (DEAR 48 CFR 970) requires contractors to manage and perform work in accordance with a documented Integrated Safety Management System. The Manager, Richland Operations Office (RL), initiated a combined Phase 1 and Phase 2 Integrated Safety Management Verification review to confirm that PNNL had successfully submitted a description of their ISMS and had implemented ISMS within the laboratory facilities and processes. A combined review was directed by the Manager, RL, based upon the progress PNNL had made in the implementation of ISM. This report documents the results of the review conducted to verify: (1) that the PNNL integrated safety management system description and enabling documents and processes conform to the guidance provided by the Manager, RL; (2) that corporate policy is implemented by line managers; (3) that PNNL has provided tailored direction to the facility management; and (4) the Manager, RL, has documented processes that integrate their safety activities and oversight with those of PNNL. The general conduct of the review was consistent with the direction provided by the Under Secretary`s Draft Safety Management System Review and Approval Protocol. The purpose of this review was to provide the Manager, RL, with a recommendation to the adequacy of the ISMS description of the Pacific Northwest Laboratory based upon compliance with the requirements of 49 CFR 970.5204(-2 and -78); and, to provide an evaluation of the extent and maturity of ISMS implementation within the Laboratory. Further, this review was intended to provide a model for other DOE Laboratories. In an effort to reduce the time and travel costs associated with ISM verification the team agreed to conduct preliminary training and orientation electronically and by phone. These

  20. New data structures and algorithms for logic synthesis and verification

    CERN Document Server

    Amaru, Luca Gaetano

    2017-01-01

    This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines. · Provides a comprehensive, theoretical study on majority and biconditional logic for logic synthesis; · Updates the current scenario in synthesis and verification – especially in light of emerging technologies; · Demonstrates applications to CMOS technology and emerging technologies.

  1. Software verification and validation for commercial statistical packages utilized by the statistical consulting section of SRTC

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, T.B.

    2000-03-22

    The purpose of this report is to provide software verification and validation for the statistical packages used by the Statistical Consulting Section (SCS) of the Savannah River Technology Center. The need for this verification and validation stems from the requirements of the Quality Assurance programs that are frequently applicable to the work conducted by SCS. The IBM Personal Computer 300PL and 300XL are both Pentium II based desktops. Therefore the software verification and validation in this report is valid interchangeably between both platforms. As new computing platforms, statistical packages, or revisions to existing packages are reevaluated using these new tools, this report is to be revised to address their verification and validation.

  2. Verification of classified fissile material using unclassified attributes

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Fearey, B.L.; Puckett, J.M.; Tape, J.W.

    1998-01-01

    This paper reports on the most recent efforts of US technical experts to explore verification by IAEA of unclassified attributes of classified excess fissile material. Two propositions are discussed: (1) that multiple unclassified attributes could be declared by the host nation and then verified (and reverified) by the IAEA in order to provide confidence in that declaration of a classified (or unclassified) inventory while protecting classified or sensitive information; and (2) that attributes could be measured, remeasured, or monitored to provide continuity of knowledge in a nonintrusive and unclassified manner. They believe attributes should relate to characteristics of excess weapons materials and should be verifiable and authenticatable with methods usable by IAEA inspectors. Further, attributes (along with the methods to measure them) must not reveal any classified information. The approach that the authors have taken is as follows: (1) assume certain attributes of classified excess material, (2) identify passive signatures, (3) determine range of applicable measurement physics, (4) develop a set of criteria to assess and select measurement technologies, (5) select existing instrumentation for proof-of-principle measurements and demonstration, and (6) develop and design information barriers to protect classified information. While the attribute verification concepts and measurements discussed in this paper appear promising, neither the attribute verification approach nor the measurement technologies have been fully developed, tested, and evaluated

  3. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  4. Entanglement verification and its applications in quantum communication

    International Nuclear Information System (INIS)

    Haeseler, Hauke

    2010-01-01

    In this thesis, we investigate the uses of entanglement and its verification in quantum communication. The main object here is to develop a verification procedure which is adaptable to a wide range of applications, and whose implementation has low requirements on experimental resources. We present such a procedure in the form of the Expectation Value Matrix. The structure of this thesis is as follows: Chapters 1 and 2 give a short introduction and background information on quantum theory and the quantum states of light. In particular, we discuss the basic postulates of quantum mechanics, quantum state discrimination, the description of quantum light and the homodyne detector. Chapter 3 gives a brief introduction to quantum information and in particular to entanglement, and we discuss the basics of quantum key distribution and teleportation. The general framework of the Expectation Value Matrix is introduced. The main matter of this thesis is contained in the subsequent three chapters, which describe different quantum communication protocols and the corresponding adaptation of the entanglement verification method. The subject of Chapter 4 is quantum key distribution, where the detection of entanglement is a means of excluding intercept-resend attacks, and the presence of quantum correlations in the raw data is a necessary precondition for the generation of secret key. We investigate a continuous-variable version of the two-state protocol and develop the Expectation Value Matrix method for such qubit-mode systems. Furthermore, we analyse the role of the phase reference with respect to the security of the protocol and raise awareness of a corresponding security threat. For this, we adapt the verification method to different settings of Stokes operator measurements. In Chapter 5, we investigate quantum memory channels and propose a fundamental benchmark for these based on the verification of entanglement. After describing some physical effects which can be used for the

  5. The SeaHorn Verification Framework

    Science.gov (United States)

    Gurfinkel, Arie; Kahsai, Temesghen; Komuravelli, Anvesh; Navas, Jorge A.

    2015-01-01

    In this paper, we present SeaHorn, a software verification framework. The key distinguishing feature of SeaHorn is its modular design that separates the concerns of the syntax of the programming language, its operational semantics, and the verification semantics. SeaHorn encompasses several novelties: it (a) encodes verification conditions using an efficient yet precise inter-procedural technique, (b) provides flexibility in the verification semantics to allow different levels of precision, (c) leverages the state-of-the-art in software model checking and abstract interpretation for verification, and (d) uses Horn-clauses as an intermediate language to represent verification conditions which simplifies interfacing with multiple verification tools based on Horn-clauses. SeaHorn provides users with a powerful verification tool and researchers with an extensible and customizable framework for experimenting with new software verification techniques. The effectiveness and scalability of SeaHorn are demonstrated by an extensive experimental evaluation using benchmarks from SV-COMP 2015 and real avionics code.

  6. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  7. A Protocol Analysis of the Influence of Technology on Students' Actions, Verbal Commentary, and Thought Processes During the Performance of Acid-Base Titrations.

    Science.gov (United States)

    Nakhleh, Mary B.; Krajcik, Joseph S.

    1993-01-01

    From an analysis of 14 secondary student's actions and thought processes, it was found that technology's level of information affected the focus of student observations. The microcomputer group focused primarily on the graph while other groups exhibited multiple foci. The discussion data also reveal that students have three main ideas about how…

  8. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages......, that are analysable with respect to interesting properties. Furthermore it motivates and is an example of, a novel, more general methodology of language design by first verbosely describing the semantics in a mathematical language, e.g. a logic, then restricting the properties of interest to be computable......, and finally systematically transforming it into a more intuitive specification language, maintaining this tractability....

  9. Verification of a climate convention: role and limitations of a space based remote sensing system

    International Nuclear Information System (INIS)

    Lanchbery, J.F.; Fischer, W.; Katscher, R.; Stein, G.

    1992-01-01

    Techniques currently under discussion for verifying compliance with an international climate convention and its protocols include space-based remoted sensing systems. This paper indicates present and potential verification sectors for such systems together with the likely technical demands of the verification system user. Space-based remote sensors currently offer the prospect of being used to monitor changes in vegetation on the Earth's surface and could thus be used as tools to verify compliance with a forest protocol and possible land-use or agriculture agreements. After discussing the capabilities and limitations of currently available remote sensing techniques in this type of application, some of the technical requirements of remote sensors in other areas likely to need verifying under a climate convention are explored. 10 refs., 2 tabs

  10. A verification environment for bigraphs

    DEFF Research Database (Denmark)

    Perrone, Gian David; Debois, Søren; Hildebrandt, Thomas

    2013-01-01

    We present the BigMC tool for bigraphical reactive systems that may be instantiated as a verification tool for any formalism or domain-specific modelling language encoded as a bigraphical reactive system. We introduce the syntax and use of BigMC, and exemplify its use with two small examples......: a textbook “philosophers” example, and an example motivated by a ubiquitous computing application. We give a tractable heuristic with which to approximate interference between reaction rules, and prove this analysis to be safe. We provide a mechanism for state reachability checking of bigraphical reactive...

  11. Investigation into Practical Implementations of a Zero Knowledge Protocol.

    Energy Technology Data Exchange (ETDEWEB)

    Marleau, Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krentz-Wee, Rebecca E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    In recent years, the concept of Zero Knowledge Protocols (ZKP) as a useful approach to nuclear warhead verification has become increasingly popular. Several implementations of ZKP have been proposed, driving technology development toward proof of concept demonstrations. Whereas proposed implementations seem to fall within the general class of template-based techniques, all physical implementations of ZKPs proposed to date have a complication: once the instrumentation is prepared, it is no longer authenticatable; the instrument physically contains sensitive information. In this work we explore three different concepts that may offer more authenticatable and practical ZKP implementations and evaluate the sensitive information that may be at risk when doing so: sharing a subset of detector counts in a preloaded image (with spatial information removed), real-time image subtraction, and a new concept, CONfirmation using a Fast-neutron Imaging Detector with Anti-image NULL-positive Time Encoding (CONFIDANTE). CONFIDANTE promises to offer an almost ideal implementation of ZKP: a positive result is indicated by a constant rate at all times enabling the monitoring party the possibility of full access to the instrument before, during, and after confirmation. A prototype of CONFIDANTE was designed, built, and its performance evaluated in a series of measurements of several objects including a set of plutonium dioxide Hemispheres. Very encouraging results proving feasibility are presented. 1 Rebecca is currently a graduate student in Nuclear Engineering at UC Berkeley

  12. Fitting Frequency-Lowering Signal Processing Applying the American Academy of Audiology Pediatric Amplification Guideline: Updates and Protocols.

    Science.gov (United States)

    Scollie, Susan; Glista, Danielle; Seto, Julie; Dunn, Andrea; Schuett, Brittany; Hawkins, Marianne; Pourmand, Nazanin; Parsa, Vijay

    2016-03-01

    Although guidelines for fitting hearing aids for children are well developed and have strong basis in evidence, specific protocols for fitting and verifying technologies can supplement such guidelines. One such technology is frequency-lowering signal processing. Children require access to a broad bandwidth of speech to detect and use all phonemes including female /s/. When access through conventional amplification is not possible, the use of frequency-lowering signal processing may be considered as a means to overcome limitations. Fitting and verification protocols are needed to better define candidacy determination and options for assessing and fine tuning frequency-lowering signal processing for individuals. This work aims to (1) describe a set of calibrated phonemes that can be used to characterize the variation in different brands of frequency-lowering processors in hearing aids and the verification with these signals and (2) determine whether verification with these signal are predictive of perceptual changes associated with changes in the strength of frequency-lowering signal processing. Finally, we aimed to develop a fitting protocol for use in pediatric clinical practice. Study 1 used a sample of six hearing aids spanning four types of frequency lowering algorithms for an electroacoustic evaluation. Study 2 included 21 adults who had hearing loss (mean age 66 yr). Simulated fricatives were designed to mimic the level and frequency shape of female fricatives extracted from two sources of speech. These signals were used to verify the frequency-lowering effects of four distinct types of frequency-lowering signal processors available in commercial hearing aids, and verification measures were compared to extracted fricatives made in a reference system. In a second study, the simulated fricatives were used within a probe microphone measurement system to verify a wide range of frequency compression settings in a commercial hearing aid, and 27 adult listeners were

  13. A Cache System Design for CMPs with Built-In Coherence Verification

    Directory of Open Access Journals (Sweden)

    Mamata Dalui

    2016-01-01

    Full Text Available This work reports an effective design of cache system for Chip Multiprocessors (CMPs. It introduces built-in logic for verification of cache coherence in CMPs realizing directory based protocol. It is developed around the cellular automata (CA machine, invented by John von Neumann in the 1950s. A special class of CA referred to as single length cycle 2-attractor cellular automata (TACA has been planted to detect the inconsistencies in cache line states of processors’ private caches. The TACA module captures coherence status of the CMPs’ cache system and memorizes any inconsistent recording of the cache line states during the processors’ reference to a memory block. Theory has been developed to empower a TACA to analyse the cache state updates and then to settle to an attractor state indicating quick decision on a faulty recording of cache line status. The introduction of segmentation of the CMPs’ processor pool ensures a better efficiency, in determining the inconsistencies, by reducing the number of computation steps in the verification logic. The hardware requirement for the verification logic points to the fact that the overhead of proposed coherence verification module is much lesser than that of the conventional verification units and is insignificant with respect to the cost involved in CMPs’ cache system.

  14. The influence of verification jig on framework fit for nonsegmented fixed implant-supported complete denture.

    Science.gov (United States)

    Ercoli, Carlo; Geminiani, Alessandro; Feng, Changyong; Lee, Heeje

    2012-05-01

    The purpose of this retrospective study was to assess if there was a difference in the likelihood of achieving passive fit when an implant-supported full-arch prosthesis framework is fabricated with or without the aid of a verification jig. This investigation was approved by the University of Rochester Research Subject Review Board (protocol #RSRB00038482). Thirty edentulous patients, 49 to 73 years old (mean 61 years old), rehabilitated with a nonsegmented fixed implant-supported complete denture were included in the study. During the restorative process, final impressions were made using the pickup impression technique and elastomeric impression materials. For 16 patients, a verification jig was made (group J), while for the remaining 14 patients, a verification jig was not used (group NJ) and the framework was fabricated directly on the master cast. During the framework try-in appointment, the fit was assessed by clinical (Sheffield test) and radiographic inspection and recorded as passive or nonpassive. When a verification jig was used (group J, n = 16), all frameworks exhibited clinically passive fit, while when a verification jig was not used (group NJ, n = 14), only two frameworks fit. This difference was statistically significant (p jig ensured clinically passive fit of metal frameworks in nonsegmented fixed implant-supported complete denture. © 2011 Wiley Periodicals, Inc.

  15. Sustaining a verification regime in a nuclear weapon-free world. VERTIC research report no. 4

    International Nuclear Information System (INIS)

    Moyland, S. van

    1999-01-01

    Sustaining high levels of commitment to and enthusiasm for the verification regime in a nuclear weapon-free world (NWFW) would be a considerable challenge, but the price of failure would be high. No verification system for a complete ban on a whole of weapon of mass destruction (WMD) has been in existence long enough to provide a precedent or the requisite experience. Nevertheless, lessons from the International Atomic Energy Agency's (IAEA) nuclear safeguards system are instructive. A potential problem over the long haul is the gradual erosion of the deterrent effect of verification that may result from the continual overlooking of minor instances of non-compliance. Flaws in the verification system must be identified and dealt with early lest they also corrode the system. To achieve this the verification organisation's inspectors and analytical staff will need sustained support, encouragement, resources and training. In drawing attention to weaknesses, they must be supported by management and at the political level. The leaking of sensitive information, either industrial or military, by staff of the verification regime is a potential problem. 'Managed access' techniques should be constantly examined and improved. The verification organisation and states parties will need to sustain close co-operation with the nuclear and related industries. Frequent review mechanisms must be established. States must invest time and effort to make them effective. Another potential problem is the withering of resources for sustained verification. Verification organisations tend to be pressured by states to cut or last least cap costs, even if the verification workload increases. The verification system must be effective as knowledge and experience allows. The organisation will need continuously to update its scientific methods and technology. This requires in-house resources plus external research and development (R and D). Universities, laboratories and industry need incentives to

  16. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  17. Evaluation of a technology-enhanced integrated care model for frail older persons: protocol of the SPEC study, a stepped-wedge cluster randomized trial in nursing homes

    OpenAIRE

    Kim, Hongsoo; Park, Yeon-Hwan; Jung, Young-il; Choi, Hyoungshim; Lee, Seyune; Kim, Gi-Soo; Yang, Dong-wook; Paik, Myunghee Cho; Lee, Tae-Jin

    2017-01-01

    Background Limited evidence exists on the effectiveness of the chronic care model for people with multimorbidity. This study aims to evaluate the effectiveness of an information and communication technology- (ICT-)enhanced integrated care model, called Systems for Person-centered Elder Care (SPEC), for frail older adults at nursing homes. Methods/Design SPEC is a prospective stepped-wedge cluster randomized trial conducted at 10 nursing homes in South Korea. Residents aged 65 or older meeting...

  18. Genomics protocols [Methods in molecular biology, v. 175

    National Research Council Canada - National Science Library

    Starkey, Michael P; Elaswarapu, Ramnath

    2001-01-01

    .... Drawing on emerging technologies in the fields of bioinformatics and proteomics, these protocols cover not only those traditionally recognized as genomics, but also early therapeutich approaches...

  19. Inspection and verification of waste packages for near surface disposal

    International Nuclear Information System (INIS)

    2000-01-01

    Extensive experience has been gained with various disposal options for low and intermediate level waste at or near surface disposal facilities. Near surface disposal is based on proven and well demonstrated technologies. To ensure the safety of near surface disposal facilities when available technologies are applied, it is necessary to control and assure the quality of the repository system's performance, which includes waste packages, engineered features and natural barriers, as well as siting, design, construction, operation, closure and institutional controls. Recognizing the importance of repository performance, the IAEA is producing a set of technical publications on quality assurance and quality control (QA/QC) for waste disposal to provide Member States with technical guidance and current information. These publications cover issues on the application of QA/QC programmes to waste disposal, long term record management, and specific QA/QC aspects of waste packaging, repository design and R and D. Waste package QA/QC is especially important because the package is the primary barrier to radionuclide release from a disposal facility. Waste packaging also involves interface issues between the waste generator and the disposal facility operator. Waste should be packaged by generators to meet waste acceptance requirements set for a repository or disposal system. However, it is essential that the disposal facility operator ensure that waste packages conform with disposal facility acceptance requirements. Demonstration of conformance with disposal facility acceptance requirements can be achieved through the systematic inspection and verification of waste packages at both the waste generator's site and at the disposal facility, based on a waste package QA/QC programme established by the waste generator and approved by the disposal operator. However, strategies, approaches and the scope of inspection and verification will be somewhat different from country to country

  20. Evaluating Data Abstraction Assistant, a novel software application for data abstraction during systematic reviews: protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ian J. Saldanha

    2016-11-01

    abstraction approaches. Trial registration The trial is registered at National Information Center on Health Services Research and Health Care Technology (NICHSR under Registration # HSRP20152269: https://wwwcf.nlm.nih.gov/hsr_project/view_hsrproj_record.cfm?NLMUNIQUE_ID=20152269&SEARCH_FOR=Tianjing%20Li . All items from the World Health Organization Trial Registration Data Set are covered at various locations in this protocol. Protocol version and date: This is version 2.0 of the protocol, dated September 6, 2016. As needed, we will communicate any protocol amendments to the Institutional Review Boards (IRBs of Johns Hopkins Bloomberg School of Public Health (JHBSPH and Brown University. We also will make appropriate as-needed modifications to the NICHSR website in a timely fashion.

  1. Protocole of a controlled before-after evaluation of a national health information technology-based program to improve healthcare coordination and access to information.

    Science.gov (United States)

    Saillour-Glénisson, Florence; Duhamel, Sylvie; Fourneyron, Emmanuelle; Huiart, Laetitia; Joseph, Jean Philippe; Langlois, Emmanuel; Pincemail, Stephane; Ramel, Viviane; Renaud, Thomas; Roberts, Tamara; Sibé, Matthieu; Thiessard, Frantz; Wittwer, Jerome; Salmi, Louis Rachid

    2017-04-21

    Improvement of coordination of all health and social care actors in the patient pathways is an important issue in many countries. Health Information (HI) technology has been considered as a potentially effective answer to this issue. The French Health Ministry first funded the development of five TSN ("Territoire de Soins Numérique"/Digital health territories) projects, aiming at improving healthcare coordination and access to information for healthcare providers, patients and the population, and at improving healthcare professionals work organization. The French Health Ministry then launched a call for grant to fund one research project consisting in evaluating the TSN projects implementation and impact and in developing a model for HI technology evaluation. EvaTSN is mainly based on a controlled before-after study design. Data collection covers three periods: before TSN program implementation, during early TSN program implementation and at late TSN program implementation, in the five TSN projects' territories and in five comparison territories. Three populations will be considered: "TSN-targeted people" (healthcare system users and people having characteristics targeted by the TSN projects), "TSN patient users" (people included in TSN experimentations or using particular services) and "TSN professional users" (healthcare professionals involved in TSN projects). Several samples will be made in each population depending on the objective, axis and stage of the study. Four types of data sources are considered: 1) extractions from the French National Heath Insurance Database (SNIIRAM) and the French Autonomy Personalized Allowance database, 2) Ad hoc surveys collecting information on knowledge of TSN projects, TSN program use, ease of use, satisfaction and understanding, TSN pathway experience and appropriateness of hospital admissions, 3) qualitative analyses using semi-directive interviews and focus groups and document analyses and 4) extractions of TSN

  2. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  3. Video-based fingerprint verification.

    Science.gov (United States)

    Qin, Wei; Yin, Yilong; Liu, Lili

    2013-09-04

    Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, "inside similarity" and "outside similarity" are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low.

  4. RISKIND verification and benchmark comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  5. RISKIND verification and benchmark comparisons

    International Nuclear Information System (INIS)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models

  6. Runtime Verification with State Estimation

    Science.gov (United States)

    Stoller, Scott D.; Bartocci, Ezio; Seyster, Justin; Grosu, Radu; Havelund, Klaus; Smolka, Scott A.; Zadok, Erez

    2011-01-01

    We introduce the concept of Runtime Verification with State Estimation and show how this concept can be applied to estimate theprobability that a temporal property is satisfied by a run of a program when monitoring overhead is reduced by sampling. In such situations, there may be gaps in the observed program executions, thus making accurate estimation challenging. To deal with the effects of sampling on runtime verification, we view event sequences as observation sequences of a Hidden Markov Model (HMM), use an HMM model of the monitored program to "fill in" sampling-induced gaps in observation sequences, and extend the classic forward algorithm for HMM state estimation (which determines the probability of a state sequence, given an observation sequence) to compute the probability that the property is satisfied by an execution of the program. To validate our approach, we present a case study based on the mission software for a Mars rover. The results of our case study demonstrate high prediction accuracy for the probabilities computed by our algorithm. They also show that our technique is much more accurate than simply evaluating the temporal property on the given observation sequences, ignoring the gaps.

  7. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  8. 9 CFR 417.8 - Agency verification.

    Science.gov (United States)

    2010-01-01

    ... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part and all other applicable regulations. Such verification may include: (a) Reviewing the HACCP plan; (b...

  9. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  10. 18 CFR 158.5 - Verification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Verification. 158.5 Section 158.5 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT....5 Verification. The facts stated in the memorandum must be sworn to by persons having knowledge...

  11. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    2000-01-01

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  12. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  13. 21 CFR 123.8 - Verification.

    Science.gov (United States)

    2010-04-01

    ..., including signing and dating, by an individual who has been trained in accordance with § 123.10, of the... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR HUMAN CONSUMPTION FISH AND FISHERY PRODUCTS General Provisions § 123.8 Verification. (a) Overall verification. Every...

  14. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  15. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  16. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  17. Z-2 Architecture Description and Requirements Verification Results

    Science.gov (United States)

    Graziosi, Dave; Jones, Bobby; Ferl, Jinny; Scarborough, Steve; Hewes, Linda; Ross, Amy; Rhodes, Richard

    2016-01-01

    The Z-2 Prototype Planetary Extravehicular Space Suit Assembly is a continuation of NASA's Z series of spacesuits. The Z-2 is another step in NASA's technology development roadmap leading to human exploration of the Martian surface. The suit was designed for maximum mobility at 8.3 psid, reduced mass, and to have high fidelity life support interfaces. As Z-2 will be man-tested at full vacuum in NASA JSC's Chamber B, it was manufactured as Class II, making it the most flight-like planetary walking suit produced to date. The Z-2 suit architecture is an evolution of previous EVA suits, namely the ISS EMU, Mark III, Rear Entry I-Suit and Z-1 spacesuits. The suit is a hybrid hard and soft multi-bearing, rear entry spacesuit. The hard upper torso (HUT) is an all-composite structure and includes a 2-bearing rolling convolute shoulder with Vernier sizing mechanism, removable suit port interface plate (SIP), elliptical hemispherical helmet and self-don/doff shoulder harness. The hatch is a hybrid aluminum and composite construction with Apollo style gas connectors, custom water pass-thru, removable hatch cage and interfaces to primary and auxiliary life support feed water bags. The suit includes Z-1 style lower arms with cam brackets for Vernier sizing and government furnished equipment (GFE) Phase VI gloves. The lower torso includes a telescopic waist sizing system, waist bearing, rolling convolute waist joint, hard brief, 2 bearing soft hip thigh, Z-1 style legs with ISS EMU style cam brackets for sizing, and conformal walking boots with ankle bearings. The Z-2 Requirements Verification Plan includes the verification of more than 200 individual requirements. The verification methods include test, analysis, inspection, demonstration or a combination of methods. Examples of unmanned requirements include suit leakage, proof pressure testing, operational life, mass, isometric man-loads, sizing adjustment ranges, internal and external interfaces such as in-suit drink bag

  18. Evaluation of a technology-enhanced integrated care model for frail older persons: protocol of the SPEC study, a stepped-wedge cluster randomized trial in nursing homes.

    Science.gov (United States)

    Kim, Hongsoo; Park, Yeon-Hwan; Jung, Young-Il; Choi, Hyoungshim; Lee, Seyune; Kim, Gi-Soo; Yang, Dong-Wook; Paik, Myunghee Cho; Lee, Tae-Jin

    2017-04-18

    Limited evidence exists on the effectiveness of the chronic care model for people with multimorbidity. This study aims to evaluate the effectiveness of an information and communication technology- (ICT-)enhanced integrated care model, called Systems for Person-centered Elder Care (SPEC), for frail older adults at nursing homes. SPEC is a prospective stepped-wedge cluster randomized trial conducted at 10 nursing homes in South Korea. Residents aged 65 or older meeting the inclusion/exclusion criteria in all the homes are eligible to participate. The multifaceted SPEC intervention, a geriatric care model guided by the chronic care model, consists of five components: comprehensive geriatric assessment for need/risk profiling, individual need-based care planning, interdisciplinary case conferences, person-centered care coordination, and a cloud-based information and communications technology (ICT) tool supporting the intervention process. The primary outcome is quality of care for older residents using a composite measure of quality indicators from the interRAI LTCF assessment system. Outcome assessors and data analysts will be blinded to group assignment. Secondary outcomes include quality of life, healthcare utilization, and cost. Process evaluation will be also conducted. This study is expected to provide important new evidence on the effectiveness, cost-effectiveness, and implementation process of an ICT-supported chronic care model for older persons with multiple chronic illnesses. The SPEC intervention is also unique as the first registered trial implementing an integrated care model using technology to promote person-centered care for frail older nursing home residents in South Korea, where formal LTC was recently introduced. ISRCTN11972147.

  19. Effectiveness of technology-assisted case management in low income adults with type 2 diabetes (TACM-DM: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Strom Joni L

    2011-10-01

    Full Text Available Abstract Background An estimated 1 in 3 American adults will have diabetes by the year 2050. Nationally, South Carolina ranks 10th in cases of diagnosed diabetes compared to other states. In adults, type 2 diabetes (T2DM accounts for approximately 90-95% of all diagnosed cases of diabetes. Clinically, provider and health system factors account for Methods We describe a four-year prospective, randomized clinical trial, which will test the effectiveness of technology-assisted case management in low income rural adults with T2DM. Two-hundred (200 male and female participants, 18 years of age or older and with an HbA1c ≥ 8%, will be randomized into one of two groups: (1 an intervention arm employing the innovative FORA system coupled with nurse case management or (2 a usual care group. Participants will be followed for 6-months to ascertain the effect of the interventions on glycemic control. Our primary hypothesis is that among indigent, rural adult patients with T2DM treated in FQHC's, participants randomized to the technology-assisted case management intervention will have significantly greater reduction in HbA1c at 6 months of follow-up compared to usual care. Discussion Results from this study will provide important insight into the effectiveness of technology-assisted case management intervention (TACM for optimizing diabetes care in indigent, rural adult patients with T2DM treated in FQHC's. Trial Registration National Institutes of Health Clinical Trials Registry (http://ClinicalTrials.gov identifier# NCT01373489

  20. FY 1998 report on the verification survey of geothermal exploration technology, etc. 2/2. Survey of deep geothermal resource; 1998 nendo chinetsu tansa gijutsu nado kensho chosa hokokusho. 2/2. Shinbu chinetsu shigen chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-01

    For the purpose of commercializing deep geothermal resource, a deep exploration well of 4000m class was drilled in the existing geothermal development area to survey the situation of deep geothermal resource existence and the availability. Concretely, the deep geothermal exploration well was drilled for study in the Kakkonda area, Shizukuishi town, Iwate prefecture, to clarify the situation of deep geothermal resource existence and the whole image of geothermal system. Consideration was made of the deep geothermal exploration method, systematization of deep high temperature drilling technology, and availability of deep geothermal resource. The results of the survey were summed up as follows: 1) general remarks; 2) deep exploration well drilling work; 3) details of the study. This report contained 3). In 3), the items were as follows: heightening of accuracy of the deep geothermal resource exploration method, making of a geothermal model in the Kakkonda area, study of deep drilling technology, study of deep fluid utilization technology, and making of a guide for deep geothermal resource exploration/development in the Kakkonda area. As to the technology of high temperature deep geothermal well drilling, studies were made of the borehole cooling method, mud water cooling method, survey of deterioration of casing with age, etc. (NEDO)

  1. IAEA verification experiment at the Portsmouth Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Subudhi, M.; Calvert, O.L.; Bonner, T.N.; Cherry, R.C.; Whiting, N.E.

    1998-01-01

    In April 1996, the United States (US) added the Portsmouth Gaseous Diffusion Plant to the list of facilities eligible for the application of International Atomic Energy Agency (IAEA) safeguards. At that time, the US proposed that the IAEA carry out a Verification Experiment at the plant with respect to the downblending of about 13 metric tons of highly enriched uranium (HEU) in the form of UF 6 . This material is part of the 226 metric tons of fissile material that President Clinton has declared to be excess to US national-security needs and which will be permanently withdrawn from the US nuclear stockpile. In September 1997, the IAEA agreed to carry out this experiment, and during the first three weeks of December 1997, the IAEA verified the design information concerning the downblending process. The plant has been subject to short-notice random inspections since December 17, 1997. This paper provides an overview of the Verification Experiment, the monitoring technologies used in the verification approach, and some of the experience gained to date

  2. The verification of neutron activation analysis support system (cooperative research)

    International Nuclear Information System (INIS)

    Sasajima, Fumio; Ichimura, Shigeju; Ohtomo, Akitoshi; Takayanagi, Masaji

    2000-12-01

    Neutron activation analysis support system is the system in which even the user who has not much experience in the neutron activation analysis can conveniently and accurately carry out the multi-element analysis of the sample. In this verification test, subjects such functions, usability, precision and accuracy of the analysis and etc. of the neutron activation analysis support system were confirmed. As a method of the verification test, it was carried out using irradiation device, measuring device, automatic sample changer and analyzer equipped in the JRR-3M PN-3 facility, and analysis software KAYZERO/SOLCOI based on the k 0 method. With these equipments, calibration of the germanium detector, measurement of the parameter of the irradiation field and analysis of three kinds of environmental standard sample were carried out. The k 0 method adopted in this system is primarily utilized in Europe recently, and it is the analysis method, which can conveniently and accurately carried out the multi-element analysis of the sample without requiring individual comparison standard sample. By this system, total 28 elements were determined quantitatively, and 16 elements with the value guaranteed as analytical data of the NIST (National Institute of Standards and Technology) environment standard sample were analyzed in the accuracy within 15%. This report describes content and verification result of neutron activation support system. (author)

  3. Report on results for fiscal 1997 on development of superconducting electric power application technology. Pt. 2. R and D of superconducting wire, R and D of superconducting generator, studies on total system, R and D of refrigeration system, and verification test; 1997 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. Chodendo senzai no kenkyu kaihatsu, chodendo hatsudenki no kenkyu kaihatsu, total system no kenkyu, reito system no kenkyu kaihatsu, jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-09-01

    This report refers, continuously to the Part 1, to the in-situ verification test of the slow-response type model machine rotor and to the review of the conceptual design of the pilot machine. On the basis of the R and D results of various element technology/partial models obtained before the previous fiscal year, the design, manufacturing and factory test had been conducted for a 70,000kW class slow-response type model machine rotor. This year, an in-situ verification test was performed to complete the test of all planned test items. Using the technological results obtained in the design, manufacturing and test of the 70,000kW class model machine, the conceptual design is being reviewed of the 200,000kW class pilot machine. In the aspect of the functional design, accurate grasping of the thermal load is essential for the purpose of attaining a large capacity for a superconducting generator, as a part of which a thermal load analytical method was planned to be established for a torque tube heat exchanger. The reasonableness of the analysis was verified through a comparison with the factory test result of the 70,000kW class slow-response type rotor, indicating good agreement between the calculation result and the actual measurement, and enabling the result to be obtained that explains dependency of the thermal load on the number of revolution. (NEDO)

  4. Smartphone User Identity Verification Using Gait Characteristics

    Directory of Open Access Journals (Sweden)

    Robertas Damaševičius

    2016-09-01

    Full Text Available Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers. The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. Then, a probability distribution function (PDF of derived features is calculated, which is compared against known user PDF. The Jaccard distance is used to evaluate distance between two distributions, and the decision is taken based on thresholding. The results for subject recognition are at an acceptable level: we have achieved a grand mean Equal Error Rate (ERR for subject identification of 5.7% (using the USC-HAD dataset. Our findings represent a step towards improving the performance of gait-based user identity verification technologies.

  5. Quality assurance issues in conducting multi-institutional advanced technology clinical trials.

    Science.gov (United States)

    Purdy, James A

    2008-01-01

    The National Cancer Institute-sponsored Advanced Technology Quality Assurance (QA) Consortium, which consisted of the Image-Guided Therapy QA Center, Radiation Therapy Oncology Group, Radiological Physics Center, Quality Assurance Review Center, and Resource Center for Emerging Technologies, has pioneered the development of an infrastructure and QA method for advanced technology clinical trials that requires volumetric digital data submission of a protocol patient's treatment plan and verification data. In particular, the Image-Guided Therapy QA Center has nearly 15 years experience in facilitating QA review for Radiation Therapy Oncology Group advanced technology clinical trials. This QA process includes (1) a data integrity review for completeness of protocol required elements, the format of data, and possible data corruption, and recalculation of dose-volume histograms; (2) a review of compliance with target volume and organ-at-risk contours by study chairs; and (3) a review of dose prescription and dose heterogeneity compliance by the Radiation Therapy Oncology Group Headquarters Dosimetry Group or the Radiological Physics Center dosimetrists (for brachytherapy protocols). This report reviews the lessons learned and the QA challenges presented by the use of advanced treatment modalities in clinical trials requiring volumetric digital data submission.

  6. Quality Assurance Issues in Conducting Multi-Institutional Advanced Technology Clinical Trials

    International Nuclear Information System (INIS)

    Purdy, James A.

    2008-01-01

    The National Cancer Institute-sponsored Advanced Technology Quality Assurance (QA) Consortium, which consisted of the Image-Guided Therapy QA Center, Radiation Therapy Oncology Group, Radiological Physics Center, Quality Assurance Review Center, and Resource Center for Emerging Technologies, has pioneered the development of an infrastructure and QA method for advanced technology clinical trials that requires volumetric digital data submission of a protocol patient's treatment plan and verification data. In particular, the Image-Guided Therapy QA Center has nearly 15 years experience in facilitating QA review for Radiation Therapy Oncology Group advanced technology clinical trials. This QA process includes (1) a data integrity review for completeness of protocol required elements, the format of data, and possible data corruption, and recalculation of dose-volume histograms; (2) a review of compliance with target volume and organ-at-risk contours by study chairs; and (3) a review of dose prescription and dose heterogeneity compliance by the Radiation Therapy Oncology Group Headquarters Dosimetry Group or the Radiological Physics Center dosimetrists (for brachytherapy protocols). This report reviews the lessons learned and the QA challenges presented by the use of advanced treatment modalities in clinical trials requiring volumetric digital data submission

  7. Gated Treatment Delivery Verification With On-Line Megavoltage Fluoroscopy

    International Nuclear Information System (INIS)

    Tai An; Christensen, James D.; Gore, Elizabeth; Khamene, Ali; Boettger, Thomas; Li, X. Allen

    2010-01-01

    Purpose: To develop and clinically demonstrate the use of on-line real-time megavoltage (MV) fluoroscopy for gated treatment delivery verification. Methods and Materials: Megavoltage fluoroscopy (MVF) image sequences were acquired using a flat panel equipped for MV cone-beam CT in synchrony with the respiratory signal obtained from the Anzai gating device. The MVF images can be obtained immediately before or during gated treatment delivery. A prototype software tool (named RTReg4D) was developed to register MVF images with phase-sequenced digitally reconstructed radiograph images generated from the treatment planning system based on four-dimensional CT. The image registration can be used to reposition the patient before or during treatment delivery. To demonstrate the reliability and clinical usefulness, the system was first tested using a thoracic phantom and then prospectively in actual patient treatments under an institutional review board-approved protocol. Results: The quality of the MVF images for lung tumors is adequate for image registration with phase-sequenced digitally reconstructed radiographs. The MVF was found to be useful for monitoring inter- and intrafractional variations of tumor positions. With the planning target volume contour displayed on the MVF images, the system can verify whether the moving target stays within the planning target volume margin during gated delivery. Conclusions: The use of MVF images was found to be clinically effective in detecting discrepancies in tumor location before and during respiration-gated treatment delivery. The tools and process developed can be useful for gated treatment delivery verification.

  8. Neuro MR: protocols.

    Science.gov (United States)

    Mikulis, David J; Roberts, Timothy P L

    2007-10-01

    Clinical MRI depends on a symbiosis between MR physics and clinical requirements. The imaging solutions are based on a balance between the "palette" of available image contrasts derived from nuclear spin physics and tissue biophysics, and clinical determinants such as the anticipated pathology and efficient use of imaging time. Imaging is therefore optimized to maximize diagnostic sensitivity and specificity through the development of protocols organized along the lines of major disease categories. In the other part of this two-part review, the primary determinants of image contrast, including T1, T2, and T2*, were highlighted. The development of pulse sequences designed to optimize each of these image contrasts was discussed and the impact of technological innovation (parallel imaging and high-field systems) on the manner in which these sequences could be modified to improve clinical efficacy was further emphasized. The scope of that discussion was broadened to include the application of: 1) water diffusion imaging used primarily for detection of pathologies that restrict the free movement of water in the tissues and for defining fiber tracts in the brain; 2) the intravenous administration of exogenous contrast agents (gadolinium-diethylene triamine pentaacetic acid [GdDTPA]) for assessment of blood-brain-barrier (BBB) defects and brain blood flow; and 3) MR spectroscopy (MRS) for assessment of brain metabolites. The goal of this part is to discuss how these acquisitions are combined into specific protocols that can effectively detect and characterize, or in keeping with our artistic analogy, "paint" each of the major diseases affecting the central nervous system (CNS). This work concludes with a discussion of image artifacts and pitfalls in image interpretation, which, in spite our best efforts to minimize or eliminate them, continue to occur. Much of the ensuing discussion is based on our own institutional experience. Protocols, therefore, do not necessarily

  9. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  10. MFTF sensor verification computer program

    International Nuclear Information System (INIS)

    Chow, H.K.

    1984-01-01

    The design, requirements document and implementation of the MFE Sensor Verification System were accomplished by the Measurement Engineering Section (MES), a group which provides instrumentation for the MFTF magnet diagnostics. The sensors, installed on and around the magnets and solenoids, housed in a vacuum chamber, will supply information about the temperature, strain, pressure, liquid helium level and magnet voltage to the facility operator for evaluation. As the sensors are installed, records must be maintained as to their initial resistance values. Also, as the work progresses, monthly checks will be made to insure continued sensor health. Finally, after the MFTF-B demonstration, yearly checks will be performed as well as checks of sensors as problem develops. The software to acquire and store the data was written by Harry Chow, Computations Department. The acquired data will be transferred to the MFE data base computer system

  11. Numerical Verification Of Equilibrium Chemistry

    International Nuclear Information System (INIS)

    Piro, Markus; Lewis, Brent; Thompson, William T.; Simunovic, Srdjan; Besmann, Theodore M.

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  12. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider......In this paper, we combine formal modeling and analysis of infrastructures of organizations with sociological explanation to provide a framework for insider threat analysis. We use the higher order logic (HOL) proof assistant Isabelle/HOL to support this framework. In the formal model, we exhibit...... theory constructed in Isabelle that implements this process of social explanation. To validate that the social explanation is generally useful for the analysis of insider threats and to demonstrate our framework, we model and verify the insider threat patterns of entitled independent and Ambitious Leader...

  13. Coherent lidar design and performance verification

    Science.gov (United States)

    Frehlich, Rod

    1993-01-01

    The verification of LAWS beam alignment in space can be achieved by a measurement of heterodyne efficiency using the surface return. The crucial element is a direct detection signal that can be identified for each surface return. This should be satisfied for LAWS but will not be satisfied for descoped LAWS. The performance of algorithms for velocity estimation can be described with two basic parameters: the number of coherently detected photo-electrons per estimate and the number of independent signal samples per estimate. The average error of spectral domain velocity estimation algorithms are bounded by a new periodogram Cramer-Rao Bound. Comparison of the periodogram CRB with the exact CRB indicates a factor of two improvement in velocity accuracy is possible using non-spectral domain estimators. This improvement has been demonstrated with a maximum-likelihood estimator. The comparison of velocity estimation algorithms for 2 and 10 micron coherent lidar was performed by assuming all the system design parameters are fixed and the signal statistics are dominated by a 1 m/s rms wind fluctuation over the range gate. The beam alignment requirements for 2 micron are much more severe than for a 10 micron lidar. The effects of the random backscattered field on estimating the alignment error is a major problem for space based lidar operation, especially if the heterodyne efficiency cannot be estimated. For LAWS, the biggest science payoff would result from a short transmitted pulse, on the order of 0.5 microseconds instead of 3 microseconds. The numerically errors for simulation of laser propagation in the atmosphere have been determined as a joint project with the University of California, San Diego. Useful scaling laws were obtained for Kolmogorov atmospheric refractive turbulence and an atmospheric refractive turbulence characterized with an inner scale. This permits verification of the simulation procedure which is essential for the evaluation of the effects of

  14. Coherent lidar design and performance verification

    Science.gov (United States)

    Frehlich, Rod

    1993-11-01

    The verification of LAWS beam alignment in space can be achieved by a measurement of heterodyne efficiency using the surface return. The crucial element is a direct detection signal that can be identified for each surface return. This should be satisfied for LAWS but will not be satisfied for descoped LAWS. The performance of algorithms for velocity estimation can be described with two basic parameters: the number of coherently detected photo-electrons per estimate and the number of independent signal samples per estimate. The average error of spectral domain velocity estimation algorithms are bounded by a new periodogram Cramer-Rao Bound. Comparison of the periodogram CRB with the exact CRB indicates a factor of two improvement in velocity accuracy is possible using non-spectral domain estimators. This improvement has been demonstrated with a maximum-likelihood estimator. The comparison of velocity estimation algorithms for 2 and 10 micron coherent lidar was performed by assuming all the system design parameters are fixed and the signal statistics are dominated by a 1 m/s rms wind fluctuation over the range gate. The beam alignment requirements for 2 micron are much more severe than for a 10 micron lidar. The effects of the random backscattered field on estimating the alignment error is a major problem for space based lidar operation, especially if the heterodyne efficiency cannot be estimated. For LAWS, the biggest science payoff would result from a short transmitted pulse, on the order of 0.5 microseconds instead of 3 microseconds. The numerically errors for simulation of laser propagation in the atmosphere have been determined as a joint project with the University of California, San Diego. Useful scaling laws were obtained for Kolmogorov atmospheric refractive turbulence and an atmospheric refractive turbulence characterized with an inner scale. This permits verification of the simulation procedure which is essential for the evaluation of the effects of

  15. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  16. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Keates, Steven [ADM Associates, Inc., Atlanta, GA (United States)

    2017-10-09

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).

  17. Design verification and cold-flow modeling test report

    Energy Technology Data Exchange (ETDEWEB)

    1993-07-01

    This report presents a compilation of the following three test reports prepared by TRW for Alaska Industrial Development and Export Authority (AIDEA) as part of the Healy Clean Coal Project, Phase 1 Design of the TRW Combustor and Auxiliary Systems, which is co-sponsored by the Department of Energy under the Clean Coal Technology 3 Program: (1) Design Verification Test Report, dated April 1993, (2) Combustor Cold Flow Model Report, dated August 28, 1992, (3) Coal Feed System Cold Flow Model Report, October 28, 1992. In this compilation, these three reports are included in one volume consisting of three parts, and TRW proprietary information has been excluded.

  18. Technology-Intensified Diabetes Education Study (TIDES) in African Americans with type 2 diabetes: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Williams, Joni S; Lynch, Cheryl P; Knapp, Rebecca G; Egede, Leonard E

    2014-11-25

    Compared to American Whites, African Americans have a higher prevalence of type 2 diabetes mellitus (T2DM), experiencing poorer metabolic control and greater risks for complications and death. Patient-level factors, such as diabetes knowledge, self-management skills, empowerment, and perceived control, account for >90% of the variance observed in outcomes between these racial groups. There is strong evidence that self-management interventions that include telephone-delivered diabetes education and skills training are effective at improving metabolic control in diabetes. Web-based home telemonitoring systems in conjunction with active care management are also effective ways to lower glycosylated hemoglobin A1c values when compared to standard care, and provide feedback to patients; however, there are no studies in African Americans with poorly controlled T2DM that examine the use of technology-based feedback to tailor or augment diabetes education and skills training. This study provides a unique opportunity to address this gap in the literature. We describe an ongoing 4-year randomized clinical trial, which will test the efficacy of a technology-intensified diabetes education and skills training (TIDES) intervention in African Americans with poorly controlled T2DM. Two hundred male and female AfricanAmerican participants, 21 years of age or older and with a glycosylated hemoglobin A1c level ≥ 8%, will be randomized into one of two groups for 12 weeks of telephone interventions: (1) TIDES intervention group or (2) a usual-care group. Participants will be followed for 12 months to ascertain the effect of the interventions on glycemic control. Our primary hypothesis is that, among African Americans with poorly controlled T2DM, patients randomized to the TIDES intervention will have significantly greater reduction in glycosylated hemoglobin A1c at 12 months of follow-up compared to the usual-care group. Results from this study will add to the current literature

  19. Experimental quantum verification in the presence of temporally correlated noise

    Science.gov (United States)

    Mavadia, S.; Edmunds, C. L.; Hempel, C.; Ball, H.; Roy, F.; Stace, T. M.; Biercuk, M. J.

    2018-02-01

    Growth in the capabilities of quantum information hardware mandates access to techniques for performance verification that function under realistic laboratory conditions. Here we experimentally characterise the impact of common temporally correlated noise processes on both randomised benchmarking (RB) and gate-set tomography (GST). Our analysis highlights the role of sequence structure in enhancing or suppressing the sensitivity of quantum verification protocols to either slowly or rapidly varying noise, which we treat in the limiting cases of quasi-DC miscalibration and white noise power spectra. We perform experiments with a single trapped 171Yb+ ion-qubit and inject engineered noise (" separators="∝σ^ z ) to probe protocol performance. Experiments on RB validate predictions that measured fidelities over sequences are described by a gamma distribution varying between approximately Gaussian, and a broad, highly skewed distribution for rapidly and slowly varying noise, respectively. Similarly we find a strong gate set dependence of default experimental GST procedures in the presence of correlated errors, leading to significant deviations between estimated and calculated diamond distances in the presence of correlated σ^ z errors. Numerical simulations demonstrate that expansion of the gate set to include negative rotations can suppress these discrepancies and increase reported diamond distances by orders of magnitude for the same error processes. Similar effects do not occur for correlated σ^ x or σ^ y errors or depolarising noise processes, highlighting the impact of the critical interplay of selected gate set and the gauge optimisation process on the meaning of the reported diamond norm in correlated noise environments.

  20. Model-Checking Web Services Business Activity Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2013-01-01

    Web Services Business Activity specification defines two coordination protocols BAwCC (Business Agreement with Coordination Completion) and BAwPC (Business Agreement with Participant Completion)that ensure a consistent agreement on the outcome of long-running distributed applications. In order...... to verify fundamental properties of the protocols we provide formal analyses in the model checker UPPAAL.Our analyses are supported by a newly developed tool chain,where in the first step we translatetables with state-transition protocol descriptionsinto an intermediate XML format, and in the second step we...... whereas the original protocols do not.All verification results presented in this article were performedin a fully automatic way using our new tool csv2uppaal....