WorldWideScience

Sample records for technology verification protocol

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    Science.gov (United States)

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  2. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP) HIGH TRANSFER EFFICIENCE SPRAY EQUIPMENT--GENERIC VERIFICATION PROTOCOL

    Science.gov (United States)

    The Environmental Technology Verification (ETV) Program has been established to verify the performance characteristics of innovative environmental technologies and report this objective information, thus, accelerating the entrance of these new technologies into the marketplace. V...

  4. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP) High Transfer Efficiency Spray Equipment--Generic Verification Protocol

    Science.gov (United States)

    The Environmental Technology Verification (ETV) Program has been established by the U.S. Environmental Protection Agency (EPA) to verify the performance characteristics of innovative environmental technologies across all media and report this objective information to the states, ...

  5. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  6. Generic Protocol for the Verification of Ballast Water Treatment Technology. Version 5.1

    Science.gov (United States)

    2010-09-01

    Core Parameters: The measurements that are required as part of the ETV verification. Cyst: The dormant cell or resting stage of microalgae ...105 organisms/m3 Protists Tetraselmis sp. Green microalgae 103 organisms/mL Bacteria Geobacillus sp. Geobacillus sp. 103 organisms/mL 1 The volumes...observation periods. Within this size class fall dormant cells or resting stages exhibited across a broad phylogenetic range of microalgae

  7. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  8. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  9. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  10. NEMVP: North American energy measurement and verification protocol

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  11. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  12. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  13. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  14. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation

    Institute of Scientific and Technical Information of China (English)

    Kai-Le Su; Qing-Liang Chen; Abdul Sattar; Wei-Ya Yue; Guan-Feng Lv; Xi-Zhong Zheng

    2006-01-01

    This paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficultto-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver.

  15. CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

    Directory of Open Access Journals (Sweden)

    Amol H Shinde

    2017-06-01

    Full Text Available Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.

  16. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  17. Verification of Quantum Cryptography Protocols by Model Checking

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-10-01

    Full Text Available Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography orQuantum Key Distribution (QKD exploits the laws of quantum physics to offer unconditionally securecommunication. The progress of research in this field allows the anticipation of QKD to be availableoutside of laboratories within the next few years and efforts are made to improve the performance andreliability of the implemented technologies. But despite this big progress, several challenges remain. Forexample the task of how to test the devices of QKD did not yet receive enough attention. These apparatusesbecome heterogeneous, complex and so demand a big verification effort. In this paper we propose to studyquantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISMtool, we analyze the security of BB84 protocol and we are focused on the specific security property ofeavesdropper's information gain on the key derived from the implementation of this protocol. We show thatthis property is affected by the parameters of the eavesdropper’s power and the quantum channel.

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  19. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  20. Formal Specifications and Verification of a Secure Communication Protocol Model

    Institute of Scientific and Technical Information of China (English)

    夏阳; 陆余良; 蒋凡

    2003-01-01

    This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.

  1. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  2. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  3. Environmental Technology Verification Program (ETV) Policy Compendium

    Science.gov (United States)

    The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

  4. On automatic verification of self-stabilizing population protocols

    Institute of Scientific and Technical Information of China (English)

    Jun PANG; Zhengqin LUO; Yuxin DENG

    2008-01-01

    The population protocol model has emerged as an elegant computation paradigm for describing mobile ad hoe networks, consisting of a number of mobile nodes that interact with each other to carry out a computation. The interactions of nodes are subject to a fairness con-straint. One essential property of population protocols is that all nodes must eventually converge to the correct out-put value (or configuration). In this paper, we aim to automatically verify self-stabilizing population protocols for leader election and token circulation in the Spin model checker. We report our verification results and discuss the issue of modeling strong fairness constraints in Spin.

  5. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  6. A Zero Knowledge Protocol For Nuclear Warhead Verification

    Energy Technology Data Exchange (ETDEWEB)

    Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  8. Parameterized Verification of Safety Properties in Ad Hoc Network Protocols

    Directory of Open Access Journals (Sweden)

    Giorgio Delzanno

    2011-08-01

    Full Text Available We summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. We consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors. Processes are finite state automata that communicate via selective broadcast messages. Reception of a broadcast is restricted to single-hop neighbors. For this model we consider a decision problem that can be expressed as the verification of the existence of an initial topology in which the execution of the protocol can lead to a configuration with at least one node in a certain state. The decision problem is parametric both on the size and on the form of the communication topology of the initial configurations. We draw a complete picture of the decidability and complexity boundaries of this problem according to various assumptions on the possible topologies.

  9. Extensible Technology-Agnostic Runtime Verification

    Directory of Open Access Journals (Sweden)

    Christian Colombo

    2013-02-01

    Full Text Available With numerous specialised technologies available to industry, it has become increasingly frequent for computer systems to be composed of heterogeneous components built over, and using, different technologies and languages. While this enables developers to use the appropriate technologies for specific contexts, it becomes more challenging to ensure the correctness of the overall system. In this paper we propose a framework to enable extensible technology agnostic runtime verification and we present an extension of polyLarva, a runtime-verification tool able to handle the monitoring of heterogeneous-component systems. The approach is then applied to a case study of a component-based artefact using different technologies, namely C and Java.

  10. U.S. EPA Environmental Technology Verification Program, the Founder of the ETV Concept

    Science.gov (United States)

    The U.S. EPA Environmental Technology Verification (ETV) Program develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The program was created in 1995 to help accelerate t...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  13. Secure Batch Verification Protocol for RSA Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    JIAZongpu; LIQingchao; LIZichen

    2005-01-01

    Harn, in 1998, proposed an efficient batch verification scheme for multiple RSA digital signatures.However, the scheme has a weakness, that is a signer can generate multiple signatures which can pass the batch verification scheme, but every one of these multiple signatures is not a valid signature. To avoid this disadvantage, we propose an improved batch verification scheme.

  14. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  15. Design and Verification of AMBA AHBLite protocol using Verilog HDL

    Directory of Open Access Journals (Sweden)

    Sravya Kante

    2016-04-01

    Full Text Available The SOC plan confronts a crevice between generation limit and time to market weights. The outline space develops with changes underway limits as far as measure of time to plan a framework utilizing these abilities. On one hand, shorter product life cycles are forcing an aggressive reduction of the time-to-market, fast simulation capabilities are required for coping with the immense design space that is to be explored; these are specially needed during early stages of the design. This need has driven the improvement of exchange level models, which are theoretical models that have been designed to run much quicker than synthesizable models.The pressure for faster executing models extends especially to the frequently reused communication libraries. AMBA AHB-Lite addresses the requirements of highperformance synthesizable designs. It is a transport interface that provides support to a solitary transport ace and gives elite data transfer capacity.This paper describes the system level modelling of the Advanced HighperformanceBus Lite (AHB-Lite subset of AHB which is a part of the Advanced Microprocessor Bus Architecture(AMBA. It also includes the design and verification ofAHB-Lite protocol for sequentialand non-sequential (increment and wrap of differentburst sizes transfers.

  16. 76 FR 50129 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing...

    Science.gov (United States)

    2011-08-12

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY 40 CFR Parts 72 and 75 RIN 2060-AQ06 Protocol Gas Verification Program and Minimum Competency... Verification Program and Minimum Competency Requirements for Air Emission Testing final rule, which...

  17. Consortium for Verification Technology Fellowship Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sadler, Lorraine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    As one recipient of the Consortium for Verification Technology (CVT) Fellowship, I spent eight days as a visiting scientist at the University of Michigan, Department of Nuclear Engineering and Radiological Sciences (NERS). During this time, I participated in multiple department and research group meetings and presentations, met with individual faculty and students, toured multiple laboratories, and taught one-half of a one-unit class on Risk Analysis in Nuclear Arms control (six 1.5 hour lectures). The following report describes some of the interactions that I had during my time as well as a brief discussion of the impact of this fellowship on members of the consortium and on me/my laboratory’s technical knowledge and network.

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM CASE STUDIES: DEMONSTRATING PROGRAM OUTCOMES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This bookle...

  19. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PERFORMANCE VERIFICATION OF THE W.L. GORE & ASSOCIATES GORE-SORBER SCREENING SURVEY

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  1. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...

  2. Formal Verification of the Merchant Registration Phase of the SET Protocol

    Institute of Scientific and Technical Information of China (English)

    Xiao-Qi Ma; Xiao-Chun Cheng

    2005-01-01

    This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the secrecy of online purchases. A number of concepts, notations, functions, predicates, assumptions and rules are introduced. We describe the knowledge of all legal participants, and a malicious spy, to assess the security of the sub-protocol. Avoiding search in a large state space, the method converges very quickly. We implemented our method in the Isabelle/Isar automated reasoning environment, therefore the whole verification process can be executed mechanically and efficiently.

  3. Technology diffusion of a different nature: Applications of nuclear safeguards technology to the chemical weapons verification regime

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.P. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Reisman, A. [Brookhaven National Lab., Upton, NY (United States); Turpen, E. [Aquila Technologies Group, Inc., Cambridge, MA (United States)

    1996-10-01

    The following discussion focuses on the issue of arms control implementation from the standpoint of technology and technical assistance. Not only are the procedures and techniques for safeguarding nuclear materials undergoing substantial changes, but the implementation of the Chemical Weapons Convention (CWC) and the Biological Weapons Convention (BWC) will give rise to technical difficulties unprecedented in the implementation of arms control verification. Although these regimes present new challenges, an analysis of the similarities between the nuclear and chemical weapons non-proliferation verification regimes illustrates the overlap in technological solutions. Just as cost-effective and efficient technologies can solve the problems faced by the nuclear safeguards community, these same technologies offer solutions for the CWC safeguards regime. With this in mind, experts at the Organization for the Prohibition of Chemical Weapons (OPCW), who are responsible for verification implementation, need to devise a CWC verification protocol that considers the technology already available. The functional similarity of IAEA and the OPCW, in conjunction with the technical necessities of both verification regimes, should receive attention with respect to the establishment of a technical assistance program. Lastly, the advanced status of the nuclear and chemical regime vis-a-vis the biological non-proliferation regime can inform our approach to implementation of confidence building measures for biological weapons.

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: ECR TECHNOLOGIES, INC., EARTHLINKED GROUND-SOURCE HEAT PUMP WATER HEATING SYSTEM

    Science.gov (United States)

    EPA has created the Environmental Technology Verification program to provide high quality, peer reviewed data on technology performance. This data is expected to accelerate the acceptance and use of improved environmental protection technologies. The Greenhouse Gas Technology C...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: ECR TECHNOLOGIES, INC., EARTHLINKED GROUND-SOURCE HEAT PUMP WATER HEATING SYSTEM

    Science.gov (United States)

    EPA has created the Environmental Technology Verification program to provide high quality, peer reviewed data on technology performance. This data is expected to accelerate the acceptance and use of improved environmental protection technologies. The Greenhouse Gas Technology C...

  6. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    translated into a representation read by VCC, a software verifier for C. We successfully verified several MPI programs in a running time that is independent of the number of processes or other input parameters. This contrasts with alternative techniques, notably model checking and runtime verification...

  7. Knowledge structure approach to verification of authentication protocols

    Institute of Scientific and Technical Information of China (English)

    SU Kaile; L(U) Guanfeng; CHEN Qingliang

    2005-01-01

    The standard Kripke semantics of epistemic logics has been applied successfully to reasoning communication protocols under the assumption that the network is not hostile. This paper introduces a natural semantics of Kripke semantics called knowledge structure and, by this kind of Kripke semantics, analyzes communication protocols over hostile networks, especially on authentication protocols. Compared with BAN-like logics,the method is automatically implementable because it operates on the actual definitions of the protocols, not on some difficult-to-establish justifications of them. What is more,the corresponding tool called SPV (Security Protocol Verifier) has been developed. Another salient point of this approach is that it is justification-oriented instead of falsificationoriented, i.e. finding bugs in protocols.

  8. Towards a CPN-Based Modelling Approach for Reconciling Verification and Implementation of Protocol Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2013-01-01

    and implementation. Our approach has been developed in the context of the Coloured Petri Nets (CPNs) modelling language. We illustrate our approach by presenting a descriptive specification model of the Websocket protocol which is currently under development by the Internet Engineering Task Force (IETF), and we show......Formal modelling of protocols is often aimed at one specific purpose such as verification or automatically generating an implementation. This leads to models that are useful for one purpose, but not for others. Being able to derive models for verification and implementation from a single model...

  9. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show...

  10. Cryptographic protocol verification using tractable classes of horn clauses

    DEFF Research Database (Denmark)

    Seidl, Helmut; Neeraj Verma, Kumar

    2007-01-01

    We consider secrecy problems for cryptographic protocols modeled using Horn clauses and present general classes of Horn clauses which can be efficiently decided. Besides simplifying the methods for the class of flat and onevariable clauses introduced for modeling of protocols with single blind...

  11. Analysis and Verification of Service Interaction Protocols - A Brief Survey

    CERN Document Server

    Salaün, Gwen

    2010-01-01

    Modeling and analysis of interactions among services is a crucial issue in Service-Oriented Computing. Composing Web services is a complicated task which requires techniques and tools to verify that the new system will behave correctly. In this paper, we first overview some formal models proposed in the literature to describe services. Second, we give a brief survey of verification techniques that can be used to analyse services and their interaction. Last, we focus on the realizability and conformance of choreographies.

  12. Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

    Science.gov (United States)

    Graham, Michelle; Gray, David

    As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.

  13. Constitutional and legal implications of arms control verification technologies

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A.; Haffenden, R.

    1992-09-01

    United States law can both help and hinder the use of instrumentation as a component of arms control verification in this country. It can foster the general use of sophisticated verification technologies, where such devices are consistent with the value attached to privacy by the Fourth Amendment to the United States Constitution. On the other hand, law can hinder reliance on devices that cross this constitutional line, or where such technology itself threatens health, safety, or environment as such threats are defined in federal statutes. The purpose of this conference paper is to explain some of the lessons that have been learned about the relationship between law and verification technologies in the hope that law can help more than hinder. This paper has three parts. In order to start with a common understanding, part I will briefly describe the hierarchy of treaties, the Constitution, federal statutes, and state and local laws. Part 2 will discuss how the specific constitutional requirement that the government respect the right of privacy in all of its endeavors may affect the use of verification technologies. Part 3 will explain the environmental law constraints on verification technology as exemplified by the system of on-site sampling embodied in the current Rolling Text of the Draft Chemical Weapons Convention.

  14. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  15. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: NORTH AMERICAN SALT COMPANY'S DUSTGARD

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  17. A Formal Verification of the Alternating Bit Protocol in the Calculus of Constructions

    NARCIS (Netherlands)

    Bezem, M.A.; Groote, J.F.

    2008-01-01

    We report on a formal verification of the Alternating Bit Protocol (ABP) in the Calculus of Constructions. We outline a semi-formal correctness proof of the ABP with sufficient detail to be formalised. Thereafter we show by examples how the formalised proof has been verified by the automated proof c

  18. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  19. 76 FR 20536 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing

    Science.gov (United States)

    2011-04-13

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 75 RIN 2060-AQ06 Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing Correction In rule document 2011-6216 appearing on pages 17288-17325 in...

  20. 76 FR 50164 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing...

    Science.gov (United States)

    2011-08-12

    ... AGENCY 40 CFR Parts 72 and 75 RIN 2060-AQ06 Protocol Gas Verification Program and Minimum Competency... Program and Minimum Competency Requirements for Air Emission Testing rule. EPA published in the Federal... Program (PGVP) and the minimum competency requirements for Air Emission Testing Bodies (AETBs), and...

  1. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, Ricardo; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    2002-01-01

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs an

  2. Verification and validation of a reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  3. Security protocol specification and verification with AnBx

    DEFF Research Database (Denmark)

    Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian Alexander

    2016-01-01

    Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose...... AnBx, a formal protocol specification language based on the popular Alice & Bob notation. AnBx offers channels as the main abstraction for communication, providing different authenticity and/or confidentiality guarantees for message transmission. AnBx extends existing proposals in the literature...

  4. A timed verification of the IEEE 1394 leader election protocol

    NARCIS (Netherlands)

    Romijn, J.M.T.

    1999-01-01

    The IEEE 1394 architecture standard defines a high performance serial multimedia bus that allows several components in a network to communicate with each other at high speed. In the physical layer of the architecture, a leader election protocol is used to find a spanning tree with a unique root in t

  5. Certificateless Public Auditing Protocol with Constant Verification Time

    Directory of Open Access Journals (Sweden)

    Dongmin Kim

    2017-01-01

    Full Text Available To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI, they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal security models and prove the security of our scheme under the three security models.

  6. Environmental Technology Verification: Baghouse Filtration Products--TDC Filter Manufacturing, Inc., SB025 Filtration Media

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT; GROUNDWATER SAMPLING TECHNOLOGIES; W.L. GORE AND ASSOCIATES, INC., GORE-SORBER WATER QUALITY MONITORING

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  8. Field analytical technology verification: The ETV Site Characterization Program

    Energy Technology Data Exchange (ETDEWEB)

    Einfeld, W. [Sandia National Labs., Albuquerque, NM (United States); Jenkins, R.A.; Dindal, A.B. [Oak Ridge National Lab., TN (United States)

    1998-06-01

    Innovative field characterization and monitoring technologies are often slow to be adopted by the environmental engineering/consulting community because of concerns that their performance has not been proven by an independent testing body, and/or they have not received the EPA`s blessing on a regional or national level. The purpose of the EPA Environmental Technology Verification (ETV) Site Characterization Pilot, a joint effort between EPA and DOE, is to accelerate the acceptance of technologies that reduce the cost and increase the speed of environmental clean-up and monitoring. Technology verifications that have been completed or are underway include: in situ technologies for the characterization of sub-surface hydrocarbon plumes, field-portable GC/MS systems, field-portable X-ray fluorescence analyzers, soil sampling technologies, field-portable PCB analyzers, analyzers for VOC analysis at the wellhead, and decision support software systems to aid site sample collection and contaminant plume definition. The verification process follows a somewhat generic pathway. A user-community need is identified, the vendor community is canvassed, and relevant, interested companies are selected. A demonstration plan is prepared by the verification organization and circulated to participants prior to the field activities. Field trials are normally held at two geologically or environmentally different sites and typically require one week at each site. Samples (soil, soil gas, water, surface wipe etc.) provided to the vendor at the demonstration include site-specific samples and standards or performance evaluation samples. Sample splits are sent to a pre-selected laboratory for analysis using a reference method. Laboratory data are used for comparison with field technology results during the data analysis phase of the demonstration.

  9. Process Document, Joint Verification Protocol, and Joint Test Plan for Verification of HACH-LANGE GmbH LUMIStox 300 Bench Top Luminometer and ECLOX Handheld Luminometer for Luminescent Bacteria Test for use in Wastewater

    Science.gov (United States)

    The Danish Environmental Technology Verification program (DANETV) Water Test Centre operated by DHI, is supported by the Danish Ministry for Science, Technology and Innovation. DANETV, the United States Environmental Protection Agency Environmental Technology Verification Progra...

  10. Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol

    Directory of Open Access Journals (Sweden)

    Hafedh ZAYANI

    2010-05-01

    Full Text Available Communication protocols and techniques are often evaluated using simulation techniques. However, theuse of formal modeling and analysis techniques for verification and evaluation in particular for WirelessSensor Networks (WSN becomes a necessity. In this paper we present a formal analysis of the backoffprocedure integrated in the medium access control protocol named ECo-MAC designed for WSN. Wedescribe this backoff procedure in terms of discrete time Markov chains (DTMCs and evaluated usingthe well known probabilistic model checker PRISM. After checking the different invariants of theproposed model, we study the effect of contention window length (in number of time contention unit onthe acceptable number of simultaneous senders in a neighborhood of a given receiver. The obtainedquantitative results confirm those provided by the simulation using OPNET tool and justify the validity ofthe adopted value for the time contention unit TCU.

  11. Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol

    CERN Document Server

    Zayani, Hafedh; Ayed, Rahma Ben; 10.5121/ijwmn.2010.2211

    2010-01-01

    Communication protocols and techniques are often evaluated using simulation techniques. However, the use of formal modeling and analysis techniques for verification and evaluation in particular for Wireless Sensor Networks (WSN) becomes a necessity. In this paper we present a formal analysis of the backoff procedure integrated in the medium access control protocol named ECo-MAC designed for WSN. We describe this backoff procedure in terms of discrete time Markov chains (DTMCs) and evaluated using the well known probabilistic model checker PRISM. After checking the different invariants of the proposed model, we study the effect of contention window length (in number of time contention unit) on the acceptable number of simultaneous senders in a neighborhood of a given receiver. The obtained quantitative results confirm those provided by the simulation using OPNET tool and justify the validity of the adopted value for the time contention unit TCU.

  12. Climate change scenarios and technology transfer protocols

    Energy Technology Data Exchange (ETDEWEB)

    Kypreos, Socrates; Turton, Hal [Energy Economics Group, Paul Scherrer Institute, Villigen PSI, CH-5232 (Switzerland)

    2011-02-15

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. (author)

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH ELECTRONIC SENSOR TECHNOLOGY MODEL 4100

    Science.gov (United States)

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. As part of this program, the...

  14. Flight testing vehicles for verification and validation of hypersonics technology

    Science.gov (United States)

    Sacher, Peter W.

    1995-03-01

    Hypersonics technology has obtained renewed interest since various concepts for future completely reusable Space Transportation Systems (STS) using airbreathing propulsion for the parts of atmospheric flight have been proposed in different countries (e.g. US, CIS, Japan, France, Germany, and UK). To cover major developments in those countries, AGARD FDP has formed the Working Group 18 on 'Hypersonic Experimental and Computational Capabilities - Improvement and Validation'. Of major importance for the proof of feasibility for all these concepts is the definition of an overall convincing philosophy for a 'hypersonics technology development and verification concept' using ground simulation facilities (both experimental and numerical) and flight testing vehicles. Flying at hypersonic Mach numbers using airbreathing propulsion requires highly sophisticated design tools to provide reliable prediction of thrust minus aerodynamic drag to accelerate the vehicle during ascent. Using these design tools, existing uncertainties have to be minimized by a carefully performed code validation process. To a large degree the database required for this validation cannot be obtained on ground. In addition thermal loads due to hypersonic flow have to be predicted accurately by aerothermodynamic flow codes to provide the inputs needed to decide on materials and structures. Heat management for hypersonic flight vehicles is one of the key-issues for any kind of successful flight demonstration. This paper identifies and discusses the role of flight testing during the verification and validation process of advanced hypersonic technology needed for flight in the atmosphere with hypersonic Mach numbers using airbreathing propulsion systems both for weapons and space transportation systems.

  15. Arms control verification: The technologies that make it possible

    Energy Technology Data Exchange (ETDEWEB)

    Tsipis, K.; Hafemeister, D.W.; Janeway, P.

    1986-01-01

    This book presents papers on arms control verification. Topics considered include the politics of treaty verification and compliance, national security, remote sensing, image processing, image enhancement by digital computer, charge-coupled device image sensors, radar imaging, infrared surveillance, monitoring, seismological aspects, satellite verifications, seismic verification, and verifying a fissile material production freeze.

  16. Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology

    CERN Document Server

    Al-Bataineh, Omar I; French, Tim; Woodings, Terry

    2012-01-01

    The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers: UPPAAL, Rabbit, and RED, and compare the results.

  17. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    Science.gov (United States)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  18. Battery Technology Life Verification Test Manual Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Jon P. Christophersen

    2012-12-01

    The purpose of this Technology Life Verification Test (TLVT) Manual is to help guide developers in their effort to successfully commercialize advanced energy storage devices such as battery and ultracapacitor technologies. The experimental design and data analysis discussed herein are focused on automotive applications based on the United States Advanced Battery Consortium (USABC) electric vehicle, hybrid electric vehicle, and plug-in hybrid electric vehicle (EV, HEV, and PHEV, respectively) performance targets. However, the methodology can be equally applied to other applications as well. This manual supersedes the February 2005 version of the TLVT Manual (Reference 1). It includes criteria for statistically-based life test matrix designs as well as requirements for test data analysis and reporting. Calendar life modeling and estimation techniques, including a user’s guide to the corresponding software tool is now provided in the Battery Life Estimator (BLE) Manual (Reference 2).

  19. A New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Glaser,; Alexander, [Princeton University

    2012-05-16

    Warhead verification systems proposed to date fundamentally rely on the use of information barriers to prevent the release of classified design information. Measurements with information carriers significantly increase the complexity of inspection systems, make their certification and authentication difficult, and may reduce the overall confidence in the verifiability of future arms- control agreements. This talk presents a proof-of-concept of a new approach to nuclear warhead verification that minimizes the role of information barriers from the outset and envisions instead an inspection system that a priori avoids leakage of sensitive information using a so-called zero-knowledge protocol. The proposed inspection system is based on the template-matching approach and relies on active interrogation of a test object with 14-MeV neutrons. The viability of the method is examined with MCNP Monte Carlo neutron transport calculations modeling the experimental setup, an investigation of different diversion scenarios, and an analysis of the simulated data showing that it does not contain information about the properties of the inspected object.

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SHARPE MANUFACTURING TITANIUM T1-CG SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ANEST IWATA CORPORATION W400-LV SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM CASE STUDIES: DEMONSTRATING PROGRAM OUTCOMES, VOLUME II

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This bookle...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PHOTOACOUSTIC SPECTROPHOTOMATER INNOVA AIR TECH INSTRUMENTS MODEL 1312 MULTI-GAS MONITOR

    Science.gov (United States)

    The U.S. Environmental Protection Agency, Through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. This report documents demons...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ANEST IWATA CORPORATION W400-LV SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SHARPE MANUFACTURING TITANIUM T1-CG SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  6. Environmental Technology Verification: Baghouse filtration products--W.L. Gore & Associates L3650 filtration media (tested November--December 2009)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  7. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: MOBILE SOURCE RETROFIT AIR POLLUTION CONTROL DEVICES: CLEAN CLEAR FUEL TECHNOLOGIES, INC.’S, UNIVERSAL FUEL CELL

    Science.gov (United States)

    The U.S. EPA's Office of Research and Development operates the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative technologies through performance verification and information dissemination. Congress funds ETV in response to the belief ...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT--BAGHOUSE FILTRATION PRODUCTS, W.L. GORE ASSOC., INC.

    Science.gov (United States)

    The U.S. Environmental Protection Agency Air Pollution Control Technology (APCT) Verification Center evaluates the performance of baghouse filtration products used primarily to control PM2.5 emissions. This verification statement summarizes the test results for W.L. Gore & Assoc....

  10. Development of evaluation and performance verification technology for radiotherapy radiation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. Y.; Jang, S. Y.; Kim, B. H. and others

    2005-02-15

    No matter how much the importance is emphasized, the exact assessment of the absorbed doses administered to the patients to treat the various diseases such as lately soaring malignant tumors with the radiotherapy practices is the most important factor. In reality, several over-exposed patients from the radiotherapy practice become very serious social issues. Especially, the development of a technology to exactly assess the high doses and high energies (In general, dose administered to the patients with the radiotherapy practices are very huge doses, and they are about three times higher than the lethal doses) generated by the radiation generators and irradiation equipment is a competing issue to be promptly conducted. Over fifty medical centers in Korea operate the radiation generators and irradiation equipment for the radiotherapy practices. However, neither the legal and regulatory systems to implement a quality assurance program are sufficiently stipulated nor qualified personnel who could run a program to maintain the quality assurance and control of those generators and equipment for the radiotherapy practices in the medical facilities are sufficiently employed. To overcome the above deficiencies, a quality assurance program such as those developed in the technically advanced countries should be developed to exactly assess the doses administered to patients with the radiotherapy practices and develop the necessary procedures to maintain the continuing performance of the machine or equipment for the radiotherapy. The QA program and procedures should induce the fluent calibration of the machine or equipment with quality, and definitely establish the safety of patients in the radiotherapy practices. In this study, a methodology for the verification and evaluation of the radiotherapy doses is developed, and several accurate measurements, evaluations of the doses delivered to patients and verification of the performance of the therapy machine and equipment are

  11. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    Science.gov (United States)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  12. Technology verification phase. Dynamic isotope power system. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.G.

    1982-03-10

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance. (LCL)

  13. Development of requirements tracking and verification technology for the NPP software

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Chul Hwan; Kim, Jang Yeol; Lee, Jang Soo; Song, Soon Ja; Lee, Dong Young; Kwon, Kee Choon

    1998-12-30

    Searched and analyzed the technology of requirements engineering in the areas of aerospace and defense industry, medical industry and nuclear industry. Summarized the status of tools for the software design and requirements management. Analyzed the software design methodology for the safety software of NPP. Development of the design requirements for the requirements tracking and verification system. Development of the background technology to design the prototype tool for the requirements tracking and verification.

  14. Smart environments technology, protocols and applications

    CERN Document Server

    Cook, Diane

    2004-01-01

    Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.

  15. Formal Description and Verification of a Transport Protocol for Local Networks

    Institute of Scientific and Technical Information of China (English)

    李腊元

    1990-01-01

    This paper discusses a transport protocol and its formal description techniques for local network.The transport layer function,The transport services and a transport protocol design in a local network architecture model are presente.A transport protocol specification using the finite state automate(FSA)is given.The correcness of the protocol is verified by using the reachability tree technique with respect to the protocol properties of completeness.deadlock and livelock freeness,termination and reachability.

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, AIRFLOW PRODUCTS AFP30

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the AFP30 air filter for dust and bioaerosol filtration manufactured by Airflow Products. The pressure drop across the filter was 62 Pa clean and 247 Pa dust loaded. The filtration effici...

  17. Facial Verification Technology for Use In Atm Transactions

    OpenAIRE

    Aru, Okereke Eze

    2013-01-01

    There is an urgent need for improving security in banking region. With the birth of the Automatic Teller Machines, banking became a lot easier though with its own troubles of insecurity. Due to tremendousincrease in the number of criminals and their activities, the ATM has become insecure. ATM systems today use no more than an access card and PIN for identity verification. The recent progress in biometric identification techniques, including finger printing, retina scanning, and facial recogn...

  18. PET Scanning Protocols for In-Situ Dose Delivery Verification of Proton Therapy

    NARCIS (Netherlands)

    Buitenhuis, H.J.T.; Dendooven, P.; Biegun, A.K.; van der Borden, A.J.; Diblen, F.; van Goethem, M.-J.; van der Schaaf, A.A.; van t Veld, Aart; Brandenburg, S.

    2016-01-01

    Positron emission tomography is so far the only method for in-vivo dose delivery verification in hadron therapy that is in clinical use. A PET scanner placed in the treatment position (in-situ) will be able to obtain the highest number of counts, as it minimizes the decay of the positron emitting

  19. PET Scanning Protocols for In-Situ Dose Delivery Verification of Proton Therapy

    NARCIS (Netherlands)

    Buitenhuis, H.J.T.; Dendooven, P.; Biegun, A.K.; van der Borden, A.J.; Diblen, F.; van Goethem, M.-J.; van der Schaaf, A.A.; van t Veld, Aart; Brandenburg, S.

    2016-01-01

    Positron emission tomography is so far the only method for in-vivo dose delivery verification in hadron therapy that is in clinical use. A PET scanner placed in the treatment position (in-situ) will be able to obtain the highest number of counts, as it minimizes the decay of the positron emitting nu

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - W.L. GORE & ASSOCIATES, INC. L4347 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - BASF CORPORATION AX/BA-14/9-SAXP FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  2. ENVIORNMENTAL TECHNOLOGY VERIFICATION REPORT: ANEST IWATA CORPORATION LPH400-LV HVLP SPRAY GUN

    Science.gov (United States)

    This Enviornmental Technology Verification reports on the characteristics of a paint spray gun. The research showed that the spray gun provided absolute and relative increases in transfer efficiency over the base line and provided a reduction in the use of paint.

  3. ENVIORNMENTAL TECHNOLOGY VERIFICATION REPORT: ANEST IWATA CORPORATION LPH400-LV HVLP SPRAY GUN

    Science.gov (United States)

    This Enviornmental Technology Verification reports on the characteristics of a paint spray gun. The research showed that the spray gun provided absolute and relative increases in transfer efficiency over the base line and provided a reduction in the use of paint.

  4. Optimization and verification of the TR-MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    Morshed, Sarwar; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The underly

  5. INDEPENDENT VERIFICATION SURVEY REPORT FOR ZONE 1 OF THE EAST TENNESSEE TECHNOLOGY PARK IN OAK RIDGE, TENNESSEE

    Energy Technology Data Exchange (ETDEWEB)

    King, David A.

    2012-08-16

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs).

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP), FINAL TECHNOLOGY APPLICATIONS GROUP TAGNITE--TESTING AND QUALITY ASSURANCE PLAN (T/QAP)

    Science.gov (United States)

    The overall objective of the Environmental Testing and Verification Coatings and Coating Equipment Program is to verify pollution prevention and performance characteristics of coating technologies and make the results of the testing available to prospective coating technology use...

  7. Design verification of a compact system for detecting tissue perfusion using bimodal diffuse optical technologies

    Science.gov (United States)

    Pakela, Julia M.; Hedrick, Taylor L.; Lee, Seung Yup; Vishwanath, Karthik; Zanfardino, Sara; Chung, Yooree G.; Helton, Michael C.; Kolodziejski, Noah J.; Stapels, Christopher J.; McAdams, Daniel R.; Fernandez, Daniel E.; Christian, James F.; Feinberg, Stephen E.; Mycek, Mary-Ann

    2017-02-01

    It is essential to monitor tissue perfusion during and after reconstructive surgery, as restricted blood flow can result in graft failures. Current clinical procedures are insufficient to monitor tissue perfusion, as they are intermittent and often subjective. To address this unmet clinical need, a compact, low-cost, multimodal diffuse correlation spectroscopy and diffuse reflectance spectroscopy system was developed. We verified system performance via tissue phantoms and experimental protocols for rigorous bench testing. Quantitative data analysis methods were employed and tested to enable the extraction of tissue perfusion parameters. This design verification study assures data integrity in future in vivo studies.

  8. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Fagerland Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    2015-01-01

    PetriCode is a tool that supports automated generation of protocol software from a restricted class of Coloured Petri Nets (CPNs) called Pragmatics Annotated Coloured Petri Nets (PA-CPNs). Petri-Code and PA-CPNs have been designed with five main requirements in mind, which include the same model...

  9. Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Delzanno, Giorgio; Esparza, Javier; Srba, Jiri

    2006-01-01

    Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e. by adding an active intruder capable of storing all exchanged messages including full analysis and synthesis...

  10. Mechanical Verification of a Two-Way Sliding Window Protocol (Full version including proofs)

    NARCIS (Netherlands)

    Badban, Bahareh; Fokkink, Wan; Pol, van de Jaco

    2008-01-01

    We prove the correctness of a two-way sliding window protocol with piggybacking, where the acknowledgments of the latest received data are attached to the next data transmitted back into the channel. The window size of both parties are considered to be finite, though they can be of different sizes.

  11. Pragmatics annotated coloured petri nets for protocol software generation and verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge Fagerland; Kristensen, Lars M.; Kindler, Ekkart

    2016-01-01

    Pragmatics Annotated Coloured Petri Nets (PA-CPNs) are a restricted class of Coloured Petri Nets (CPNs) developed to support automated generation of protocol software. The practical application of PA-CPNs and the supporting PetriCode software tool have been discussed and evaluated in earlier papers...

  12. An approach to verification and validation of a reliable multicasting protocol: Extended Abstract

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. This initial version did not handle off-nominal cases such as network partitions or site failures. Meanwhile, the V&V team concurrently developed a formal model of the requirements using a variant of SCR-based state tables. Based on these requirements tables, the V&V team developed test cases to exercise the implementation. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test in the model and implementation agreed, then the test either found a potential problem or verified a required behavior. However, if the execution of a test was different in the model and implementation, then the differences helped identify inconsistencies between the model and implementation. In either case, the dialogue between both teams drove the co-evolution of the model and implementation. We have found that this

  13. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    This paper presents the formal definition of Pragmatics Annotated Coloured Petri Nets (PA-CPNs). PA-CPNs represent a class of Coloured Petri Nets (CPNs) that are designed to support automated code genera-tion of protocol software. PA-CPNs restrict the structure of CPN models and allow Petri net...... elements to be annotated with so-called pragmatics, which are exploited for code generation. The approach and tool for gen-erating code is called PetriCode and has been discussed and evaluated in earlier work already. The contribution of this paper is to give a formal def-inition for PA-CPNs; in addition...

  14. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  15. VZLUSAT-1: verification of new materials and technologies for space

    Science.gov (United States)

    Daniel, Vladimir; Urban, Martin; Nentvich, Ondrej; Stehlikova, Veronika

    2016-09-01

    CubeSats are a good opportunity to test new technologies and materials on orbit. These innovations can be later used for improving of properties and life length of Cubesat or other satellites as well. VZLUSAT-1 is a small satellite from the CubeSat family, which will carry a wide scale of payloads with different purposes. The poster is focused on measuring of degradation and properties measurement of new radiation hardened composite material in orbit due to space environment. Material properties changes can be studied by many methods and in many disciplines. One payload measures mechanical changes in dependence on Young's modulus of elasticity which is got from non-destructive testing by mechanical vibrations. The natural frequencies we get using Fast Fourier Transform. The material is tested also by several thermometers which measure heat distribution through the composite, as well as reflectivity in dependence on different coatings. The satellite also will measure the material radiation shielding properties. There are PIN diodes which measure the relative shielding efficiency of composite and how it will change in time in space environment. Last one of material space testing is measurement of outgassing from tested composite material. It could be very dangerous for other parts of satellite, like detectors, when anything was outgassing, for example water steam. There are several humidity sensors which are sensitive to steam and other gases and measures temperatures as well.

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROTOCOL: BIOREACTION SYSTEM CONTROL TECHNOLOGIES FOR VOLATILE ORGANIC COMPOUND EMISSIONS

    Science.gov (United States)

    This report is a generic test plan for bioreaction systems that use biological tools to act as contaminant sorbers and biodegraders. These are usually biofilters and bioreactors which are packed bed reactors using peat, soil, etc., biotrickling filters which handle liquid phase ...

  17. Environmental Technology Verification: Test Report of Mobile Source Selective Catalytic Reduction--Nett Technologies, Inc., BlueMAX 100 version A urea-based selective catalytic reduction technology

    Science.gov (United States)

    Nett Technologies’ BlueMAX 100 version A Urea-Based SCR System utilizes a zeolite catalyst coating on a cordierite honeycomb substrate for heavy-duty diesel nonroad engines for use with commercial ultra-low–sulfur diesel fuel. This environmental technology verification (ETV) repo...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: RESIDENTIAL ELECTRIC POWER GENERATION USING THE PLUG POWER SU1 FUEL CELL SYSTEM

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Plug Power SU1 Fuel Cell System manufactured by Plug Power. The SU1 is a proton exchange membrane fuel cell that requires hydrogen (H2) as fuel. H2 is generally not available, so the ...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, COLUMBUS INDUSTRIES SL-3 RING PANEL

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the High Efficiency Mini Pleat air filter for dust and bioaerosol filtration manufactured by Columbus Industries. The pressure drop across the filter was 142 Pa clean and 283 Pa dust load...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT-INGERSOLL-RAND ENERGY SYSTEMS IR POWERWORKS(TM) 70 KW MICROTURBINE SYSTEM

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the IR PowerWorks 70kW Microturbine System manufactured by Ingersoll-Rand Energy Systems. This system is a 70 kW electrical generator that puts out 480 v AC at 60 Hz and that is driven by...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--CAPSTONE 30KW MICROTURBINE SYSTEM

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system was evaluated based on the Capstone 30kW Microturbine developed by Cain Ind...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, C. LEE COOK DIVISION, DOVER CORPORATION, STATIC PAC (TM) SYSTEM, PHASE II REPORT

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Static Pac System, Phase II, natural gas reciprocating compressor rod packing manufactured by the C. Lee Cook Division, Dover Corporation. The Static Pac System is designed to seal th...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT-A AND A ENVIRONMENTAL SEALS, INC., SEAL ASSIST SYSTEM (SAS) PHASE II REPORT

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Seal Assist System (SAS) for natural gas reciprocating compressor rod packing manufactured by A&A Environmental Seals, Inc. The SAS uses a secondary containment gland to collect natural g...

  6. 多路径域间路由决策检测协议%Multipath interdomain routing decision verification protocol

    Institute of Scientific and Technical Information of China (English)

    邱修峰; 刘建伟; 伍前红; 刘建华

    2013-01-01

    由于不同域之间的利益和安全策略存在复杂的竞争与冲突,域间路由安全问题一直具有挑战性。当前相关研究主要集中于路由源可信性与路径信息可信性等方向,但对域间路由策略实施可信性则较少关注。设计了一种多路径域间路由决策检测协议,可验证一个自治域是否遵守从N条目的地相同的候选路径中选择合适的M条路径发送往下游自治域的路由选择决策承诺。分析表明协议正确有效,同时可以抵抗伪造、篡改和重放等攻击,且具有增量部署和尊重参与者隐私的特性。%Because of complicated security policy collisions and twisted interest conflicts between different network do-mains, interdomain routing security has been one challenge of secure routing.At present most of related researches fo-cus on the authentication of routing source and true path, but seldom address another point of whether the routing deci-sion process matches expected policy.A multipath interdomain routing decision verification protocol was designed, which can check whether an AS keeps its promise about choosing appropriate M from N paths that have the same desti-nation and are received from upstream ASs, and sending to a downstream AS.According to the analysis, the protocol is valid and respects the privacy of participants, as well as can resist attacks such as forgery, tampering and replay etc. and deploy on internet incrementally.

  7. Two years experience with quality assurance protocol for patient related Rapid Arc treatment plan verification using a two dimensional ionization chamber array

    Directory of Open Access Journals (Sweden)

    Vorwerk Hilke

    2011-02-01

    Full Text Available Abstract Purpose To verify the dose distribution and number of monitor units (MU for dynamic treatment techniques like volumetric modulated single arc radiation therapy - Rapid Arc - each patient treatment plan has to be verified prior to the first treatment. The purpose of this study was to develop a patient related treatment plan verification protocol using a two dimensional ionization chamber array (MatriXX, IBA, Schwarzenbruck, Germany. Method Measurements were done to determine the dependence between response of 2D ionization chamber array, beam direction, and field size. Also the reproducibility of the measurements was checked. For the patient related verifications the original patient Rapid Arc treatment plan was projected on CT dataset of the MatriXX and the dose distribution was calculated. After irradiation of the Rapid Arc verification plans measured and calculated 2D dose distributions were compared using the gamma evaluation method implemented in the measuring software OmniPro (version 1.5, IBA, Schwarzenbruck, Germany. Results The dependence between response of 2D ionization chamber array, field size and beam direction has shown a passing rate of 99% for field sizes between 7 cm × 7 cm and 24 cm × 24 cm for measurements of single arc. For smaller and larger field sizes than 7 cm × 7 cm and 24 cm × 24 cm the passing rate was less than 99%. The reproducibility was within a passing rate of 99% and 100%. The accuracy of the whole process including the uncertainty of the measuring system, treatment planning system, linear accelerator and isocentric laser system in the treatment room was acceptable for treatment plan verification using gamma criteria of 3% and 3 mm, 2D global gamma index. Conclusion It was possible to verify the 2D dose distribution and MU of Rapid Arc treatment plans using the MatriXX. The use of the MatriXX for Rapid Arc treatment plan verification in clinical routine is reasonable. The passing rate should be 99

  8. Sandia technology. Volume 13, number 2 Special issue : verification of arms control treaties.

    Energy Technology Data Exchange (ETDEWEB)

    1989-03-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, BWF AMERICA, INC., GRADE 700 MPS POLYESTER FELT FILTER SAMPLE

    Science.gov (United States)

    EPA's National Risk Management Research Laboratory, through its Environmental Technology Verification Program, evaluated the performance of a bag house filtration product for use controlling PM2.5. The product was BWF America, Inc., filter fabric Grade 700 Polyester Felt. All tes...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, BWF AMERICA, INC., GRADE 700 MPS POLYESTER FELT FILTER SAMPLE

    Science.gov (United States)

    EPA's National Risk Management Research Laboratory, through its Environmental Technology Verification Program, evaluated the performance of a bag house filtration product for use controlling PM2.5. The product was BWF America, Inc., filter fabric Grade 700 Polyester Felt. All tes...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, W.L. GORE & ASSOCIATES, INC. LYSB3 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size for particles equal to or smaller than...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, W.L. GORE & ASSOCIATES, INC., L4427 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  13. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP). High Transfer Efficiency Spray Equipment - Generic Verification Protocol (Revision 0)

    Science.gov (United States)

    2006-09-30

    private sector . A long-range goal of this initiative is to become a vital resource to the industry and, thus, self-sustaining through private support...High-Pressure Waterjet • CO2 Pellet/Turbine Wheel • Ultrahigh-Pressure Waterjet 5 Process Water Reuse/Recycle • Cross-Flow Microfiltration ...Diffusion Dialysis • Electrowinning • Ion Exchange • Membrane Electrolysis • Reverse Osmosis • Vacuum Evaporation 2 • Laser Figure 2. Demonstration

  14. Architecture and critical technologies of seismic information system in CTBT verification

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xue-feng; SHEN Jun-yi; JIN Ping; ZHENG Jiang-ling; SUN Peng; ZHANG Hui-min; WANG Tong-dong

    2006-01-01

    Seismic monitoring is one of the most important approaches for ground-based nuclear explosion monitoring. In order to improve the monitoring capability for low magnitude seismic events, a seismic information system was developed by using the technologies of geographic information system and database. This paper describes the designing and critical technologies of the Seismic Information System in CTBT Verification developed based on ArcGIS and ORACLE platforms. It is a combination of the database storage framework, application programming interface and graphic application software for users to meet their monitoring objectives. Combining the ArcSDE Geodatabase, RDBMS ORACLE and ArcObjects developing technique on COM, not only the multi-sources data has been seamlessly integrated, but also the most functions of ORACLE, for example, consistency, concurrent access, security mechanism, etc, have been reserved. For easy access to the information system we develop two different mechanisms. The first is a menu-driven internal system that is run on NT platforms. The second access mechanism is based on LAN and easily accessible by any web browsers.

  15. Students' Use of Technological Tools for Verification Purposes in Geometry Problem Solving

    Science.gov (United States)

    Papadopoulos, Ioannis; Dagdilelis, Vassilios

    2008-01-01

    Despite its importance in mathematical problem solving, verification receives rather little attention by the students in classrooms, especially at the primary school level. Under the hypotheses that (a) non-standard tasks create a feeling of uncertainty that stimulates the students to proceed to verification processes and (b) computational…

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT; ULTRASONIC AQUEOUS CLEANING SYSTEMS, SMART SONIC CORPORATION, SMART SONIC

    Science.gov (United States)

    This report is a product of the U.S. EPA's Environmental Technoloy Verification (ETV) Program and is focused on the Smart Sonics Ultrasonic Aqueous Cleaning Systems. The verification is based on three main objectives. (1) The Smart Sonic Aqueous Cleaning Systems, Model 2000 and...

  17. A Method and Its Practice for Teaching the Fundamental Technology of Communication Protocols and Coding

    Science.gov (United States)

    Kobayashi, Tetsuji

    The education of information and communication technologies is important for engineering, and it includes terminals, communication media, transmission, switching, software, communication protocols, coding, etc. The proposed teaching method for protocols is based on the HDLC (High-level Data Link Control) procedures using our newly developed software “HDLC trainer” , and includes the extensions for understanding other protocols such as TCP/IP. As for teaching the coding theory that is applied for the error control in protocols, we use both of a mathematical programming language and a general-purpose programming language. We have practiced and evaluated the proposed teaching method in our college, and it is shown that the method has remarkable effects for understanding the fundamental technology of protocols and coding.

  18. Development of Out-pile Test Technology for Fuel Assembly Performance Verification

    Energy Technology Data Exchange (ETDEWEB)

    Chun, Tae Hyun; In, W. K.; Oh, D. S. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)] (and others)

    2007-03-15

    Out-pile tests with full scale fuel assembly are to verify the design and to evaluate the performance of the final products. HTL for the hydraulic tests and FAMeCT for mechanical/structural tests were constructed in this project. The maximum operating conditions of HTL are 30 bar, 320 .deg. C, and 500 m3/hr. This facility can perform the pressure drop test, fuel assembly uplift test, and flow induced vibration test. FAMeCT can perform the bending and vibration tests. The verification of the developed facilities were carried out by comparing the reference data of the fuel assembly which was obtained at the Westinghouse Co. The compared data showed a good coincidence within uncertainties. FRETONUS was developed for high temperature and high pressure fretting wear simulator and performance test. A performance test was conducted for 500 hours to check the integrity, endurance, data acquisition capability of the simulator. The technology of turbulent flow analysis and finite element analysis by computation was developed. From the establishments of out-pile test facilities for full scale fuel assembly, the domestic infrastructure for PWR fuel development has been greatly upgraded.

  19. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  20. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author).

  1. The sentence verification task: a reliable fMRI protocol for mapping receptive language in individual subjects

    Energy Technology Data Exchange (ETDEWEB)

    Sanjuan, Ana; Avila, Cesar [Universitat Jaume I, Departamento de Psicologia Basica, Clinica y Psicobiologia, Castellon de la Plana (Spain); Hospital La Fe, Unidad de Epilepsia, Servicio de Neurologia, Valencia (Spain); Forn, Cristina; Ventura-Campos, Noelia; Rodriguez-Pujadas, Aina; Garcia-Porcar, Maria [Universitat Jaume I, Departamento de Psicologia Basica, Clinica y Psicobiologia, Castellon de la Plana (Spain); Belloch, Vicente [Hospital La Fe, Eresa, Servicio de Radiologia, Valencia (Spain); Villanueva, Vicente [Hospital La Fe, Unidad de Epilepsia, Servicio de Neurologia, Valencia (Spain)

    2010-10-15

    To test the capacity of a sentence verification (SV) task to reliably activate receptive language areas. Presurgical evaluation of language is useful in predicting postsurgical deficits in patients who are candidates for neurosurgery. Productive language tasks have been successfully elaborated, but more conflicting results have been found in receptive language mapping. Twenty-two right-handed healthy controls made true-false semantic judgements of brief sentences presented auditorily. Group maps showed reliable functional activations in the frontal and temporoparietal language areas. At the individual level, the SV task showed activation located in receptive language areas in 100% of the participants with strong left-sided distributions (mean lateralisation index of 69.27). The SV task can be considered a useful tool in evaluating receptive language function in individual subjects. This study is a first step towards designing the fMRI task which may serve to presurgically map receptive language functions. (orig.)

  2. SU-E-T-67: A Quality Assurance Procedure for VMAT Delivery Technique with Multiple Verification Metric Using TG-119 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Katsuta, Y; Kadoya, N; Shimizu, E; Matsunaga, K; Inoue, M; Majima, K; Jingu, K [Tohoku University School of Medicine, Sendai, Miyagi (Japan)

    2015-06-15

    Purpose: A successful VMAT plan delivery includes precise modulations of dose rate, gantry rotational and multi-leaf collimator shapes. The purpose of this research is to construct routine QA protocol which focuses on VMAT delivery technique and to obtain a baseline including dose error, fluence distribution and mechanical accuracy during VMAT. Methods: The mock prostate, head and neck (HN) cases supplied from AAPM were used in this study. A VMAT plans were generated in Monaco TPS according to TG-119 protocol. Plans were created using 6 MV and 10 MV photon beams for each case. The phantom based measurement, fluence measurement and log files analysis were performed. The dose measurement was performed using 0.6 cc ion chamber, which located at isocenter. The fluence distribution were acquired using the MapCHECK2 mounted in the MapPHAN. The trajectory log files recorded inner 20 leaf pairs and gantry angle positions at every 0.25 sec interval were exported to in-house software developed by MATLAB and determined those RMS values. Results: The dose difference is expressed as a ratio of the difference between measured and planned doses. The dose difference for 6 MV was 0.91%, for 10 MV was 0.67%. In turn, the fluence distribution using gamma criteria of 2%/2 mm with a 50% minimum dose threshold for 6 MV was 98.8%, for 10 MV was 97.5%, respectively. The RMS values of MLC for 6 MV and 10 MV were 0.32 mm and 0.37 mm, of gantry were 0.33 degree and 0.31 degree. Conclusion: In this study, QA protocol to assess VMAT delivery accuracy is constructed and results acquired in this study are used as a baseline of VMAT delivery performance verification.

  3. Protocol for Evaluation of Robotic Technology in Orthopedic Surgery

    Directory of Open Access Journals (Sweden)

    Milad Masjedi

    2013-01-01

    Full Text Available In recent years, robots have become commonplace in surgical procedures due to their high accuracy and repeatability. The Acrobot Sculptor is an example of such a robot that can assist with unicompartmental knee replacement. In this study, we aim to evaluate the accuracy of the robot (software and hardware in a clinical setting. We looked at (1 segmentation by comparing the segmented data from Sculptor software to other commercial software, (2 registration by checking the inter- and intraobserver repeatability of selecting set points, and finally (3 sculpting (n=9 cases by evaluating the achieved implant position and orientation relative to that planned. The results from segmentation and registration were found to be accurate. The highest error was observed in flexion extension orientation of femoral implant (0.4±3.7°. Mean compound rotational and translational errors for both components were 2.1±0.6 mm and 3±0.8° for tibia and 2.4±1.2 mm and 4.3±1.4° for the femur. The results from all processes used in Acrobot were small. Validation of robot in clinical settings is highly vital to ensure a good outcome for patients. It is therefore recommended to follow the protocol used here on other available similar products.

  4. Disaster management mobile protocols: a technology that will save lives.

    Science.gov (United States)

    Williamson, Hope M

    2011-01-01

    Although training and education have long been accepted as integral to disaster preparedness, many currently taught practices are neither evidence based nor standardized. The need for effective evidence-based disaster education for healthcare workers at all levels in the multidisciplinary medical response to major events has been designated by the disaster response community as a high priority. This article describes a disaster management mobile application of systematic evidence-based practice. The application is interactive and comprises portable principles, algorithms, and emergency protocols that are agile, concise, comprehensive, and response relevant to all healthcare workers. Early recognition through clinical assessment versus laboratory and diagnostic procedures in chemical, biological, radiological, and nuclear (CBRNE) exposures grounded in an evidence-based skill set is especially important. During the immediate threat, the clinical diagnosis can get frustrating because CBRNE casualties can mimic everyday healthcare illnesses and initially present with nonspecific respiratory or flu-like symptoms. As there is minimal time in a catastrophic event for the medical provider to make accurate decisions, access to accurate, timely, and comprehensive information in these situations is critical. The CBRNE mobile application is intended to provide a credible source for treatment and management of numerous patients in an often intimidating environment with scarce resources and overwhelming tasks.

  5. The Mobile Commerce technologies: Generations, Standards and Protocols

    OpenAIRE

    Tiwari, Rajnish; Buse, Stephan; Herstatt, Cornelius

    2006-01-01

    Mobile Commerce has staged a remarkable come-back. Driven by the technological innovations in the field of telecommunications, it is showing signs of a healthy recovery. The collapse of the dot-com boom in 2001/2002 had dealt a severe blow not only to Electronic Commerce but also to Mobile Commerce, which was just about developing at that time. In addition to a general lack of customer demand for mobile, location-based, services, it suffered heavily under the technical deficiencies of end-dev...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DEVILBISS JGHV-531-46FF HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss JGHV-531-46FF high-volume, low-pressure pressure-feed spray gun, hereafter referred to as the DeVilbiss JGHV, which is designed for use in industrial finishing. The test coating chosen by ITW Industrial Fi...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: STORMWATER MANAGEMENT STORMFILTER® TREATMENT SYSTEM USING PERLITE MEDIA

    Science.gov (United States)

    Verification testing of the Stormwater Management, Inc. StormFilter® Using Perlite Filter Media was conducted on a 0.7 acre drainage basin near downtown Griffin, Georgia. The system consists of an inlet bay, flow spreader, cartridge bay, overflow baffle, and outlet bay, housed in...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HVLP COATING EQUIPMENT, SHARPE MANUFACTURING COMPANY PLATINUM 2012 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the Sharpe Platinum 2013 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the Sharpe Platinum, which is designed for use in automotive refinishing. The test coating chosen by Sharpe Manufacturi...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DEVILBISS JGHV-531-46FF HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss JGHV-531-46FF high-volume, low-pressure pressure-feed spray gun, hereafter referred to as the DeVilbiss JGHV, which is designed for use in industrial finishing. The test coating chosen by ITW Industrial Fi...

  10. A Verification and Analysis of the USAF/DoD Fatigue Model and Fatigue Management Technology

    Science.gov (United States)

    2005-11-01

    We Nap: Evolution, Chronobiology, and Functions of Polyphasic and Ultrashort Sleep . Stampi, C. (ed) Birkhduser, Boston. Defense Acquisition...Windows® soffivare application of the Sleep , Activity, Fatigue, and Task Effectiveness (SAFTE) applied model. The application, the Fatigue Avoidance...Scheduling Tool (FASTTM) was re-engineered as a clone from the SAFTE specification. The verification considered nine sleep /wake schedules that were

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HVLP COATING EQUIPMENT, SHARPE MANUFACTURING COMPANY PLATINUM 2012 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the Sharpe Platinum 2013 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the Sharpe Platinum, which is designed for use in automotive refinishing. The test coating chosen by Sharpe Manufacturi...

  12. The FPGA Prototyping Verification of ASIC Based on TotalRecall Technology%基于TotalRecall技术ASIC的FPGA原型验证

    Institute of Scientific and Technical Information of China (English)

    郭安华; 黄世震

    2012-01-01

    Verification is a very important part in IG design. With the rapid development of FPGA, the FPGA prototype verification has been used widely in the ASIC. FPGA prototyping verification is an effective verification way of ASIC, but the visibility of traditional FPGA prototyping verification is poor. In order to solve the visibility problem of traditional FPGA prototyping verification, verification engineer uses a combination of TotalRecall technology FPGA prototyping verification method to verify a mouse chip. The result shows this method provides complete visibility and ensures FPGA prototyping verification at the real speed. This method has innovated ASIC verification methodology.%芯片设计中一个非常重要的环节是验证.随着FPGA技术的迅速发展使基于FPGA的原型验证被广泛的用于ASIC的开发过程,FPGA原型验证是ASIC有效的验证途径,但传统FPGA原型验证的可视性非常差.为了解决传统FPGA原型验证可视性的问题,验证工程师采用了结合TotalRecall技术的FPGA原型验证方法对一款鼠标芯片进行验证.获得该方法不仅能提供100%的可视性,还确保FPGA原型验证以实时硬件速度运行.该方法创新了ASIC的验证方法学.

  13. Security technologies and protocols for Asynchronous Transfer Mode networks

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.

    1996-06-01

    Asynchronous Transfer Mode (ATM) is a new data communications technology that promises to integrate voice, video, and data traffic into a common network infrastructure. In order to fully utilize ATM`s ability to transfer real-time data at high rates, applications will start to access the ATM layer directly. As a result of this trend, security mechanisms at the ATM layer will be required. A number of research programs are currently in progress which seek to better understand the unique issues associated with ATM security. This paper describes some of these issues, and the approaches taken by various organizations in the design of ATM layer security mechanisms. Efforts within the ATM Forum to address the user communities need for ATM security are also described.

  14. Comments for A Conference on Verification in the 21st Century

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  15. The monitoring, evaluation, reporting, and verification of climate change mitigation projects: Discussion of issues and methodologies and review of existing protocols and guidelines

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.; Sathaye, J.

    1997-12-01

    Because of concerns with the growing threat of global climate change from increasing emissions of greenhouse gases, the US and other countries are implementing, by themselves or in cooperation with one or more other nations (i.e., joint implementation), climate change mitigation projects. These projects will reduce greenhouse gas (GHG) emissions or sequester carbon, and will also result in non-GHG impacts (i.e., environmental, economic, and social impacts). Monitoring, evaluating, reporting, and verifying (MERV) guidelines are needed for these projects in order to accurately determine their net GHG, and other, benefits. Implementation of MERV guidelines is also intended to: (1) increase the reliability of data for estimating GHG benefits; (2) provide real-time data so that mid-course corrections can be made; (3) introduce consistency and transparency across project types and reporters; and (4) enhance the credibility of the projects with stakeholders. In this paper, the authors review the issues and methodologies involved in MERV activities. In addition, they review protocols and guidelines that have been developed for MERV of GHG emissions in the energy and non-energy sectors by governments, nongovernmental organizations, and international agencies. They comment on their relevance and completeness, and identify several topics that future protocols and guidelines need to address, such as (1) establishing a credible baseline; (2) accounting for impacts outside project boundaries through leakage; (3) net GHG reductions and other impacts; (4) precision of measurement; (5) MERV frequency; (6) persistence (sustainability) of savings, emissions reduction, and carbon sequestration; (7) reporting by multiple project participants; (8) verification of GHG reduction credits; (9) uncertainty and risk; (10) institutional capacity in conducting MERV; and (11) the cost of MERV.

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST REPORT OF CONTROL OF BIOAEROSOLS IN HLVAC SYSTEMS: AEOLUS CORPORATION SYNTHETIC MINIPLEAT V-CELL, SMV-M13-2424

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Synthetic Minipleat V-Cell, SMV-M13-2424 air filter for dust and bioaerosol filtration manufactured by Aeolus Corporation. The pressure drop across the filter was 77 Pa clean and 348 ...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS: TRI-DIM FILTER CORP. PREDATOR II MODEL 8VADTP123C23

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Predator II, Model 8VADTP123C23CC000 air filter for dust and bioaerosol filtration manufactured by Tri-Dim Filter Corporation. The pressure drop across the filter was 138 Pa clean and...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, FILTRATION GROUP, AEROSTAR FP-98 MINIPLEAT V-BLANK FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the AeroStar FP-98 Minipleat V-Bank Filter air filter for dust and bioaerosol filtration manufactured by Filtration Group. The pressure drop across the filter was 137 Pa clean and 348 Pa ...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS: AEOLUS CORPORATION SYNTHETIC MINIPLEAT V-CELL, SMV-M14-2424

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Synthetic Minipleat V-Cell, SMV-M14-2424 air filter for dust and bioaerosol filtration manufactured by Aeolus Corporation. The pressure drop across the filter was 104 Pa clean and 348...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS:AAF INTERNATIONAL, PERFECTPLEAT ULTRA, 175-102-863

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the PerfectPleat Ultra 175-102-863 air filter for dust and bioaerosol filtration manufactured by AAF International. The pressure drop across the filter was 112 Pa clean and 229 Pa dust lo...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, FILTRATION GROUP, AEROSTAR "C-SERIES" POLYESTER PANEL FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the AeroStar "C-Series" Polyester Panel Filter air filter for dust and bioaerosol filtration manufactured by Filtration Group. The pressure drop across the filter was 126 Pa clean and 267...

  2. Independent Validation and Verification of Process Design and Optimization Technology Diagnostic and Control of Natural Gas Fired Furnaces via Flame Image Analysis Technology

    Energy Technology Data Exchange (ETDEWEB)

    Cox, Daryl [ORNL

    2009-05-01

    The United States Department of Energy, Industrial Technologies Program has invested in emerging Process Design and Optimizations Technologies (PDOT) to encourage the development of new initiatives that might result in energy savings in industrial processes. Gas fired furnaces present a harsh environment, often making accurate determination of correct air/fuel ratios a challenge. Operation with the correct air/fuel ratio and especially with balanced burners in multi-burner combustion equipment can result in improved system efficiency, yielding lower operating costs and reduced emissions. Flame Image Analysis offers a way to improve individual burner performance by identifying and correcting fuel-rich burners. The anticipated benefit of this technology is improved furnace thermal efficiency, and lower NOx emissions. Independent validation and verification (V&V) testing of the FIA technology was performed at Missouri Forge, Inc., in Doniphan, Missouri by Environ International Corporation (V&V contractor) and Enterprise Energy and Research (EE&R), the developer of the technology. The test site was selected by the technology developer and accepted by Environ after a meeting held at Missouri Forge. As stated in the solicitation for the V&V contractor, 'The objective of this activity is to provide independent verification and validation of the performance of this new technology when demonstrated in industrial applications. A primary goal for the V&V process will be to independently evaluate if this technology, when demonstrated in an industrial application, can be utilized to save a significant amount of the operating energy cost. The Seller will also independently evaluate the other benefits of the demonstrated technology that were previously identified by the developer, including those related to product quality, productivity, environmental impact, etc'. A test plan was provided by the technology developer and is included as an appendix to the summary report

  3. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  4. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT; UV DISINFECTION FOR REUSE APPLICATION, AQUIONICS, INC. BERSONINLINE 4250 UV SYSTEM

    Science.gov (United States)

    Verification testing of the Aquionics, Inc. bersonInLine® 4250 UV System to develop the UV delivered dose flow relationship was conducted at the Parsippany-Troy Hills Wastewater Treatment Plant test site in Parsippany, New Jersey. Two full-scale reactors were mounted in series. T...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: UV DISINFECTION FOR REUSE APPLICATIONS, ONDEO DEGREMONT, INC., AQUARAY® 40 HO VLS DISINFECTION SYSTEM

    Science.gov (United States)

    Verification testing of the Ondeo Degremont, Inc. Aquaray® 40 HO VLS Disinfection System to develop the UV delivered dose flow relationship was conducted at the Parsippany-Troy Hills wastewater treatment plant test site in Parsippany, New Jersey. Three reactor modules were m...

  7. 浅析电子商务支付协议认证性的SVO逻辑验证%SVO logic verification of authentication of electronic commerce payment protocol

    Institute of Scientific and Technical Information of China (English)

    刘丽峰

    2015-01-01

    当前,高效、安全的支付方式已成为移动电子商务发展的首要问题.但目前移动电子商务研究中对移动支付协议的设计尚不健全,如何对移动支付协议认证备受关注.本文浅析电死商务协议认证中SVO逻辑验证的应用.%At present,efficient and secure payment has become the primary problem of the development of mobile electronic commerce.But at present,the design of mobile payment protocol is not perfect,how to pay attention to the mobile payment protocol authentication. Application of SVO logic verification in the authentication of electronic commerce protocol.

  8. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D. [and others

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs.

  9. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  10. Voltage verification unit

    Science.gov (United States)

    Martin, Edward J.

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  11. Technology transfer metrics: Measurement and verification of data/reusable launch vehicle business analysis

    Science.gov (United States)

    Trivoli, George W.

    1996-01-01

    Congress and the Executive Branch have mandated that all branches of the Federal Government exert a concentrated effort to transfer appropriate government and government contractor-developed technology to the industrial use in the U.S. economy. For many years, NASA has had a formal technology transfer program to transmit information about new technologies developed for space applications into the industrial or commercial sector. Marshall Space Flight Center (MSFC) has been in the forefront of the development of U.S. industrial assistance programs using technologies developed at the Center. During 1992-93, MSFC initiated a technology transfer metrics study. The MSFC study was the first of its kind among the various NASA centers. The metrics study is a continuing process, with periodic updates that reflect on-going technology transfer activities.

  12. Remote Sensing and the Kyoto Protocol: A Review of Available and Future Technology for Monitoring Treaty Compliance

    Science.gov (United States)

    Imhoff, Marc L.; Rosenquist, A.; Milne, A. K.; Dobson, M. C.; Qi, J.

    2000-01-01

    An International workshop was held to address how remote sensing technology could be used to support the environmental monitoring requirements of the Kyoto Protocol. An overview of the issues addressed and the findings of the workshop are discussed.

  13. Mechanical Verification of Cryptographic Protocols

    Science.gov (United States)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  14. Network Stack Analyzing and Protocol Add Technology in Linux%Linux网络协议栈分析及协议添加的实现

    Institute of Scientific and Technical Information of China (English)

    唐续; 刘心松; 杨峰

    2003-01-01

    In order to improve the performance of Linux network,new protocols should be implemented and added in original protocol stack. For this demand,this paper has analyzed Linux network stack architecture and implement technology,then presented a method that appended new protocols in the network stack of Linux. The processes of protocol register ,protocol operation,protocol header implement,packets receiving, user interface are involved in this method.

  15. Design Considerations and Experimental Verification of a Rail Brake Armature Based on Linear Induction Motor Technology

    Science.gov (United States)

    Sakamoto, Yasuaki; Kashiwagi, Takayuki; Hasegawa, Hitoshi; Sasakawa, Takashi; Fujii, Nobuo

    This paper describes the design considerations and experimental verification of an LIM rail brake armature. In order to generate power and maximize the braking force density despite the limited area between the armature and the rail and the limited space available for installation, we studied a design method that is suitable for designing an LIM rail brake armature; we considered adoption of a ring winding structure. To examine the validity of the proposed design method, we developed a prototype ring winding armature for the rail brakes and examined its electromagnetic characteristics in a dynamic test system with roller rigs. By repeating various tests, we confirmed that unnecessary magnetic field components, which were expected to be present under high speed running condition or when a ring winding armature was used, were not present. Further, the necessary magnetic field component and braking force attained the desired values. These studies have helped us to develop a basic design method that is suitable for designing the LIM rail brake armatures.

  16. The experimental verification of the condition of the magnetic material caused by different technological processes

    CERN Document Server

    Tumanski, S

    2000-01-01

    The changes of electrical steel parameters caused by different technological processes have been tested using the magnetovision method. The effects of cutting into the strips, stamping the shape, laser scribing, annealing, bending and stressing have been investigated.

  17. Research on Digital Output Verification Technology of Electronic DC Current Transformer

    Science.gov (United States)

    Chen, Yuanjie; Wang, Bin; Hu, Haoliang; Xiong, Qianzhu; Yang, Chunyan

    2017-05-01

    Aiming at the error of calibration system when conducting field calibration by electronic DC current transformer’s digital calibration system, an electronic DC current transformer’s digital calibration system based on protocol conversion is proposed and researched. Data frames outputted from merging unit are collected and converted by the system, the digital synchronization is realized by using the synchronous clock device to trigger the second pulse, and it is verified by the virtual instrument design software. The field calibration is conducted to some converter station digital dc current transformer under the rated current of 500A by using the calibration system. By calibrating and analyzing errors, the error is less than 0.075% when tested current is more than 40% of the rated current. According the standard in literature[1], performance of the calibration system is perfect, measured results perfectly meet the requirements of design, and the calibration system has great practical application value.

  18. Optics Design for the U.S. SKA Technology Development Project Design Verification Antenna

    Science.gov (United States)

    Imbriale, W. A.; Baker, L.; Cortes-Medellin, G.

    2012-01-01

    The U.S. design concept for the Square Kilometer Array (SKA) program is based on utilizing a large number of 15 meter dish antennas. The Technology Development Project (TDP) is planning to design and build the first of these antennas to provide a demonstration of the technology and a solid base on which to estimate costs. This paper describes the performance of the selected optics design. It is a dual-shaped offset Gregorian design with a feed indexer that can accommodate corrugated horns, wide band single pixel feeds or phased array feeds.

  19. Optics Design for the U.S. SKA Technology Development Project Design Verification Antenna

    Science.gov (United States)

    Imbriale, W. A.; Baker, L.; Cortes-Medellin, G.

    2012-01-01

    The U.S. design concept for the Square Kilometer Array (SKA) program is based on utilizing a large number of 15 meter dish antennas. The Technology Development Project (TDP) is planning to design and build the first of these antennas to provide a demonstration of the technology and a solid base on which to estimate costs. This paper describes the performance of the selected optics design. It is a dual-shaped offset Gregorian design with a feed indexer that can accommodate corrugated horns, wide band single pixel feeds or phased array feeds.

  20. Environmental Technology Verification; Baghouse Filtration Products TTG Inc., TG100 Filtration Media (Tested August 2012)

    Science.gov (United States)

    Baghouses are air pollution control devices used to control particulate emissions from stationary sources and are among the technologies evaluated by the APCT Center. Baghouses and their accompanying filter media have long been one of the leading particulate control techniques fo...

  1. Environmental Technology Verification, Baghouse Filtration Products TTG Inc., TG800 Filtration Media (Tested August 2012)

    Science.gov (United States)

    Baghouses are air pollution control devices used to control particulate emissions from stationary sources and are among the technologies evaluated by the APCT Center. Baghouses and their accompanying filter media have long been one of the leading particulate control techniques fo...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, FRANCE COMPRESSOR PRODUCTS EMISSIONS PACKING, PHASE I REPORT

    Science.gov (United States)

    The report presents results of a Phase I test of emissions packing technology offered by France Compressor Products which is designed to reduce methane leaks from compressor rod packing when a compressor is in a standby and pressurized state. This Phase I test was executed betwee...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: COMM ENGINEERING, USA ENVIRONMENTAL VAPOR RECOVERY UNIT (EVRU)

    Science.gov (United States)

    This report documents the testing of a new technology that recovers and utilizes vapors from crude oil storage tanks employed in the oil production and processing industry. The COMM Engineering, USA Environmental Vapor Recovery Unit (EVRU) is a non-mechanical eductor, or jet pump...

  4. AFDX网络协议及关键技术的研究%Research on AFDX Network Protocol and Key Technology

    Institute of Scientific and Technical Information of China (English)

    李哲; 田泽; 张荣华; 杨峰

    2016-01-01

    机载通信网络技术是实现航空电子系统间大容量的高速数据交换的枢纽和核心,其性能和功能决定航空电子系统综合化程度的高低,是现代先进飞机航空电子综合化的关键技术之一。源于商用以太网技术、在国际民机中广泛使用的AFDX网络技术,具有低成本、高带宽、低延迟、确定性、高可靠性等诸多优点。文中在论述现有总线网络技术的基础上,介绍了AFDX技术。重点叙述了AFDX网络体系结构,给出了AFDX网络工作机制和流程,重点分析研究了AFDX网络协议及关键技术,为AFDX网络协议处理芯片的设计、实现、验证及系统应用提供了理论基础。%Airborne communication network technology is the hinge and kernel to implement the high-speed,large-volume data exchan-ges among the avionics systems. The function and performance of the airborne data bus determines the avionics system integration level. Airborne data bus technology is one of the most significant technologies in the advanced avionics system integration of the modern air-plane. Rooted from the commercial Ethernet network technology,with the advantages of low-cost,high-bandwidth,low-lantency,high-reliability and so on,the AFDX networks technology has been widely used in the international civil airplanes. On the basis of the available bus network technology,AFDX technology is introduced. The architecture of AFDX network is discussed as a focal point,and working mechanism and working process of AFDX network is provided,and networking protocol and theoretical basis of AFDX is analyzed partic-ularly,which lays the foundation of theoretical basis for design,implementation,verification and system application of AFDX networking protocol processing chip.

  5. Aspects concerning verification methods and rigidity increment of complex technological systems

    Science.gov (United States)

    Casian, M.

    2016-11-01

    Any technological process and technology aims a quality and precise product, something almost impossible without high rigidity machine tools, equipment and components. Therefore, from the design phase, it is very important to create structures and machines with high stiffness characteristics. At the same time, increasing the stiffness should not raise the material costs. Searching this midpoint between high rigidity and minimum expenses leads to investigations and checks in structural components through various methods and techniques and sometimes quite advanced methods. In order to highlight some aspects concerning the significance of the mechanical equipment rigidity, the finite element method and an analytical method based on the use Mathcad software were used, by taking into consideration a subassembly of a grinding machine. Graphical representations were elaborated, offering a more complete image about the stresses and deformations able to affect the considered mechanical subassembly.

  6. System Verification Through Reliability, Availability, Maintainability (RAM) Analysis & Technology Readiness Levels (TRLs)

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel Ohene Opare, Jr.; Charles V. Park

    2011-06-01

    The Next Generation Nuclear Plant (NGNP) Project, managed by the Idaho National Laboratory (INL), is authored by the Energy Policy Act of 2005, to research, develop, design, construct, and operate a prototype fourth generation nuclear reactor to meet the needs of the 21st Century. A section in this document proposes that the NGNP will provide heat for process heat applications. As with all large projects developing and deploying new technologies, the NGNP is expected to meet high performance and availability targets relative to current state of the art systems and technology. One requirement for the NGNP is to provide heat for the generation of hydrogen for large scale productions and this process heat application is required to be at least 90% or more available relative to other technologies currently on the market. To reach this goal, a RAM Roadmap was developed highlighting the actions to be taken to ensure that various milestones in system development and maturation concurrently meet required availability requirements. Integral to the RAM Roadmap was the use of a RAM analytical/simulation tool which was used to estimate the availability of the system when deployed based on current design configuration and the maturation level of the system.

  7. INNOVATIVE TECHNOLOGY VERIFICATION REPORT "FIELD MEASUREMENT TECHNOLOGIES FOR TOTAL PETROLEUM HYDROCARBONS IN SOIL" HORIBA INSTRUMENTS INCORPORATED OCMA-350 CONTENT ANALYZER

    Science.gov (United States)

    The OCMA-350 Oil Content Analyzer(OCMA-350) developed by Horiba Instruments Incorporated (Horiba), was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Huen...

  8. Integration of multidisciplinary technologies for real time target visualization and verification for radiotherapy

    Directory of Open Access Journals (Sweden)

    Chang WC

    2014-06-01

    Full Text Available Wen-Chung Chang,1,* Chin-Sheng Chen,2,* Hung-Chi Tai,3 Chia-Yuan Liu,4,5 Yu-Jen Chen3 1Department of Electrical Engineering, National Taipei University of Technology, Taipei, Taiwan; 2Graduate Institute of Automation Technology, National Taipei University of Technology, Taipei, Taiwan; 3Department of Radiation Oncology, Mackay Memorial Hospital, Taipei, Taiwan; 4Department of Internal Medicine, Mackay Memorial Hospital, Taipei, Taiwan; 5Department of Medicine, Mackay Medical College, New Taipei City, Taiwan  *These authors contributed equally to this work Abstract: The current practice of radiotherapy examines target coverage solely from digitally reconstructed beam's eye view (BEV in a way that is indirectly accessible and that is not in real time. We aimed to visualize treatment targets in real time from each BEV. The image data of phantom or patients from ultrasound (US and computed tomography (CT scans were captured to perform image registration. We integrated US, CT, US/CT image registration, robotic manipulation of US, a radiation treatment planning system, and a linear accelerator to constitute an innovative target visualization system. The performance of this algorithm segmented the target organ in CT images, transformed and reconstructed US images to match each orientation, and generated image registration in real time mode with acceptable accuracy. This image transformation allowed physicians to visualize the CT image-reconstructed target via a US probe outside the BEV that was non-coplanar to the beam's plane. It allowed the physicians to remotely control the US probe that was equipped on a robotic arm to dynamically trace and real time monitor the coverage of the target within the BEV during a simulated beam-on situation. This target visualization system may provide a direct remotely accessible and real time way to visualize, verify, and ensure tumor targeting during radiotherapy. Keywords: ultrasound, computerized tomography

  9. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  10. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  11. Feature-Aware Verification

    CERN Document Server

    Apel, Sven; Wendler, Philipp; von Rhein, Alexander; Beyer, Dirk

    2011-01-01

    A software product line is a set of software products that are distinguished in terms of features (i.e., end-user--visible units of behavior). Feature interactions ---situations in which the combination of features leads to emergent and possibly critical behavior--- are a major source of failures in software product lines. We explore how feature-aware verification can improve the automatic detection of feature interactions in software product lines. Feature-aware verification uses product-line verification techniques and supports the specification of feature properties along with the features in separate and composable units. It integrates the technique of variability encoding to verify a product line without generating and checking a possibly exponential number of feature combinations. We developed the tool suite SPLverifier for feature-aware verification, which is based on standard model-checking technology. We applied it to an e-mail system that incorporates domain knowledge of AT&T. We found that feat...

  12. Automatic classification and defect verification based on inspection technology with lithography simulation

    Science.gov (United States)

    Kato, Masaya; Inuzuka, Hideki; Kosuge, Takeshi; Yoshikawa, Shingo; Kanno, Kayoko; Imai, Hidemichi; Miyashita, Hiroyuki; Vacca, Anthony; Fiekowsky, Peter; Fiekowsky, Dan

    2015-10-01

    Even small defects on the main patterns can create killer defects on the wafer, whereas the same defect on or near the decorative patterns may be completely benign to the wafer functionality. This ambiguity often causes operators and engineers to put a mask "on hold" to be analyzed by an AIMS™ tool which slows the manufacturing time and increases mask cost. In order to streamline the process, mask shops need a reliable way to quickly identify the wafer impact of defects during mask inspection review reducing the number of defects requiring AIMS™ analysis. Source Mask Optimization (SMO) techniques are now common on sub 20nm node critical reticle patterns These techniques create complex reticle patterns which often makes it difficult for inspection tool operators to identify the desired wafer pattern from the surrounding nonprinting patterns in advanced masks such as SMO, Inverse Lithography Technology (ILT), Negative Tone Development (NTD). In this study, we have tested a system that generates aerial simulation images directly from the inspection tool images. The resulting defect dispositions from a program defect test mask along with numerous production mask defects have been compared to the dispositions attained from AIMS™ analysis. The results of our comparisons are presented, as well as the impact to mask shop productivity.

  13. Information technology -- Telecommunications and information exchange between systems -- Corporate telecommunication networks -- Signalling interworking between QSIG and H.323 -- Generic functional protocol for the support of supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2001-01-01

    Information technology -- Telecommunications and information exchange between systems -- Corporate telecommunication networks -- Signalling interworking between QSIG and H.323 -- Generic functional protocol for the support of supplementary services

  14. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

  15. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Call priority interruption and call priority interruption protection supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Call priority interruption and call priority interruption protection supplementary services

  16. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Wireless terminal authentication supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Wireless terminal authentication supplementary services

  17. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

  18. Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

  19. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Name identification supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Name identification supplementary services

  20. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Single step call transfer supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Single step call transfer supplementary service

  1. 实例化空间逻辑下的SET支付协议验证及改进%Verification and improvement of SET payment protocols under instantiation space logic

    Institute of Scientific and Technical Information of China (English)

    肖茵茵; 苏开乐; 马震远; 胡若

    2013-01-01

    使用基于知识推理的实例化空间逻辑及其自动化验证工具SPV对SET支付协议的重要安全性质进行验证,并对协议进行改进.与模型检测法相比,可以验证协议在任意会话中的正确性;与定理证明等方法相比,验证过程是完全自动化的.在不影响原SET支付协议安全性的前提下,使用实例化空间逻辑简化协议的复杂消息,并合理选择协议分支,建立比以往研究更贴近原协议的模型.给出了该模型及其秘密性、认证性在SPV下的形式化描述,并展示验证结果,分析验证效率.针对验证结果中不被满足的认知规范,给出协议的改进方案,解决了持卡人和支付网关之间的认证问题.%The important properties of SET(secure electronic transaction)payment protocols were verified and improved by a knowledge reasoning method ISL(instantiation space logic)and its tool SPV (security protocol verifier).The method could verify the correctness of protocols in unbounded number of sessions compared with model checking method.By comparison with theorems or proved methods,the method was testified fully automatically.A model more closed to the original protocols was proposed by simplifying complex messages of protocols under the ISL and choosing the protocol steps rationally,without affecting the important security properties.The SPV formal description of the model and its properties (secrecy and authentication) was given,and the verification results and effectiveness were showed.The protocols were improved according to the unsatisfied epistemic specifications,and the improvement resolved the authentication problem between the cardholder and pay-gate in the protocols.

  2. SSR-Patchwork: An Optimized Protocol to Obtain a Rapid and Inexpensive SSR Library Using First-Generation Sequencing Technology

    Directory of Open Access Journals (Sweden)

    Antonietta Di Maio

    2013-01-01

    Full Text Available Premise of the study: We have optimized a version of a microsatellite loci isolation protocol for first-generation sequencing (FGS technologies. The protocol is optimized to reduce the cost and number of steps, and it combines some procedures from previous simple sequence repeat (SSR protocols with several key improvements that significantly affect the final yield of the SSR library. This protocol may be accessible for laboratories with a moderate budget or for which next-generation sequencing (NGS is not readily available. Methods and Results: We drew from classic protocols for library enrichment by digestion, ligation, amplification, hybridization, cloning, and sequencing. Three different systems were chosen: two with very different genome sizes (Galdieria sulphuraria, 10 Mbp; Pancratium maritimum, 30000 Mbp, and a third with an undetermined genome size (Kochia saxicola. Moreover, we also report the optimization of the sequencing reagents. A good frequency of the obtained microsatellite loci was achieved. Conclusions: The method presented here is very detailed; comparative tests with other SSR protocols are also reported. This optimized protocol is a promising tool for low-cost genetic studies and the rapid, simple construction of homemade SSR libraries for small and large genomes.

  3. SSR-patchwork: An optimized protocol to obtain a rapid and inexpensive SSR library using first-generation sequencing technology.

    Science.gov (United States)

    Di Maio, Antonietta; De Castro, Olga

    2013-01-01

    We have optimized a version of a microsatellite loci isolation protocol for first-generation sequencing (FGS) technologies. The protocol is optimized to reduce the cost and number of steps, and it combines some procedures from previous simple sequence repeat (SSR) protocols with several key improvements that significantly affect the final yield of the SSR library. This protocol may be accessible for laboratories with a moderate budget or for which next-generation sequencing (NGS) is not readily available. • We drew from classic protocols for library enrichment by digestion, ligation, amplification, hybridization, cloning, and sequencing. Three different systems were chosen: two with very different genome sizes (Galdieria sulphuraria, 10 Mbp; Pancratium maritimum, 30 000 Mbp), and a third with an undetermined genome size (Kochia saxicola). Moreover, we also report the optimization of the sequencing reagents. A good frequency of the obtained microsatellite loci was achieved. • The method presented here is very detailed; comparative tests with other SSR protocols are also reported. This optimized protocol is a promising tool for low-cost genetic studies and the rapid, simple construction of homemade SSR libraries for small and large genomes.

  4. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  5. A participatory approach to designing and enhancing integrated health information technology systems for veterans: protocol.

    Science.gov (United States)

    Haun, Jolie N; Nazi, Kim M; Chavez, Margeaux; Lind, Jason D; Antinori, Nicole; Gosline, Robert M; Martin, Tracey L

    2015-02-27

    The Department of Veterans Affairs (VA) has developed health information technologies (HIT) and resources to improve veteran access to health care programs and services, and to support a patient-centered approach to health care delivery. To improve VA HIT access and meaningful use by veterans, it is necessary to understand their preferences for interacting with various HIT resources to accomplish health management related tasks and to exchange information. The objective of this paper was to describe a novel protocol for: (1) developing a HIT Digital Health Matrix Model; (2) conducting an Analytic Hierarchy Process called pairwise comparison to understand how and why veterans want to use electronic health resources to complete tasks related to health management; and (3) developing visual modeling simulations that depict veterans' preferences for using VA HIT to manage their health conditions and exchange health information. The study uses participatory research methods to understand how veterans prefer to use VA HIT to accomplish health management tasks within a given context, and how they would like to interact with HIT interfaces (eg, look, feel, and function) in the future. This study includes two rounds of veteran focus groups with self-administered surveys and visual modeling simulation techniques. This study will also convene an expert panel to assist in the development of a VA HIT Digital Health Matrix Model, so that both expert panel members and veteran participants can complete an Analytic Hierarchy Process, pairwise comparisons to evaluate and rank the applicability of electronic health resources for a series of health management tasks. This protocol describes the iterative, participatory, and patient-centered process for: (1) developing a VA HIT Digital Health Matrix Model that outlines current VA patient-facing platforms available to veterans, describing their features and relevant contexts for use; and (2) developing visual model simulations based on

  6. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available is yet to be developed and applied for the South African market. This paper will describe the current international developments on ETV and how it could find application in South Africa that is lagging behind the implementation of such a tool....

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS FLG-631-318 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss FLG-631-318 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss FLG, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refi...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS GTI-600G, HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss GTi-600G high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss GTi, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refinis...

  9. AN ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PERFORMANCE TESTING OF THE INDUSTRIAL TEST SYSTEM, INC. CYANIDE REAGENTSTRIP™ TEST KIT

    Science.gov (United States)

    Cyanide can be present in various forms in water. The cyanide test kit evaluated in this verification study (Industrial Test System, Inc. Cyanide Regent Strip ™ Test Kit) was designed to detect free cyanide in water. This is done by converting cyanide in water to cyanogen...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS GTI-600G, HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss GTi-600G high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss GTi, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refinis...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS FLG-631-318 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss FLG-631-318 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss FLG, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refi...

  12. Some drastic improvements found in the analysis of routing protocol for the Bluetooth technology using scatternet

    CERN Document Server

    Perwej, Yusuf; Jaleel, Uruj; Saxena, Sharad

    2012-01-01

    Bluetooth is a promising wireless technology that enables portable devices to form short-range wireless ad hoc networks. Unlike wireless LAN, the communication of Bluetooth devices follow a strict master slave relationship, that is, it is not possible for a slave device to directly communicate with another slave device even though they are within the radio coverage of each other. For inter piconet communication, a scatternet has to be formed, in which some Bluetooth devices have to act as bridge nodes between piconets. The Scatternet formed have following properties in which they are connected i.e every Bluetooth device can be reached from every other device, Piconet size is limited to eight nodes [1]. The author of this research paper have studied different type of routing protocol and have made efforts to improve throughput and reduce packet loss due to failure in the routing loop and increased mobility and improve the cohesive network structure, resolve the change topology conflicts [2], and a successful &...

  13. Analysis and Verification of Secure E-commerce Payment Protocol Based on Four Parties%基于四方的安全电子商务支付协议分析与验证

    Institute of Scientific and Technical Information of China (English)

    肖仕成; 李开; 甘早斌

    2012-01-01

    Both the finite state model and the CTL (Computation Tree Logic) formulations were first constructed for the secure e-commerce payment protocol based on four parties (FSET) in this paper. Then, the symbolic model checking (SMV) was used to analyze and verify the atomicity of the FSET protocol. The result of analysis and verification indicates that the FSET can meet with the money atomicity, the goods atomicity and the certified delivery, as well as the electronic payment security requirements.%以基于四方的安全电子商务支付协议为研究对象,建立了协议的有限状态模型以及安全计算树逻辑CTL公式,利用符号模型检测工具SMV对协议的原子性进行检测验证.验证结果证明,基于四方的安全电子商务支付协议满足电子支付的金钱原子性、商品原子性以及确认发送原子性,协议符合电子支付的原子性安全要求.

  14. Study protocol: mobile improvement of self-management ability through rural technology (mI SMART).

    Science.gov (United States)

    Mallow, Jennifer A; Theeke, Laurie A; Long, Dustin M; Whetsel, Tara; Theeke, Elliott; Mallow, Brian K

    2015-01-01

    There are 62 million Americans currently residing in rural areas who are more likely to have multiple chronic conditions and be economically disadvantaged, and in poor health, receive less recommended preventive services and attend fewer visits to health care providers. Recent advances in mobile healthcare (mHealth) offer a promising new approach to solving health disparities and improving chronic illness care. It is now possible and affordable to transmit health information, including values from glucometers, automated blood pressure monitors, and scales, through Bluetooth-enabled devices. Additionally, audio and video communications technologies can allow healthcare providers to conduct many parts of a physical exam remotely from varied settings. These technologies could remove geographical distance as a barrier to care and diminish the access to care issues faced by patients who live rurally. However, currently there is lack of studies that provide evidence of feasibility, acceptability, and effectiveness of mHealth initiatives on improved outcomes of care, a needed step to make the translation to implementation studies in healthcare systems. The purpose of this paper is to present the protocol for the first study of mI SMART (mobile Improvement of Self-Management Ability through Rural Technology), a new integrated mHealth intervention. Our objective is to provide evidence of feasibility and acceptability for the use of mI SMART in an underserved population and establish evidence for the refinement of mI SMART. The proposed study will take place at Milan Puskar Health Right, a free primary care clinic in the state of West Virginia. The clinic provides health care at no cost to uninsured, low income; adults aged 18-64 living in West Virginia. We will enroll 30 participants into this feasibility study with plans of implementing a longitudinal randomized, comparative effectiveness design in the future. Data collection will include tracking of barriers and

  15. Nuclear disarmament verification

    Energy Technology Data Exchange (ETDEWEB)

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  16. Advanced Communications Technology Satellite (ACTS) Fade Compensation Protocol Impact on Very Small-Aperture Terminal Bit Error Rate Performance

    Science.gov (United States)

    Cox, Christina B.; Coney, Thom A.

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) communications system operates at Ka band. ACTS uses an adaptive rain fade compensation protocol to reduce the impact of signal attenuation resulting from propagation effects. The purpose of this paper is to present the results of an analysis characterizing the improvement in VSAT performance provided by this protocol. The metric for performance is VSAT bit error rate (BER) availability. The acceptable availability defined by communication system design specifications is 99.5% for a BER of 5E-7 or better. VSAT BER availabilities with and without rain fade compensation are presented. A comparison shows the improvement in BER availability realized with rain fade compensation. Results are presented for an eight-month period and for 24 months spread over a three-year period. The two time periods represent two different configurations of the fade compensation protocol. Index Terms-Adaptive coding, attenuation, propagation, rain, satellite communication, satellites.

  17. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  18. HEART: heart exercise and remote technologies: A randomized controlled trial study protocol

    Directory of Open Access Journals (Sweden)

    Kira Geoffrey

    2011-05-01

    Full Text Available Abstract Background Cardiovascular disease (CVD is the leading cause of death worldwide. Cardiac rehabilitation (CR is aimed at improving health behaviors to slow or reverse the progression of CVD disease. Exercise is a central element of CR. Technologies such as mobile phones and the Internet (mHealth offer potential to overcome many of the psychological, physical, and geographical barriers that have been associated with lack of participation in exercise-based CR. We aim to trial the effectiveness of a mobile phone delivered exercise-based CR program to increase exercise capacity and functional outcomes compared with usual CR care in adults with CVD. This paper outlines the rationale and methods of the trial. Methods A single-blinded parallel two-arm randomized controlled trial is being conducted. A total of 170 people will be randomized at 1:1 ratio either to receive a mHealth CR program or usual care. Participants are identified by CR nurses from two metropolitan hospitals in Auckland, New Zealand through outpatient clinics and existing databases. Consenting participants are contacted to attend a baseline assessment. The intervention consists of a theory-based, personalized, automated package of text and video message components via participants' mobile phones and the Internet to increase exercise behavior, delivered over six months. The control group will continue with usual CR. Data collection occurs at baseline and 24 weeks (post-intervention. The primary outcome is change in maximal oxygen uptake from baseline to 24 weeks. Secondary outcomes include post-intervention measures on self-reported physical activity (IPAQ, cardiovascular risk factors (systolic blood pressure, weight, and waist to hip ratio, health related quality of life (SF-36, and cost-effectiveness. Discussion This manuscript presents the protocol for a randomized controlled trial of a mHealth exercise-based CR program. Results of this trial will provide much needed

  19. Environmental Technology Verification Report for Abraxis Ecologenia® 17β-Estradiol (E2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    This verification test was conducted according to procedures specifiedin the Test/QA Planfor Verification of Enzyme-Linked Immunosorbent Assay (ELISA) Test Kis for the Quantitative Determination of Endocrine Disrupting Compounds (EDCs) in Aqueous Phase Samples. Deviations to the...

  20. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  1. A verification protocol for the probe sequences of Affymetrix genome arrays reveals high probe accuracy for studies in mouse, human and rat

    NARCIS (Netherlands)

    Alberts, R.; Terpstra, P.; Hardonk, M.; Bystrykh, L.V.; Haan, de G.; Breitling, R.; Nap, J.P.H.; Jansen, R.C.

    2007-01-01

    Background - The Affymetrix GeneChip technology uses multiple probes per gene to measure its expression level. Individual probe signals can vary widely, which hampers proper interpretation. This variation can be caused by probes that do not properly match their target gene or that match multiple gen

  2. A verification protocol for the probe sequences of Affymetrix genome arrays reveals high probe accuracy for studies in mouse, human and rat

    NARCIS (Netherlands)

    Alberts, Rudi; Terpstra, Peter; Hardonk, Menno; Bystrykh, Leonid V.; de Haan, Gerald; Breitling, Rainer; Nap, Jan-Peter; Jansen, Ritsert C.

    2007-01-01

    Background: The Affymetrix GeneChip technology uses multiple probes per gene to measure its expression level. Individual probe signals can vary widely, which hampers proper interpretation. This variation can be caused by probes that do not properly match their target gene or that match multiple gene

  3. A verification protocol for the probe sequences of Affymetrix genome arrays reveals high probe accuracy for studies in mouse, human and rat

    NARCIS (Netherlands)

    Alberts, R.; Terpstra, P.; Hardonk, M.; Bystrykh, L.V.; Haan, de G.; Breitling, R.; Nap, J.P.H.; Jansen, R.C.

    2007-01-01

    Background - The Affymetrix GeneChip technology uses multiple probes per gene to measure its expression level. Individual probe signals can vary widely, which hampers proper interpretation. This variation can be caused by probes that do not properly match their target gene or that match multiple gen

  4. A verification protocol for the probe sequences of Affymetrix genome arrays reveals high probe accuracy for studies in mouse, human and rat

    NARCIS (Netherlands)

    Alberts, Rudi; Terpstra, Peter; Hardonk, Menno; Bystrykh, Leonid V.; de Haan, Gerald; Breitling, Rainer; Nap, Jan-Peter; Jansen, Ritsert C.

    2007-01-01

    Background: The Affymetrix GeneChip technology uses multiple probes per gene to measure its expression level. Individual probe signals can vary widely, which hampers proper interpretation. This variation can be caused by probes that do not properly match their target gene or that match multiple gene

  5. A survey on the high reliability software verification and validation technology for instrumentation and control in NPP.

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Lee, Chang Soo; Dong, In Sook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1994-01-01

    This document presents the technical status of the software verification and validation (V and V) efforts to support developing and licensing digital instrumentation and control (I and C) systems in nuclear power plants. We have reviewed codes and standards to be concensus criteria among vendor, licensee and licenser. Then we have described the software licensing procedures under 10 CFR 50 and 10 CFR 52 of the United States cope with the licensing barrier. At last, we have surveyed the technical issues related to developing and licensing the high integrity software for digital I and C systems. These technical issues let us know the development direction of our own software V and V methodology. (Author) 13 refs., 2 figs.,.

  6. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  7. The Predigest Project of TCP/IP Protocol Communication System Based on DSP Technology and Ethernet

    Science.gov (United States)

    hong-you, Wang; san-ping, Zhao

    The paper introduce a predigest project of TCP/IP based on DSP CMOS chip TMS320F2407 and Ethernet interface. The system design the Network Interface Controller using TMS320F2407and TRL8019AS,it simplify TCP/IP, achieve simple protocol stack in DSP, and achieve Data transmission by software program. The experiment indicated that, the communication system constructed by TMS320F2407andTRL8019AS is low cast, simple and reliable.

  8. Protocol Materials: A Clarification.

    Science.gov (United States)

    Innerd, Wilfred; O'Gorman, David

    "Protocol materials" are records or recordings of a wide variety of behavioral situations. Characteristically they are neither simulated nor extensively edited. They are to be used for the empirical verification of concepts derived from both educational theory and the social sciences. They are attempts to capture reality so that it may be studied…

  9. Technology combined with a counseling protocol to stimulate physical activity of chronically ill patients in primary care.

    Science.gov (United States)

    Verwey, R; van der Weegen, S; Spreeuwenberg, M; Tange, H; van der Weijden, T; de Witte, L

    2014-01-01

    An iterative user-centered design method was used to develop and test mobile technology (the It's LiFe! tool/monitor) embedded in primary care, followed by a three months feasibility study with 20 patients and three nurses. The tool consists of an accelerometer that transfers data to an app on a Smartphone, which is subsequently connected to a server. Physical activity levels are measured in minutes per day compared to pre-set activity goals, which are set by patients in dialogue with nurses. Nurses can monitor patients' physical activity via a secured website. The counseling protocol is based on the Five A's model and consists of a limited number of behavior change consultations intertwined with interaction with and responses from the tool. The technology supports nurses when performing physical activity counseling. Provided that no connectivity problems occur, the It's LiFe! intervention is feasible, and its longitudinal effects will be tested in a cluster RCT.

  10. Strategies for merging microbial fuel cell technologies in water desalination processes: Start-up protocol and desalination efficiency assessment

    Science.gov (United States)

    Borjas, Zulema; Esteve-Núñez, Abraham; Ortiz, Juan Manuel

    2017-07-01

    Microbial Desalination Cells constitute an innovative technology where microbial fuel cell and electrodialysis merge in the same device for obtaining fresh water from saline water with no energy-associated cost for the user. In this work, an anodic biofilm of the electroactive bacteria Geobacter sulfurreducens was able to efficiently convert the acetate present in synthetic waste water into electric current (j = 0.32 mA cm-2) able to desalinate water. .Moreover, we implemented an efficient start-up protocol where desalination up to 90% occurred in a desalination cycle (water production:0.308 L m-2 h-1, initial salinity: 9 mS cm-1, final salinity: treatment method combined with other well established desalination technologies such as reverse osmosis (RO) or reverse electrodialysis.

  11. The Effect of Health Information Technology on Health Care Provider Communication: A Mixed-Method Protocol.

    Science.gov (United States)

    Manojlovich, Milisa; Adler-Milstein, Julia; Harrod, Molly; Sales, Anne; Hofer, Timothy P; Saint, Sanjay; Krein, Sarah L

    2015-06-11

    Communication failures between physicians and nurses are one of the most common causes of adverse events for hospitalized patients, as well as a major root cause of all sentinel events. Communication technology (ie, the electronic medical record, computerized provider order entry, email, and pagers), which is a component of health information technology (HIT), may help reduce some communication failures but increase others because of an inadequate understanding of how communication technology is used. Increasing use of health information and communication technologies is likely to affect communication between nurses and physicians. The purpose of this study is to describe, in detail, how health information and communication technologies facilitate or hinder communication between nurses and physicians with the ultimate goal of identifying how we can optimize the use of these technologies to support effective communication. Effective communication is the process of developing shared understanding between communicators by establishing, testing, and maintaining relationships. Our theoretical model, based in communication and sociology theories, describes how health information and communication technologies affect communication through communication practices (ie, use of rich media; the location and availability of computers) and work relationships (ie, hierarchies and team stability). Therefore we seek to (1) identify the range of health information and communication technologies used in a national sample of medical-surgical acute care units, (2) describe communication practices and work relationships that may be influenced by health information and communication technologies in these same settings, and (3) explore how differences in health information and communication technologies, communication practices, and work relationships between physicians and nurses influence communication. This 4-year study uses a sequential mixed-methods design, beginning with a

  12. Stuttering partial-order reduction algorithm in verification of security protocols%安全协议状态空间的束动作偏序约简算法

    Institute of Scientific and Technical Information of China (English)

    马亚南; 刘楠; 祝跃飞; 胡宗立

    2011-01-01

    At present,the partial-order reduction algorithms used for the verification of security protocols are complicated, and uneasy to carry out,resulting in a limited scope of applicability. Furthermore it permutes based on actions, leading to a limited effect of reduction. To solve the above problems, this paper considered the action sequences in the same session as a stuttering action,and proposed a stuttering action reduction algorithm on the base of partial-order reduction. It judged whether the succes sors of stutter-equivalent stuttering transitions were redundant based on the relation between messages achieved by the intruder and the intruder knowledges, in order to reduce the state space. This algorithm has a clear structure and easy to implement. Experiment clearly implies that the adopted reduction method is effective.%目前安全协议分析的偏序归约算法较为复杂、不易实现,限制了其适用范围,且以动作为基础,粒度较小,对减少状态空间的作用有限.针对该问题提出了一种束动作偏序约简算法,将同一会话中的动作序列看做一个束动作,根据攻击者截获的消息与攻击者知识集间的关系,判断迹等价的束动作迁移所到达的后继状态是否为冗余节点,以约简状态空间.该算法思想简单、易于实现;实例表明它有效地约简了安全协议的状态空间.

  13. 天然气计量检定技术现状及进展%Current Situation and Development of the Natural Gas Metrological Verification Technology

    Institute of Scientific and Technical Information of China (English)

    赵士海; 刘博韬

    2015-01-01

    With the continual increase of requirement of natural gas and global development of natural gas trade, the accuracy of natural gas flow rate measurement attracts more and more attention from the supply and demand sides. In this paper, the current technology situation and development trend of orifice-plate flowmeter, ultrasonic flowmeter and turbine flowmeter were reviewed. Development of the natural gas metrological verification technology used for measurement tracing at home and abroad was also analyzed.%随着天然气需求量的不断增加和天然气贸易的全球化发展,供求双方越来越重视天然气流量计量的准确性。重点论述了广泛应用于天然气流量计量的孔板流量计、超声流量计、涡轮流量计的技术现状和发展趋势,以及国内外用于流量计量值溯源的天然气计量检定站技术的进展情况。

  14. Involving patient in the early stages of health technology assessment (HTA): a study protocol

    OpenAIRE

    Gagnon, Marie-Pierre; Candas, Bernard; Desmartis, Marie; Gagnon, Johanne; Roche, Daniel La; Rhainds, Marc; Coulombe, Martin; Dipankui, Mylène Tantchou; Légaré, France

    2014-01-01

    Background Public and patient involvement in the different stages of the health technology assessment (HTA) process is increasingly encouraged. The selection of topics for assessment, which includes identifying and prioritizing HTA questions, is a constant challenge for HTA agencies because the number of technologies requiring an assessment exceeds the resources available. Public and patient involvement in these early stages of HTA could make assessments more relevant and acceptable to them. ...

  15. The Effect of Health Information Technology on Health Care Provider Communication: A Mixed-Method Protocol

    OpenAIRE

    Manojlovich, Milisa; Adler-Milstein, Julia; Harrod, Molly; Sales, Anne; Hofer, Timothy P.; Saint, Sanjay; Krein, Sarah L.

    2015-01-01

    Background Communication failures between physicians and nurses are one of the most common causes of adverse events for hospitalized patients, as well as a major root cause of all sentinel events. Communication technology (ie, the electronic medical record, computerized provider order entry, email, and pagers), which is a component of health information technology (HIT), may help reduce some communication failures but increase others because of an inadequate understanding of how communication...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT FOR THE UV DISINFECTION OF SECONDARY EFFLUENTS, SUNTEC, INC. MODEL LPX200 DISINFECTION SYSTEM - 03/09/WQPC-SWP

    Science.gov (United States)

    Verification testing of the SUNTEC LPX200 UV Disinfection System to develop the UV delivered dose flow relationship was conducted at the Parsippany-Troy Hills wastewater treatment plant test site in Parsippany, New Jersey. Two lamp modules were mounted parallel in a 6.5-meter lon...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT FOR THE REMOVAL OF MERCURY FROM DENTAL OFFICE WASTEWATER, DENTAL RECYCLING OF NORTH AMERICA (DRNA) MERCURY REMOVAL UNIT (MRU). - NSF 02/01/EPAWQPC-SWP

    Science.gov (United States)

    Verification testing of the Dental Recycling North America (DRNA) Mercury Removal Unit (MRU) was conducted over a seven week period, at a dental office in Michigan that had three operatory rooms and two hygiene rooms. The office operated four days per week and averaged approxiam...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT FOR THE REDUCTION OF NITROGEN IN DOMESTIC WASTEWATER FROM INDIVIDUAL RESIDENTIAL HOMES, WATERLOO BIOFILTER® MODEL 4-BEDROOM (NSF 02/03/WQPC-SWP)

    Science.gov (United States)

    Verification testing of the Waterloo Biofilter Systems (WBS), Inc. Waterloo Biofilter® Model 4-Bedroom system was conducted over a thirteen month period at the Massachusetts Alternative Septic System Test Center (MASSTC) located at Otis Air National Guard Base in Bourne, Mas...

  19. Protocol of a Pilot Study of Technology-Enabled Coproduction in Pediatric Chronic Illness Care.

    Science.gov (United States)

    Kaplan, Heather C; Thakkar, Sunny Narendra; Burns, Lisa; Chini, Barbara; Dykes, Dana Mh; McPhail, Gary L; Moore, Erin; Saeed, Shehzad Ahmed; Eslick, Ian; Margolis, Peter A; Opipari-Arrigan, Lisa

    2017-04-28

    Pediatric chronic illness care models are traditionally organized around acute episodes of care and may not meet the needs of patients and their families. Interventions that extend the patient-clinician interaction beyond the health care visit, allow for asynchronous and bidirectional feedback loops that span visits and daily life, and facilitate seamless sharing of information are needed to support a care delivery system that is more collaborative, continuous, and data-driven. Orchestra is a mobile health technology platform and intervention designed to transform the management of chronic diseases by optimizing patient-clinician coproduction of care. The aim of this study is to assess the feasibility, acceptability, and preliminary impact of the Orchestra technology and intervention in the context of pediatric chronic illness care. This study will be conducted in the cystic fibrosis and inflammatory bowel disease clinics at Cincinnati Children's Hospital Medical Center. We will enroll interested patients and their caregivers to work with clinicians to use the Orchestra technology platform and care model over a 6-month period. In parallel, we will use quality improvement methods to improve processes for integrating Orchestra into clinic workflows and patient/family lifestyles. We will use surveys, interviews, technology use data, and measures of clinical outcomes to assess the feasibility, acceptability, and preliminary impact of Orchestra. Outcome measures will include assessments of: (1) enrollment and dropout rates; (2) duration of engagement/sustained use; (3) symptom and patient-reported outcome tracker completion rates; (4) perceived impact on treatment plan, communication with the clinical team, visit preparation, and overall care; (5) changes in disease self-efficacy and engagement in care; and (6) clinical outcomes and health care utilization. Participant recruitment began in mid-2015, with results expected in 2017. Chronic disease management needs a

  20. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  1. The development of verification and validation technology for instrumentation and control in NPPs - A study on the software development methodology of a highly reliable software

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Yong Rae; Cha, Sung Deok; Lee, Woo Jin; Chae, Hong Seok; Yoon, Kwang Sik; Jeong, Ki Suk [Korea Advanced Institute of Science and Technology,= Taejon (Korea, Republic of)

    1996-07-01

    Nuclear industries have tried to use the digital I and C technology in developing advanced nuclear power plants. However, because the industries did= not establish the highly reliable software development methodologies and standards applied to developing the highly reliable and safe software for digital I and C systems, they were confronted with the difficulties to avoid software common mode failures. To mitigate the difficulties, the highly reliable software development environments and methodologies and validation and verification techniques should be the cornerstone of all digital implementation in nuclear power plants. The objectives of this project is to establish the highly reliable software development methodology to support developing digital instrumentation and control systems in nuclear power plants. In this project, we have investigated the business-oriented and the real-time software development methods and techniques for ensuring safety and reliability of the software. Also we have studied standards related to licensing the software for digital I and C systems. 50 refs., 51 figs. (author)

  2. Effectiveness of a pressurized stormwater filtration system in Green Bay, Wisconsin: a study for the environmental technology verification program of the U.S. Environmental Protection Agency

    Science.gov (United States)

    Horwatich, J.A.; Corsi, Steven R.; Bannerman, Roger T.

    2004-01-01

    A pressurized stormwater filtration system was installed in 1998 as a stormwater-treatment practice to treat runoff from a hospital rooftop and parking lot in Green Bay, Wisconsin. This type of filtration system has been installed in Florida citrus groves and sewage treatment plants around the United States; however, this installation is the first of its kind to be used to treat urban runoff and the first to be tested in Wisconsin. The U.S. Geological Survey (USGS) monitored the system between November 2000 and September 2002 to evaluate it as part of the U.S. Environmental Protection Agency's Environmental Technology Verification Program. Fifteen runoff events were monitored for flow and water quality at the inlet and outlet of the system, and comparison of the event mean concentrations and constituent loads was used to evaluate its effectiveness. Loads were decreased in all particulate-associated constituents monitored, including suspended solids (83 percent), suspended sediment (81 percent), total Kjeldahl nitrogen (26 percent), total phosphorus (54 percent), and total recoverable zinc (62 percent). Total dissolved solids, dissolved phosphorus, and nitrate plus nitrite loads remained similar or increased through the system. The increase in some constituents was most likely due to a ground-water contribution between runoff events. Sand/silt split analysis resulted in the median silt content of 78 percent at the inlet, 87 percent at the outlet, and 3 percent at the flow splitter.

  3. Modeling and Verification of the Bitcoin Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Fehnker, Ansgar; van de Pol, Jan Cornelis; Stoelinga, Mariëlle Ida Antoinette; van Glabbeek, R.J.; Groote, J.F.; Höfner, P.

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spendi

  4. Modeling and verification of the bitcoin protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Pol, van de Jaco; Stoelinga, Mariëlle; Glabbeek, van R.J.; Groote, J.F.; Höfner, P.

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spendi

  5. Modeling and Verification of the Bitcoin Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Fehnker, Ansgar; van de Pol, Jan Cornelis; Stoelinga, Mariëlle Ida Antoinette; van Glabbeek, R.J.; Groote, J.F.; Höfner, P.

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double

  6. Next Generation Electronic Passport Scheme using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2013-08-01

    Full Text Available Electronic passports (e-passports are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris. A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

  7. [Current internet technology for gynecology--from hypertext transfer protocol to embedded web server].

    Science.gov (United States)

    Seufert, R; Woernle, F

    2000-01-01

    The scientific and commercial use of the internet has caused a revolution in information technologies and has influenced medical communication and documentation. Web browsers are the becoming universal starting point for all kinds of client-server applications. Many commercial and medical systems--such as information reservation systems--are being shifted towards web-based systems. This paper describes new techniques. Security problems are the main topics for further developments in medical computing.

  8. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  9. Mithramycin encapsulated in polymeric micelles by microfluidic technology as novel therapeutic protocol for beta-thalassemia

    Directory of Open Access Journals (Sweden)

    Capretto L

    2012-01-01

    Full Text Available Lorenzo Capretto1, Stefania Mazzitelli2, Eleonora Brognara2, Ilaria Lampronti2, Dario Carugo1, Martyn Hill1, Xunli Zhang1, Roberto Gambari2, Claudio Nastruzzi31Engineering Sciences, University of Southampton, Southampton, UK; 2Department of Biochemistry and Molecular Biology, 3Department of Pharmaceutical Sciences, University of Ferrara, Ferrara, ItalyAbstract: This report shows that the DNA-binding drug, mithramycin, can be efficiently encapsulated in polymeric micelles (PM-MTH, based on Pluronic® block copolymers, by a new microfluidic approach. The effect of different production parameters has been investigated for their effect on PM-MTH characteristics. The compared analysis of PM-MTH produced by microfluidic and conventional bulk mixing procedures revealed that microfluidics provides a useful platform for the production of PM-MTH with improved controllability, reproducibility, smaller size, and polydispersity. Finally, an investigation of the effects of PM-MTH, produced by microfluidic and conventional bulk mixing procedures, on the erythroid differentiation of both human erythroleukemia and human erythroid precursor cells is reported. It is demonstrated that PM-MTH exhibited a slightly lower toxicity and more pronounced differentiative activity when compared to the free drug. In addition, PM-MTH were able to upregulate preferentially γ-globin messenger ribonucleic acid production and to increase fetal hemoglobin (HbF accumulation, the percentage of HbF-containing cells, and their HbF content without stimulating α-globin gene expression, which is responsible for the clinical symptoms of ß-thalassemia. These results represent an important first step toward a potential clinical application, since an increase in HbF could alleviate the symptoms underlying ß-thalassemia and sickle cell anemia. In conclusion, this report suggests that PM-MTH produced by microfluidic approach warrants further evaluation as a potential therapeutic protocol

  10. Development of a Wearable Instrumented Vest for Posture Monitoring and System Usability Verification Based on the Technology Acceptance Model.

    Science.gov (United States)

    Lin, Wen-Yen; Chou, Wen-Cheng; Tsai, Tsai-Hsuan; Lin, Chung-Chih; Lee, Ming-Yih

    2016-12-17

    Body posture and activity are important indices for assessing health and quality of life, especially for elderly people. Therefore, an easily wearable device or instrumented garment would be valuable for monitoring elderly people's postures and activities to facilitate healthy aging. In particular, such devices should be accepted by elderly people so that they are willing to wear it all the time. This paper presents the design and development of a novel, textile-based, intelligent wearable vest for real-time posture monitoring and emergency warnings. The vest provides a highly portable and low-cost solution that can be used both indoors and outdoors in order to provide long-term care at home, including health promotion, healthy aging assessments, and health abnormality alerts. The usability of the system was verified using a technology acceptance model-based study of 50 elderly people. The results indicated that although elderly people are anxious about some newly developed wearable technologies, they look forward to wearing this instrumented posture-monitoring vest in the future.

  11. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    Directory of Open Access Journals (Sweden)

    Najlaa A. Abuadhmah

    2010-01-01

    Full Text Available Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa verification system is based on Identity Based Encryption (IBE and Public Key Infrastructure (PKI. This research provided comparison between both methods in terms of processing time and application usability. Results: The result showed the e-visa verification system is highly flexible when implemented with IBE and on the other hand produces better processing speed when implemented with PKI. Conclusion: Therefore, it is believed that the proposed e-visa verification schemes are valuable security protocol for future study on e-visa.

  12. MObile Technology for Improved Family Planning Services (MOTIF): study protocol for a randomised controlled trial

    Science.gov (United States)

    2013-01-01

    Background Providing women with contraceptive methods following abortion is important to reduce repeat abortion rates, yet evidence for effective post-abortion family planning interventions are limited. This protocol outlines the evaluation of a mobile phone-based intervention using voice messages to support post-abortion family planning in Cambodia. Methods/Design A single blind randomised controlled trial of 500 participants. Clients aged 18 or over, attending for abortion at four Marie Stopes International clinics in Cambodia, owning a mobile phone and not wishing to have a child at the current time are randomised to the mobile phone-based intervention or control (standard care) with a 1:1 allocation ratio. The intervention comprises a series of six automated voice messages to remind clients about available family planning methods and provide a conduit for additional support. Clients can respond to message prompts to request a phone call from a counsellor, or alternatively to state they have no problems. Clients requesting to talk to a counsellor, or who do not respond to the message prompts, receive a call from a Marie Stopes International Cambodia counsellor who provides individualised advice and support regarding family planning. The duration of the intervention is 3 months. The control group receive existing standard of care without the additional mobile phone-based support. We hypothesise that the intervention will remind clients about contraceptive methods available, identify problems with side effects early and provide support, and therefore increase use of post-abortion family planning, while reducing discontinuation and unsafe method switching. Participants are assessed at baseline and at 4 months. The primary outcome measure is use of an effective modern contraceptive method at 4 months post abortion. Secondary outcome measures include contraception use, pregnancy and repeat abortion over the 4-month post-abortion period. Risk ratios will be used as

  13. SSR-patchwork: An optimized protocol to obtain a rapid and inexpensive SSR library using first-generation sequencing technology1

    Science.gov (United States)

    Di Maio, Antonietta; De Castro, Olga

    2013-01-01

    • Premise of the study: We have optimized a version of a microsatellite loci isolation protocol for first-generation sequencing (FGS) technologies. The protocol is optimized to reduce the cost and number of steps, and it combines some procedures from previous simple sequence repeat (SSR) protocols with several key improvements that significantly affect the final yield of the SSR library. This protocol may be accessible for laboratories with a moderate budget or for which next-generation sequencing (NGS) is not readily available. • Methods and Results: We drew from classic protocols for library enrichment by digestion, ligation, amplification, hybridization, cloning, and sequencing. Three different systems were chosen: two with very different genome sizes (Galdieria sulphuraria, 10 Mbp; Pancratium maritimum, 30 000 Mbp), and a third with an undetermined genome size (Kochia saxicola). Moreover, we also report the optimization of the sequencing reagents. A good frequency of the obtained microsatellite loci was achieved. • Conclusions: The method presented here is very detailed; comparative tests with other SSR protocols are also reported. This optimized protocol is a promising tool for low-cost genetic studies and the rapid, simple construction of homemade SSR libraries for small and large genomes. PMID:25202476

  14. Making sense of health information technology implementation: A qualitative study protocol

    Directory of Open Access Journals (Sweden)

    McDaniel Reuben R

    2010-11-01

    Full Text Available Abstract Background Implementing new practices, such as health information technology (HIT, is often difficult due to the disruption of the highly coordinated, interdependent processes (e.g., information exchange, communication, relationships of providing care in hospitals. Thus, HIT implementation may occur slowly as staff members observe and make sense of unexpected disruptions in care. As a critical organizational function, sensemaking, defined as the social process of searching for answers and meaning which drive action, leads to unified understanding, learning, and effective problem solving -- strategies that studies have linked to successful change. Project teamwork is a change strategy increasingly used by hospitals that facilitates sensemaking by providing a formal mechanism for team members to share ideas, construct the meaning of events, and take next actions. Methods In this longitudinal case study, we aim to examine project teams' sensemaking and action as the team prepares to implement new information technology in a tiertiary care hospital. Based on management and healthcare literature on HIT implementation and project teamwork, we chose sensemaking as an alternative to traditional models for understanding organizational change and teamwork. Our methods choices are derived from this conceptual framework. Data on project team interactions will be prospectively collected through direct observation and organizational document review. Through qualitative methods, we will identify sensemaking patterns and explore variation in sensemaking across teams. Participant demographics will be used to explore variation in sensemaking patterns. Discussion Outcomes of this research will be new knowledge about sensemaking patterns of project teams, such as: the antecedents and consequences of the ongoing, evolutionary, social process of implementing HIT; the internal and external factors that influence the project team, including team composition

  15. Environmental Technology Verification Report for Abraxis Ecologenia® Ethynylestradiol (EE2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis Ecologenia Ethynylestradiol (EE2) ...

  16. Environmental Technology Verification Report for Abraxis Ecologenia® Ethynylestradiol (EE2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis Ecologenia Ethynylestradiol (EE2) ...

  17. An Evaluation Protocol for Selection of Educational Technologies for Students with Developmental Disabilities: A Demonstration Study Using iPad Apps

    Science.gov (United States)

    Arthanat, Sajay; Curtin, Christine; Kontak, David

    2015-01-01

    Mainstream technologies are widely being employed in inclusive and special education classrooms to accommodate the learning needs of students. As the evidence of their effectiveness evolves, educators and school-based therapists need tools and documentable strategies for their implementation. This research presents an evaluation protocol to guide…

  18. A Qualitative Study of the Treatment Improvement Protocols (TIPs): An Assessment of the Use of TIPs by Individuals Affiliated with the Addiction Technology Transfer Centers (ATTCs).

    Science.gov (United States)

    Hayashi, Susan W.; Suzuki, Marcia; Hubbard, Susan M.; Huang, Judy Y.; Cobb, Anita M.

    2003-01-01

    Evaluated the Addiction Technology Transfer Centers (ATTCs) of the Center for Substance Abuse Treatment (CSAT) as a means of diffusion of innovations, focusing on use of the Treatment Improvement Protocols (TIPs). Qualitative studies at 6 ATTCs that included 57 interviews show that the CSAT is at the forefront of providing resources to the…

  19. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, A.; Larsen, K.G.; Møller, M.H.;

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  20. Environmental Technology Verification Test Report of Mobile Source Selective Catalytic Reduction, Johnson Matthey SCCRT, Version 1, Selective Catalytic Reduction Technology with a Catalyzed Continuously Regenerating Trap

    Science.gov (United States)

    The Johnson Matthey SCCRT, v.1 technology is a urea-based SCR system combined with a CCRT filter designed for on-highway light, medium, and heavy heavy-duty diesel, urban and non-urban, bus exhaust gas recirculation (EGR)-or non-EGR-equipped engines for use with commercial ultra-...

  1. Based on the Research of the Innovative Technologies of the Automatic Verification Assembly Line for Smart Electricity Meter%智能电能表自动化检定流水线新技术研究

    Institute of Scientific and Technical Information of China (English)

    蔡文嘉; 刘莉; 李莉; 石洪

    2014-01-01

    The paper point at paper turnover box used in the innovative technologies Of The Automatic Verification Assembly Line, and LCD display unit of the smart electricity meterelectric meter crystal cycle significant demand of the standard test requirements, the paper container automatic palletizing, electric energy meterliquid crystal based research and design of explicit detection technology innovation, optimize, improve the function of the system, play a greater measure of automatic verification line modular, automation, intelligent, liftingtest quality, improve the efficiency of the verification.%本文针对智能电能表自动化检定流水线采用纸质周转箱作为电能表基本存储单元,智能电能表液晶循显检测等现场需求与国网标准要求,提出纸质空箱自动码垛、电能表液晶循显检测等创新技术的研究与设计,通过优化、完善系统功能,更大限度发挥自动化检定流水线模块化、自动化、智能化的特点,提升检定质量,提高检定效率。

  2. Evidence on health-promoting lifestyle practices and information and communication technologies: scoping review protocol.

    Science.gov (United States)

    Joseph-Shehu, Elizabeth M; Ncama, Busisiwe P

    2017-03-29

    Information and communication technologies (ICTs) play a key role in improving health and maintaining health promoting behaviours. ICTs are therefore one potential solution for promoting healthy lifestyles. In addition, they can assist in the reduction and control of the menace of both communicable and non-communicable diseases. This study will map evidence of interventions that demonstrate the effect of ICTs on health-promoting lifestyle practices that can prevent and control diseases. It is anticipated that this study will help identify areas where there is need for primary research. The following electronic databases will be searched: PsycArticle (EBSCO), PsycINFO (EBSCO), Science direct, PubMed, Medline (EBSCO) and Google Scholar. The study will be conducted in two stages: the first stage will map out the studies descriptively while the second stage will map the additional inclusion criteria of quality assessment. Two independent reviewers will undertake the data extraction. Relevant outcomes of the studies will be analysed thematically using NVIvo computer software. The authors will code all evidence independently. Thereafter the authors will critically cross-examine the relationship of the research questions to the emerging themes from the selected articles. The authors hope to find a large number of studies on health-promoting lifestyles that encompass six-subscales of health-promoting activities (nutrition, stress management, interpersonal relation, self-actualisation, health responsibility, physical activity) and ICT. This study will be presented in conferences related to health promotion and health-promoting lifestyles. It will also be disseminated in print and electronically. CRD42016042568. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  3. Optimizing postoperative care protocols in thoracic surgery: best evidence and new technology

    Science.gov (United States)

    French, Daniel G.; Dilena, Michael; LaPlante, Simon; Shamji, Farid; Sundaresan, Sudhir; Villeneuve, James; Seely, Andrew; Maziak, Donna

    2016-01-01

    Postoperative clinical pathways have been shown to improve postoperative care and decrease length of stay in hospital. In thoracic surgery there is a need to develop chest tube management pathways. This paper considers four aspects of chest tube management: (I) appraising the role of chest X-rays in the management of lung resection patients with chest drains; (II) selecting of a fluid output threshold below which chest tubes can be removed safely; (III) deciding whether suction should be applied to chest tubes; (IV) and selecting the safest method for chest tube removal. There is evidence that routine use of chest X-rays does not influence the management of chest tubes. There is a lack of consensus on the highest fluid output threshold below which chest tubes can be safely removed. The optimal use of negative intra-pleural pressure has not yet been established despite multiple randomized controlled trials and meta-analyses. When attempting to improve efficiency in the management of chest tubes, evidence in support of drain removal without a trial of water seal should be considered. Inconsistencies in the interpretation of air leaks and in chest tube management are likely contributors to the conflicting results found in the literature. New digital pleural drainage systems, which provide a more objective air leak assessment and can record air leak trend over time, will likely contribute to the development of new evidence-based guidelines. Technology should be combined with continued efforts to standardize care, create clinical pathways, and analyze their impact on postoperative outcomes. PMID:26941968

  4. Optimizing postoperative care protocols in thoracic surgery: best evidence and new technology.

    Science.gov (United States)

    French, Daniel G; Dilena, Michael; LaPlante, Simon; Shamji, Farid; Sundaresan, Sudhir; Villeneuve, James; Seely, Andrew; Maziak, Donna; Gilbert, Sebastien

    2016-02-01

    Postoperative clinical pathways have been shown to improve postoperative care and decrease length of stay in hospital. In thoracic surgery there is a need to develop chest tube management pathways. This paper considers four aspects of chest tube management: (I) appraising the role of chest X-rays in the management of lung resection patients with chest drains; (II) selecting of a fluid output threshold below which chest tubes can be removed safely; (III) deciding whether suction should be applied to chest tubes; (IV) and selecting the safest method for chest tube removal. There is evidence that routine use of chest X-rays does not influence the management of chest tubes. There is a lack of consensus on the highest fluid output threshold below which chest tubes can be safely removed. The optimal use of negative intra-pleural pressure has not yet been established despite multiple randomized controlled trials and meta-analyses. When attempting to improve efficiency in the management of chest tubes, evidence in support of drain removal without a trial of water seal should be considered. Inconsistencies in the interpretation of air leaks and in chest tube management are likely contributors to the conflicting results found in the literature. New digital pleural drainage systems, which provide a more objective air leak assessment and can record air leak trend over time, will likely contribute to the development of new evidence-based guidelines. Technology should be combined with continued efforts to standardize care, create clinical pathways, and analyze their impact on postoperative outcomes.

  5. Evidence on health-promoting lifestyle practices and information and communication technologies: scoping review protocol

    Science.gov (United States)

    Joseph-Shehu, Elizabeth M; Ncama, Busisiwe P

    2017-01-01

    Introduction Information and communication technologies (ICTs) play a key role in improving health and maintaining health promoting behaviours. ICTs are therefore one potential solution for promoting healthy lifestyles. In addition, they can assist in the reduction and control of the menace of both communicable and non-communicable diseases. This study will map evidence of interventions that demonstrate the effect of ICTs on health-promoting lifestyle practices that can prevent and control diseases. It is anticipated that this study will help identify areas where there is need for primary research. Methods and analysis The following electronic databases will be searched: PsycArticle (EBSCO), PsycINFO (EBSCO), Science direct, PubMed, Medline (EBSCO) and Google Scholar. The study will be conducted in two stages: the first stage will map out the studies descriptively while the second stage will map the additional inclusion criteria of quality assessment. Two independent reviewers will undertake the data extraction. Relevant outcomes of the studies will be analysed thematically using NVIvo computer software. The authors will code all evidence independently. Thereafter the authors will critically cross-examine the relationship of the research questions to the emerging themes from the selected articles. The authors hope to find a large number of studies on health-promoting lifestyles that encompass six-subscales of health-promoting activities (nutrition, stress management, interpersonal relation, self-actualisation, health responsibility, physical activity) and ICT. Dissemination This study will be presented in conferences related to health promotion and health-promoting lifestyles. It will also be disseminated in print and electronically. Trial registration number CRD42016042568. PMID:28360246

  6. The mPED randomized controlled clinical trial: applying mobile persuasive technologies to increase physical activity in sedentary women protocol

    Directory of Open Access Journals (Sweden)

    Fukuoka Yoshimi

    2011-12-01

    Full Text Available Abstract Background Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. Methods A randomized controlled trial (RCT with three arms; 1 PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention, 2 REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention, and 3 CONTROL (pedometer only, but no intervention will be conducted. A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary, immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. Discussion If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral

  7. Solar Array Verification Analysis Tool (SAVANT) Developed

    Science.gov (United States)

    Bailey, Sheila G.; Long, KIenwyn J.; Curtis, Henry B.; Gardner, Barbara; Davis, Victoria; Messenger, Scott; Walters, Robert

    1999-01-01

    Modeling solar cell performance for a specific radiation environment to obtain the end-of-life photovoltaic array performance has become both increasingly important and, with the rapid advent of new types of cell technology, more difficult. For large constellations of satellites, a few percent difference in the lifetime prediction can have an enormous economic impact. The tool described here automates the assessment of solar array on-orbit end-of-life performance and assists in the development and design of ground test protocols for different solar cell designs. Once established, these protocols can be used to calculate on-orbit end-of-life performance from ground test results. The Solar Array Verification Analysis Tool (SAVANT) utilizes the radiation environment from the Environment Work Bench (EWB) model developed by the NASA Lewis Research Center s Photovoltaic and Space Environmental Effects Branch in conjunction with Maxwell Technologies. It then modifies and combines this information with the displacement damage model proposed by Summers et al. (ref. 1) of the Naval Research Laboratory to determine solar cell performance during the course of a given mission. The resulting predictions can then be compared with flight data. The Environment WorkBench (ref. 2) uses the NASA AE8 (electron) and AP8 (proton) models of the radiation belts to calculate the trapped radiation flux. These fluxes are integrated over the defined spacecraft orbit for the duration of the mission to obtain the total omnidirectional fluence spectra. Components such as the solar cell coverglass, adhesive, and antireflective coatings can slow and attenuate the particle fluence reaching the solar cell. In SAVANT, a continuous slowing down approximation is used to model this effect.

  8. Secure Position Verification for Wireless Sensor Networks in Noisy Channels

    CERN Document Server

    Mandal, Partha Sarathi

    2011-01-01

    Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations) during the verification stage. In the literature of WSNs, most of the existing methods of position verification have used trusted verifiers, which are in fact vulnerable to attacks by malicious nodes. They also depend on some distance estimation techniques, which are not accurate in noisy channels (mediums). In this article, we propose a secure position verification scheme for WSNs in noisy channels without relying on any trusted entities. Our verification scheme detects and filters out all malicious nodes from the network with very high probability.

  9. An Assembler Driven Verification Methodology (ADVM)

    CERN Document Server

    Macbeth, John S; Gray, Ken

    2011-01-01

    This paper presents an overview of an assembler driven verification methodology (ADVM) that was created and implemented for a chip card project at Infineon Technologies AG. The primary advantage of this methodology is that it enables rapid porting of directed tests to new targets and derivatives, with only a minimum amount of code refactoring. As a consequence, considerable verification development time and effort was saved.

  10. Research on Web Service Technology Based on Hessian Protocol in ASP.NET Environment%ASP.NET环境下Hessian协议Web服务技术的研究

    Institute of Scientific and Technical Information of China (English)

    董婕; 覃华

    2011-01-01

    The Web services technologies used in ASP. NET is based on the XML + SOAP protocol, which is of more shortcomings such as starting with a high learning, and being difficult to use. Hessian protocol is a lightweight Web services program. This paper focuses on the implementation process of Hessian protocol in ASP. NET environment. This scheme is another Web service option for practical applications.%ASP.NET中采用的Web服务技术是基于XML+SOAP协议实现,具有学习起点高、推广难度大等问题.Hessian协议是一种新的Web服务技术,本文着重研究Hessian协议的Web服务在ASP.NET环境下的一般实现过程,为工程实际应用提供另一种选择方案.

  11. Technology of COM and implementation principle of its protocol card%COM技术及其规约插件的实现原理

    Institute of Scientific and Technical Information of China (English)

    贾春娟; 郭桂同

    2001-01-01

    The design and implementation principle of protocol card based on COM technology is proposed in view of different remote operation protocol standards in SCADA system. With this design mode, an easy and flexible solution scheme for integrating different remote protocols and different RTUs from different manufacturers in SCSDA system is available.%针对SCADA系统中远动规约标准不统一,提出基于COM 技术的规约插件的设计与实现原理。采用这种设计模式,将为SCADA系统中多厂家RTU的集成、多种远动规约的集成提供方便、灵活的解决方案。

  12. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ......It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  13. Retrieval of HPV oncogenes E6 and E7 mRNA from cervical specimens using a manual open technology protocol.

    Science.gov (United States)

    Campbell, Leonardo Martins; Pitta, Denise Rocha; De Assis, Angela Maria; Derchain, Sophie Francoise Mauricette; Campos, Elisabete Aparecida; Sarian, Luis Otavio Zanatta

    2013-01-01

    HPV oncogenes mRNA detection gains momentum as an adjuvant for HPV-related cervical abnormalities diagnosis, but is based on costly detection assays not allowing viral type targeting. To assess detection rate of HPV oncogenes E6/E7 mRNA from cervical specimens using a manual, open technology, fully customizable protocol and determine whether HPV-related epidemiological features influence mRNA retrieval. We reviewed literature and compared our retrieval rate with automated technologies. We used 60 samples positive for HPV DNA types 16, 18, 31 and/or 45. We extracted mRNA with a TRizol-based protocol, and tested mRNA purity and concentration using light absorbance. We reverse-transcribed mRNA into cDNA for E6/7 detection. HPV oncogenes E6/E7 mRNA was retrieved from 36 (60%) out of 60 specimens. No HPV load-related clinical or epidemiological feature was significantly associated with mRNA retrieval. Presence of HPV-DNA 16/18 was associated with mRNA retrieval (OR = 9.08; 95% CI 1.26 to 65.32 for HPV 16; and 18.2; IC95% 1.86 to 391.44 for HPV 18). The open-technology protocol yielded an mRNA detection rate similar to that of automated technologies. Advantages are lower costs and target HPV type customization.

  14. 基于 MIMO 技术和“双环”技术的 Ad Hoc 网络路由协议%Ad Hoc network routing protocol based on MIMO technology and double loop technology

    Institute of Scientific and Technical Information of China (English)

    李艳霞

    2014-01-01

    According to the drawbacks of previous Ad Hoc network , this paper puts forward Ad Hoc network routing protocol based on MIMO technology and double loop technology .Under the support of MIMO technology and double loop technology , the new Ad Hoc net-work routing protocol adopts diversity link and reuse link to give play to the advantage of DZR protocol and ZRP protocol .With OPNET simulation as the platform, it is optimized.%针对以往的 Ad Hoc 网络的缺陷,提出了一种基于 MIMO 技术和“双环”技术的 Ad Hoc 网络路由协议方案。在MIMO 技术、“双环”技术的支持下,新的 Ad Hoc 网络路由协议中采用了分集链路与复用链路,发挥了 DZR 协议与 ZRP协议的优势,以 OPNET 仿真工具为平台,从而实现了新 Ad Hoc 网络路由协议的最优化。

  15. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...... in the literature, a treatment of simultaneous speaker and utterance verification with a modern, standard database is so far lacking. This is despite the burgeoning demand for voice biometrics in a plethora of practical security applications. With the goal of improving overall verification performance, this paper...... reports different strategies for simultaneous ASV and UV in the context of short-duration, text-dependent speaker verification. Experiments performed on the recently released RedDots corpus are reported for three different ASV systems and four different UV systems. Results show that the combination...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: WATTS PREMIER M-SERIES M-15,000 REVERSE OSMOSIS TREATMENT SYSTEM

    Science.gov (United States)

    Verification testing of the Watts Premier M-Series M-15,000 RO Treatment System was conducted over a 31-day period from April 26, 2004, through May 26, 2004. This test was conducted at the Coachella Valley Water District (CVWD) Well 7802 in Thermal, California. The source water...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: WATTS PREMIER M-SERIES M-15,000 REVERSE OSMOSIS TREATMENT SYSTEM

    Science.gov (United States)

    Verification testing of the Watts Premier M-Series M-15,000 RO Treatment System was conducted over a 31-day period from April 26, 2004, through May 26, 2004. This test was conducted at the Coachella Valley Water District (CVWD) Well 7802 in Thermal, California. The source water...

  18. Environmental Technology Verification Report for Abraxis 17β-Estradiol (E2) Magnetic Particle Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis 17(beta)-estradiol (E2) magnetic p...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PHYSICAL REMOVAL OF MICROBIOLOGICAL & PARTICULATE CONTAMINANTS IN DRINKING WATER: US FILTER 3M10C MICROFILTRATION MEMBRANE SYSTEM AT CHULA VISTA, CALIFORNIA

    Science.gov (United States)

    Verification testing of the US Filter 3M10C membrane system was conducted over a 44-day test period at the Aqua 2000 Research Center in Chula Vista, California. The test period extended from July 24, 2002 to September 5, 2002. The source water was a blend of Colorado River and ...

  20. 基于覆盖率驱动的SoC验证技术研究%Research of SoC Verification Technology Based on Coverage--Driven

    Institute of Scientific and Technical Information of China (English)

    朱车壮; 陈岚; 冯燕

    2011-01-01

    Coverage data--base is the qualitative measurement for the verification engineer to judge the complete degree of SoC verification, and it provides the safeguard for the SoC validation completeness. This paper takes the verification of SoC bus arbiter as an example, analyzes many kinds of coverage in detail, for example, structure coverage, functional coverage, assertion coverage and so on, then modifies the RTL design code and testcases based on the analysis results of these coverage, until the integrity of the verification meet the design requirements.%覆盖率数据是验证工程师判定SoC验证完备程度的定性度量,为SoC验证完全性提供了保障,指明了方向.文中以SoC总线仲裁器验证为例,对其结构覆盖率、功能覆盖率、断言覆盖率等多种覆盖率进行了全面的分析,然后根据覆盖率分析结果反馈到RTL设计代码和测试激励进行修正,直到验证的完整性满足设计的要求.

  1. Environmental Technology Verification Report for Abraxis 17β-Estradiol (E2) Magnetic Particle Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis 17(beta)-estradiol (E2) magnetic p...

  2. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    Government drawings, specifications, or other data included in this document for any purpose other than Government procurement does not in any way...information exchange, and its publication does not constitute the Government’s approval or disapproval of its ideas or findings. REPORT DOCUMENTATION ...DATES COVERED (From - To) JUN 2012 – SEP 2015 4. TITLE AND SUBTITLE VERIFICATION GAMES: CROWD-SOURCED FORMAL VERIFICATION 5a. CONTRACT NUMBER FA8750

  3. Integration of Linux TCP and Simulation: Verification, Validation and Application

    Directory of Open Access Journals (Sweden)

    Songrith Kittiperachol

    2009-11-01

    Full Text Available Network simulator has been acknowledged as one of the most flexible means in studying and developing protocol as it allows virtually endless numbers of simulated network environments to be setup and protocol of interest to be fine-tuned without requiring any real-world complicated and costly network experiment. However, depending on researchers, the same protocol of interest can be developed in different ways and different implementations may yield the outcomes that do not accurately capture the dynamics of the real protocol. In the last decade, TCP, the protocol on which the Internet is based, has been extensively studied in order to study and reevaluate its performance particularly when TCP based applications and services are deployed in an emerging Next Generation Network (NGN and Next Generation Internet (NGI. As a result, to understand the realistic interaction of TCP with new types of networks and technologies, a combination of a real-world TCP and a network simulator seems very essential. This work presents an integration of real-world TCP implementation of Linux TCP/IP network stack into a network simulator, called INET. Moreover, verification and validation of the integrated Linux TCP are performed within INET framework to ensure the validity of the integration. The results clearly confirm that the integrated Linux TCP displays reasonable and consistent dynamics with respect to the behaviors of the real-world Linux TCP. Finally, to demonstrate the application of the INET with Linux TCP extension, algorithms of other Linux TCP variants and their dynamic over a large-bandwidth long-delay network are briefly presented.

  4. Fiscal 1997 report of the development of high efficiency waste power generation technology. No.2 volume. Pilot plant verification test; Kokoritsu haikibutsu hatsuden gijutsu kaihatsu (pilot plant jissho shiken). 1997 nendo hokokusho (daini bunsatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    As to a high efficiency waste power generation system using general waste as fuel, the details of the following were described: design/construction management and operational study of pilot plant, design/manufacture/construction of pilot plant, and study of an optimal total system. Concerning the construction management and operational study, the paper described the application for governmental/official inspection procedures and taking inspection, process management of pilot plant, site patrol, safety management, management of trial run of pilot plant, drawing-up of a verification test plan and test run, etc. Relating to the design/manufacture/construction of pilot plant, an outline of the pilot plant was described. The paper also stated points to be considered in design of furnace structure and boiler structure, points to be considered of the verification test, etc. As to the study of an optimal total system, the following were described: survey of waste gasification/slagging power generation technology, basic study on RDF production process, survey of trends of waste power generation technology in the U.S., etc. 52 refs., 149 figs., 121 tabs.

  5. Using a Delphi consensus process to develop an acupuncture treatment protocol by consensus for women undergoing Assisted Reproductive Technology (ART treatment

    Directory of Open Access Journals (Sweden)

    Smith Caroline A

    2012-07-01

    Full Text Available Abstract Background Assisted reproductive technologies (ART are increasingly utilised for resolving difficulties conceiving. These technologies are expensive to both the public purse and the individual consumers. Acupuncture is widely used as an adjunct to ART with indications that it may assist reducing the time to conception and increasing live birth rates. Heterogeneity is high between treatment protocols. The aim of this study was to examine what fertility acupuncturists consider key components of best practice acupuncture during an ART cycle, and to establish an acupuncture protocol by consensus. Methods Fifteen international acupuncturists with extensive experience treating women during ART interventions participated in 3 rounds of Delphi questionnaires. The first round focused on identifying the parameters of acupuncture treatment as adjunct to ART, the second round evaluated statements derived from the earlier round, and the third evaluated specific parameters for a proposed trial protocol. Consensus was defined as greater than 80% agreement. Results Significant agreement was achieved on the parameters of best practice acupuncture, including an acupuncture protocol suitable for future research. Study participants confirmed the importance of needling aspects relating to the dose of acupuncture, the therapeutic relationship, tailoring treatment to the individual, and the role of co-interventions. From two rounds of the Delphi a consensus was achieved on seven treatment parameters for the design of the acupuncture treatment to be used in a clinical trial of acupuncture as an adjunct to ART. The treatment protocol includes the use of the traditional Chinese medicine acupuncture, use of manual acupuncture, a first treatment administered between day 6–8 of the stimulated ART cycle which is individualised to the participant, two treatments will be administered on the day of embryo transfer, and will include points SP8, SP10, LR3, ST29, CV4

  6. Testing Quantum Devices: Practical Entanglement Verification in Bipartite Optical Systems

    OpenAIRE

    Häseler, Hauke; Moroder, Tobias; Lütkenhaus, Norbert

    2007-01-01

    We present a method to test quantum behavior of quantum information processing devices, such as quantum memories, teleportation devices, channels and quantum key distribution protocols. The test of quantum behavior can be phrased as the verification of effective entanglement. Necessary separability criteria are formulated in terms of a matrix of expectation values in conjunction with the partial transposition map. Our method is designed to reduce the resources for entanglement verification. A...

  7. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Research and application of multi-core technology in SoC verification%SoC仿真验证中多核技术的研究与应用

    Institute of Scientific and Technical Information of China (English)

    刘瑞; 邵智勇; 康春雷; 李斌

    2015-01-01

    With the increasing enlargement of SoC design scale and the gradual complexity of its structure,the verification simulation has become an important part of the SoC design process,and its required time often becomes a bottleneck of the en⁃tire design cycle,so the research and application of the technology that can speed up the simulation verification is imperative. The multi⁃core technology offered by Synopsys Company’s simulation tool VCS makes the multiple processors working in parallel to achieve the lifting of the simulation speed. The feasibility and effectiveness of the multi⁃core technology was proved by analy⁃sis in actual project and the design level parallelism(DLP)method which is one of the multi⁃core technologies.%随着SoC设计规模的日益增大,结构逐渐复杂,仿真验证已经成为Soc设计过程中重要的环节,其所需时间往往成为整个设计周期的瓶颈,因而研究和应用能够加快验证仿真速度的技术变得愈发重要。Synopsys公司的仿真工具VCS所提供的多核技术就是利用目前计算机所拥有的多个处理器核并行工作,以达到对仿真速度的提升。通过在实际项目中分析和使用多核技术中的设计级并行仿真方法,证明了该多核技术的可行性和有效性。

  9. Wean Earlier and Automatically with New technology (the WEAN study: a protocol of a multicentre, pilot randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Lessard Martin R

    2009-09-01

    Full Text Available Abstract Background Weaning is the process during which mechanical ventilation is withdrawn and the work of breathing is transferred from the ventilator back to the patient. Prolonged weaning is associated with development of ventilator-related complications and longer stays in the Intensive Care Unit (ICU. Computerized or Automated Weaning is a novel weaning strategy that continuously measures and adapts ventilator support (by frequently measuring and averaging three breathing parameters and automatically conducts Spontaneous Breathing Trials to ascertain whether patients can resume autonomous breathing. Automated Weaning holds promise as a strategy to reduce the time spent on the ventilator, decrease ICU length of stay, and improve clinically important outcomes. Methods/Design A pilot weaning randomized controlled trial (RCT is underway in the ICUs of 8 Canadian hospitals. We will randomize 90 critically ill adults requiring invasive ventilation for at least 24 hours and identified at an early stage of the weaning process to either Automated Weaning (SmartCare™ or Protocolized Weaning. The results of a National Weaning Survey informed the design of the Protocolized Weaning arm. Both weaning protocols are operationalized in Pressure Support mode, include opportunities for Spontaneous Breathing Trials, and share a common sedation protocol, oxygen titration parameters, and extubation and reintubation criteria. The primary outcome of the WEAN study is to evaluate compliance with the proposed weaning and sedation protocols. A key secondary outcome of the pilot RCT is to evaluate clinician acceptance of the weaning and sedation protocols. Prior to initiating the WEAN Study, we conducted a run-in phase, involving two patients per centre (randomizing the first participant to either weaning strategy and assigning the second patient to the alternate strategy to ensure that participating centres could implement the weaning and sedation protocols and

  10. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  11. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    Science.gov (United States)

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  12. Verification of ceramic structures

    NARCIS (Netherlands)

    Behar-Lafenetre, S.; Cornillon, L.; Rancurel, M.; Graaf, D. de; Hartmann, P.; Coe, G.; Laine, B.

    2012-01-01

    In the framework of the "Mechanical Design and Verification Methodologies for Ceramic Structures" contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instr

  13. Evaluation of AK-225(R), Vertrel(R) MCA and HFE A 7100 as Alternative Solvents for Precision Cleaning and Verification Technology

    Science.gov (United States)

    Melendez, Orlando; Trizzino, Mary; Fedderson, Bryan

    1997-01-01

    The National Aeronautics and Space Administration (NASA), Kennedy Space Center (KSC) Materials Science Division conducted a study to evaluate alternative solvents for CFC-113 in precision cleaning and verification on typical samples that are used in the KSC environment. The effects of AK-225(R), Vertrel(R), MCA, and HFE A 7100 on selected metal and polymer materials were studied over 1, 7 and 30 day test times. This report addresses a study on the compatibility aspects of replacement solvents for materials in aerospace applications.

  14. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  15. 1394总线物理层芯片虚拟验证关键技术研究%Research on Key Technology of 1394 Bus PHY Chip Virtual Verification

    Institute of Scientific and Technical Information of China (English)

    徐文进; 田泽; 郑新建; 楼晓强

    2016-01-01

    1394 bus supports isochronous and asynchronous transaction of flow transmission,which has the characteristics of certain band-width,real-time data transmission and flexible topology,meeting the requirements of avionics system to bus bandwidth,real-time,fault tolerance and reliability. Physical layer chip is the core device of the IEEE1394 buses. In the whole development process of the chip,the ability to fully verify its direct impact on the final tape-out is crucial. In this paper,the function of the 1394 bus physical layer chip is ana-lyzed,and the verification strategy is described,and a kind of key technologies of virtual verification platform is put forward. This verifi-cation platform has high efficiency,flexibility and so on. Through the implementation of digital logic,it can shorten the time of verifica-tion,improve the efficiency of verification,save the human resources,and have a certain reference value for the development of the 1394 bus related products.%1394总线支持等时和异步流传输事务,具有确定性带宽、实时数据传输、拓扑灵活等特点,满足航空电子系统对总线带宽、实时性、容错和可靠性等方面的要求.物理层芯片是1394总线网络的核心器件,在研制过程中能否对其进行充分验证,是直接影响其投片成功的关键因素之一.文中通过对1394总线物理层芯片进行功能分析,描述了芯片的验证策略,提出了一种虚拟验证平台搭建的关键技术.该验证平台具有高效率、灵活等特点.通过对数字逻辑的验证实施,可以极大地缩短验证时间,提高验证效率,节省验证人力,并对后续1394总线相关产品的开发具有一定参考价值.

  16. Verification of an algorithm of cono collapsed through the IAEA TECDOC 1583 protocol and dosimetry with radiochromic films; Verificacion de un algoritmo de cono colapso mediante en protocolo IAEA TECDOC 1583 y dosimetria con peliculas radiocromicas

    Energy Technology Data Exchange (ETDEWEB)

    Martin-Viera Cueto, J. A.; Benitez Villegas, E. M.; Bodineau Gil, C.; Parra Osorio, V.; Garcia Pareja, S.; Casado Villalon, F. J.

    2013-07-01

    The objective of this study is to verify the characterization of the collapsed cone algorithm of an SP using this Protocol. In addition, given that it only offers details of dose values measured at discrete points, measures are complemented by a gamma test distributions 2D of doses in different cases using film radiochromic. (Author)

  17. Verification Technology of Uninterruption Power System Relay Protection for Smart Substation%智能变电站不停电电力系统继电保护校验技术

    Institute of Scientific and Technical Information of China (English)

    童洁; 陈晓刚; 侯伟宏

    2013-01-01

    In view of 220 kV Yunhui smart substation in Hangzhou municipal electric power bureau,combination of traditional secondary equipment and primary equipment with interruption of power supply for relay protection verification may increase scheduled outages of primary equipment and reduce power supply reliability.In order to ensure uninterruption of power supply relay protection verification for smart substation,some technologies including sample fiber optic network,GOOSE fiber optic network,GOOSE message,double-test line protection device,and complete double protection,are used to design GOOSE outlet safety measure of Yunhui smart substation.And then,the basic principle of online verification GOOSE outlet safety measure is proposed.At the same time,it discusses the safety measure of uninterruption of power supply protection verification for smart substation and engineering practice.So,it achieves the relay protection verification without power cut in China.Furthermore,it proves the reliability of online relay protection verification technolo gy without power cut in smart substation.%针对杭州电力局220 kV云会全智能变电站继电保护系统,采用传统的二次设备伴随一次设备停电的传统方法进行电力系统继电保护校验,增加了一次设备计划停电次数、降低了供电可靠性等.为使智能变电站继电保护不停电校验,充分利用智能变电站采样值光纤网络技术、GOOSE光纤网络技术、GOOSE心跳报文技术、双重化的保测一体化线路保护装置、双套保护实现完全双重化设计等整合出云会全智能化变电站的GOOSE出口安措技术,提出了在线校验GOOSE出口安措的基本原则,探索了智能变电站不停电保护校验的安措,并进行了智能变电站不停电保护校验的工程实践,实现了我国智能变电站继电保护不停电校验,进而验证了智能化变电站继电保护不停电在线校验安措技术的可靠性.

  18. Monitoring and verification R&D

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  19. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  20. Research on IM Protocol Recognition System Based on DPI Technology%基于DPI技术的IM协议识别系统研究

    Institute of Scientific and Technical Information of China (English)

    王凯; 吴君钦

    2013-01-01

    Aiming at lawbreakers take advantage of the IM protocol communication software to divulge state and corporate secrets,as well as dissemination of reactionary remarks,in order to solve this problem,on the basis of studying and analyzing in-depth the IM protocol of a variety of instant messaging software,summarizing the previous IM protocol identification system's defects,combined with the applica-tion of DPI technology a novel IM protocol detection system is designed,which is the IM protocol recognition system based on DPI tech-nology. This system is capable of effective identification and monitoring of a variety of real-time communication software. Through the real-time monitoring experiments on a variety of instant messaging software such as QQ,fetion,MSN,the Sina microblogging desktop e-dition,googletalk,yahoomsg etc,verify the system with superior recognition rate and perfect stability.%针对不法分子利用IM协议通信软件泄露国家和企业机密以及传播反动言论的问题,文中在深入研究和分析多种即时通信软件的IM协议的基础上,总结以往IM协议识别系统的缺陷,配合DPI技术的应用设计了一个全新的IM协议检测系统,即基于DPI技术的IM协议识别系统,该系统能够有效地对多种即时通信软件进行识别和监控。通过实验对多种即时通信软件如QQ,fetion,MSN,新浪微博桌面版,googletalk,yahoomsg等的文本信息进行实时监控,验证了该系统对IM协议识别具备极高的识别率以及优越的稳定性。

  1. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  2. Communication protocol conversion platform based on OPC technology%基于OPC技术的通信协议转换平台

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      在通信领域,OPC技术满足了现场设备与操作系统之间的通信要求,把现场的数据转化成统一的、规范的OPC数据,有利于科学集中地管理通信数据。文章在OPC技术的基础上,探究其在通信协议转换平台中的实践应用。%OPC technology has meet the communication demand between site equipment and operating system in the communications field,changing spot data into unitive and normative OPC data is of benefit to administrate communication data intensively.The applica-tion of the OPC technology in the communication protocol conversion platform is discussed in this paper.

  3. Distributed Engine Control Empirical/Analytical Verification Tools Project

    Data.gov (United States)

    National Aeronautics and Space Administration — In this Phase I project, Impact Technologies, in collaboration with Prof. R.K. Yedavalli, propose a novel verification environment for eventual rapid certification...

  4. 无线网络中TCP/NC协议性能分析与仿真验证%Performance Analysis and Simulation Verification of TCP/NC Protocol in Wireless Network

    Institute of Scientific and Technical Information of China (English)

    葛卫民; 朱海颖; 李娟

    2015-01-01

    In order to improve the traditional Transmission Control Protocol( TCP) performance in wireless networks, this paper solves throughput rate model of three TCP protocols,TCP Reno,TCP Vegas and TCP/NC based on network coding through Matlab,and analyzes the theoretical value of the three models in different networks,and verifies whether TCP/NC model can improve its throughput rate. The three models are simulated through NS-2,and simulation results show the effectiveness of TCP/NC protocol and its analysis model.%为改进传统传输控制协议( TCP)在无线网络中的性能,运用Matlab对TCP Reno,TCP Vegas和基于网络编码的TCP/NC吞吐率分析模型进行数值求解,分析3个模型在不同网络环境下应达到的理论值,验证TCP/NC模型在理论上能否提高其吞吐率。基于NS-2对3种吞吐率模型进行仿真,结果表明,TCP/NC及其分析模型可有效改进TCP协议。

  5. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  6. Development of nuclear thermal hydraulic verification test and evaluation technology - Development of fundamental technique for experiment of natural circulation phenomena in PWR systems

    Energy Technology Data Exchange (ETDEWEB)

    Park, Goon Cherl; Lee, Tae Ho; Kim, Moon Oh; Kim, Hak Joon [Seoul National University, Seoul (Korea)

    2000-04-01

    The dimensional analysis applied two-fluid model of CFX-4,2 were performed. For verification of analysis results, experimental measurement data of two-phase flow parameters in subcooled boiling flow were produced for vertical(0 deg) and inclination (60 deg). And through comparison analysis and experiments the application possibility of various two -phase flow models and the analysis ability of code were evaluated. Measurement technique of bubble velocity in two-phase flow using backscattering standard LDV was investigated from slug to bubbly flow regime. The range of velocity measured is from 0.2 to 1.5 m/s and that of bubble size is from 2 to 20 mm. For local temperature of boiling flow measurement, microthermocouple were manufactured and local liquid and vapor temperatures were measured in pool boiling and boiling flow. 66 refs., 74 figs., 4 tabs. (Author)

  7. Remotely-Supervised Transcranial Direct Current Stimulation (tDCS for Clinical Trials: Guidelines for Technology and Protocols

    Directory of Open Access Journals (Sweden)

    Leigh E Charvet

    2015-03-01

    Full Text Available The effect of transcranial direct current stimulation (tDCS is cumulative. Treatment protocols typically require multiple consecutive sessions spanning weeks or months. However, traveling to clinic for a tDCS session can present an obstacle to subjects and their caregivers. With modified devices and headgear, tDCS treatment can be administered remotely under clinical supervision, potentially enhancing recruitment, throughput, and convenience. Here we propose standards and protocols for clinical trials utilizing remotely-supervised tDCS with the goal of providing safe, reproducible and well-tolerated stimulation therapy outside of the clinic. The recommendations include: 1 training of staff in tDCS treatment and supervision, 2 assessment of the user’s capability to participate in tDCS remotely, 3 ongoing training procedures and materials including assessments of the user and/or caregiver, 4 simple and fail-safe electrode preparation techniques and tDCS headgear, 5 strict dose control for each session, 6 ongoing monitoring to quantify compliance (device preparation, electrode saturation/placement, stimulation protocol, with corresponding corrective steps as required, 7 monitoring for treatment-emergent adverse effects, 8 guidelines for discontinuation of a session and/or study participation including emergency failsafe procedures tailored to the treatment population’s level of need. These guidelines are intended to provide a minimal level of methodological rigor for clinical trials seeking to apply tDCS outside a specialized treatment center. We outline indication-specific applications (Attention Deficit Hyperactivity Disorder, Depression, Multiple Sclerosis, Palliative Care following these recommendations that support a standardized framework for evaluating the tolerability and reproducibility of remote-supervised tDCS that, once established, will allow for translation of tDCS clinical trials to a greater size and range of patient populations.

  8. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  9. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  10. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  11. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program......, which in turn is used to transform the program into Static Single Assignment form. In SSA, verification is reduced to simple type compatibility checking between the definition type of each SSA variable and the type of each of its uses. Inter-adjacent transitions of a value through stack and registers...... are no longer verified explicitly. This integrated approach is more efficient than traditional bytecode verification but still as safe as strict verification, as overall program correctness can be induced once the data flow from each definition to all associated uses is known to be type-safe....

  12. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  13. Formal Modeling and Verification for MVB

    Directory of Open Access Journals (Sweden)

    Mo Xia

    2013-01-01

    Full Text Available Multifunction Vehicle Bus (MVB is a critical component in the Train Communication Network (TCN, which is widely used in most of the modern train techniques of the transportation system. How to ensure security of MVB has become an important issue. Traditional testing could not ensure the system correctness. The MVB system modeling and verification are concerned in this paper. Petri Net and model checking methods are used to verify the MVB system. A Hierarchy Colored Petri Net (HCPN approach is presented to model and simulate the Master Transfer protocol of MVB. Synchronous and asynchronous methods are proposed to describe the entities and communication environment. Automata model of the Master Transfer protocol is designed. Based on our model checking platform M3C, the Master Transfer protocol of the MVB is verified and some system logic critical errors are found. Experimental results show the efficiency of our methods.

  14. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  15. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  16. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  17. NTRIP: Networked Transport of RTCM via Internet Protocol - Internet Radio Technology for Real-Time GNSS Purposes

    Science.gov (United States)

    Gebhard, H.; Weber, G.

    2003-12-01

    The massive worldwide growing of Internet capacity enables the introduction of new services such as Internet Radio or Internet Video-on-Demand, which transfer continuous data-streams by IP-packages. These services include the data transport via mobile IP-Networks like GSM, GPRS, EDGE, and UMTS where costs are nowadays rapidly decreasing. As a consequence, the global Internet can be used for the real-time collection and exchange of GNSS data, as well as for broadcasting derived differential products. Compared to Multimedia applications, the bandwidth required for streaming GNSS data is relatively small. The introduction of a real time streaming of GNSS data via Internet as a professional service is demanding with respect to network transparency, network security, program stability, access control, remote administration, scalability and client simplicity. This paper will discuss several possible technical/protocol solutions for streaming GNSS date over the Internet: Unicast vs. IP-Multicast, TCP vs. UDP, Client/Server vs. Client/Server/Splitter architecture. Based on this discussion, a novel HTTP-based technique for streaming GNSS data to mobile clients over the Internet is introduced. It allows simultaneous access of a large number of PDAs, Laptops, or GNSS receivers to a broadcasting host via Mobile IP-Networks. The technique establishes a format called "Networked Transport of RTCM via Internet Protocol" (NTRIP). NTRIP is designed for disseminating differential correction data (e.g. in the RTCM-104 format) or other kinds of GNSS streaming data.

  18. The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Technologies and Possible Association with Brain Tumor Risk.

    Science.gov (United States)

    Sadetzki, Siegal; Langer, Chelsea Eastman; Bruchim, Revital; Kundi, Michael; Merletti, Franco; Vermeulen, Roel; Kromhout, Hans; Lee, Ae-Kyoung; Maslanyj, Myron; Sim, Malcolm R; Taki, Masao; Wiart, Joe; Armstrong, Bruce; Milne, Elizabeth; Benke, Geza; Schattner, Rosa; Hutter, Hans-Peter; Woehrer, Adelheid; Krewski, Daniel; Mohipp, Charmaine; Momoli, Franco; Ritvo, Paul; Spinelli, John; Lacour, Brigitte; Delmas, Dominique; Remen, Thomas; Radon, Katja; Weinmann, Tobias; Klostermann, Swaantje; Heinrich, Sabine; Petridou, Eleni; Bouka, Evdoxia; Panagopoulou, Paraskevi; Dikshit, Rajesh; Nagrani, Rajini; Even-Nir, Hadas; Chetrit, Angela; Maule, Milena; Migliore, Enrica; Filippini, Graziella; Miligi, Lucia; Mattioli, Stefano; Yamaguchi, Naohito; Kojimahara, Noriko; Ha, Mina; Choi, Kyung-Hwa; Mannetje, Andrea 't; Eng, Amanda; Woodward, Alistair; Carretero, Gema; Alguacil, Juan; Aragones, Nuria; Suare-Varela, Maria Morales; Goedhart, Geertje; Schouten-van Meeteren, A Antoinette Y N; Reedijk, A Ardine M J; Cardis, Elisabeth

    2014-01-01

    The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case-control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10-24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: (1) the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; (2) investigating a young study population spanning a relatively wide age range; (3) conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; (4) investigating a rare and potentially fatal disease; and (5) assessing exposure to EMF from communication technologies. Our experience in thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people.

  19. The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Technologies and Possible Association with Brain Tumor Risk

    Science.gov (United States)

    Sadetzki, Siegal; Langer, Chelsea Eastman; Bruchim, Revital; Kundi, Michael; Merletti, Franco; Vermeulen, Roel; Kromhout, Hans; Lee, Ae-Kyoung; Maslanyj, Myron; Sim, Malcolm R.; Taki, Masao; Wiart, Joe; Armstrong, Bruce; Milne, Elizabeth; Benke, Geza; Schattner, Rosa; Hutter, Hans-Peter; Woehrer, Adelheid; Krewski, Daniel; Mohipp, Charmaine; Momoli, Franco; Ritvo, Paul; Spinelli, John; Lacour, Brigitte; Delmas, Dominique; Remen, Thomas; Radon, Katja; Weinmann, Tobias; Klostermann, Swaantje; Heinrich, Sabine; Petridou, Eleni; Bouka, Evdoxia; Panagopoulou, Paraskevi; Dikshit, Rajesh; Nagrani, Rajini; Even-Nir, Hadas; Chetrit, Angela; Maule, Milena; Migliore, Enrica; Filippini, Graziella; Miligi, Lucia; Mattioli, Stefano; Yamaguchi, Naohito; Kojimahara, Noriko; Ha, Mina; Choi, Kyung-Hwa; Mannetje, Andrea ’t; Eng, Amanda; Woodward, Alistair; Carretero, Gema; Alguacil, Juan; Aragones, Nuria; Suare-Varela, Maria Morales; Goedhart, Geertje; Schouten-van Meeteren, A. Antoinette Y. N.; Reedijk, A. Ardine M. J.; Cardis, Elisabeth

    2014-01-01

    The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: (1) the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; (2) investigating a young study population spanning a relatively wide age range; (3) conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; (4) investigating a rare and potentially fatal disease; and (5) assessing exposure to EMF from communication technologies. Our experience in thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people. PMID:25295243

  20. The MOBI-Kids study protocol: challenges in assessing childhood and adolescent exposure to electromagnetic fields from wireless telecommunication technologies and possible association with brain tumor risk

    Directory of Open Access Journals (Sweden)

    Siegal eSadetzki

    2014-09-01

    Full Text Available The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF, extremely low frequency (ELF electromagnetic fields (EMF. MOBI-Kids, a multinational case-control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10-24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: 1 the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; 2 investigating a young study population spanning a relatively wide age-range. 3 conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; 4 investigating a rare and potentially fatal disease; and 5 assessing exposure to EMF from communication technologies. Our experience thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people.

  1. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  2. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order......We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... to ensure the finiteness of the protocol state-spaces while still being able to verify interesting protocol properties. The translations for different kinds of communication media have been implemented and successfully tested, among others, on agreement protocols from WS-Business Activity....

  3. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  4. Research on Field Verification Technology of Substation Intelligent Measurement System%智能变电站量测系统现场检定技术的研究

    Institute of Scientific and Technical Information of China (English)

    程昱舒; 潘泳超; 赵园; 蔚晓明

    2013-01-01

      智能变电站与传统变电站的量测系统有很大区别,以电子式互感器为电流电压数据采集单元的智能量测系统有着传统量测系统无法比拟的优点,但应用中也遇到了一些问题。在调试过程中,大部分问题的解决都必须以适应智能化、信息化的方式去思考、去剖析。本文主要介绍了智能量测系统在智能变电站的应用,研究了电子式互感器及数字电能表的现场校验技术,最后结合实际经验分析了现场检定过程中可能遇到的问题,并提出解决方案。%  Intelligent measurement system of the smart substation is very different from the traditional measurement system of the substation. The system which takes electronic transformers as current and voltage data acquisition unit has incomparable advantages over the traditional measurement systems. But the new system has encountered some problems in the application. This paper introduces the intelligent measurement system to think and parse the most of theproblems with the way of intelligence and information. And it has studied the field verification technology of the electronic transformer and digital energy meter as well. Combining with practical experience, the paper also analyzes the might encountering problems in the field verification process, and proposes solutions.

  5. INDEPENDENT VERIFICATION SURVEY REPORT FOR EXPOSURE UNITS Z2-24, Z2-31, Z2-32, AND Z2-36 IN ZONE 2 OF THE EAST TENNESSEE TECHNOLOGY PARK OAK RIDGE, TENNESSEE

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-10-10

    The U.S. Department of Energy (DOE) Oak Ridge Office of Environmental Management selected Oak Ridge Associated Universities (ORAU), through the Oak Ridge Institute for Science and Education (ORISE) contract, to perform independent verification (IV) at Zone 2 of the East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. ORAU has concluded IV surveys, per the project-specific plan (PSP) (ORAU 2013a) covering exposure units (EUs) Z2-24, -31, -32, and -36. The objective of this effort was to verify the following. • Target EUs comply with requirements in the Zone 2 Record of Decision (ROD) (DOE 2005), as implemented by using the dynamic verification strategy presented in the dynamic work plan (DWP) (BJC 2007) • Commitments in the DWP were adequately implemented, as verified via IV surveys and soil sampling The Zone 2 ROD establishes maximum remediation level (RLmax) values and average RL (RLavg) values for the primary contaminants of concern (COCs) U-234, U-235, U-238, Cs-137, Np-237, Ra-226, Th-232, arsenic, mercury, and polychlorinated biphenyls (PCBs). Table 1.1 lists Zone 2 COCs with associated RLs. Additional radiological and chemical contaminants were also identified during past characterization and monitoring actions, though the ROD does not present RLs for these potential contaminants. IV activities focused on the identification and quantification of ROD-specific COCs in surface soils, but also generated data for other analytes to support future decisions. ORAU personnel also reviewed EU-specific phased construction completion reports (PCCRs) to focus IV activities and identify potential judgmental sample locations, if any.

  6. Cognitive Protocol Stack Design

    Science.gov (United States)

    2015-12-30

    directly related to the protocol stack, e.g., environmental or positioning data) that can be exploited to design and test novel cognitive networking ...quality of service (QoS) is challenging. Currently, 5G technologies are being developed to answer the need for further increasing network capacity, and...SECURITY CLASSIFICATION OF: In the ARO “Cognitive Protocol Stack Design" project we proposed cognitive networking solutions published in international

  7. Protocol for evaluation of the cost-effectiveness of ePrescribing systems and candidate prototype for other related health information technologies

    Science.gov (United States)

    2014-01-01

    Background This protocol concerns the assessment of cost-effectiveness of hospital health information technology (HIT) in four hospitals. Two of these hospitals are acquiring ePrescribing systems incorporating extensive decision support, while the other two will implement systems incorporating more basic clinical algorithms. Implementation of an ePrescribing system will have diffuse effects over myriad clinical processes, so the protocol has to deal with a large amount of information collected at various ‘levels’ across the system. Methods/Design The method we propose is use of Bayesian ideas as a philosophical guide. Assessment of cost-effectiveness requires a number of parameters in order to measure incremental cost utility or benefit – the effectiveness of the intervention in reducing frequency of preventable adverse events; utilities for these adverse events; costs of HIT systems; and cost consequences of adverse events averted. There is no single end-point that adequately and unproblematically captures the effectiveness of the intervention; we therefore plan to observe changes in error rates and adverse events in four error categories (death, permanent disability, moderate disability, minimal effect). For each category we will elicit and pool subjective probability densities from experts for reductions in adverse events, resulting from deployment of the intervention in a hospital with extensive decision support. The experts will have been briefed with quantitative and qualitative data from the study and external data sources prior to elicitation. Following this, there will be a process of deliberative dialogues so that experts can “re-calibrate” their subjective probability estimates. The consolidated densities assembled from the repeat elicitation exercise will then be used to populate a health economic model, along with salient utilities. The credible limits from these densities can define thresholds for sensitivity analyses. Discussion The

  8. Formal Verification, Engineering and Business Value

    Directory of Open Access Journals (Sweden)

    Ralf Huuck

    2012-12-01

    Full Text Available How to apply automated verification technology such as model checking and static program analysis to millions of lines of embedded C/C++ code? How to package this technology in a way that it can be used by software developers and engineers, who might have no background in formal verification? And how to convince business managers to actually pay for such a software? This work addresses a number of those questions. Based on our own experience on developing and distributing the Goanna source code analyzer for detecting software bugs and security vulnerabilities in C/C++ code, we explain the underlying technology of model checking, static analysis and SMT solving, steps involved in creating industrial-proof tools.

  9. multi-protocol dimming System Based on ARM Technology%基于ARM技术的多协议调光系统

    Institute of Scientific and Technical Information of China (English)

    李南安; 梁芳芳

    2012-01-01

    In order to meet the dimming system networked and multi-protocol trends,and some suggestions of multi-protocol dimming System based on the ARM technology were put forward.Used the embedded Linux operating system and industrial ARM9 development platform,through designing the realized system,the equipment demand of dimming market was realized effectively,it enriched the corporate products and the product adaptability was enhanced.%为了满足调光系统的网络化和多协议趋势,提出了一种基于ARM技术的多协议调光系统。采用嵌入式linux操作系统和工业化的工业级ARM9开发平台。所设计实现的系统有效的实现了调光市场的设备需求,丰富了公司的产品和增强了产品适应性。

  10. The effectiveness of M-health technologies for improving health and health services: a systematic review protocol

    Directory of Open Access Journals (Sweden)

    Patel Vikram

    2010-10-01

    Full Text Available Abstract Background The application of mobile computing and communication technology is rapidly expanding in the fields of health care and public health. This systematic review will summarise the evidence for the effectiveness of mobile technology interventions for improving health and health service outcomes (M-health around the world. Findings To be included in the review interventions must aim to improve or promote health or health service use and quality, employing any mobile computing and communication technology. This includes: (1 interventions designed to improve diagnosis, investigation, treatment, monitoring and management of disease; (2 interventions to deliver treatment or disease management programmes to patients, health promotion interventions, and interventions designed to improve treatment compliance; and (3 interventions to improve health care processes e.g. appointment attendance, result notification, vaccination reminders. A comprehensive, electronic search strategy will be used to identify controlled studies, published since 1990, and indexed in MEDLINE, EMBASE, PsycINFO, Global Health, Web of Science, the Cochrane Library, or the UK NHS Health Technology Assessment database. The search strategy will include terms (and synonyms for the following mobile electronic devices (MEDs and a range of compatible media: mobile phone; personal digital assistant (PDA; handheld computer (e.g. tablet PC; PDA phone (e.g. BlackBerry, Palm Pilot; Smartphone; enterprise digital assistant; portable media player (i.e. MP3 or MP4 player; handheld video game console. No terms for health or health service outcomes will be included, to ensure that all applications of mobile technology in public health and health services are identified. Bibliographies of primary studies and review articles meeting the inclusion criteria will be searched manually to identify further eligible studies. Data on objective and self-reported outcomes and study quality will

  11. Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana (REACCTING): study rationale and protocol.

    Science.gov (United States)

    Dickinson, Katherine L; Kanyomse, Ernest; Piedrahita, Ricardo; Coffey, Evan; Rivera, Isaac J; Adoctor, James; Alirigia, Rex; Muvandimwe, Didier; Dove, MacKenzie; Dukic, Vanja; Hayden, Mary H; Diaz-Sanchez, David; Abisiba, Adoctor Victor; Anaseba, Dominic; Hagar, Yolanda; Masson, Nicholas; Monaghan, Andrew; Titiati, Atsu; Steinhoff, Daniel F; Hsu, Yueh-Ya; Kaspar, Rachael; Brooks, Bre'Anna; Hodgson, Abraham; Hannigan, Michael; Oduro, Abraham Rexford; Wiedinmyer, Christine

    2015-02-12

    Cooking over open fires using solid fuels is both common practice throughout much of the world and widely recognized to contribute to human health, environmental, and social problems. The public health burden of household air pollution includes an estimated four million premature deaths each year. To be effective and generate useful insight into potential solutions, cookstove intervention studies must select cooking technologies that are appropriate for local socioeconomic conditions and cooking culture, and include interdisciplinary measurement strategies along a continuum of outcomes. REACCTING (Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana) is an ongoing interdisciplinary randomized cookstove intervention study in the Kassena-Nankana District of Northern Ghana. The study tests two types of biomass burning stoves that have the potential to meet local cooking needs and represent different "rungs" in the cookstove technology ladder: a locally-made low-tech rocket stove and the imported, highly efficient Philips gasifier stove. Intervention households were randomized into four different groups, three of which received different combinations of two improved stoves, while the fourth group serves as a control for the duration of the study. Diverse measurements assess different points along the causal chain linking the intervention to final outcomes of interest. We assess stove use and cooking behavior, cooking emissions, household air pollution and personal exposure, health burden, and local to regional air quality. Integrated analysis and modeling will tackle a range of interdisciplinary science questions, including examining ambient exposures among the regional population, assessing how those exposures might change with different technologies and behaviors, and estimating the comparative impact of local behavior and technological changes versus regional climate variability and change on local air quality and health outcomes

  12. Verification of the Usefulness of the Trimble Rtx Extended Satellite Technology with the Xfill Function in the Local Network Implementing Rtk Measurements

    Science.gov (United States)

    Siejka, Zbigniew

    2014-12-01

    The paper presents the method of satellite measurements, which gives users the ability of GNSS continuous precise positioning in real time, even in the case of short interruptions in receiving the correction of the local ground system of measurements support. The proposed method is a combination of two satellite positioning technologies RTN GNSS and RTX Extended. In technology RTX Extended the xFill function was used for precise positioning in real time and in the local reference system. This function provides the ability to perform measurement without the need for constant communication with the ground support satellite system. Test measurements were performed on a test basis located in Krakow, and RTN GNSS positioning was done based on the national network of reference stations of the ASGEUPOS. The solution allows for short (up to 5 minutes) interruptions in radio or internet communication. When the primary stream of RTN correction is not available, then the global corrections Trimble xFill broadcasted by satellite are used. The new technology uses in the real-time data from the global network of tracking stations and contributes significantly to improving the quality and efficiency of surveying works. At present according to the authors, technology Trimble CenterPoint RTX can guarantee repeatability of measurements not worse than 3.8 cm (Trimble Survey Division, 2012). In the paper the comparative analysis of measurement results between the two technologies was performed: RTN carried out in the classic way, which was based on the corrections of the terrestrial local network of the Polish system of active geodetic network (ASG-EUPOS) and RTK xFill technology. The results were related to the data of test network, established as error free. The research gave satisfactory results and confirmed the great potential of the use of the new technology in the geodetic work realization. By combining these two technologies of GNSS surveying the user can greatly improve the

  13. Protocol for Data Collection and Analysis Applied to Automated Facial Expression Analysis Technology and Temporal Analysis for Sensory Evaluation.

    Science.gov (United States)

    Crist, Courtney A; Duncan, Susan E; Gallagher, Daniel L

    2016-08-26

    We demonstrate a method for capturing emotional response to beverages and liquefied foods in a sensory evaluation laboratory using automated facial expression analysis (AFEA) software. Additionally, we demonstrate a method for extracting relevant emotional data output and plotting the emotional response of a population over a specified time frame. By time pairing each participant's treatment response to a control stimulus (baseline), the overall emotional response over time and across multiple participants can be quantified. AFEA is a prospective analytical tool for assessing unbiased response to food and beverages. At present, most research has mainly focused on beverages. Methodologies and analyses have not yet been standardized for the application of AFEA to beverages and foods; however, a consistent standard methodology is needed. Optimizing video capture procedures and resulting video quality aids in a successful collection of emotional response to foods. Furthermore, the methodology of data analysis is novel for extracting the pertinent data relevant to the emotional response. The combinations of video capture optimization and data analysis will aid in standardizing the protocol for automated facial expression analysis and interpretation of emotional response data.

  14. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  15. Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana (REACCTING): study rationale and protocol

    OpenAIRE

    Dickinson, Katherine L.; Kanyomse, Ernest; Piedrahita, Ricardo; Coffey, Evan; Rivera, Isaac J; Adoctor, James; Alirigia, Rex; Muvandimwe, Didier; Dove, MacKenzie; Dukic, Vanja; Mary H Hayden; Diaz-Sanchez, David; Abisiba, Adoctor Victor; Anaseba, Dominic; Hagar, Yolanda

    2015-01-01

    Background Cooking over open fires using solid fuels is both common practice throughout much of the world and widely recognized to contribute to human health, environmental, and social problems. The public health burden of household air pollution includes an estimated four million premature deaths each year. To be effective and generate useful insight into potential solutions, cookstove intervention studies must select cooking technologies that are appropriate for local socioeconomic conditio...

  16. Wind gust warning verification

    Science.gov (United States)

    Primo, Cristina

    2016-07-01

    Operational meteorological centres around the world increasingly include warnings as one of their regular forecast products. Warnings are issued to warn the public about extreme weather situations that might occur leading to damages and losses. In forecasting these extreme events, meteorological centres help their potential users in preventing the damage or losses they might suffer. However, verifying these warnings requires specific methods. This is due not only to the fact that they happen rarely, but also because a new temporal dimension is added when defining a warning, namely the time window of the forecasted event. This paper analyses the issues that might appear when dealing with warning verification. It also proposes some new verification approaches that can be applied to wind warnings. These new techniques are later applied to a real life example, the verification of wind gust warnings at the German Meteorological Centre ("Deutscher Wetterdienst"). Finally, the results obtained from the latter are discussed.

  17. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  18. Requirement Assurance: A Verification Process

    Science.gov (United States)

    Alexander, Michael G.

    2011-01-01

    Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

  19. IP Routing Protocols

    Science.gov (United States)

    Nolasco Pinto, Armando

    2002-03-01

    Uyless Black is a widely known expert in computer networks and data communications. He is author of more than ten books in the communication technologies field, which puts him in a good position to address this topic. In IP Routing Protocols he starts by providing the background and concepts required for understanding TCP/IP technology. This is done clearly and assumes little prior knowledge of the area. As might be expected, he emphasizes the IP route discovery problem. Later he details several routing protocols.

  20. SoC Design Approach Using Convertibility Verification

    Directory of Open Access Journals (Sweden)

    Basu Samik

    2008-01-01

    Full Text Available Abstract Compositional design of systems on chip from preverified components helps to achieve shorter design cycles and time to market. However, the design process is affected by the issue of protocol mismatches, where two components fail to communicate with each other due to protocol differences. Convertibility verification, which involves the automatic generation of a converter to facilitate communication between two mismatched components, is a collection of techniques to address protocol mismatches. We present an approach to convertibility verification using module checking. We use Kripke structures to represent protocols and the temporal logic to describe desired system behavior. A tableau-based converter generation algorithm is presented which is shown to be sound and complete. We have developed a prototype implementation of the proposed algorithm and have used it to verify that it can handle many classical protocol mismatch problems along with SoC problems. The initial idea for -based convertibility verification was presented at SLA++P '07 as presented in the work by Roopak Sinha et al. 2008.

  1. Open verification methodology cookbook

    CERN Document Server

    Glasser, Mark

    2009-01-01

    Functional verification is an art as much as a science. It requires not only creativity and cunning, but also a clear methodology to approach the problem. The Open Verification Methodology (OVM) is a leading-edge methodology for verifying designs at multiple levels of abstraction. It brings together ideas from electrical, systems, and software engineering to provide a complete methodology for verifying large scale System-on-Chip (SoC) designs. OVM defines an approach for developing testbench architectures so they are modular, configurable, and reusable. This book is designed to help both novic

  2. Process Document for the joint ETV/NOWATECH verification of the Sorbisense GSW40 passive sampler

    Science.gov (United States)

    Nordic Water Technology Verification Center’s (NOWATECH) DHI Water Monitoring Center (DHI WMC), a pilot Environmental Technology Verification (ETV) program in the European Union, and the United States Environmental Protection Agency ETV (US EPA ETV) program’s Advanced Monitoring ...

  3. Environmental Technology Verification Report and Statement for Baghouse Filtration Products, W. L. Gore & Associates, Inc. 5117 High Durability PPS Laminate Filtration Media (Tested March-April 2012)

    Science.gov (United States)

    Baghouses are air pollution control devices used to control particulate emissions from stationary sources and are among the technologies evaluated by the APCT Center. Baghouses and their accompanying filter media have long been one of the leading particulate control techniques fo...

  4. Environmental Technology Verification Report and Statement for Baghouse Filtration Products, W. L. Gore & Associates, Inc. 5117 High Durability PPS Laminate Filtration Media (Tested March-April 2012)

    Science.gov (United States)

    Baghouses are air pollution control devices used to control particulate emissions from stationary sources and are among the technologies evaluated by the APCT Center. Baghouses and their accompanying filter media have long been one of the leading particulate control techniques fo...

  5. Research of VPN Technology based on SSL Protocol%基于SSL协议的VPN技术研究

    Institute of Scientific and Technical Information of China (English)

    张宁

    2011-01-01

    SSL VPN is a new technology of VPN which is very spectacular recently.In this paper,the structure and principle of SSL are analyzed,the principle of implementation is studied,and two categories of SSL VPN are introduced:proxy-based SSL VPN and tunnel-based SSL VPN.Then The application of SSL VPN things to note are analyzed.%基于SSL协议的VPN是近年来兴起的一种新型的VPN技术。该文分析了SSL协议的组成结构及工作机制,研究了SSL VPN的实现原理,简要介绍了代理型和隧道型两种SSL VPN技术的特点,分析了应用SSL VPN需要注意的问题。

  6. Quantitative Verification in Practice

    NARCIS (Netherlands)

    Haverkort, Boudewijn R.; Katoen, Joost-Pieter; Larsen, Kim G.

    2010-01-01

    Soon after the birth of model checking, the first theoretical achievements have been reported on the automated verification of quanti- tative system aspects such as discrete probabilities and continuous time. These theories have been extended in various dimensions, such as con- tinuous probabilities

  7. Component Verification and Certification in NASA Missions

    Science.gov (United States)

    Giannakopoulou, Dimitra; Penix, John; Norvig, Peter (Technical Monitor)

    2001-01-01

    Software development for NASA missions is a particularly challenging task. Missions are extremely ambitious scientifically, have very strict time frames, and must be accomplished with a maximum degree of reliability. Verification technologies must therefore be pushed far beyond their current capabilities. Moreover, reuse and adaptation of software architectures and components must be incorporated in software development within and across missions. This paper discusses NASA applications that we are currently investigating from these perspectives.

  8. Validity of 3 protocols for verifying VO2 max.

    Science.gov (United States)

    Kirkeberg, J M; Dalleck, L C; Kamphoff, C S; Pettitt, R W

    2011-04-01

    The verification bout has emerged as a technique for confirming 'true' VO2 max; however, validity during a single visit is unknown. We evaluated 3 different GXT durations with severe intensity verification bouts. On 3 separate days, in counterbalanced order, 12 recreational-trained men completed short (9±1 min), middle (11±1 min), and long (13±2 min) duration GXTs followed by exhaustive, sine wave verification bouts during the same visit. Intensities for verification were set at speeds equivalent to 2-stages minus end-GXT speed. No differences (pVO2 max (mL/kg/min) were observed between short (49.1), middle (48.2), and long (48.8) protocols. In addition, no differences in verification bout duration occurred between protocols (3±1 min). Validity of VO2 max was strongest for the middle duration protocol (ICC α=0.97; typical error=1 mL/kg/min; CV=2%). A small, but significantly higher HR (max) (∼1-2 bpm) was observed for the long protocol. Maximum respiratory exchange ratios were inconsistent (ICC α ranged 0.58-0.68). Our findings indicate GXT-verification bout testing during a single visit is a valid means of measuring 'true' VO2 max. The 10 min target for GXT duration was the optimum. © Georg Thieme Verlag KG Stuttgart · New York.

  9. Proceedings of the Defense Nuclear Agency Conference on Arms Control and Verification Technology (ACT) Held in Williamsburg, Virginia on 1-4 June 1992

    Science.gov (United States)

    1993-12-01

    response (IPR) methodology is a measure of the width of the magnitude intensity of the SAR image of a trihedral corner reflector made of radar -reflecting...nature of imaging radars , where there is not an easy way of assuring that the trihedral corner reflector will always be located exactly in the middle...sufficient nuclear expertise remain to inform and staff the IAEA process?17 - If cruise missiles, technologies to reduce radar cross sections , ad

  10. Using mobile technology to deliver a cognitive behaviour therapy-informed intervention in early psychosis (Actissist): study protocol for a randomised controlled trial.

    Science.gov (United States)

    Bucci, Sandra; Barrowclough, Christine; Ainsworth, John; Morris, Rohan; Berry, Katherine; Machin, Matthew; Emsley, Richard; Lewis, Shon; Edge, Dawn; Buchan, Iain; Haddock, Gillian

    2015-09-10

    Cognitive behaviour therapy (CBT) is recommended for the treatment of psychosis; however, only a small proportion of service users have access to this intervention. Smartphone technology using software applications (apps) could increase access to psychological approaches for psychosis. This paper reports the protocol development for a clinical trial of smartphone-based CBT. We present a study protocol that describes a single-blind randomised controlled trial comparing a cognitive behaviour therapy-informed software application (Actissist) plus Treatment As Usual (TAU) with a symptom monitoring software application (ClinTouch) plus TAU in early psychosis. The study consists of a 12-week intervention period. We aim to recruit and randomly assign 36 participants registered with early intervention services (EIS) across the North West of England, UK in a 2:1 ratio to each arm of the trial. Our primary objective is to determine whether in people with early psychosis the Actissist app is feasible to deliver and acceptable to use. Secondary aims are to determine whether Actissist impacts on predictors of first episode psychosis (FEP) relapse and enhances user empowerment, functioning and quality of life. Assessments will take place at baseline, 12 weeks (post-treatment) and 22-weeks (10 weeks post-treatment) by assessors blind to treatment condition. The trial will report on the feasibility and acceptability of Actissist and compare outcomes between the randomised arms. The study also incorporates semi-structured interviews about the experience of participating in the Actissist trial that will be qualitatively analysed to inform future developments of the Actissist protocol and app. To our knowledge, this is the first controlled trial to test the feasibility, acceptability, uptake, attrition and potential efficacy of a CBT-informed smartphone app for early psychosis. Mobile applications designed to deliver a psychologically-informed intervention offer new possibilities to

  11. Public preferences for engagement in Health Technology Assessment decision-making: protocol of a mixed methods study.

    Science.gov (United States)

    Wortley, Sally; Tong, Allison; Lancsar, Emily; Salkeld, Glenn; Howard, Kirsten

    2015-07-14

    Much attention in recent years has been given to the topic of public engagement in health technology assessment (HTA) decision-making. HTA organizations spend substantial resources and time on undertaking public engagement, and numerous studies have examined challenges and barriers to engagement in the decision-making process however uncertainty remains as to optimal methods to incorporate the views of the public in HTA decision-making. Little research has been done to ascertain whether current engagement processes align with public preferences and to what extent their desire for engagement is dependent on the question being asked by decision-makers or the characteristics of the decision. This study will examine public preferences for engagement in Australian HTA decision-making using an exploratory mixed methods design. The aims of this study are to: 1) identify characteristics about HTA decisions that are important to the public in determining whether public engagement should be undertaken on a particular topic, 2) determine which decision characteristics influence public preferences for the extent, or type of public engagement, and 3) describe reasons underpinning these preferences. Focus group participants from the general community, aged 18-70 years, will be purposively sampled from the Australian population to ensure a wide range of demographic groups. Each focus group will include a general discussion on public engagement as well as a ranking exercise using a modified nominal group technique (NGT). The NGT will inform the design of a discrete choice study to quantitatively assess public preferences for engagement in HTA decision-making. The proposed research seeks to investigate under what circumstances and how the public would like their views and preferences to be considered in health technology assessments. HTA organizations regularly make decisions about when and how public engagement should occur but without consideration of the public's preferences on

  12. Accuracy Verification of Magnetic Resonance Imaging (MRI Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Safari

    2012-01-01

    Full Text Available Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  13. CMOS工艺射频功率放大器的实现与验证%Realization and verification of the CMOS technology RF power amplifier

    Institute of Scientific and Technical Information of China (English)

    谢君

    2011-01-01

    RF power amplifiers are key components in wireless devices, CaAs technology is widely used in the design and manufacture of RF power amplifier. But the CMOS technology has the very big superiority in the production maturity and the cost, this paper focuses on the problems that using CMOS technology to do the RF power amplifier, introduces the world's first mass product CMOS power amplifier and the special techniques used. Using a mature handset product, it replaces this power amplifier and the peripheral components, and finally carries on the contrast test with the original product.%射频功率放大器是无线设备的关键器件,GaAs工艺被广泛使用在射频功放的设计制造上.而CMOS工艺在生产成熟度和成本上有很大优势,主要关注用CMOS工艺来做射频功放的问题,介绍世界上第一颗量产的CMOS功放及其所使用的特殊技术.利用一款成熟的手机产品,替换这颗功放及外围器件,最后与原产品进行对比测试.

  14. Accuracy verification of magnetic resonance imaging (MRI) technology for lower-limb prosthetic research: utilising animal soft tissue specimen and common socket casting materials.

    Science.gov (United States)

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  15. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  16. The effectiveness of information and communication technology-based psychological interventions for paediatric chronic pain: protocol for a systematic review, meta-analysis and intervention content analysis.

    Science.gov (United States)

    Traynor, Angeline; Morrissey, Eimear; Egan, Jonathan; McGuire, Brian E

    2016-10-18

    Resource and geographic barriers are the commonly cited constraints preventing the uptake of psychological treatment for chronic pain management. For adults, there is some evidence to support the use of information and communication technology (ICT) as a mode of treatment delivery. However, mixed findings have been reported for the effectiveness and acceptability of psychological interventions delivered using information and communication technology for children and adolescents. This is a protocol for a review that aims to (i) evaluate the effectiveness of psychological interventions delivered using information and communication technology for children and adolescents with chronic pain and (ii) identify the intervention components and usability factors in technology-based treatments associated with behaviour change. We will conduct a systematic review to evaluate the effectiveness of psychological interventions for paediatric chronic pain delivered using ICT. We plan to directly compare ICT-based, psychological interventions with active control, treatment as usual or waiting list control conditions. This systematic review will be reported in line with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidance. Published and unpublished randomised controlled trials will be included and the literature search will comprise Ovid MEDLINE, Ovid Embase, PsycINFO and the Cochrane Library on Wiley, including CENTRAL and Cochrane Database of Systematic Reviews. Grey literature including theses, dissertations, technical and research reports will also be examined. Two review authors will independently conduct study selection, relevant data extraction and assessment of methodological quality. Risk of bias in included studies will be assessed using the Cochrane Collaboration risk of bias tool criteria. Two qualified coders will independently code behaviour change techniques according to the behaviour change taxonomy (v1) of 93 hierarchically

  17. 测井数据库数据叠加对比验证技术%Logging Database Data Superimposed Contrast Verification Technology

    Institute of Scientific and Technical Information of China (English)

    姜泽军

    2011-01-01

    "Exploration and production technology data management system(A1)"part of China's information technology projects of oil upstream of four subsystems of the two,both to meet its objectives and tasks in construction information management needs of the oil,but also to bring the oil rapid development and considerable economic benefits.Article describes the process of building A1 logging in the main library before loading and after loading data quality control technical measures.%“勘探与生产技术数据管理系统(A1)”属于中国石油的信息化建设项目上游领域四个子系统之二,其目标任务建设既能满足中石油信息管理需求,又能为中石油带来高速发展和可观经济效益。文章阐述A1测井主库建设过程中加栽前和加栽后数据质量的控制方面技术措施。

  18. Model Checking Data Consistency for Cache Coherence Protocols

    Institute of Scientific and Technical Information of China (English)

    Hong Pan; Hui-Min Lin; Yi Lv

    2006-01-01

    A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.

  19. Spherical coverage verification

    CERN Document Server

    Petkovic, Marko D; Latecki, Longin Jan

    2011-01-01

    We consider the problem of covering hypersphere by a set of spherical hypercaps. This sort of problem has numerous practical applications such as error correcting codes and reverse k-nearest neighbor problem. Using the reduction of non degenerated concave quadratic programming (QP) problem, we demonstrate that spherical coverage verification is NP hard. We propose a recursive algorithm based on reducing the problem to several lower dimension subproblems. We test the performance of the proposed algorithm on a number of generated constellations. We demonstrate that the proposed algorithm, in spite of its exponential worst-case complexity, is applicable in practice. In contrast, our results indicate that spherical coverage verification using QP solvers that utilize heuristics, due to numerical instability, may produce false positives.

  20. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  1. (dtltt) protocol

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... Keywords: multi-access, multiservice, network, synchronous, asynchronous, traffic, timed-token. 1. ... 12, 13 ] SAFENET [14], Manufacturing Automation. Protocol (MAP) ...... ken circulation on mobile Ad Hoc Networks. 21th In-.

  2. Robust verification analysis

    Energy Technology Data Exchange (ETDEWEB)

    Rider, William, E-mail: wjrider@sandia.gov [Sandia National Laboratories, Center for Computing Research, Albuquerque, NM 87185 (United States); Witkowski, Walt [Sandia National Laboratories, Verification and Validation, Uncertainty Quantification, Credibility Processes Department, Engineering Sciences Center, Albuquerque, NM 87185 (United States); Kamm, James R. [Los Alamos National Laboratory, Methods and Algorithms Group, Computational Physics Division, Los Alamos, NM 87545 (United States); Wildey, Tim [Sandia National Laboratories, Center for Computing Research, Albuquerque, NM 87185 (United States)

    2016-02-15

    We introduce a new methodology for inferring the accuracy of computational simulations through the practice of solution verification. We demonstrate this methodology on examples from computational heat transfer, fluid dynamics and radiation transport. Our methodology is suited to both well- and ill-behaved sequences of simulations. Our approach to the analysis of these sequences of simulations incorporates expert judgment into the process directly via a flexible optimization framework, and the application of robust statistics. The expert judgment is systematically applied as constraints to the analysis, and together with the robust statistics guards against over-emphasis on anomalous analysis results. We have named our methodology Robust Verification. Our methodology is based on utilizing multiple constrained optimization problems to solve the verification model in a manner that varies the analysis' underlying assumptions. Constraints applied in the analysis can include expert judgment regarding convergence rates (bounds and expectations) as well as bounding values for physical quantities (e.g., positivity of energy or density). This approach then produces a number of error models, which are then analyzed through robust statistical techniques (median instead of mean statistics). This provides self-contained, data and expert informed error estimation including uncertainties for both the solution itself and order of convergence. Our method produces high quality results for the well-behaved cases relatively consistent with existing practice. The methodology can also produce reliable results for ill-behaved circumstances predicated on appropriate expert judgment. We demonstrate the method and compare the results with standard approaches used for both code and solution verification on well-behaved and ill-behaved simulations.

  3. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  4. Rationale and study protocol for a multi-component Health Information Technology (HIT) screening tool for depression and post-traumatic stress disorder in the primary care setting.

    Science.gov (United States)

    Biegler, Kelly; Mollica, Richard; Sim, Susan Elliott; Nicholas, Elisa; Chandler, Maria; Ngo-Metzger, Quyen; Paigne, Kittya; Paigne, Sompia; Nguyen, Danh V; Sorkin, Dara H

    2016-09-01

    The prevalence rate of depression in primary care is high. Primary care providers serve as the initial point of contact for the majority of patients with depression, yet, approximately 50% of cases remain unrecognized. The under-diagnosis of depression may be further exacerbated in limited English-language proficient (LEP) populations. Language barriers may result in less discussion of patients' mental health needs and fewer referrals to mental health services, particularly given competing priorities of other medical conditions and providers' time pressures. Recent advances in Health Information Technology (HIT) may facilitate novel ways to screen for depression and other mental health disorders in LEP populations. The purpose of this paper is to describe the rationale and protocol of a clustered randomized controlled trial that will test the effectiveness of an HIT intervention that provides a multi-component approach to delivering culturally competent, mental health care in the primary care setting. The HIT intervention has four components: 1) web-based provider training, 2) multimedia electronic screening of depression and PTSD in the patients' primary language, 3) Computer generated risk assessment scores delivered directly to the provider, and 4) clinical decision support. The outcomes of the study include assessing the potential of the HIT intervention to improve screening rates, clinical detection, provider initiation of treatment, and patient outcomes for depression and post-traumatic stress disorder (PTSD) among LEP Cambodian refugees who experienced war atrocities and trauma during the Khmer Rouge. This technology has the potential to be adapted to any LEP population in order to facilitate mental health screening and treatment in the primary care setting.

  5. Code Verification by the Method of Manufactured Solutions

    Energy Technology Data Exchange (ETDEWEB)

    SALARI,KAMBIZ; KNUPP,PATRICK

    2000-06-01

    A procedure for code Verification by the Method of Manufactured Solutions (MMS) is presented. Although the procedure requires a certain amount of creativity and skill, we show that MMS can be applied to a variety of engineering codes which numerically solve partial differential equations. This is illustrated by detailed examples from computational fluid dynamics. The strength of the MMS procedure is that it can identify any coding mistake that affects the order-of-accuracy of the numerical method. A set of examples which use a blind-test protocol demonstrates the kinds of coding mistakes that can (and cannot) be exposed via the MMS code Verification procedure. The principle advantage of the MMS procedure over traditional methods of code Verification is that code capabilities are tested in full generality. The procedure thus results in a high degree of confidence that all coding mistakes which prevent the equations from being solved correctly have been identified.

  6. Hardware/software co-verification platform for EOS design

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Ethernet over SDH/SONET (EOS) is a hotspot in today's data transmission technology for it combines the merits of both Ethernet and SDH/SONET. However, implementing an EOS system on a chip is complex and needs full verifications. This paper introduces our design of Hardware/Software co-verification platform for EOS design. The hardware platform contains a microprocessor board and an FPGA (Field Programmable Gate Array)-based verification board, and the corresponding software includes test benches running in FPGAs, controlling programs for the microprocessor and a console program with GUI (Graphical User Interface) interface for configuration, management and supervision. The design is cost-effective and has been successfully employed to verify several IP (Intellectual Property) blocks of our EOS chip. Moreover, it is flexible and can be applied as a general-purpose verification platform.

  7. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  8. 指纹识别技术在养老金发放中的应用研究%Studyon Social Secure System Based on Fingerprint Verification Technology

    Institute of Scientific and Technical Information of China (English)

    罗海波

    2011-01-01

    发放养老金优化管理,针对指纹识别技术用于养老金优化管理问题,传统养老金的生存证明获取过程存在造假且效率低的难题,导致大量冒领现象发生.为了提高养老金发放管理效率,防止冒领现象的发生,提出一种基于指纹识别技术的养老金发验证方法.首先通过指纹采集终端对退休人员的指纹进行采集,对获得的指纹图像进行分割、增强、二值化及细化预处理,然后提取有效特征,将特征通过网络传送到服务器中,最后将获得的指纹信息与指纹特征库中的指纹进行匹配,通过匹配的结果来判断是不是存在这样的指纹.采用识别方法进行了仿真,实验结果表明,平均正确率为 88%,验识时间仅为2s,是一种高效和准确的验证方法,能为养老金优化管理提供参考.%Study on the fingerprint identification technology in pension. Because the traditional pension survival certificate is of low efficiency and inconvenience to retired workersmay, and can lead to fraud phenomenon. In order to improve the efficiency of management, prevent pension to be false received, this paper puts forward a method based on fingerprint identification technology validation. The fingerprint acquisition terminal collects fingerprint images which are segmented, enhanced, binarized and refined, then, features are extracted effectively and transmitted to the server through the network. Through the fingerprint characteristics of fingerprint identification and matching, the legitimate fingerprints are confirmed. Finally, the results of simulation experiments show that the method is correct, the average accuracy is 88%, and the general check-up time is 2s. It can meet the requirements for actual application.

  9. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  10. Continuous verification using multimodal biometrics.

    Science.gov (United States)

    Sim, Terence; Zhang, Sheng; Janakiraman, Rajkumar; Kumar, Sandeep

    2007-04-01

    Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper, we present the theory, architecture, implementation, and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged-in user. Two modalities are currently used--face and fingerprint--but our theory can be readily extended to include more modalities. We show that continuous verification imposes additional requirements on multimodal fusion when compared to conventional verification systems. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for continuous verification and propose new metrics against which we benchmark our system.

  11. Thoughts on Verification of Nuclear Disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Dunlop, W H

    2007-09-26

    It is my pleasure to be here to day to participate in this Conference. My thanks to the organizers for preparing such an interesting agenda on a very difficult topic. My effort in preparing my presentation was performed under the auspices of the U.S. Department of Energy by University of California, Lawrence Livermore National Laboratory under Contract W-7405-Eng-48. And as many of you know Lawrence Livermore National Laboratory is now, as of Oct 1st, under contract to the Lawrence Livermore National Security LLC. There has been a long history of how to view verification of arms control agreements. The basis for verification during the days of SALT was that verification would be based on each country's national technical means. For treaties dealing with strategic missiles this worked well as the individual items subject to verification were of such a size that they were visible by the National Technical Means available at the time. And it was felt that the counting of missiles and launchers could be verified by our National Technical Means. For nuclear testing treaties the use of seismic measurements developed into a capability that was reasonably robust for all but the smallest of nuclear tests. However, once we had the Threshold Test Ban Treaty, there was a significant problem in that the fidelity of the measurements were not sufficient to determine if a test was slightly above the 150 kt limit or slightly below the 150 kt limit. This led some in the US to believe that the Soviet Union was not living up to the TTBT agreement. An on-site verification protocol was negotiated in 1988 and 1989 that allowed the US to make hydrodynamic yield measurements on Soviet tests above 50 kt yield and regional seismic measurements on all tests above 35 kt of yield; and the Soviets to make the same type of measurements on US tests to ensure that they were not over 150 kt. These on-site measurements were considered reasonably intrusive. Again the measurement capability was

  12. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  13. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  14. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  15. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  16. Supporting Heart Failure Patient Transitions From Acute to Community Care With Home Telemonitoring Technology: A Protocol for a Provincial Randomized Controlled Trial (TEC4Home).

    Science.gov (United States)

    2016-12-18

    sooner. It is hypothesized that TEC4Home will be a cost-effective strategy to decrease 90-day emergency department revisits and hospital admission rates and improve comfort and quality of life for seniors with heart failure. The results from this project will also help establish an innovation pathway for rapid and rigorous introduction of innovation into the health system. While there is some evidence about the effectiveness of home telemonitoring for some patients and conditions, the TEC4Home project will be one of the first protocols that implements and evaluates the technology for patients with heart failure as they transition from the emergency department to home care. The results from this research are expected to inform the full scale and spread of the home monitoring approach throughout British Columbia and Canada and to other chronic diseases. ClinicalTrials.gov NCT02821065; https://clinicaltrials.gov/ct2/show/NCT02821065 (Archived by WebCite at http://www.webcitation.org/6ml2iwKax).

  17. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  18. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological (

  19. Verification of the thermal design of electronic equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hienonen, R.; Karjalainen, M.; Lankinen, R. [VTT Automation, Espoo (Finland). ProTechno

    1997-12-31

    The project `Verification of the thermal design of electronic equipment` studied the methodology to be followed in the verification of thermal design of electronic equipment. This project forms part of the `Cool Electronics` research programme funded by TEKES, the Finnish Technology Development Centre. This project was carried out jointly by VTT Automation, Lappeenranta University of Technology, Nokia Research Center and ABB Industry Oy VSD-Technology. The thermal design of electronic equipment has a significant impact on the cost, reliability, tolerance to different environments, selection of components and materials, and ergonomics of the product. This report describes the method for verification of thermal design. It assesses the goals set for thermal design, environmental requirements, technical implementation of the design, thermal simulation and modelling, and design qualification testing and the measurements needed. The verification method covers all packaging levels of electronic equipment from the system level to the electronic component level. The method described in this report can be used as part of the quality system of a corporation. The report includes information about the measurement and test methods needed in the verification process. Some measurement methods for the temperature, flow and pressure of air are described. (orig.) Published in Finnish VTT Julkaisuja 824. 22 refs.

  20. Study of space shuttle orbiter system management computer function. Volume 2: Automated performance verification concepts

    Science.gov (United States)

    1975-01-01

    The findings are presented of investigations on concepts and techniques in automated performance verification. The investigations were conducted to provide additional insight into the design methodology and to develop a consolidated technology base from which to analyze performance verification design approaches. Other topics discussed include data smoothing, function selection, flow diagrams, data storage, and shuttle hydraulic systems.

  1. Verification of LHS distributions.

    Energy Technology Data Exchange (ETDEWEB)

    Swiler, Laura Painton

    2006-04-01

    This document provides verification test results for normal, lognormal, and uniform distributions that are used in Sandia's Latin Hypercube Sampling (LHS) software. The purpose of this testing is to verify that the sample values being generated in LHS are distributed according to the desired distribution types. The testing of distribution correctness is done by examining summary statistics, graphical comparisons using quantile-quantile plots, and format statistical tests such as the Chisquare test, the Kolmogorov-Smirnov test, and the Anderson-Darling test. The overall results from the testing indicate that the generation of normal, lognormal, and uniform distributions in LHS is acceptable.

  2. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  3. The Role of science in treaty verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavron, A. I. (Avigdor I.)

    2004-01-01

    Technologically advanced nations are currently applying more science to treaty verification than ever before. Satellites gather a multitude of information relating to proliferation concerns using thermal imaging analysis, nuclear radiation measurements, and optical and radio frequency signals detection. Ground stations gather complementary signals such as seismic events and radioactive emissions. Export controls in many countries attempt to intercept materials and technical means that could be used for nuclear proliferation. Never the less, we have witnessed a plethora of nuclear proliferation episodes, that were undetected (or were belatedly detected) by these technologies - the Indian nuclear tests in 1998, the Libyan nuclear buildup, the Iranian enrichment program and the North Korea nuclear weapons program are some prime examples. In this talk we will discuss some of the technologies used for proliferation detection. In particular, we will note some of the issues relating to nuclear materials control agreements that epitomize political difficulties as they impact the implementation of science and technology.

  4. The NULevel trial of a scalable, technology-assisted weight loss maintenance intervention for obese adults after clinically significant weight loss: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Evans, Elizabeth H; Araújo-Soares, Vera; Adamson, Ashley; Batterham, Alan M; Brown, Heather; Campbell, Miglena; Dombrowski, Stephan U; Guest, Alison; Jackson, Daniel; Kwasnicka, Dominika; Ladha, Karim; McColl, Elaine; Olivier, Patrick; Rothman, Alexander J; Sainsbury, Kirby; Steel, Alison J; Steen, Ian Nicholas; Vale, Luke; White, Martin; Wright, Peter; Sniehotta, Falko F

    2015-09-22

    Effective weight loss interventions are widely available but, after weight loss, most individuals regain weight. This article describes the protocol for the NULevel trial evaluating the effectiveness and cost-effectiveness of a systematically developed, inexpensive, scalable, technology-assisted, behavioural intervention for weight loss maintenance (WLM) in obese adults after initial weight loss. A 12-month single-centre, two-armed parallel group, participant randomised controlled superiority trial is underway, recruiting a total of 288 previously obese adults after weight loss of ≥5 % within the previous 12 months. Participants are randomly assigned to intervention or control arms, with a 1:1 allocation, stratified by sex and percentage of body weight lost (costs. Participants in the intervention arm initially attend an individual face-to-face WLM consultation with an intervention facilitator and then use a mobile internet platform to self-monitor and report their diet, daily activity (via pedometer) and weight through daily weighing on wirelessly connected scales. Automated feedback via mobile phone, tailored to participants' weight regain and goal progress is provided. Participants in the control arm receive quarterly newsletters (via links embedded in text messages) and wirelessly connected scales. Qualitative process evaluation interviews are conducted with a subsample of up to 40 randomly chosen participants. Acceptability and feasibility of procedures, cost-effectiveness, and relationships among socioeconomic variables and WLM will also be assessed. It is hypothesised that participants allocated to the intervention arm will show significantly lower levels of weight regain from baseline than those in the control arm. To date, this is the first WLM trial using remote real-time weight monitoring and mobile internet platforms to deliver a flexible, efficient and scalable intervention, tailored to the individual. This trial addresses a key research need and has

  5. Certificateless Public Auditing Protocol with Constant Verification Time

    OpenAIRE

    Dongmin Kim; Ik Rae Jeong

    2017-01-01

    To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditin...

  6. A Type Theoretic Investigation of the Verification of Voting Protocols

    DEFF Research Database (Denmark)

    Gustafsson, Daniel

    2016-01-01

    As the world becomes more digital we see a greater push for digital elections, but we need to be cautious when we modernize to make sure we don't introduce issues that affect the election. These issues are related to trust, on the one hand, how can we trust that the result of the election...... and calculation of probabilities, in particular ∑-types are used as they correspond to summation. Furthermore, I extend the type theory with process algebraic constructions in order to capture attack games as defined by semantic security in cryptography. To type these processes I propose a session type system...

  7. An Automated Computer Communication Network Protocol Verification System.

    Science.gov (United States)

    1983-12-01

    TRANSITION 3. OUTPLACE 1 4. OUTPLACE 2 5. ERRORFLAG ’ i. INODE: I TITLE: INUMBER:I 1.5.3.3.6 I PROCESS EVENT . I _I _B_ Ii ~B-40 lAUTHOR: I PROJECT...TRANSITIONTHATFIRED 2. OUTPLACE 3. PLACE PTR 44. ENABLED-TRANSITION 4’ ".’ \\"INODE: I TITLE: INUMBER: I 1.5.3.3.6.31 UPDATE EVENT LIST I B-41...1.5.3.3.6.1.3 1. TRANSITION 2. PPML ARRAY 3. OUTPLACE 1 4. OUTPLACE -2 5. ERROR FLAG INODE: I TITLE: INUMBER: 11.5.3.3.6.1 I FIRE TRANSITION (1 of 2) B

  8. A Type Theoretic Investigation of the Verification of Voting Protocols

    DEFF Research Database (Denmark)

    Gustafsson, Daniel

    2016-01-01

    is correct, and on the other hand we can we trust that the secrecy of the vote is preserved. These seemingly contradictory statements have fuelled new developments in cryptography, but the question remain can we trust these developments? The thesis of my dissertation is that it possible to formalise...... the proofs used to justify both the correctness and security of such cryptographic constructions inside type theory. This requires a theory of probabilities in order to describe the probabilistic algorithms used. My contributions include, using types and type isomorphisms to simplify both specification...... and calculation of probabilities, in particular ∑-types are used as they correspond to summation. Furthermore, I extend the type theory with process algebraic constructions in order to capture attack games as defined by semantic security in cryptography. To type these processes I propose a session type system...

  9. Design and Verification of AMBA AHBLite protocol using Verilog HDL

    OpenAIRE

    2016-01-01

    The SOC plan confronts a crevice between generation limit and time to market weights. The outline space develops with changes underway limits as far as measure of time to plan a framework utilizing these abilities. On one hand, shorter product life cycles are forcing an aggressive reduction of the time-to-market, fast simulation capabilities are required for coping with the immense design space that is to be explored; these are specially needed during early stages of the design. This need ...

  10. The accident of overexposure at the University hospital center of Toulouse. Expertise report n.1. Checking of experimental protocols of micro-beams calibration before and after dysfunction correction; L'accident de surexposition au centre hospitalier universitaire de Toulouse. Rapport d'expertise n.1. Verification des protocoles experimentaux d'etalonnage des microfaisceaux avant et apres correction du dysfonctionnement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The regional center of stereotaxic radiosurgery of the University hospital center of Toulouse is equipped since april 2006 of a Novalis accelerator (Brainlab) devoted to the intra-skull stereotaxic radiosurgery. In april 2007, during an intercomparison of dosimetry computer files coming from different sites, the Brainlab society finds an anomaly in the files. The analysis made by the society concludes to to the use of an inappropriate detector for the measurement of a dosimetry parameter during the initial calibration of the accelerator. following this error, 145 patients (on the 172 treated by the service in question) suffer the consequences of an overdose whom importance is variable according the cases. The I.R.S.N. in charge of an expertise about the protocols of calibration of micro-beams before and after the correction of the dysfunction, took up with the search of the technical causes of the dysfunction. This report presents successively: the documents base on which is founded the expertise; the material of dosimetry and quality control necessary to the initial calibration of the device and to its follow-up; the formula made at the accelerator commissioning; the calibration of micro-beams in the two configurations that allows the device (micro-multi-knives and conic collimator) and the definition of parameters of the software of treatment planning; the maintenance and quality control implemented in the frame of its clinical use. (N.C.)

  11. Study Protocol of MINI SALTEN: a technology-based multi-component intervention in the school environment targeting healthy habits of first grade children and their parents.

    Science.gov (United States)

    Kovalskys, Irina; Rausch Herscovici, Cecile; Indart Rougier, Paula; De Gregorio, María José; Zonis, Luciana; Orellana, Liliana

    2017-05-06

    MINI SALTEN is a program developed to increase moderate to vigorous physical activity (PA) and improve eating habits at home and school in first grade children. It aims to assess the effects of a technology family-based and PA school-based intervention. The purpose of this manuscript is to describe the protocol design and the MINISALTEN intervention. This is cluster-randomized controlled trial designed to run from July 2015 to November 2016 in 12 public schools of the city of Buenos Aires, matched for socio-demographic characteristics. The intervention is based on two main components: (a) "active breaks" (AB): implemented during school breaks by a PA instructor; (b) "virtual" (V): web-based contents delivered to the families via a multiplatform application. Using a computer generated random sequence participants are allocated to one of four intervention conditions: (AB), (V), (AB + V), and control (C). Outcomes are measured at baseline and 12 months post intervention, and will include data collected from the child and her/his mother/father or guardian. Primary outcome measures are: PA and sedentary behaviour (measured with accelerometers). Secondary outcome measures related are: percentage of kilocalories (kcal) from added sugars, and from total and saturated fats; grams of fruits and vegetables; and number of snacks and kcal coming from their added sugars and total and saturated fats. Family socio-economic level, home environment, and school environment will also be assessed. Statistical analysis is on an intention-to-treat principle. Baseline characteristics are described using summary measures and mixed models (with school as random effect). The effect of the two interventions will be estimated using a generalized mixed linear model with link and distribution selected according to the type of outcome. Included random effects are: child (or mother/father or guardian) accounting for repeated measures; school accounting for cluster induced by school. The most

  12. 放疗调强计划不同分野数的三维验证比较%Compare the Three-dimensional Verification Results With Different Technologies During the Instensity-modulated Radiation Therapy

    Institute of Scientific and Technical Information of China (English)

    容贤冰; 付庆国; 杨海明; 吴建益

    2016-01-01

    Objective To compare the three-dimensional verification results with different technologies during the instensity-modulated radiation therapy. Methods50 patients with nasopharyngeal carcinoma treated from May 2013 to December 2015 in our hospital were selected. Based on the SFT and FJT,the corresponding therapy was conducted. Through compass measurements,gamma analysis was conducted in the three-dimensional space. Results With the error condition of gamma was 3 mm/3%,the passing rate of al the target regions and organ at risk based on FJT was the highest(>95%),at the same time,the passing rate of al the target regions based on SFT was 90%,the passing rate of organ at risk based on SFT was 92%,the verification result based on FJT was better than SFT(P<0.05).Conclusion During the intensity-modulated radiation therapy,the FJT can meet the clinical requirements for target regions and organ at risk.%目的:探讨放疗调强计划不同分野数的三维验证比较。方法临床选择2013年5月~2015年12月本院收治的鼻咽癌调强放疗患者50例,然后分别按多分野技术和混合固定铅门技术制定调强计划,并分别应用Compass实测验证两种技术的调强计划进行比较,对各感兴趣区域予以三维空间体积的Gamma分析。结果当设定Gamma误差条件为(3 mm/3%)时,全部靶区和危及器官的通过率在混合固定铅门技术时的通过率较高,均大于95%;而多分野技术全部靶区的通过率则为90%,危及器官的通过率在多分野技术的调强计划通过率稍高为92%。混合固定铅门计划的三维验证结果高于多分野计划,差异有统计学意义(P<0.05)。结论鼻咽癌调强放疗进行混合固定铅门技术,可满足其靶区和危及器官的临床的质量控制要求。

  13. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  14. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  15. Generic System Verilog Universal Verification Methodology Based Reusable Verification Environment for Efficient Verification of Image Signal Processing IPS/SOCS

    Directory of Open Access Journals (Sweden)

    Abhishek Jain

    2012-12-01

    Full Text Available In this paper, we present Generic System Verilog Universal Verification Methodology based Reusable Verification Environment for efficient verification of Image Signal Processing IP’s/SoC’s. With the tight schedules on all projects it is important to have a strong verification methodology which contributes to First Silicon Success. Deploy methodologies which enforce full functional coverage and verification of corner cases through pseudo random test scenarios is required. Also, standardization of verification flow is needed. Previously, inside imaging group of ST, Specman (e/Verilog based Verification Environment forIP/Subsystem level verification and C/C++/Verilog based Directed Verification Environment for SoC Level Verification was used for Functional Verification. Different Verification Environments were used at IP level and SoC level. Different Verification/Validation Methodologies were used for SoC Verification across multiple sites. Verification teams were also looking for the ways how to catch bugs early in the design cycle? Thus, Generic System Verilog Universal Verification Methodology (UVM based Reusable Verification Environment is required to avoid the problem of having so many methodologies and provides a standard unified solution which compiles on all tools.

  16. Clinical Verification of Homeopathy

    Directory of Open Access Journals (Sweden)

    Michel Van Wassenhoven

    2011-07-01

    Full Text Available The world is changing! This is certainly true regarding the homeopathic practice and access to homeopathic medicine. Therefore our first priority at the ECH-LMHI [1] has been to produce a yearly report on the scientific framework of homeopathy. In the 2010 version a new chapter about epidemic diseases has been added including the Leptospirosis survey on the Cuban population. A second priority has been to review the definition of the homeopathic medicines respecting the new framework generated by the official registration procedure and the WHO report. We are working now on a documented (Materia Medica and provings list of homeopathic remedies to facilitate the registration of our remedies. The new challenges are: first of all more good research proposals and as such more funding (possible through ISCHI + Blackie Foundation as examples [2]; international acceptance of new guidelines for proving and clinical verification of homeopathic symptoms (Proposals are ready for discussion; total reconsideration of the homeopathic repertories including results of the clinical verification of the symptoms. The world is changing, we are part of the world and changes are needed also for homeopathy!

  17. Mechanical Proofs about BW Multi-Party Contract Signing Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ningrong; ZHANG Xingyuan; WANG Yuanyuan

    2006-01-01

    We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson' inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simultaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL.

  18. Verification of pneumatic railway brake models

    Science.gov (United States)

    Piechowiak, Tadeusz

    2010-03-01

    The article presents a survey of diverse methods for validation of pneumatic train brake modelling. Various experimental measurements of railway pneumatic brakes were made chiefly on a test stand at Poznań University of Technology; other test stands and some results have been taken from the literature. The measurements, some of them unconventional, were performed on separate pneumatic elements, brake devices, the brake pipe and fragments thereof. Mechanical devices were also included. The experimental measurement results were used for the verification of numerical models and for the determination of parameters. The latter was partially performed using an optimisation method.

  19. On-machine dimensional verification. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rendulic, W.

    1993-08-01

    General technology for automating in-process verification of machined products has been studied and implemented on a variety of machines and products at AlliedSignal Inc., Kansas City Division (KCD). Tests have been performed to establish system accuracy and probe reliability on two numerically controlled machining centers. Commercial software has been revised, and new cycles such as skew check and skew machining, have been developed to enhance and expand probing capabilities. Probe benefits have been demonstrated in the area of setup, cycle time, part quality, tooling cost, and product sampling.

  20. AIF-ω: Set-Based Protocol Abstraction with Countable Families

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Bruni, Alessandro

    2016-01-01

    Abstraction based approaches like ProVerif are very efficient in protocol verification, but have a limitation in dealing with stateful protocols. A number of extensions have been proposed to allow for a limited amount of state information while not destroying the advantages of the abstraction...... this limitation by abstracting state into countable families of sets. We can then formalize a problem with unbounded agents, where each agent maintains its own set of keys. Still, our method does not loose the benefits of the abstraction approach, in particular, it translates a verification problem to a set...

  1. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  2. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  3. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of LightWater Reactors (CASL). Fivemain types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  4. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  5. Practical mask inspection system with printability and pattern priority verification

    Science.gov (United States)

    Tsuchiya, Hideo; Ozaki, Fumio; Takahara, Kenichi; Inoue, Takafumi; Kikuiri, Nobutaka

    2011-05-01

    Through the four years of study in Association of Super-Advanced Electronics Technologies (ASET) on reducing mask manufacturing Turn Around Time (TAT) and cost, we have been able to establish a technology to improve the efficiency of the review process by applying a printability verification function that utilizes computational lithography simulations to analyze defects detected by a high-resolution mask inspection system. With the advent of Source-Mask Optimization (SMO) and other technologies that extend the life of existing optical lithography, it is becoming extremely difficult to judge a defect only by the shape of a mask pattern, while avoiding pseudo-defects. Thus, printability verification is indispensable for filtering out nuisance defects from high-resolution mask inspection results. When using computational lithography simulations to verify printability with high precision, the image captured by the inspection system must be prepared with extensive care. However, for practical applications, this preparation process needs to be simplified. In addition, utilizing Mask Data Rank (MDR) to vary the defect detection sensitivity according to the patterns is also useful for simultaneously inspecting minute patterns and avoiding pseudo-defects. Combining these two technologies, we believe practical mask inspection for next generation lithography is achievable. We have been improving the estimation accuracy of the printability verification function through discussion with several customers and evaluation of their masks. In this report, we will describe the progress of these practical mask verification functions developed through customers' evaluations.

  6. 基于虚拟仪器的真空计电参数检定系统%Electrical Parameter Verification System of Vacuumomter based on Virtual Instrument Technology

    Institute of Scientific and Technical Information of China (English)

    贾军伟; 张书锋; 王欢; 李彤; 田虎林

    2014-01-01

    介绍了真空计电参数检定装置及检定方法,并基于美国NI公司的Labview软件开发平台和真空计电参数检定规程,结合日常型号服务的真空计电参数计量需求,开发了真空计电参数检定程序。程序以模块化思想为基础,可进行不同厂家各类真空计的的检定,实现数据自动处理,报告自动生成。%The electrical parameter verification equipment of vacuumomter and the verification method are introduced. Based on the Labview software and“Verification regulation for electric parameters of vacuumometer”, to meet the demand of ordinary type service, an electric parameters of vacuumometer verification program is developed . This software can be applied to kinds of vertification of vacuumometer, provides modular structures which may automatically deal with the date of tested machines, and the origi-nal record and certificates can go into mass production automatically.

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT PHYSICAL REMOVAL OF CRYPTOSPORIDIUM OOCYSTS AND GIARDIA CYSTS IN DRINKING WATER PALL CORPORATION WPM-1 MICROFILTRATION SYSTEM AT PITTSBURGH, PA - NSF 00/09/EPADW395

    Science.gov (United States)

    Verification testing of the Pall Corporation WPM-1 Microfiltration Pilot System was conducted from February 3 to March 5, 1999. The Pall WPM-1 membrane is a hollow fiber type microfiltration membrane made of polyvinylidenefluoride (PVDF). It has a 0.1 micrometer ( m) nominal por...

  8. Utterance Verification for Text-Dependent Speaker Recognition: a Comparative Assessment Using the RedDots Corpus

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan;

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...... in the literature, a treatment of simultaneous speaker and utterance verification with a modern, standard database is so far lacking. This is despite the burgeoning demand for voice biometrics in a plethora of practical security applications. With the goal of improving overall verification performance, this paper...... reports different strategies for simultaneous ASV and UV in the context of short-duration, text-dependent speaker verification. Experiments performed on the recently released RedDots corpus are reported for three different ASV systems and four different UV systems. Results show that the combination...

  9. 40 CFR 1065.307 - Linearity verification.

    Science.gov (United States)

    2010-07-01

    ... linearity verification generally consists of introducing a series of at least 10 reference values to a... reference values of the linearity verification. For pressure, temperature, dewpoint, and GC-ECD linearity verifications, we recommend at least three reference values. For all other linearity verifications select...

  10. System and Component Software Specification, Run-time Verification and Automatic Test Generation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The following background technology is described in Part 5: Run-time Verification (RV), White Box Automatic Test Generation (WBATG). Part 5 also describes how WBATG...

  11. Reconfigurable system design and verification

    CERN Document Server

    Hsiung, Pao-Ann; Huang, Chun-Hsian

    2009-01-01

    Reconfigurable systems have pervaded nearly all fields of computation and will continue to do so for the foreseeable future. Reconfigurable System Design and Verification provides a compendium of design and verification techniques for reconfigurable systems, allowing you to quickly search for a technique and determine if it is appropriate to the task at hand. It bridges the gap between the need for reconfigurable computing education and the burgeoning development of numerous different techniques in the design and verification of reconfigurable systems in various application domains. The text e

  12. THE MASTER PROTOCOL CONCEPT

    Science.gov (United States)

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  13. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  14. Behavioral biometrics for verification and recognition of malicious software agents

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  15. Generic interpreters and microprocessor verification

    Science.gov (United States)

    Windley, Phillip J.

    1990-01-01

    The following topics are covered in viewgraph form: (1) generic interpreters; (2) Viper microprocessors; (3) microprocessor verification; (4) determining correctness; (5) hierarchical decomposition; (6) interpreter theory; (7) AVM-1; (8) phase-level specification; and future work.

  16. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  17. Biometric verification with correlation filters

    Science.gov (United States)

    Vijaya Kumar, B. V. K.; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-01

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification.

  18. Achievement report for fiscal 1999 on project for supporting the formation of energy/environmental technology verification project. International joint verification research project (Verification project relative to ignition and NOx reduction using plasma sub-burner in pulverized coal-fired furnace); 1999 nendo plasma sabubana ni yoru bifuntan nenshoro ni okeru chakka oyobi NO{sub x} teigen gijutsu ni kansuru jissho project seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    This project is executed through the cooperation of a Russian research institute, Akita Prefectural University, and the Ishikawajima-Harima Heavy Industries Co., Ltd. In the development of a plasma sub-burner and the basic research for its verification, a pulverized coal burning plasma sub-burner is designed and fabricated, a basic burning experiment is conducted for the plasma sub-burner, and plasma stabilization in a pulverized coal flow is simulated. In the verification study of the ignition by the plasma sub-burner in a pulverized coal-fired furnace, it is found that the newly-developed plasma sub-burner satisfies the prescribed operating conditions in the system and that the ignition of pulverized coal takes place across the air ratio range of 0.5-1.5 when pulverized coal is fed to the sub-burner. It is also found that NOx is reduced a great deal when a plasma operating on an orifice gas of air or nitrogen is generated in a gas which contains NOx. (NEDO)

  19. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  20. Experimental verification of multipartite entanglement in quantum networks

    Science.gov (United States)

    McCutcheon, W.; Pappa, A.; Bell, B. A.; McMillan, A.; Chailloux, A.; Lawson, T.; Mafu, M.; Markham, D.; Diamanti, E.; Kerenidis, I.; Rarity, J. G.; Tame, M. S.

    2016-11-01

    Multipartite entangled states are a fundamental resource for a wide range of quantum information processing tasks. In particular, in quantum networks, it is essential for the parties involved to be able to verify if entanglement is present before they carry out a given distributed task. Here we design and experimentally demonstrate a protocol that allows any party in a network to check if a source is distributing a genuinely multipartite entangled state, even in the presence of untrusted parties. The protocol remains secure against dishonest behaviour of the source and other parties, including the use of system imperfections to their advantage. We demonstrate the verification protocol in a three- and four-party setting using polarization-entangled photons, highlighting its potential for realistic photonic quantum communication and networking applications.

  1. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  2. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  3. FY 1995 report on verification of geothermal exploration technology. Development of fracture reservoir exploration technology (development of seismic exploration); 1995 nendo chinetsu tansa gijutsunado kensho chosa. Danretsugata choryuso tansaho kaihatsu (danseiha riyo tansaho kaihatsu) hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This report provides the development of new exploration technology using elastic waves, such as reflection seismic survey, VSP, and seismic tomography, for precisely characterizing subsurface fractures in geothermal reservoirs. In order to investigate and improve the effective data acquisition and analysis methods for detecting a fault type of fractures, an experiment of a seismic tomography method was conducted using wells drilled in the Ogiri geothermal field, Aira-gun, Kagoshima Prefecture. An experiment of propagation characteristics of piezo type underground seismic source in the volcanic field was also conducted as a trend survey of underground seismic sources. The fracture type in the model field was systematically analyzed by measuring the core samples obtained in the demonstration test field through remanence measurement, fluid inclusion measurement, and zircon measurement using test equipment, and by analyzing results obtained from cores and results of seismic tomography obtained from the wells. Based on these results, the effectiveness and practical application of exploration methods using elastic waves were investigated. 80 refs., 250 figs., 49 tabs.

  4. Woodward Effect Experimental Verifications

    Science.gov (United States)

    March, Paul

    2004-02-01

    The work of J. F. Woodward (1990 1996a; 1996b; 1998; 2002a; 2002b; 2004) on the existence of ``mass fluctuations'' and their use in exotic propulsion schemes was examined for possible application in improving space flight propulsion and power generation. Woodward examined Einstein's General Relativity Theory (GRT) and assumed that if the strong Machian interpretation of GRT as well as gravitational / inertia like Wheeler-Feynman radiation reaction forces hold, then when an elementary particle is accelerated through a potential gradient, its rest mass should fluctuate around its mean value during its acceleration. Woodward also used GRT to clarify the precise experimental conditions necessary for observing and exploiting these mass fluctuations or ``Woodward effect'' (W-E). Later, in collaboration with his ex-graduate student T. Mahood, they also pushed the experimental verification boundaries of these proposals. If these purported mass fluctuations occur as Woodward claims, and his assumption that gravity and inertia are both byproducts of the same GRT based phenomenon per Mach's Principle is correct, then many innovative applications such as propellantless propulsion and gravitational exotic matter generators may be feasible. This paper examines the reality of mass fluctuations and the feasibility of using the W-E to design propellantless propulsion devices in the near to mid-term future. The latest experimental results, utilizing MHD-like force rectification systems, will also be presented.

  5. Some decidability result for logic constructed for checking user authentication protocols

    Directory of Open Access Journals (Sweden)

    László Aszalós

    2008-05-01

    Full Text Available The core of our paper is a general purpose logical system for reasoning about user authentication protocols. Proposed as an extension of the propositional epistemic logic by dynamic operators, the potential usefulness of our calculus for protocol verification is illustrated with examples.

  6. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    Energy Technology Data Exchange (ETDEWEB)

    Betsill, J.D. [Sandia National Labs., Albuquerque, NM (United States); Gruebel, R.D. [Tech Reps., Inc., Albuquerque, NM (United States)

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums.

  7. Chapter 15: Commercial New Construction Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  8. Verification and validation in railway signalling engineering - an application of enterprise systems techniques

    Science.gov (United States)

    Chen, Xiangxian; Wang, Dong; Huang, Hai; Wang, Zheng

    2014-07-01

    Verification and validation of a railway signalling system is a crucial part of the workflow in railway signalling enterprises. Typically, the verification and validation of this type of safety-critical system is performed by means of an on-site test, which leads to a low efficiency and high costs. A novel method for the verification and validation of a railway signalling system is proposed as an application of the enterprise information system (EIS) technique. In this application, the EIS and the simulation test platform are combined together, which enhances the coherence and consistency of the information exchange between the system development and the system verification, to improve the work efficiency. The simulation and auto-test technology used in the system verification also lowers the human and financial costs.

  9. Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military

    OpenAIRE

    Eikenberg, Bruce R.

    1990-01-01

    Approved for public release; distribution is unlimited. The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. Th...

  10. Mental distress and personality in women undergoing GnRH agonist versus GnRH antagonist protocols for assisted reproductive technology

    DEFF Research Database (Denmark)

    Stenbæk, D. S.; Toftager, M.; Hjordt, L. V.

    2015-01-01

    pregnancy test (P-value =0.028). LIMITATIONS, REASONS FOR CAUTION: Information on prognostic factors such as preceding length of infertility, number of retrieved oocytes and number of prior insemination treatments was not accounted for in the analyses. The stratification of protocols by age in the subgroups...... of women included in this study was suboptimal. Women with prior or current use of antidepressant medication were excluded from our study. WIDER IMPLICATIONS: Our results imply that mental distress emerging during ART treatment is not causally linked to hypogonadism per se or to the choice of protocol...... pregnancy. STUDY FUNDING/COMPETING INTERESTS: The Danish Research Council for Independent Research and MSD, Denmark kindly supported the study. The authors declare no competing financial interests. TRIAL REGISTRATION NUMBER: EudraCT - 2008-005452-24....

  11. Quantum multi-signature protocol based on teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiao-jun; Liu Yun; Sun Yu [Beijing Jiaotong Univ., Beijing (China). School of Electronic Information Engineering

    2007-03-15

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  12. A hardware-software system for the automation of verification and calibration of oil metering units secondary equipment

    Science.gov (United States)

    Boyarnikov, A. V.; Boyarnikova, L. V.; Kozhushko, A. A.; Sekachev, A. F.

    2017-08-01

    In the article the process of verification (calibration) of oil metering units secondary equipment is considered. The purpose of the work is to increase the reliability and reduce the complexity of this process by developing a software and hardware system that provides automated verification and calibration. The hardware part of this complex carries out the commutation of the measuring channels of the verified controller and the reference channels of the calibrator in accordance with the introduced algorithm. The developed software allows controlling the commutation of channels, setting values on the calibrator, reading the measured data from the controller, calculating errors and compiling protocols. This system can be used for checking the controllers of the secondary equipment of the oil metering units in the automatic verification mode (with the open communication protocol) or in the semi-automatic verification mode (without it). The peculiar feature of the approach used is the development of a universal signal switch operating under software control, which can be configured for various verification methods (calibration), which allows to cover the entire range of controllers of metering units secondary equipment. The use of automatic verification with the help of a hardware and software system allows to shorten the verification time by 5-10 times and to increase the reliability of measurements, excluding the influence of the human factor.

  13. CTBT Integrated Verification System Evaluation Model

    Energy Technology Data Exchange (ETDEWEB)

    Edenburn, M.W.; Bunting, M.L.; Payne, A.C. Jr.

    1997-10-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia`s Monitoring Systems and Technology Center and has been funded by the US Department of Energy`s Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, top-level, modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM`s unique features is that it integrates results from the various CTBT sensor technologies (seismic, infrasound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection) and location accuracy of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system`s performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. This report describes version 1.2 of IVSEM.

  14. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  15. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  16. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  17. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  18. Functional verification coverage measurement and analysis

    CERN Document Server

    Piziali, Andrew

    2007-01-01

    This book addresses a means of quantitatively assessing functional verification progress. Without this process, design and verification engineers, and management, are left guessing whether or not they have completed verifying the device they are designing.

  19. 10 CFR 300.11 - Independent verification.

    Science.gov (United States)

    2010-01-01

    ... skills required for verification are often cross-disciplinary. For example, an individual verifier...) Companies that provide verification services must use professionals that possess the necessary skills and...: American Institute of Certified Public Accountants; American National Standards Institute's...

  20. University of Washington/ Northwest National Marine Renewable Energy Center Tidal Current Technology Test Protocol, Instrumentation, Design Code, and Oceanographic Modeling Collaboration: Cooperative Research and Development Final Report, CRADA Number CRD-11-452

    Energy Technology Data Exchange (ETDEWEB)

    Driscoll, Frederick R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-11-01

    The University of Washington (UW) - Northwest National Marine Renewable Energy Center (UW-NNMREC) and the National Renewable Energy Laboratory (NREL) will collaborate to advance research and development (R&D) of Marine Hydrokinetic (MHK) renewable energy technology, specifically renewable energy captured from ocean tidal currents. UW-NNMREC is endeavoring to establish infrastructure, capabilities and tools to support in-water testing of marine energy technology. NREL is leveraging its experience and capabilities in field testing of wind systems to develop protocols and instrumentation to advance field testing of MHK systems. Under this work, UW-NNMREC and NREL will work together to develop a common instrumentation system and testing methodologies, standards and protocols. UW-NNMREC is also establishing simulation capabilities for MHK turbine and turbine arrays. NREL has extensive experience in wind turbine array modeling and is developing several computer based numerical simulation capabilities for MHK systems. Under this CRADA, UW-NNMREC and NREL will work together to augment single device and array modeling codes. As part of this effort UW NNMREC will also work with NREL to run simulations on NREL's high performance computer system.

  1. Technology Improvement of Shredder based on self-defined communication protocol%基于双机通讯的碎纸机技术改进

    Institute of Scientific and Technical Information of China (English)

    张晓涛

    2011-01-01

    According to the current problems of shredder, this paper introduced an improvement scheme based on self-defined communication protocol. This scheme proves to be effective from mass production and can bring good economic benefit.%针对当前碎纸机存在的成本较高、连线复杂等问题,采用基于自定义通讯协议的方案进行改进.大量生产实践证明,此方案行之有效,取得良好的经济效益.

  2. Comparison of intensities and rest periods for VO2max verification testing procedures.

    Science.gov (United States)

    Nolan, P B; Beaven, M L; Dalleck, L

    2014-11-01

    We sought to determine the incidence of 'true' VO2max confirmation with the verification procedure across different protocols. 12 active participants (men n=6, women n=6) performed in random order 4 different maximal graded exercises tests (GXT) and verification bout protocols on 4 separate days. Conditions for the rest period and verification bout intensity were: A - 105% intensity, 20 min rest; B - 105% intensity, 60 min rest; C - 115% intensity, 20 min rest; D - 115% intensity, 60 min rest. VO2max confirmation (difference between peak VO2 GXT and verification trialVO2max confirmation across all exercise test conditions (intensity effect within recovery 20 min (χ(2) (1)=4.800, pVO2max confirmation with different rest periods. We recommend the use of 105% of the maximal GXT workload and 20 min rest periods when using verification trials to confirm VO2max in normally active populations. © Georg Thieme Verlag KG Stuttgart · New York.

  3. Mobile IPv6 Protocols and Implementation

    CERN Document Server

    Li, Qing; Shima, Keiichi

    2009-01-01

    Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide. This book covers the IPv6 host mobility protocol known as 'mobile IPv6' and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation.

  4. Quantum position verification in bounded-attack-frequency model

    Science.gov (United States)

    Gao, Fei; Liu, Bin; Wen, QiaoYan

    2016-11-01

    In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification (QPV) protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries' pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV. And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries' attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries "blind", that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model.

  5. The Function and Significance of Network Security Protocol in Computer Communication Technology%网络安全协议在计算机通信技术中的作用与意义

    Institute of Scientific and Technical Information of China (English)

    马玉红

    2015-01-01

    With the development and progress of society, rapid development of information technology, processing and transmission of information has gradually broken the limits of time and space, network information technology has been widely used in many ifelds, mainly military, cultural, ifnancial and commercial ifelds, and plays a big role, but with the development and progress, gradually the problem of network security, which has become a major obstacle to restrict the development of network information technology, the Internet has shared and open, there will be many security risks, therefore, we need to establish a network security protocol, so as to ensure the security of the network environment, but also a major part of construction of network safety, ensure the accuracy and the security of security protocols can avoid the problems caused the loss of data network hidden etc. This paper mainly studies the function and signiifcance of network security protocol in computer communication technology.%随着社会的发展和进步,信息技术不断飞速发展,处理和传递信息的方式已经逐渐打破空间和时间的限制,网络信息化已经在很多领域得到广泛应用,主要有军事、文化、金融以及商业领域等,并且起到很大的作用,但随着发展和进步,逐渐出现了网络安全问题,这成为了限制网络信息技术发展的主要障碍,互联网具有共享性和开放性,会存在很多安全隐患,因此,就需要建立一定的网络安全协议,从而保证网络环境的安全性,同时也是建设安全网络的主要部分,保证安全协议的正确性和安全性可以避免由于数据丢失导致的网络隐患等问题。文章主要研究了网络安全协议在计算机通信技术当中的作用与意义。

  6. The Improvement of RFID Authentication Protocols Based on R-RAPSE

    Directory of Open Access Journals (Sweden)

    QingLing Cai

    2014-01-01

    Full Text Available Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. We had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not offer sufficient security and privacy protection, and thereafter, proposes relevant solutions to fix the security holes based on R-RAPSE, which demonstrates how R-RAPSE can be used to verify and improve RFID authentication protocols.

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - 4100 VAPOR DETECTOR - ELECTRONIC SENSOR TECHNOLOGY

    Science.gov (United States)

    In July 1997, the U.S. Environmental Protection Agency conducted a demonstration of polychlorinated biphenyl (PCB) FIELD ANALYTICAL TECHNIQUES. The demonstration design was subjected to extensive review and comment by EPA's National Exposure Research Laboratory (NERL) Environmen...

  8. 基于ARM的ModBus第三方接口协议模块%Third Party Protocol Transfer of ModBus Based on ARM Technology

    Institute of Scientific and Technical Information of China (English)

    申万义; 黄玉宝; 谷一

    2013-01-01

      为满足工业现场各种不同类型模块现场总线之间的数据相互传输的要求,设计了基于ARM硬件和软件体系的第三方接口协议模块。该模块由电源电路,CPU电路,逻辑控制电路和电平转换电路构成,并且基于ARM内核构成各个接口数据采集的驱动程序,实现了不同模块和不同协议之间的信息与数据的传输。测试和实际应用表明,该模块具有较高的实用性和可靠性等优点,达到了预期目的。%Design a third-party protocol module based on ARM hardware and software system to meet the requirement of data transfer and store between some different kinds of modules in industry field. The module consists of power circuit,CPU circuit, logic control circuit and voltage transfer circuit. Driver programs of data collection interface are designed based on ARM core and it realize the data and information transfer in different modules and different protocols. Practicability and reliability are proved in test and practical application.

  9. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  10. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  11. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and size

  12. 自组织网络路由协议及仿真技术研究%RESEARCH ON SELF-ORGANISING NETWORK ROUTING PROTOCOLS AND ITS SIMULATION TECHNOLOGY

    Institute of Scientific and Technical Information of China (English)

    贾欣歌; 计春雷

    2015-01-01

    Self-organising network routing protocol is an important core component of wireless communication technology.Aiming at the limitations in most of the current designing of self-organising network routing protocol, we studied the parameters of relative position between self-organising network node and adjacent node on the basis of self-organising network structure and mobility model.According to the size of its relative position parameters, we presented the improved example of self-organising network routing protocol.Applying the network nodes mobile tool NS2 simulation platform, and based on the estimation of delay time between end-to-end in networks, we carried out the corre-sponding network performances evaluation before and after the improvement of network routing protocol.Simulation experiment showed that the improved wireless self-organising network protocol could improve network performance effectively.%自组织网络的路由协议是无线通信技术的重要核心部分。针对目前多数自组织网络协议设计的局限性,依据自组织网络结构和移动模型,研究自组织网络节点与临近节点之间的相对位置参数。依据其相对位置参数大小,提出自组织网络路由协议的改进算例。应用网络节点移动工具NS2仿真平台,基于网络端到端之间的延时时间判断,进行相应的网络路由协议改进前后的网络性能评价。仿真实验表明,改进后的无线自组织网络协议能够有效地提高网络性能。

  13. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  14. A study of applications scribe frame data verifications using design rule check

    Science.gov (United States)

    Saito, Shoko; Miyazaki, Masaru; Sakurai, Mitsuo; Itoh, Takahisa; Doi, Kazumasa; Sakurai, Norioko; Okada, Tomoyuki

    2013-06-01

    In semiconductor manufacturing, scribe frame data generally is generated for each LSI product according to its specific process design. Scribe frame data is designed based on definition tables of scanner alignment, wafer inspection and customers specified marks. We check that scribe frame design is conforming to specification of alignment and inspection marks at the end. Recently, in COT (customer owned tooling) business or new technology development, there is no effective verification method for the scribe frame data, and we take a lot of time to work on verification. Therefore, we tried to establish new verification method of scribe frame data by applying pattern matching and DRC (Design Rule Check) which is used in device verification. We would like to show scheme of the scribe frame data verification using DRC which we tried to apply. First, verification rules are created based on specifications of scanner, inspection and others, and a mark library is also created for pattern matching. Next, DRC verification is performed to scribe frame data. Then the DRC verification includes pattern matching using mark library. As a result, our experiments demonstrated that by use of pattern matching and DRC verification our new method can yield speed improvements of more than 12 percent compared to the conventional mark checks by visual inspection and the inspection time can be reduced to less than 5 percent if multi-CPU processing is used. Our method delivers both short processing time and excellent accuracy when checking many marks. It is easy to maintain and provides an easy way for COT customers to use original marks. We believe that our new DRC verification method for scribe frame data is indispensable and mutually beneficial.

  15. Electromagnetic tracking for treatment verification in interstitial brachytherapy

    Science.gov (United States)

    Kellermeier, Markus; Tanderup, Kari

    2016-01-01

    Electromagnetic tracking (EMT) is used in several medical fields to determine the position and orientation of dedicated sensors, e.g., attached to surgical tools. Recently, EMT has been introduced to brachytherapy for implant reconstruction and error detection. The manuscript briefly summarizes the main issues of EMT and error detection in brachytherapy. The potential and complementarity of EMT as treatment verification technology will be discussed in relation to in vivo dosimetry and imaging. PMID:27895688

  16. Methods of Verification, Accountability and Control of Special Nuclear Material

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, J.E.

    1999-05-03

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data.

  17. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  18. Pixel Based Off-line Signature Verification System

    Directory of Open Access Journals (Sweden)

    Anik Barua

    2015-01-01

    Full Text Available The verification of handwritten signatures is one of the oldest and the most popular authentication methods all around the world. As technology improved, different ways of comparing and analyzing signatures become more and more sophisticated. Since the early seventies, people have been exploring how computers can fully take over the task of signature verification and tried different methods. However, none of them is satisfactory enough and time consuming too. Therefore, our proposed pixel based offline signature verification system is one of the fastest and easiest ways to authenticate any handwritten signature we have ever found. For signature acquisition, we have used scanner. Then we have divided the signature image into 2D array and calculated the hexadecimal RGB value of each pixel. After that, we have calculated the total percentage of matching. If the percentage of matching is more than 90, the signature is considered as valid otherwise invalid. We have experimented on more than 35 signatures and the result of our experiment is quite impressive. We have made the whole system web based so that the signature can be verified from anywhere. The average execution time for signature verification is only 0.00003545 second only.

  19. Design and Verification of Critical Pressurised Windows for Manned Spaceflight

    Science.gov (United States)

    Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.

    2014-06-01

    The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.

  20. Results of verifications of the control automatic exposure in equipment of RX with CR systems; Resultados de las verificaciones del control automatico de exposicion en equipos de RX con sistemas CR

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz Manzano, P.; Rivas Ballarin, M. A.; Ortega Pardina, P.; Villa Gazulla, D.; Calvo Carrillo, S.; Canellas Anoz, M.; Millan Cebrian, E.

    2013-07-01

    After the entry into force in 2012, the new Spanish Radiology quality control protocol lists and discusses the results obtained after verification of the automatic control of exposure in computed radiography systems. (Author)

  1. Investigation into Practical Implementations of a Zero Knowledge Protocol.

    Energy Technology Data Exchange (ETDEWEB)

    Marleau, Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krentz-Wee, Rebecca E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    In recent years, the concept of Zero Knowledge Protocols (ZKP) as a useful approach to nuclear warhead verification has become increasingly popular. Several implementations of ZKP have been proposed, driving technology development toward proof of concept demonstrations. Whereas proposed implementations seem to fall within the general class of template-based techniques, all physical implementations of ZKPs proposed to date have a complication: once the instrumentation is prepared, it is no longer authenticatable; the instrument physically contains sensitive information. In this work we explore three different concepts that may offer more authenticatable and practical ZKP implementations and evaluate the sensitive information that may be at risk when doing so: sharing a subset of detector counts in a preloaded image (with spatial information removed), real-time image subtraction, and a new concept, CONfirmation using a Fast-neutron Imaging Detector with Anti-image NULL-positive Time Encoding (CONFIDANTE). CONFIDANTE promises to offer an almost ideal implementation of ZKP: a positive result is indicated by a constant rate at all times enabling the monitoring party the possibility of full access to the instrument before, during, and after confirmation. A prototype of CONFIDANTE was designed, built, and its performance evaluated in a series of measurements of several objects including a set of plutonium dioxide Hemispheres. Very encouraging results proving feasibility are presented. 1 Rebecca is currently a graduate student in Nuclear Engineering at UC Berkeley

  2. Technology.

    Science.gov (United States)

    Online-Offline, 1998

    1998-01-01

    Focuses on technology, on advances in such areas as aeronautics, electronics, physics, the space sciences, as well as computers and the attendant progress in medicine, robotics, and artificial intelligence. Describes educational resources for elementary and middle school students, including Web sites, CD-ROMs and software, videotapes, books,…

  3. Light dose verification for pleural PDT.

    Science.gov (United States)

    Sandell, Julia L; Liang, Xing; Zhu, Timothy

    2012-02-13

    The ability to deliver uniform light dose in Photodynamic therapy (PDT) is critical to treatment efficacy. Current protocol in pleural photodynamic therapy uses 7 isotropic detectors placed at discrete locations within the pleural cavity to monitor light dose throughout treatment. While effort is made to place the detectors uniformly through the cavity, measurements do not provide an overall uniform measurement of delivered dose. A real-time infrared (IR) tracking camera is development to better deliver and monitor a more uniform light distribution during treatment. It has been shown previously that there is good agreement between fluence calculated using IR tracking data and isotropic detector measurements for direct light phantom experiments. This study presents the results of an extensive phantom study which uses variable, patient-like geometries and optical properties (both absorption and scattering). Position data of the treatment is collected from the IR navigation system while concurrently light distribution measurements are made using the aforementioned isotropic detectors. These measurements are compared to fluence calculations made using data from the IR navigation system to verify our light distribution theory is correct and applicable in patient-like settings. The verification of this treatment planning technique is an important step in bringing real-time fluence monitoring into the clinic for more effective treatment.

  4. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  5. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  6. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  7. Secure voice-based authentication for mobile devices: vaulted voice verification

    Science.gov (United States)

    Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.

    2013-05-01

    As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.

  8. Independent Technology Assessment within the Federation of Earth Science Information Partners (ESIP) Testbed

    Science.gov (United States)

    Burgess, A. B.; Robinson, E.; Graybeal, J.

    2015-12-01

    The Federation of Earth Science Information Partners (ESIP) is a community of science, data and information technology practitioners. ESIP's mission is to support the networking and data dissemination needs of our members and the global community. We do this by linking the functional sectors of education, observation, research and application with the ultimate use of Earth science. Amongst the services provided to ESIP members is the Testbed; a collaborative forum for the development of technology standards, services, protocols and best practices. ESIP has partnered with the NASA Advanced Information Systems Technology (AIST) program to integrate independent assessment of Testing Readiness Level (TRL) into the ESIP Testbed. In this presentation we will 1) demonstrate TRL assessment in the ESIP Testbed using three AIST projects, 2) discuss challenges and insights into creating an independent validation/verification framework and 3) outline the versatility of the ESIP Testbed as applied to other technology projects.

  9. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due......The purpose of this thesis is to develop a method for verifying timed temporal properties of continuous dynamical systems, and to develop a method for verifying the safety of an interconnection of continuous systems. The methods must be scalable in the number of continuous variables...

  10. Effectiveness of a Technology-Based Injury Prevention Program for Enhancing Mothers' Knowledge of Child Safety: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Chow, Chun Bong; Wong, Wilfred Hing-Sang; Leung, Wing Cheong; Tang, Mary Hoi-Yin; Chan, Ko Ling; Or, Calvin Kl; Li, Tim Mh; Ho, Frederick Ka Wing; Lo, Daniel; Ip, Patrick

    2016-10-31

    Provision of anticipatory guidance for parents is recommended as an effective strategy to prevent injuries among young children. Technology-based anticipatory guidance has been suggested to reinforce the effectiveness of injury prevention and improve parents' knowledge of child safety. This study aims to examine the effectiveness of a technology-based injury prevention program with parental anticipatory guidance for enhancing mothers' knowledge of child safety. In this randomized controlled trial, 308 mothers will be recruited from the antenatal clinics and postnatal wards of two major public hospitals in Hong Kong. Participating mothers will be randomly assigned into intervention and control groups. Mothers in the intervention group will be given free access to a technology-based injury prevention program with anticipatory guidance, whereas mothers in the control group will be given a relevant booklet on parenting. The injury prevention program, available as a website or on a mobile app, includes behavioral components based on the Theory of Planned Behavior. The primary outcome measure will be the change in the mother's knowledge of child safety. The secondary outcome measures will be age-appropriate domestic safety knowledge, attitudes, intentions, perceived behavioral control, and self-reported behavior related to home safety practice. We will also determine dose-response relationships between the outcome measures and the website and mobile app usage. Enrolment of participants will begin in October 2016. Results are expected by June 2018. Parents will be able to easily access the domestic injury prevention website to find information regarding child injury prevention. It is anticipated that the technology-based intervention will help parents improve their knowledge of child safety and raise their awareness about the consequences of domestic injuries and the importance of prevention. Clinicaltrials.gov Clinicaltrials.gov NCT02835768; http://clinicaltrials.gov/ct2

  11. Program Verification of Numerical Computation

    OpenAIRE

    Pantelis, Garry

    2014-01-01

    These notes outline a formal method for program verification of numerical computation. It forms the basis of the software package VPC in its initial phase of development. Much of the style of presentation is in the form of notes that outline the definitions and rules upon which VPC is based. The initial motivation of this project was to address some practical issues of computation, especially of numerically intensive programs that are commonplace in computer models. The project evolved into a...

  12. Kleene Algebra and Bytecode Verification

    Science.gov (United States)

    2016-04-27

    Bytecode 2005 Preliminary Version Kleene Algebra and Bytecode Verification Lucja Kot 1 Dexter Kozen 2 Department of Computer Science Cornell...first-order methods that inductively annotate program points with abstract values. In [6] we introduced a second-order approach based on Kleene algebra ...form a left-handed Kleene algebra . The dataflow labeling is not achieved by inductively labeling the program with abstract values, but rather by

  13. Regression Verification Using Impact Summaries

    Science.gov (United States)

    Backes, John; Person, Suzette J.; Rungta, Neha; Thachuk, Oksana

    2013-01-01

    Regression verification techniques are used to prove equivalence of syntactically similar programs. Checking equivalence of large programs, however, can be computationally expensive. Existing regression verification techniques rely on abstraction and decomposition techniques to reduce the computational effort of checking equivalence of the entire program. These techniques are sound but not complete. In this work, we propose a novel approach to improve scalability of regression verification by classifying the program behaviors generated during symbolic execution as either impacted or unimpacted. Our technique uses a combination of static analysis and symbolic execution to generate summaries of impacted program behaviors. The impact summaries are then checked for equivalence using an o-the-shelf decision procedure. We prove that our approach is both sound and complete for sequential programs, with respect to the depth bound of symbolic execution. Our evaluation on a set of sequential C artifacts shows that reducing the size of the summaries can help reduce the cost of software equivalence checking. Various reduction, abstraction, and compositional techniques have been developed to help scale software verification techniques to industrial-sized systems. Although such techniques have greatly increased the size and complexity of systems that can be checked, analysis of large software systems remains costly. Regression analysis techniques, e.g., regression testing [16], regression model checking [22], and regression verification [19], restrict the scope of the analysis by leveraging the differences between program versions. These techniques are based on the idea that if code is checked early in development, then subsequent versions can be checked against a prior (checked) version, leveraging the results of the previous analysis to reduce analysis cost of the current version. Regression verification addresses the problem of proving equivalence of closely related program

  14. Enhancing mHealth Technology in the Patient-Centered Medical Home Environment to Activate Patients With Type 2 Diabetes: A Multisite Feasibility Study Protocol

    Science.gov (United States)

    Shi, Lu; Williams, Joel E; Dye, Cheryl J; Chen, Liwei; Crawford, Paul; Shry, Eric A; Griffin, Sarah F; Jones, Karyn O; Sherrill, Windsor W; Truong, Khoa; Little, Jeanette R; Edwards, Karen W; Hing, Marie; Moss, Jennie B

    2017-01-01

    Background The potential of mHealth technologies in the care of patients with diabetes and other chronic conditions has captured the attention of clinicians and researchers. Efforts to date have incorporated a variety of tools and techniques, including Web-based portals, short message service (SMS) text messaging, remote collection of biometric data, electronic coaching, electronic-based health education, secure email communication between visits, and electronic collection of lifestyle and quality-of-life surveys. Each of these tools, used alone or in combination, have demonstrated varying degrees of effectiveness. Some of the more promising results have been demonstrated using regular collection of biometric devices, SMS text messaging, secure email communication with clinical teams, and regular reporting of quality-of-life variables. In this study, we seek to incorporate several of the most promising mHealth capabilities in a patient-centered medical home (PCMH) workflow. Objective We aim to address underlying technology needs and gaps related to the use of mHealth technology and the activation of patients living with type 2 diabetes. Stated differently, we enable supporting technologies while seeking to influence patient activation and self-care activities. Methods This is a multisite phased study, conducted within the US Military Health System, that includes a user-centered design phase and a PCMH-based feasibility trial. In phase 1, we will assess both patient and provider preferences regarding the enhancement of the enabling technology capabilities for type 2 diabetes chronic care management. Phase 2 research will be a single-blinded 12-month feasibility study that incorporates randomization principles. Phase 2 research will seek to improve patient activation and self-care activities through the use of the Mobile Health Care Environment with tailored behavioral messaging. The primary outcome measure is the Patient Activation Measure scores. Secondary outcome

  15. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  16. New data structures and algorithms for logic synthesis and verification

    CERN Document Server

    Amaru, Luca Gaetano

    2017-01-01

    This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines. · Provides a comprehensive, theoretical study on majority and biconditional logic for logic synthesis; · Updates the current scenario in synthesis and verification – especially in light of emerging technologies; · Demonstrates applications to CMOS technology and emerging technologies.

  17. SEMI-AUTOMATIC SPEAKER VERIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    E. V. Bulgakova

    2016-03-01

    Full Text Available Subject of Research. The paper presents a semi-automatic speaker verification system based on comparing of formant values, statistics of phone lengths and melodic characteristics as well. Due to the development of speech technology, there is an increased interest now in searching for expert speaker verification systems, which have high reliability and low labour intensiveness because of the automation of data processing for the expert analysis. System Description. We present a description of a novel system analyzing similarity or distinction of speaker voices based on comparing statistics of phone lengths, formant features and melodic characteristics. The characteristic feature of the proposed system based on fusion of methods is a weak correlation between the analyzed features that leads to a decrease in the error rate of speaker recognition. The system advantage is the possibility to carry out rapid analysis of recordings since the processes of data preprocessing and making decision are automated. We describe the functioning methods as well as fusion of methods to combine their decisions. Main Results. We have tested the system on the speech database of 1190 target trials and 10450 non-target trials, including the Russian speech of the male and female speakers. The recognition accuracy of the system is 98.59% on the database containing records of the male speech, and 96.17% on the database containing records of the female speech. It was also experimentally established that the formant method is the most reliable of all used methods. Practical Significance. Experimental results have shown that proposed system is applicable for the speaker recognition task in the course of phonoscopic examination.

  18. Software verification and validation for commercial statistical packages utilized by the statistical consulting section of SRTC

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, T.B.

    2000-03-22

    The purpose of this report is to provide software verification and validation for the statistical packages used by the Statistical Consulting Section (SCS) of the Savannah River Technology Center. The need for this verification and validation stems from the requirements of the Quality Assurance programs that are frequently applicable to the work conducted by SCS. The IBM Personal Computer 300PL and 300XL are both Pentium II based desktops. Therefore the software verification and validation in this report is valid interchangeably between both platforms. As new computing platforms, statistical packages, or revisions to existing packages are reevaluated using these new tools, this report is to be revised to address their verification and validation.

  19. Time trend of injection drug errors before and after implementation of bar-code verification system.

    Science.gov (United States)

    Sakushima, Ken; Umeki, Reona; Endoh, Akira; Ito, Yoichi M; Nasuhara, Yasuyuki

    2015-01-01

    Bar-code technology, used for verification of patients and their medication, could prevent medication errors in clinical practice. Retrospective analysis of electronically stored medical error reports was conducted in a university hospital. The number of reported medication errors of injected drugs, including wrong drug administration and administration to the wrong patient, was compared before and after implementation of the bar-code verification system for inpatient care. A total of 2867 error reports associated with injection drugs were extracted. Wrong patient errors decreased significantly after implementation of the bar-code verification system (17.4/year vs. 4.5/year, pcode medication administration is effective for prevention of wrong patient errors. However, ordinary bar-code verification systems are limited in their ability to prevent incorrect drug preparation in hospital wards.

  20. Technology

    Directory of Open Access Journals (Sweden)

    Xu Jing

    2016-01-01

    Full Text Available The traditional answer card reading method using OMR (Optical Mark Reader, most commonly, OMR special card special use, less versatile, high cost, aiming at the existing problems proposed a method based on pattern recognition of the answer card identification method. Using the method based on Line Segment Detector to detect the tilt of the image, the existence of tilt image rotation correction, and eventually achieve positioning and detection of answers to the answer sheet .Pattern recognition technology for automatic reading, high accuracy, detect faster

  1. Integrated safety management system verification: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, R.F.

    1998-08-12

    Department of Energy (DOE) Policy (P) 450.4, Safety Management System Policy, commits to institutionalizing an Integrated Safety Management System (ISMS) throughout the DOE complex. The DOE Acquisition Regulations (DEAR 48 CFR 970) requires contractors to manage and perform work in accordance with a documented Integrated Safety Management System. The Manager, Richland Operations Office (RL), initiated a combined Phase 1 and Phase 2 Integrated Safety Management Verification review to confirm that PNNL had successfully submitted a description of their ISMS and had implemented ISMS within the laboratory facilities and processes. A combined review was directed by the Manager, RL, based upon the progress PNNL had made in the implementation of ISM. This report documents the results of the review conducted to verify: (1) that the PNNL integrated safety management system description and enabling documents and processes conform to the guidance provided by the Manager, RL; (2) that corporate policy is implemented by line managers; (3) that PNNL has provided tailored direction to the facility management; and (4) the Manager, RL, has documented processes that integrate their safety activities and oversight with those of PNNL. The general conduct of the review was consistent with the direction provided by the Under Secretary`s Draft Safety Management System Review and Approval Protocol. The purpose of this review was to provide the Manager, RL, with a recommendation to the adequacy of the ISMS description of the Pacific Northwest Laboratory based upon compliance with the requirements of 49 CFR 970.5204(-2 and -78); and, to provide an evaluation of the extent and maturity of ISMS implementation within the Laboratory. Further, this review was intended to provide a model for other DOE Laboratories. In an effort to reduce the time and travel costs associated with ISM verification the team agreed to conduct preliminary training and orientation electronically and by phone. These

  2. Integrated safety management system verification: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, R.F.

    1998-08-12

    Department of Energy (DOE) Policy (P) 450.4, Safety Management System Policy, commits to institutionalizing an Integrated Safety Management System (ISMS) throughout the DOE complex. The DOE Acquisition Regulations (DEAR 48 CFR 970) requires contractors to manage and perform work in accordance with a documented Integrated Safety Management System. The Manager, Richland Operations Office (RL), initiated a combined Phase 1 and Phase 2 Integrated Safety Management Verification review to confirm that PNNL had successfully submitted a description of their ISMS and had implemented ISMS within the laboratory facilities and processes. A combined review was directed by the Manager, RL, based upon the progress PNNL had made in the implementation of ISM. This report documents the results of the review conducted to verify: (1) that the PNNL integrated safety management system description and enabling documents and processes conform to the guidance provided by the Manager, RL; (2) that corporate policy is implemented by line managers; (3) that PNNL has provided tailored direction to the facility management; and (4) the Manager, RL, has documented processes that integrate their safety activities and oversight with those of PNNL. The general conduct of the review was consistent with the direction provided by the Under Secretary`s Draft Safety Management System Review and Approval Protocol. The purpose of this review was to provide the Manager, RL, with a recommendation to the adequacy of the ISMS description of the Pacific Northwest Laboratory based upon compliance with the requirements of 49 CFR 970.5204(-2 and -78); and, to provide an evaluation of the extent and maturity of ISMS implementation within the Laboratory. Further, this review was intended to provide a model for other DOE Laboratories. In an effort to reduce the time and travel costs associated with ISM verification the team agreed to conduct preliminary training and orientation electronically and by phone. These

  3. Effectiveness of technology-assisted case management in low income adults with type 2 diabetes (TACM-DM: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Strom Joni L

    2011-10-01

    Full Text Available Abstract Background An estimated 1 in 3 American adults will have diabetes by the year 2050. Nationally, South Carolina ranks 10th in cases of diagnosed diabetes compared to other states. In adults, type 2 diabetes (T2DM accounts for approximately 90-95% of all diagnosed cases of diabetes. Clinically, provider and health system factors account for Methods We describe a four-year prospective, randomized clinical trial, which will test the effectiveness of technology-assisted case management in low income rural adults with T2DM. Two-hundred (200 male and female participants, 18 years of age or older and with an HbA1c ≥ 8%, will be randomized into one of two groups: (1 an intervention arm employing the innovative FORA system coupled with nurse case management or (2 a usual care group. Participants will be followed for 6-months to ascertain the effect of the interventions on glycemic control. Our primary hypothesis is that among indigent, rural adult patients with T2DM treated in FQHC's, participants randomized to the technology-assisted case management intervention will have significantly greater reduction in HbA1c at 6 months of follow-up compared to usual care. Discussion Results from this study will provide important insight into the effectiveness of technology-assisted case management intervention (TACM for optimizing diabetes care in indigent, rural adult patients with T2DM treated in FQHC's. Trial Registration National Institutes of Health Clinical Trials Registry (http://ClinicalTrials.gov identifier# NCT01373489

  4. Evaluation of a technology-enhanced integrated care model for frail older persons: protocol of the SPEC study, a stepped-wedge cluster randomized trial in nursing homes.

    Science.gov (United States)

    Kim, Hongsoo; Park, Yeon-Hwan; Jung, Young-Il; Choi, Hyoungshim; Lee, Seyune; Kim, Gi-Soo; Yang, Dong-Wook; Paik, Myunghee Cho; Lee, Tae-Jin

    2017-04-18

    Limited evidence exists on the effectiveness of the chronic care model for people with multimorbidity. This study aims to evaluate the effectiveness of an information and communication technology- (ICT-)enhanced integrated care model, called Systems for Person-centered Elder Care (SPEC), for frail older adults at nursing homes. SPEC is a prospective stepped-wedge cluster randomized trial conducted at 10 nursing homes in South Korea. Residents aged 65 or older meeting the inclusion/exclusion criteria in all the homes are eligible to participate. The multifaceted SPEC intervention, a geriatric care model guided by the chronic care model, consists of five components: comprehensive geriatric assessment for need/risk profiling, individual need-based care planning, interdisciplinary case conferences, person-centered care coordination, and a cloud-based information and communications technology (ICT) tool supporting the intervention process. The primary outcome is quality of care for older residents using a composite measure of quality indicators from the interRAI LTCF assessment system. Outcome assessors and data analysts will be blinded to group assignment. Secondary outcomes include quality of life, healthcare utilization, and cost. Process evaluation will be also conducted. This study is expected to provide important new evidence on the effectiveness, cost-effectiveness, and implementation process of an ICT-supported chronic care model for older persons with multiple chronic illnesses. The SPEC intervention is also unique as the first registered trial implementing an integrated care model using technology to promote person-centered care for frail older nursing home residents in South Korea, where formal LTC was recently introduced. ISRCTN11972147.

  5. Incorporating Novel Mobile Health Technologies Into Management of Knee Osteoarthritis in Patients Treated With Intra-Articular Hyaluronic Acid: Rationale and Protocol of a Randomized Controlled Trial

    Science.gov (United States)

    Skrepnik, Nebojsa; Toselli, Richard M; Leroy, Bruno

    2016-01-01

    Background Osteoarthritis (OA) of the knee is one of the leading causes of disability in the United States. One relatively new strategy that could be helpful in the management of OA is the use of mHealth technologies, as they can be used to increase physical activity and promote exercise, which are key components of knee OA management. Objective Currently, no published data on the use of a mHealth approach to comprehensively monitor physical activity in patients with OA are available, and similarly, no data on whether mHealth technologies can impact outcomes are available. Our objective is to evaluate the effectiveness of mHealth technology as part of a tailored, comprehensive management strategy for patients with knee OA. Methods The study will assess the impact of a smartphone app that integrates data from a wearable activity monitor (thereby both encouraging changes in mobility as well as tracking them) combined with education about the benefits of walking on patient mobility. The results from the intervention group will be compared with data from a control group of individuals who are given the same Arthritis Foundation literature regarding the benefits of walking and wearable activity monitors but who do not have access to the data from those monitors. Activity monitors will capture step count estimates and will compare those with patients’ step goals, calories burned, and distance walked. Patients using the novel smartphone app will be able to enter information on their daily pain, mood, and sleep quality. The relationships among activity and pain, activity and mood, and sleep will be assessed, as will patient satisfaction with and adherence to the mobile app. Results We present information on an upcoming trial that will prospectively assess the ability of a mobile app to improve mobility for knee OA patients who are treated with intra-articular hyaluronic acid. Conclusions We anticipate the results of this study will support the concept that m

  6. Incorporating Novel Mobile Health Technologies Into Management of Knee Osteoarthritis in Patients Treated With Intra-Articular Hyaluronic Acid: Rationale and Protocol of a Randomized Controlled Trial

    OpenAIRE

    Jones, Donald; Skrepnik, Nebojsa; Toselli, Richard M; Leroy, Bruno

    2016-01-01

    Background Osteoarthritis (OA) of the knee is one of the leading causes of disability in the United States. One relatively new strategy that could be helpful in the management of OA is the use of mHealth technologies, as they can be used to increase physical activity and promote exercise, which are key components of knee OA management. Objective Currently, no published data on the use of a mHealth approach to comprehensively monitor physical activity in patients with OA are available, and sim...

  7. Fingerprint verification based on wavelet subbands

    Science.gov (United States)

    Huang, Ke; Aviyente, Selin

    2004-08-01

    Fingerprint verification has been deployed in a variety of security applications. Traditional minutiae detection based verification algorithms do not utilize the rich discriminatory texture structure of fingerprint images. Furthermore, minutiae detection requires substantial improvement of image quality and is thus error-prone. In this paper, we propose an algorithm for fingerprint verification using the statistics of subbands from wavelet analysis. One important feature for each frequency subband is the distribution of the wavelet coefficients, which can be modeled with a Generalized Gaussian Density (GGD) function. A fingerprint verification algorithm that combines the GGD parameters from different subbands is proposed to match two fingerprints. The verification algorithm in this paper is tested on a set of 1,200 fingerprint images. Experimental results indicate that wavelet analysis provides useful features for the task of fingerprint verification.

  8. Design and Verification Guidelines for Vibroacoustic and Transient Environments

    Science.gov (United States)

    1986-01-01

    Design and verification guidelines for vibroacoustic and transient environments contain many basic methods that are common throughout the aerospace industry. However, there are some significant differences in methodology between NASA/MSFC and others - both government agencies and contractors. The purpose of this document is to provide the general guidelines used by the Component Analysis Branch, ED23, at MSFC, for the application of the vibroacoustic and transient technology to all launch vehicle and payload components and payload components and experiments managed by NASA/MSFC. This document is intended as a tool to be utilized by the MSFC program management and their contractors as a guide for the design and verification of flight hardware.

  9. On Performance Modeling of Ad Hoc Routing Protocols

    OpenAIRE

    Khayam SyedAli; Farooq Muddassar; Saleem Muhammad

    2010-01-01

    Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermore, several prominent ad hoc simulations report inconsistent and unrepeatable results. We, therefore, argue that simulation-based evaluation of ad hoc routing protocols should be complemented with mathematical verification and comparison. In this paper, we propose a performance evaluation framework that can be used ...

  10. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  11. Automated verification of flight software. User's manual

    Science.gov (United States)

    Saib, S. H.

    1982-01-01

    (Automated Verification of Flight Software), a collection of tools for analyzing source programs written in FORTRAN and AED is documented. The quality and the reliability of flight software are improved by: (1) indented listings of source programs, (2) static analysis to detect inconsistencies in the use of variables and parameters, (3) automated documentation, (4) instrumentation of source code, (5) retesting guidance, (6) analysis of assertions, (7) symbolic execution, (8) generation of verification conditions, and (9) simplification of verification conditions. Use of AVFS in the verification of flight software is described.

  12. Wind-farm power performance verification

    Energy Technology Data Exchange (ETDEWEB)

    Dutilleux, P. [DEWI German Wind Energy Institute, Wilhelmshaven (Germany)

    2005-07-01

    Details of wind farm power performance verification procedures were presented. Verifications were performed at the DEWI test site at Wilhelmhaven, Germany. Types of power performance guarantees included power performance of individual turbines with IEC verification measurement, and Nacelle anemometer verification. In addition, availability guarantees were examined, as well as issues concerning energy production guarantees of complete wind farms in relation to nearby meteorology masts. An evaluation of power curve verification measurements was presented as well as measurement procedures relating to IEC standards. Methods for Nacelle anemometry verification included calibration of the anemometer; documentation of its exact position and chain signal; and end-to-end calibration from sensor to SCADA data base. Classification of anemometers included impact of dynamical effects; and influence on annual energy production. An example of a project for performance verification of a wind farm with 9 identical wind turbines was presented. The significance of status signals was discussed, as well as alternative methods for power-curve measurements. Evaluation procedures for energy yield and power curve verifications were presented. The upcoming set of IEC standards concerning power curve measurements was discussed. Various alternative verification procedures for wind farm power performance were reviewed. refs., tabs., figs.

  13. The SeaHorn Verification Framework

    Science.gov (United States)

    Gurfinkel, Arie; Kahsai, Temesghen; Komuravelli, Anvesh; Navas, Jorge A.

    2015-01-01

    In this paper, we present SeaHorn, a software verification framework. The key distinguishing feature of SeaHorn is its modular design that separates the concerns of the syntax of the programming language, its operational semantics, and the verification semantics. SeaHorn encompasses several novelties: it (a) encodes verification conditions using an efficient yet precise inter-procedural technique, (b) provides flexibility in the verification semantics to allow different levels of precision, (c) leverages the state-of-the-art in software model checking and abstract interpretation for verification, and (d) uses Horn-clauses as an intermediate language to represent verification conditions which simplifies interfacing with multiple verification tools based on Horn-clauses. SeaHorn provides users with a powerful verification tool and researchers with an extensible and customizable framework for experimenting with new software verification techniques. The effectiveness and scalability of SeaHorn are demonstrated by an extensive experimental evaluation using benchmarks from SV-COMP 2015 and real avionics code.

  14. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...... with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...

  15. 分层异构无线网络的协议架构和关键技术%Key Technologies and Protocol Architectures in Heterogeneous Network

    Institute of Scientific and Technical Information of China (English)

    刘鸿雁; 胡春静; 李远

    2013-01-01

    分层异构无线网络技术因其可以有效提高网络频谱效率、满足不同热点覆盖需求、大幅提升系统容量等优点,而成为当今LTE-Advanced系统中的关键技术之一.总结了分层异构无线网络的背景、定义以及架构,并重点讨论了由于传统网络拓扑结构的改变而引发的干扰问题,详述了3GPP标准中的增强干扰协调方案,最后分析了分层异构无线网络中的其他关键技术,如网络自组织、回程链路设计、小区选择和切换、节能、认知无线电技术等.这些关键技术对于分层异构无线网络商用化部署具有指导意义.%Heterogeneous network (HetNet) is recently becoming one of the key technologies in LTE-Advanced network,because it can significantly improve spectrum efficiency and system capacity,while meeting different requirements for coverage in hotspots.The research background,term definitions and system architecture of HetNet were detailed.Furthermore,the interference problem caused by the variation in network topology,and the schemes for enhanced inter cell interference coordination (eICIC) in the 3rd generation partnership project (3GPP) standardization were focused on.Lastly,other key technologies in HetNet were also analyzed,such as self-organized network (SON),backhaul link design,mobility management,energy saving and cognitive radio,etc.Resolutions of those aforementioned key technologies have profound guiding significance for the commercial deployment of HetNet.

  16. PALMPRINT VERIFICATION USING INVARIANT MOMENTS BASED ON WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    Inass SH. Hussein

    2014-01-01

    Full Text Available Data security is one of the important issues among computer users. Data security can prevent fraudulent users from accessing an individual’s personal data. The biometrics recognition as one of the most important parts in the security of the data and the application of computer vision. The biometrics is the authentication method used in a wide variety of applications such as e-banking, e-commerce, e-government and many others. A biometric system is one which requires the recognition of a pattern, whereby it enables the differentiation of features from one individual to another. Biometric technologies, thus may be defined as the automated methods of identifying, or authenticating, the identity of a living person based on physiological or behavioral traits. This study emphasizes palmprint recognition, which provides a wide deployment range of authentication methods. The palmprint contains principal lines, wrinkles, fine lines, ridges and surface area; thus the palmprint of person differs from one to another. Previous researchers have difficulty extracting the features of a palm print, because of the effects of rotation, translation and scaling changes and the accuracy rate of verification performance needs to be improved. The aim of this study is to extract shape features using an invariant moments algorithm based on wavelet transform and identify the person’s verification. This model has shown a promising results without the effects of rotation, translation and scaling of objects, because it is associated with the use of a good description of shape features. This system has been tested using databases from the Indian Institute of Technology, Kanpur (IITK, by using the False Rejection Rate (FRR and False Acceptance Rate (FAR, we may calculate the accuracy rate of verification. The experiment shows a 97.99% accuracy rate of verification.

  17. Electronic Voting Protocol Using Identity-Based Cryptography

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  18. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  19. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  20. Towards a Methodology for Formal Design and Analysis of Agent Interaction Protocols --An Investigation in Electronic Commerce

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Various extensions of UML have been developed to meet thechallenges of designin g modern software systems, such as agent-based electronic commerce applications . Recent advances in model checking technology have led it to be introduced into the development of approaches and tools to check the correctness of electronic c ommerce protocols. This paper focuses on the research of a method that connects an extension of AUML to model checker-SPIN/Promela for the specification and v e rification of agent interaction protocols (AIP) in electronic commerce. The meth od presented here allows us to combine the benefits of visual specification with the power of some static analysis and model checking. Some algorithms and rules are developed to permit all visual modeling constructs translated mechanically into some Promela models of AIP, as supported by the model checker -SPIN. Moreo v er, a process is illustrated to guide the specification and verification of AIP. The method is demonstrated thoroughly using the e-commerce protocol -NetBill as an example.