WorldWideScience

Sample records for technology verification statement

  1. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... confidentiality of, Statements of Account, Verification Auditor's Reports, and other verification information... GENERAL PROVISIONS § 201.29 Access to, and confidentiality of, Statements of Account, Verification Auditor... Account, including the Primary Auditor's Reports, filed under 17 U.S.C. 1003(c) and access to a Verifying...

  2. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  3. 78 FR 27137 - Verification of Statements of Account Submitted by Cable Operators and Satellite Carriers

    Science.gov (United States)

    2013-05-09

    ... Statements of Account. They agreed that the verification should be conducted by a certified public accountant... Public Accountants (``AICPA'') or the State Board of Accountancy that licensed the auditor while the... professional association for certified public accountants. In any event, it seems unlikely that the copyright...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  5. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  6. Complementary technologies for verification of excess plutonium

    International Nuclear Information System (INIS)

    Langner, D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L.; Mitchell, D.J.; Marlow, K.W.; Luke, S.J.; Gosnell, T.B.

    1998-01-01

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of 240 Pu to 239 Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  8. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S PETROTAC

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S TECHSUPPRESS

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  11. Introductory statement to the Board of Governors. Vienna, 16 June 2003. IAEA Board of Governors

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The statement covers a broad range of issues, including the Agency's Annual Report for 2002, the Technical Co-operation Report for 2002, the report of the Programme and Budget Committee, nuclear verification and the prevention of nuclear terrorism, namely, The Safeguards Implementation Report and Safeguards Statement for 2002; Status of Safeguards Agreements and Additional Protocols; Integrated Safeguards; Verification in Iraq; Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran; Verification in the Democratic People's Republic of Korea; Nuclear Security - Measures To Protect Against Nuclear Terrorism; Nuclear Technology (Agency's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO)); New Information Security Policy; Public Communication of the IAEA

  12. Hanford science and technology needs statements document

    Energy Technology Data Exchange (ETDEWEB)

    Piper, L.L.

    1997-12-31

    This document is a compilation of the Hanford science and technology needs statements for FY 1998. The needs were developed by the Hanford Site Technology Coordination Group (STCG) with full participation and endorsement of site user organizations, stakeholders, and regulators. The purpose of this document is to: (a) provide a comprehensive listing of Hanford science and technology needs, and (b) identify partnering and commercialization opportunities with industry, other federal and state agencies, and the academic community. The Hanford STCG reviews and updates the needs annually. Once completed, the needs are communicated to DOE for use in the development and prioritization of their science and technology programs, including the Focus Areas, Cross-Cutting Programs, and the Environmental Management Science Program. The needs are also transmitted to DOE through the Accelerating Cleanup: 2006 Plan. The public may access the need statements on the Internet on: the Hanford Home Page (www.hanford.gov), the Pacific Rim Enterprise Center`s web site (www2.pacific-rim.org/pacific rim), or the STCG web site at DOE headquarters (em-52.em.doegov/ifd/stcg/stcg.htm). This page includes links to science and technology needs for many DOE sites. Private industry is encouraged to review the need statements and contact the Hanford STCG if they can provide technologies that meet these needs. On-site points of contact are included at the ends of each need statement. The Pacific Rim Enterprise Center (206-224-9934) can also provide assistance to businesses interested in marketing technologies to the DOE.

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH ELECTRONIC SENSOR TECHNOLOGY MODEL 4100

    Science.gov (United States)

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. As part of this program, the...

  16. Advanced Technologies for Design Information Verification

    International Nuclear Information System (INIS)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-01-01

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  17. Verification Testing of Air Pollution Control Technology Quality Management Plan Revision 2.3

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center was established in 1995 as part of the EPA’s Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technologies’ performance.

  18. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC MONITORING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This technology ...

  19. Introductory statement to the Board of Governors. Vienna, 9 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The agenda for the meeting includes topics related to all three pillars of Agency activities - technology, safety and verification. This statement, primarily covers developments since the Board held in June 2002. The topics dealt with are: nuclear technology; waste management; decommissioning of NPPs; management of nuclear knowledge; world summit on sustainable development; safety issues of nuclear activities; transport safety; occupational radiation protection; radiological protection of patients; verification of nuclear proliferation; status of comprehensive safeguards agreements and additional protocols; convention on the physical protection of nuclear material; implementation of Un security council resolutions related to Iraq; status of safeguards agreement with the Democratic Peoples Republic of Korea; application of IAEA safeguards in the Middle east; and management of the IAEA

  20. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  1. Development of requirements tracking and verification technology for the NPP software

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Chul Hwan; Kim, Jang Yeol; Lee, Jang Soo; Song, Soon Ja; Lee, Dong Young; Kwon, Kee Choon

    1998-12-30

    Searched and analyzed the technology of requirements engineering in the areas of aerospace and defense industry, medical industry and nuclear industry. Summarized the status of tools for the software design and requirements management. Analyzed the software design methodology for the safety software of NPP. Development of the design requirements for the requirements tracking and verification system. Development of the background technology to design the prototype tool for the requirements tracking and verification.

  2. Development of requirements tracking and verification technology for the NPP software

    International Nuclear Information System (INIS)

    Jung, Chul Hwan; Kim, Jang Yeol; Lee, Jang Soo; Song, Soon Ja; Lee, Dong Young; Kwon, Kee Choon

    1998-01-01

    Searched and analyzed the technology of requirements engineering in the areas of aerospace and defense industry, medical industry and nuclear industry. Summarized the status of tools for the software design and requirements management. Analyzed the software design methodology for the safety software of NPP. Development of the design requirements for the requirements tracking and verification system. Development of the background technology to design the prototype tool for the requirements tracking and verification

  3. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC TREATMENT TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techn...

  4. Environmental Technology Verification: Baghouse Filtration Products--TDC Filter Manufacturing, Inc., SB025 Filtration Media

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT LASER TOUCH AND TECHNOLOGIES, LLC LASER TOUCH MODEL LT-B512

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Laser Touch model LT-B512 targeting device manufactured by Laser Touch and Technologies, LLC, for manual spray painting operations. The relative transfer efficiency (TE) improved an avera...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: TRITON SYSTEMS, LLC SOLID BOWL CENTRIFUGE, MODEL TS-5000

    Science.gov (United States)

    Verification testing of the Triton Systems, LLC Solid Bowl Centrifuge Model TS-5000 (TS-5000) was conducted at the Lake Wheeler Road Field Laboratory Swine Educational Unit in Raleigh, North Carolina. The TS-5000 was 48" in diameter and 30" deep, with a bowl capacity of 16 ft3. ...

  7. Introductory statement to the Board of Governors. 13 September 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The agenda for this meeting includes topics related to all areas of Agency activity - nuclear technology, nuclear, radiation, transport and waste safety, verification of nuclear non-proliferation, technical cooperation funding and the IAEA management issues. In this statement, developments since the June Board are covered. The Agency continues to assume growing responsibilities in nearly all areas of its work, including verification, safety and security, and sustainable development. In this context, the value of the close partnership between the Secretariat and its Member States, is underlined, which will hopefully continue to be forthcoming

  8. Statement of the Director General to the forty-third regular session of the General Conference of the International Atomic Energy Agency

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1999-01-01

    In his Statement on the forty-third regular session of the General Conference of the IAEA, the Director General of the Agency presented the past, present and future programme of the Agency in terms of the three 'pillars' that constitute its mandate: Nuclear technology (with emphasis on nuclear power and nuclear applications); Nuclear, radiation and waste safety (with emphasis on international conventions prescribing the basic legal norms for the safe use of nuclear energy, internationally accepted safety standards, and measures to assist Member States in the implementation of these conventions and standards, including technological solutions for improving safety); Nuclear verification and the security of material (with emphasis on IAEA safeguards, and physical protection of nuclear material), including possible new verification activities and specific verification issues (Iraq, DPRK, Middle East region). The Director General also touched in his Statement on two supporting elements that undergird these 'pillars': effective interaction with partners and the public, and achieving excellence in management

  9. Environmental Technology Verification Report: Taconic Energy, Inc. TEA Fuel Additive

    Science.gov (United States)

    The Greenhouse Gas Technology Center (GHG Center) is one of six verification organizations operating under EPA’s ETV program. One sector of significant interest to GHG Center stakeholders is transportation - particularly technologies that result in fuel economy improvements. Taco...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: MOBILE SOURCE RETROFIT AIR POLLUTION CONTROL DEVICES: CLEAN CLEAR FUEL TECHNOLOGIES, INC.’S, UNIVERSAL FUEL CELL

    Science.gov (United States)

    The U.S. EPA's Office of Research and Development operates the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative technologies through performance verification and information dissemination. Congress funds ETV in response to the belief ...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC., PNEUMATIC BLADDER PUMP GW 1400 SERIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  12. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  13. Technical workshop on safeguards, verification technologies, and other related experience

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-31

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation Refs, figs, tabs

  14. Introductory statement to the Board of Governors, 14 June 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The Statement to the Board of Governors includes the Agency's Annual Report, the Technical Cooperation Report, the Safeguards Implementation Report, the report of the Programme and Budget Committee, and a number of specific nuclear technology, safety and verification issues. The Technical Cooperation Report deals with TC Programme Management; Programme of Action for Cancer Therapy; TC Programme Funding; TC Programme Oversight. The Nuclear Technology part is concerned with Action Plan on Decommissioning of nuclear facilities, which incorporates the recommendations from the Agency's conference on safe decommissioning for nuclear activities held in 2002 in Berlin; Status of the IAEA International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). Nuclear Safety and Security covers Nuclear Installation Safety; Transport Safety; Emergency Preparedness and Response; Global Threat Reduction Initiative. Nuclear Verification is describing the Safeguards Implementation Report and Safeguards Statement for 2003; Implementation of Safeguards in the Democratic People's Republic of Korea, in the Islamic Republic of Iran; and in Iraq; Status of Safeguards Agreements and Additional Protocols; Integrated Safeguards. The Secretariat remains committed to the efficient and effective implementation of programmes that reflect the priorities of all our Member States

  15. Dynamic Isotope Power System: technology verification phase, program plan, 1 October 1978

    International Nuclear Information System (INIS)

    1979-01-01

    The technology verification phase program plan of the Dynamic Isotope Power System (DIPS) project is presented. DIPS is a project to develop a 0.5 to 2.0 kW power system for spacecraft using an isotope heat source and a closed-cycle Rankine power-system with an organic working fluid. The technology verification phase's purposes are to increase the system efficiency to over 18%, to demonstrate system reliability, and to provide an estimate for flight test scheduling. Progress toward these goals is reported

  16. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    OpenAIRE

    Najlaa A. Abuadhmah; Muawya Naser; Azman Samsudin

    2010-01-01

    Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa...

  17. Introductory statement to the Board of Governors. Vienna, 8 September 2003. IAEA Board of Governors

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The agenda for this meeting includes topics related to all areas of Agency activity - nuclear technology, nuclear, radiation, transport and waste safety, verification of nuclear non-proliferation, the IAEA management issues. In this statement, developments since the June Board are covered. The Agency continues to assume growing responsibilities in nearly all areas of its work, including verification, safety and security, and sustainable development. In this context, the value of the close partnership between the Secretariat and its Member States, is underlined, which will hopefully continue to be forthcoming

  18. ETV Tech Brief: Rapid Fungi and Bacteria Detection Technologies

    Science.gov (United States)

    Technical brief that summarizes the results for Mycometer, Inc. Mycometer®-test and Bactiquant®-test, which are rapid detection technologies for fungi and bacteria. The brief summarizes the results of the verification report and statement.

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SHARPE MANUFACTURING TITANIUM T1-CG SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ANEST IWATA CORPORATION W400-LV SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BIOQUELL, INC. CLARIS C HYDROGEN PEROXIDE GAS GENERATOR

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Clarus C Hydrogen Peroxide Gas Generator, a biological decontamination device manufactured by BIOQUELL, Inc. The unit was tested by evaluating its ability to decontaminate seven types...

  2. VERIFICATION TESTING OF AIR POLLUTION CONTROL TECHNOLOGY QUALITY MANAGEMENT PLAN

    Science.gov (United States)

    This document is the basis for quality assurance for the Air Pollution Control Technology Verification Center (APCT Center) operated under the U.S. Environmental Protection Agency (EPA). It describes the policies, organizational structure, responsibilities, procedures, and qualit...

  3. A review of technology for verification of waste removal from Hanford Underground Storage Tanks (WHC Issue 30)

    International Nuclear Information System (INIS)

    Thunborg, S.

    1994-09-01

    Remediation of waste from Underground Storage Tanks (UST) at the Hanford Waste storage sites will require removal of all waste to a nearly clean condition. Current requirements are 99% clean. In order to meet remediation legal requirements, a means to remotely verify that the waste has been removed to sufficient level is needed. This report discusses the requirements for verification and reviews major technologies available for inclusion in a verification system. The report presents two operational scenarios for verification of residual waste volume. Thickness verification technologies reviewed are Ultrasonic Sensors, Capacitance Type Sensors, Inductive Sensors, Ground Penetrating Radar, and Magnetometers. Of these technologies Inductive (Metal Detectors) and Ground Penetrating Radar appear to be the most suitable for use as waste thickness sensors

  4. Subsurface barrier verification technologies, informal report

    International Nuclear Information System (INIS)

    Heiser, J.H.

    1994-06-01

    One of the more promising remediation options available to the DOE waste management community is subsurface barriers. Some of the uses of subsurface barriers include surrounding and/or containing buried waste, as secondary confinement of underground storage tanks, to direct or contain subsurface contaminant plumes and to restrict remediation methods, such as vacuum extraction, to a limited area. To be most effective the barriers should be continuous and depending on use, have few or no breaches. A breach may be formed through numerous pathways including: discontinuous grout application, from joints between panels and from cracking due to grout curing or wet-dry cycling. The ability to verify barrier integrity is valuable to the DOE, EPA, and commercial sector and will be required to gain full public acceptance of subsurface barriers as either primary or secondary confinement at waste sites. It is recognized that no suitable method exists for the verification of an emplaced barrier's integrity. The large size and deep placement of subsurface barriers makes detection of leaks challenging. This becomes magnified if the permissible leakage from the site is low. Detection of small cracks (fractions of an inch) at depths of 100 feet or more has not been possible using existing surface geophysical techniques. Compounding the problem of locating flaws in a barrier is the fact that no placement technology can guarantee the completeness or integrity of the emplaced barrier. This report summarizes several commonly used or promising technologies that have been or may be applied to in-situ barrier continuity verification

  5. Transparencies used in describing the CTBT verification regime and its four monitoring technologies

    International Nuclear Information System (INIS)

    Basham, P.

    1999-01-01

    This presentation includes description of the CTBT verification regime and its four monitoring technologies, (namely, seismic monitoring, hydro acoustic monitoring, infrasound monitoring and radionuclides monitoring) CTBT global verification system, sequence of steps needed for installing an international monitoring system station which includes: site survey, site preparation and construction, equipment procurement and installation, final tests and certification

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, COLUMBUS INDUSTRIES HIGH EFFICIENCY MINI PLEAT

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ENVIRONMENTAL DECISION SUPPORT SOFTWARE, UNIVERSITY OF TENNESSEE RESEARCH CORPORATION, SPATIAL ANALYSIS AND DECISION ASSISTANCE (SADA)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: BROME AGRI SALES, LTD., MAXIMIZER SEPARATOR, MODEL MAX 1016 - 03/01/WQPC-SWP

    Science.gov (United States)

    Verification testing of the Brome Agri Sales Ltd. Maximizer Separator, Model MAX 1016 (Maximizer) was conducted at the Lake Wheeler Road Field Laboratory Swine Educational Unit in Raleigh, North Carolina. The Maximizer is an inclined screen solids separator that can be used to s...

  9. New Approaches and New Technologies for the Verification of Nuclear Disarmament

    International Nuclear Information System (INIS)

    Keir, David

    2013-01-01

    ESARDA’s New Approaches/Novel Technologies Working group has recently begun to take a great interest in technology for use in arms control verification, in parallel with a focus on Nuclear Safeguards technology. A topic-based meeting of members of the NA/NT Subgroup was hosted at Joint Research Centre (JRC), ITU-Nuclear Security Unit in Ispra (Italy), to further explore the technical issues and opportunities presented by the need for new approaches and technologies in a future verified nuclear weapons dismantlement regime. Nuclear warheads must contain radioactive material and, by their nature, gamma rays and neutrons are likely to penetrate to the outside of the warhead casing and even metal containers. Therefore radiation signatures should be detectable by appropriate pieces of equipment. For this reason, researchers in the field of technical verification of nuclear warhead dismantlement have studied and developed technologies for Non-Destructive Assay (NDA). This paper presents a generic dismantlement pathway for verified nuclear warhead dismantlement, based on the scenario employed by the UK-Norway initiative for their exercise in 2008/9. Using this as a framework the types of measurement challenge likely to be presented to a verifying inspector are discussed. The problem of intrusiveness of measurements in relation to the issue of proliferative release of classified information about the warhead attributes is discussed and the concept of ‘information barriers is introduced as a possible solution to this issue. A list of candidate technologies for use in verification activities, with or without information barriers is then presented and, since most of these are new or novel approaches to the issue, an already-established system for classifying them – in terms of state of development and complexity of use in this context – is proposed. Finally, the concept of capturing this information as a library of ‘data sheets’, designed for periodic review as

  10. Consortium for Verification Technology Fellowship Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sadler, Lorraine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    As one recipient of the Consortium for Verification Technology (CVT) Fellowship, I spent eight days as a visiting scientist at the University of Michigan, Department of Nuclear Engineering and Radiological Sciences (NERS). During this time, I participated in multiple department and research group meetings and presentations, met with individual faculty and students, toured multiple laboratories, and taught one-half of a one-unit class on Risk Analysis in Nuclear Arms control (six 1.5 hour lectures). The following report describes some of the interactions that I had during my time as well as a brief discussion of the impact of this fellowship on members of the consortium and on me/my laboratory’s technical knowledge and network.

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    Science.gov (United States)

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT HYDRO COMPLIANCE MANAGEMENT, INC. HYDRO-KLEEN FILTRATION SYSTEM, 03/07/WQPC-SWP, SEPTEMBER 2003

    Science.gov (United States)

    Verification testing of the Hydro-Kleen(TM) Filtration System, a catch-basin filter designed to reduce hydrocarbon, sediment, and metals contamination from surface water flows, was conducted at NSF International in Ann Arbor, Michigan. A Hydro-Kleen(TM) system was fitted into a ...

  13. Statement to the fifty-sixth regular session of the United Nations General Assembly. New York, 22 October 2001

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2001-01-01

    The statement briefly covers the IAEA's activities in terms of its three fundamental functions: to bring about the development and transfer of peaceful nuclear technologies; to build and maintain a global nuclear safety regime; and to prevent the proliferation of nuclear weapons and to ensure the security of nuclear materials and facilities. The specific topics covered include efforts to protect against nuclear terrorism, nuclear technology, nuclear safety, verification and security of nuclear material and installations, and management of the IAEA

  14. Remote sensing and geoinformation technologies in support of nuclear non-proliferation and arms control verification regimes

    Energy Technology Data Exchange (ETDEWEB)

    Niemeyer, Irmgard [Forschungszentrum Juelich GmbH, Institut fuer Energie- und Klimaforschung, IEK-6: Nukleare Entsorgung und Reaktorsicherheit (Germany)

    2013-07-01

    A number of international agreements and export control regimes have been concluded in order to reduce the risk and proliferation of weapons of mass destruction. In order to provide confidence that Member States are complying with the agreed commitments, most of the treaties and agreements include verification provisions. Different types of verification measures exist, e.g. cooperative measures; national technical means; technical monitoring or measurement devices placed at or near sites; on-site inspections; intelligence information; open-source information, such as commercial internet data and satellite imagery. The study reviews the technical progress in the field of satellite imaging sensors and explores the recent advances in satellite imagery processing and geoinformation technologies as to the extraction of significant observables and signatures. Moreover, it discusses how satellite data and geoinformation technologies could be used complementary for confirming information gathered from other systems or sources. The study also aims at presenting the legal and political aspects and the cost benefits of using imagery from both national and commercial satellites in the verification procedure. The study concludes that satellite imagery and geoinformation technologies are expected to enhance the verification efficiency and effectiveness.

  15. Statement of the Director General to the forty-second regular session of the General Conference of the International Atomic Energy Agency

    International Nuclear Information System (INIS)

    1998-01-01

    In his Statement on the forty-second regular session of the General Conference of the IAEA, the Director General of the Agency highlighted the role of the IAEA in four areas: nuclear power and the fuel cycle, nuclear and radiation safety, nuclear verification and the security of material, and transfer of technology. The final part of the Statement is devoted to the process of programme and management review initiated by the Director General to ensure that the Agency maintains and enhances its record as an effective and efficient organization

  16. Update on Monitoring Technologies for International Safeguards and Fissile Material Verification

    International Nuclear Information System (INIS)

    Croessmann, C. Dennis; Glidewell, Don D.; Mangan, Dennis L.; Smathers, Douglas C.

    1999-01-01

    Monitoring technologies are playing an increasingly important part in international safeguards and fissile material verification. The developments reduce the time an inspector must spend at a site while assuring continuity of knowledge. Monitoring technologies' continued development has produced new seal systems and integrated video surveillance advances under consideration for Trilateral Initiative use. This paper will present recent developments for monitoring systems at Embalse, Argentina, VNHEF, Sarov, Russian, and Savannah River Site, Aiken, South Carolina

  17. US monitoring and verification technology: on-site inspection experience and future challenges

    International Nuclear Information System (INIS)

    Gullickson, R.L.; Carlson, D.; Ingraham, J.; Laird, B.

    2013-01-01

    The United States has a long and successful history of cooperation with treaty partners in monitoring and verification. For strategic arms reduction treaties, our collaboration has resulted in the development and application of systems with limited complexity and intrusiveness. As we progress beyond New START (NST) along the 'road to zero', the reduced number of nuclear weapons is likely to require increased confidence in monitoring and verification techniques. This may place increased demands on the technology to verify the presence of a nuclear weapon and even confirm the presence of a certain type. Simultaneously, this technology must include the ability to protect each treaty partner's sensitive nuclear weapons information. Mutual development of this technology by treaty partners offers the best approach for acceptance in treaty negotiations. This same approach of mutual cooperation and development is essential for developing nuclear test monitoring technology in support of the Comprehensive Nuclear Test Ban Treaty (CTBT). Our ability to detect low yield and evasive testing will be enhanced through mutually developed techniques and experiments using laboratory laser experiments and high explosives tests in a variety of locations and geologies. (authors)

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES/CLEAN DIESEL TECHNOLOGIES FUEL BORNE CATALYST WITH CLEANAIR SYSTEM'S DIESEL OXIDATION CATALYST

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with CleanAir System's Diesel Oxidation Catalyst manufactured by Clean Diesel Technologies, Inc. The technology is a fuel-borne catalyst used in ultra low sulfur d...

  19. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  20. Technology Foresight and nuclear test verification: a structured and participatory approach

    Science.gov (United States)

    Noack, Patrick; Gaya-Piqué, Luis; Haralabus, Georgios; Auer, Matthias; Jain, Amit; Grenard, Patrick

    2013-04-01

    As part of its mandate, the CTBTO's nuclear explosion monitoring programme aims to maintain its sustainability, effectiveness and its long-term relevance to the verification regime. As such, the PTS is conducting a Technology Foresight programme of activities to identify technologies, processes, concepts and ideas that may serve said purpose and become applicable within the next 20 years. Through the Technology Foresight activities (online conferences, interviews, surveys, workshops and other) we have involved the wider science community in the fields of seismology, infrasound, hydroacoustics, radionuclide technology, remote sensing and geophysical techniques. We have assembled a catalogue of over 200 items, which incorporate technologies, processes, concepts and ideas which will have direct future relevance to the IMS (International Monitoring System), IDC (International Data Centre) and OSI (On-Site Inspection) activities within the PTS. In order to render this catalogue as applicable and useful as possible for strategy and planning, we have devised a "taxonomy" based on seven categories, against which each technology is assessed through a peer-review mechanism. These categories are: 1. Focus area of the technology in question: identify whether the technology relates to (one or more of the following) improving our understanding of source and source physics; propagation modelling; data acquisition; data transport; data processing; broad modelling concepts; quality assurance and data storage. 2. Current Development Stage of the technology in question. Based on a scale from one to six, this measure is specific to PTS needs and broadly reflects Technology Readiness Levels (TRLs). 3. Impact of the technology on each of the following capabilities: detection, location, characterization, sustainment and confidence building. 4. Development cost: the anticipated monetary cost of validating a prototype (i.e. Development Stage 3) of the technology in question. 5. Time to

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES: CLEAN DIESEL TECHNOLOGIES FUEL-BORNE CATALYST WITH MITSUI/PUREARTH CATALYZED WIRE MESH FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with Mitsui/PUREarth Catalyzed Wire Mesh Filter manufactured by Clean Diesel Technologies, Inc. The technology is a platinum/cerium fuel-borne catalyst in commerci...

  2. Independent Verification Survey Report For Zone 1 Of The East Tennessee Technology Park In Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    King, David A.

    2012-01-01

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs)

  3. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  4. ENVIORNMENTAL TECHNOLOGY VERIFICATION REPORT: ANEST IWATA CORPORATION LPH400-LV HVLP SPRAY GUN

    Science.gov (United States)

    This Enviornmental Technology Verification reports on the characteristics of a paint spray gun. The research showed that the spray gun provided absolute and relative increases in transfer efficiency over the base line and provided a reduction in the use of paint.

  5. Current Research on Containment Technologies for Verification Activities: Advanced Tools for Maintaining Continuity of Knowledge

    International Nuclear Information System (INIS)

    Smartt, H.; Kuhn, M.; Krementz, D.

    2015-01-01

    The U.S. National Nuclear Security Administration (NNSA) Office of Non-proliferation and Verification Research and Development currently funds research on advanced containment technologies to support Continuity of Knowledge (CoK) objectives for verification regimes. One effort in this area is the Advanced Tools for Maintaining Continuity of Knowledge (ATCK) project. Recognizing that CoK assurances must withstand potential threats from sophisticated adversaries, and that containment options must therefore keep pace with technology advances, the NNSA research and development on advanced containment tools is an important investment. The two ATCK efforts underway at present address the technical containment requirements for securing access points (loop seals) and protecting defined volumes. Multiple U.S. national laboratories are supporting this project: Sandia National Laboratories (SNL), Savannah River National Laboratory (SRNL), and Oak Ridge National Laboratory (ORNL). SNL and SRNL are developing the ''Ceramic Seal,'' an active loop seal that integrates multiple advanced security capabilities and improved efficiency housed within a small-volume ceramic body. The development includes an associated handheld reader and interface software. Currently at the prototype stage, the Ceramic Seal will undergo a series of tests to determine operational readiness. It will be field tested in a representative verification trial in 2016. ORNL is developing the Whole Volume Containment Seal (WCS), a flexible conductive fabric capable of enclosing various sizes and shapes of monitored items. The WCS includes a distributed impedance measurement system for imaging the fabric surface area and passive tamper-indicating features such as permanent-staining conductive ink. With the expected technology advances from the Ceramic Seal and WCS, the ATCK project takes significant steps in advancing containment technologies to help maintain CoK for various verification

  6. Excerpts from the introductory statement to the IAEA Board of Governors, Vienna, 7 December 2000

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 7 December 2000. The following aspects from the Agency's activities are briefly presented: nuclear verification (status of integrated safeguards, plan of action for safeguards agreements and additional protocols, safeguards related to the Democratic People's Republic of Korea), technology issues (results of the 6th Conference of the Parties to the Convention on Climate Change, international project on innovative reactor and fuel cycle technologies), and safety issues (depleted uranium, safety standard discussions with the International Civil Aviation Organization, exchange of regulators or other safety personnel, emergency response co-ordination)

  7. A saddle-point for data verification and materials accountancy to control nuclear material

    International Nuclear Information System (INIS)

    Beedgen, R.

    1983-01-01

    Materials accountancy is one of the main elements in international safeguards to determine whether or not nuclear material has been diverted in nuclear plants. The inspector makes independent measurements to verify the plant-operator's data before closing the materials balance with the operator's data. All inspection statements are in principle probability statements because of random errors in measuring the material and verification on a random sampling basis. Statistical test procedures help the inspector to decide under this uncertainty. In this paper a statistical test procedure representing a saddle-point is presented that leads to the highest guaranteed detection probability taking all concealing strategies into account. There are arguments favoring a separate statistical evaluation of data verification and materials accountancy. Following these considerations, a bivariate test procedure is explained that evaluates verification and accountancy separately. (orig.) [de

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  9. Statements Relating to the Impact of Technological Change. Technology and the American Economy, Appendix, Volume VI.

    Science.gov (United States)

    National Commission on Technology, Automation and Economic Progress, Washington, DC.

    Forty-seven statements by industrial and business spokesmen, union and association representatives, and professors concern the broad impact of technological change on individuals, establishments, and society in general. Some of the longer presentations are (1) "The Poverty and Unemployment Crisis," by Walter Buckingham, (2) "Technological…

  10. Statement to the forty-fourth regular session of the IAEA General Conference 2000. IAEA General Conference. Vienna, 18 September 2000

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    In his Statement on the forty-fourth regular session of the General Conference of the IAEA, the Director General of the Agency highlighted IAEA's achievements in connection with its major functions: as catalyst for the development and transfer of nuclear technology (nuclear power, nuclear fuel cycle and waste management, preservation of nuclear expertise, nuclear science and applications, laboratory and research activities, future challenges in nuclear technology), as a recognized authority on nuclear safety (international conventions, establishment of international standards, safety services, early shutdown of nuclear power plants, decommissioning issues, Kursk submarine accident, future challenges in nuclear safety), and as an instrument for the verification of nuclear non-proliferation (safeguards agreements and additional protocols, implementation of United Nations Security Council Resolutions relating to Iraq, safeguards agreement with the Democratic People's Republic of Korea, application of IAEA Safeguards in the Middle East, other verification activities, security of material, future challenges in verification. He also discussed the Agency's technical co-operation programme and the Agency management for maximum efficiency and effectiveness, and the new outreach policy

  11. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--CAPSTONE 30KW MICROTURBINE SYSTEM

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system was evaluated based on the Capstone 30kW Microturbine developed by Cain Ind...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, FLINT HILLS RESOURCES, LP, CCD15010 DIESEL FUEL FORMULATION WITH HITEC4121 ADDITIVE

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, CUMMINS EMISSION SOLUTIONS AND CUMMINS FILTRATION DIESEL OXIDATION CATALYST AND CLOSED CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) Program. ETV seeks to provide high-quality, peer-reviewed data on technology performance. The Air Pollution Control Technology (APCT) Verification Center, a center under the ETV Program, is operated by Res...

  15. ETV VERTIFICATION REPORT AND VERIFICATION STATEMENT: COOPER POWER SYSTEMS ENVIROTEMP® FR3™ VEGETABLE OIL-BASED INSULATING DIELECTRIC FLUID

    Science.gov (United States)

    EPA's ETV Program, through the NRMRL has partnered with the California Department of Toxic Substances Control (DTSC) under an ETV Pilot Project to verify pollution prevention, recycling, and waste treatment technologies. This report and statement provides documentation of perfor...

  16. Hanford science and technology needs statements, 2000

    International Nuclear Information System (INIS)

    BERLIN, G.T.

    1999-01-01

    This document: (a) provides a comprehensive listing of the Hanford sites science and technology needs for fiscal year (FY) 2000; and (b) identifies partnering and commercialization opportunities within industry, other federal and state agencies, and the academic community. These needs were prepared by the Hanford projects (within the Project Hanford Management Contract and the Environmental Restoration Contract) and subsequently reviewed and endorsed by the Hanford Site Technology Coordination Group (STCG). The STCG reviews included participation of DOE-RL Management, site stakeholders, state and federal regulators, and Tribal Nations. The Science and Technology Needs Document is organized by major problem areas and coincides with the STCG subgroups which are as follows: Deactivation and Decommissioning, Mixed Waste, Subsurface Contaminants, High Level Waste Tanks, and Spent Nuclear Fuel. Each problem area begins with a technology needs index table. This table is followed by detailed descriptions of each technology need, including a problem statement and current baseline information associated with that need. Following the technology need description for each problem area is a table listing the science needs, followed by detailed descriptions of the functional need and the problem to be solved as currently understood. Finally, a crosswalk table is provided at the end of each problem area which ties together last years needs and this years needs, provides brief justification for elimination of any needs, and identifies any other significant changes which took place during the revision process

  17. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  18. ANIMAL WASTE IMPACT ON SOURCE WATERSAIDED BY EPA/NSF ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) SOURCE WATER PROTECTION PILOT

    Science.gov (United States)

    The Environmental Technology Verification Program (ETV) was established in 1995 by the U.S. Environmental Protection Agency to encourage the development and commercialization of new environmental technologies through third part testing and reporting of performance data. By ensur...

  19. Excerpts from the introductory statement. IAEA Board of Governors. Vienna, 19 March 2001

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    In his introductory statement to the IAEA Board of Governors, the IAEA Director General gave an overview of the Agency's activities regarding technological issues in nuclear power and non-power applications; safety issues related to nuclear power plants and research reactors; decommissioning of nuclear facilities; safety of radiation sources; and marine transport of radioactive materials. Further in the document he gives a brief description of the Agency's activities in the field of nuclear verification; Agency's participation in a field mission to Kosovo on environmental assessment of the consequences of the use of depleted uranium in ammunition; safety standards discussions with ICAO

  20. Environmental Technology Verification: Biological Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Systems--American Ultraviolet Corporation, DC24-6-120 [EPA600etv08005

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center (APCT Center) is operated by RTI International (RTI), in cooperation with EPA's National Risk Management Research Laboratory. The APCT Center conducts verifications of technologies that clean air in ventilation systems, inc...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, TETRATEC PTFE PRODUCTS, TETRATEX 6212 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  2. Working Group 2: Future Directions for Safeguards and Verification, Technology, Research and Development

    International Nuclear Information System (INIS)

    Zykov, S.; Blair, D.

    2013-01-01

    For traditional safeguards it was recognized that the hardware presently available is, in general, addressing adequately fundamental IAEA needs, and that further developments should therefore focus mainly on improving efficiencies (i.e. increasing cost economies, reliability, maintainability and user-friendliness, keeping abreast of continual advancements in technologies and of the evolution of verification approaches). Specific technology areas that could benefit from further development include: -) Non-destructive measurement systems (NDA), in particular, gamma-spectroscopy and neutron counting techniques; -) Containment and surveillance tools, such as tamper indicating seals, video-surveillance, surface identification methods, etc.; -) Geophysical methods for design information verification (DIV) and safeguarding of geological repositories; and -) New tools and methods for real-time monitoring. Furthermore, the Working Group acknowledged that a 'building block' (or modular) approach should be adopted towards technology development, enabling equipment to be upgraded efficiently as technologies advance. Concerning non-traditional safeguards, in the area of satellite-based sensors, increased spatial resolution and broadened spectral range were identified as priorities. In the area of wide area surveillance, the development of LIDAR-like tools for atmospheric sensing was discussed from the perspective of both potential benefits and certain limitations. Recognizing the limitations imposed by the human brain in terms of information assessment and analysis, technologies are needed that will enable the more effective utilization of all information, regardless of its format and origin. The paper is followed by the slides of the presentation. (A.C.)

  3. Reliability program plan for the Kilowatt Isotope Power System (KIPS) technology verification phase

    International Nuclear Information System (INIS)

    1978-01-01

    Ths document is an integral part of the Kilowatt Isotope Power System (KIPS) Program Plan. This document defines the KIPS Reliability Program Plan for the Technology Verification Phase. This document delineates the reliability assurance tasks that are to be accomplished by Sundstrand and its suppliers during the design, fabrication and testing of the KIPS

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: NEW CONDENSATOR, INC.--THE CONDENSATOR DIESEL ENGINE RETROFIT CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    EPA's Environmental Technology Verification Program has tested New Condensator Inc.'s Condensator Diesel Engine Retrofit Crankcase Ventilation System. Brake specific fuel consumption (BSFC), the ratio of engine fuel consumption to the engine power output, was evaluated for engine...

  5. ENVIRONMENTAL TECHNOLOGY PROTOCOL VERIFICATION REPORT, EMISSIONS OF VOCS AND ALDEHYDES FROM COMMERCIAL FURNITURE (WITH APPENDICES)

    Science.gov (United States)

    As part of a U.S. Environmental Protection Agency Environmental Technology Verification program, the Research Triangle Institute (RTI) developed a test protocol for measuring volatile organic compounds and aldehydes in a large chamber. RTI convened stakeholders for the commercial...

  6. TEST DESIGN FOR ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) OF ADD-ON NOX CONTROL UTILIZING OZONE INJECTION

    Science.gov (United States)

    The paper discusses the test design for environmental technology verification (ETV) of add-0n nitrogen oxides (NOx) control utilizing ozone injection. (NOTE: ETV is an EPA-established program to enhance domestic and international market acceptance of new or improved commercially...

  7. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    International Nuclear Information System (INIS)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author)

  8. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author).

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: RESIDENTIAL ELECTRIC POWER GENERATION USING THE PLUG POWER SU1 FUEL CELL SYSTEM

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Plug Power SU1 Fuel Cell System manufactured by Plug Power. The SU1 is a proton exchange membrane fuel cell that requires hydrogen (H2) as fuel. H2 is generally not available, so the ...

  10. Quality Assurance in Environmental Technology Verification (ETV): Analysis and Impact on the EU ETV Pilot Programme Performance

    Science.gov (United States)

    Molenda, Michał; Ratman-Kłosińska, Izabela

    2018-03-01

    Many innovative environmental technologies never reach the market because they are new and cannot demonstrate a successful track record of previous applications. This fact is a serious obstacle on their way to the market. Lack of credible data on the performance of a technology causes mistrust of investors in innovations, especially from public sector, who seek effective solutions however without compromising the technical and financial risks associated with their implementation. Environmental technology verification (ETV) offers a credible, robust and transparent process that results in a third party confirmation of the claims made by the providers about the performance of the novel environmental technologies. Verifications of performance are supported by high quality, independent test data. In that way ETV as a tool helps establish vendor credibility and buyer confidence. Several countries across the world have implemented ETV in the form of national or regional programmes. ETV in the European Union was implemented as a voluntary scheme if a form of a pilot programme. The European Commission launched the Environmental Technology Pilot Programme of the European Union (EU ETV) in 2011. The paper describes the European model of ETV set up and put to operation under the Pilot Programme of Environmental Technologies Verification of the European Union. The goal, objectives, technological scope, involved entities are presented. An attempt has been made to summarise the results of the EU ETV scheme performance available for the period of 2012 when the programme has become fully operational until the first half of 2016. The study was aimed at analysing the overall organisation and efficiency of the EU ETV Pilot Programme. The study was based on the analysis of the documents the operation of the EU ETV system. For this purpose, a relevant statistical analysis of the data on the performance of the EU ETV system provided by the European Commission was carried out.

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, COLUMBUS INDUSTRIES SL-3 RING PANEL

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the High Efficiency Mini Pleat air filter for dust and bioaerosol filtration manufactured by Columbus Industries. The pressure drop across the filter was 142 Pa clean and 283 Pa dust load...

  12. Alpha radioactivity measurement technology with ionized air type measurement. Applicability evaluation to verification of the clearance level

    International Nuclear Information System (INIS)

    Mita, Yutaka; Matsumura, Toshihiro; Yokoyama, Kaoru; Sugitsue, Noritake

    2008-10-01

    The purpose of this test is to evaluate the applicability of the clearance level measuring system by Ionized Air Type Measurement after decontaminated by sulfuric acid sample. In Ningyo-toge Environmental Engineering Center. The equipment and radioactive waste which were contaminated with uranium are generated so much in future dismantling stage. In our plan, some of equipments and radioactive waste are contaminated to a clearance level, and cut down on decommission and disposal expense. This plan needs the alpha-rays measurement technology of the very low level. We think that ionized Air transfer measurement technology is promising as of clearance verification technology. The ionized Air transfer measurement technology applied to the Ionized Air Type Measurement can measure plan radioactivity of a very low level. Moreover, as compared with a direct survey, there is the merit which can be measured in a short time. However ionized Air transfer measurement technology is new technology. Therefore, there is almost no measurement track record. Furthermore, the date about the influence of a background, a detection limit, measurement performance, and reliability is insufficient. So, this measurement test estimated applicability as clearance level verification of an Ionized Air Type Measurement. (author)

  13. 37 CFR 201.30 - Verification of Statements of Account.

    Science.gov (United States)

    2010-07-01

    ...), and primary auditor have the same meaning as the definition in § 201.28 of this part. (2) Filer is a... Copyright Office Quarterly and Annual Statements of Account and a primary auditor's report on the Annual... this part. (4) Verifying auditor is the person retained by interested copyright parties to perform a...

  14. ETV REPORT AND VERIFICATION STATEMENT - KASELCO POSI-FLO ELECTROCOAGULATION TREATMENT SYSTEM

    Science.gov (United States)

    The Kaselco Electrocoagulation Treatment System (Kaselco system) in combination with an ion exchange polishing system was tested, under actual production conditions, processing metal finishing wastewater at Gull Industries in Houston, Texas. The verification test evaluated the a...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS:AAF INTERNATIONAL, PERFECTPLEAT ULTRA, 175-102-863

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the PerfectPleat Ultra 175-102-863 air filter for dust and bioaerosol filtration manufactured by AAF International. The pressure drop across the filter was 112 Pa clean and 229 Pa dust lo...

  16. Statement to the fifty-third session of the United Nations General Assembly, New York, 2 November 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document reproduces the statement of the Director General of the IAEA at the fifty-third session of the United Nations General Assembly in New York, USA, on 2 November 1998. The statement focuses on the priority work of the Agency under the following main headings: contribution to peace and security (including the IAEA's strengthened safeguards system, inspections in Iraq, safeguards verifications in the Democratic People's Republic of Korea, future prospects of verification, illicit trafficking in nuclear material), co-operation for development (the Agency's technical co-operation programme), and meeting global challenges in the field of energy, the environment and nuclear safety. The statement concludes with a description of the process of management review and reform initiated by the Director General to ensure that the Agency is responding efficiently and effectively to the needs of its Member States

  17. Feasibility of biochemical verification in a web-based smoking cessation study.

    Science.gov (United States)

    Cha, Sarah; Ganz, Ollie; Cohn, Amy M; Ehlke, Sarah J; Graham, Amanda L

    2017-10-01

    Cogent arguments have been made against the need for biochemical verification in population-based studies with low-demand characteristics. Despite this fact, studies involving digital interventions (low-demand) are often required in peer review to report biochemically verified abstinence. To address this discrepancy, we examined the feasibility and costs of biochemical verification in a web-based study conducted with a national sample. Participants were 600U.S. adult current smokers who registered on a web-based smoking cessation program and completed surveys at baseline and 3months. Saliva sampling kits were sent to participants who reported 7-day abstinence at 3months, and analyzed for cotinine. The response rate at 3-months was 41.2% (n=247): 93 participants reported 7-day abstinence (38%) and were mailed a saliva kit (71% returned). The discordance rate was 36.4%. Participants with discordant responses were more likely to report 3-month use of nicotine replacement therapy or e-cigarettes than those with concordant responses (79.2% vs. 45.2%, p=0.007). The total cost of saliva sampling was $8280 ($125/sample). Biochemical verification was both time- and cost-intensive, and yielded a relatively small number of samples due to low response rates and use of other nicotine products during the follow-up period. There was a high rate of discordance of self-reported abstinence and saliva testing. Costs for data collection may be prohibitive for studies with large sample sizes or limited budgets. Our findings echo previous statements that biochemical verification is not necessary in population-based studies, and add evidence specific to technology-based studies. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  19. Resonating Statements

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects...

  20. Technology for bolus verification in proton therapy

    Science.gov (United States)

    Shipulin, K. N.; Mytsin, G. V.; Agapov, A. V.

    2015-01-01

    To ensure the conformal depth-dose distribution of a proton beam within a target volume, complex shaped range shifters (so-called boluses), which account for the heterogeneous structure of patient tissue and organs in the beam path, were calculated and manufactured. The precise manufacturing of proton compensators used for patient treatment is a vital step in quality assurance in proton therapy. In this work a software-hardware complex that verifies the quality and precision of bolus manufacturing at the Medico-Technical Complex (MTC) was developed. The boluses consisted of a positioning system with two photoelectric biosensors. We evaluated 20 boluses used in proton therapy of five patients. A total number of 2562 experimental points were measured, of which only two points had values that differed from the calculated value by more than 0.5 mm. The other data points displayed a deviation within ±0.5 mm from the calculated value. The technology for bolus verification developed in this work can be used for the high precision testing of geometrical parameters of proton compensators in radiotherapy.

  1. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  2. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  3. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    International Nuclear Information System (INIS)

    Betsill, J.D.; Gruebel, R.D.

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums

  4. DOE/LLNL verification symposium on technologies for monitoring nuclear tests related to weapons proliferation

    International Nuclear Information System (INIS)

    Nakanishi, K.K.

    1993-01-01

    The rapidly changing world situation has raised concerns regarding the proliferation of nuclear weapons and the ability to monitor a possible clandestine nuclear testing program. To address these issues, Lawrence Livermore National Laboratory's (LLNL) Treaty Verification Program sponsored a symposium funded by the US Department of Energy's (DOE) Office of Arms Control, Division of Systems and Technology. The DOE/LLNL Symposium on Technologies for Monitoring Nuclear Tests Related to Weapons Proliferation was held at the DOE's Nevada Operations Office in Las Vegas, May 6--7,1992. This volume is a collection of several papers presented at the symposium. Several experts in monitoring technology presented invited talks assessing the status of monitoring technology with emphasis on the deficient areas requiring more attention in the future. In addition, several speakers discussed proliferation monitoring technologies being developed by the DOE's weapons laboratories

  5. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  6. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  7. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  8. CTBT verification-related technologies for peaceful purposes: the French experiences of international cooperation

    International Nuclear Information System (INIS)

    Massinon, B.

    1999-01-01

    The French experience concerning CTBT verification-related technologies for peaceful purposes as well a the international cooperation in this field are presented. Possible objectives and cooperation program needs are cited. French experience in international cooperation is related to seismology and seismic hazards in Bolivia, Madagascar, Nepal and Indonesia and is considered as very constructive, meaning that technical experience is developed, consistent scientific results are obtained, and a considerable yield to the CTBT task is achieved. Large scientific benefits are expected from the CTBTO

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES--PUREM NORTH AMERICA LLC, PMF GREENTEC 1004205.00.0 DIESEL PARTICULATE FILTER

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) program to provide high quality, peer reviewed data on technology performance to those involved in the design, distribution, financing, permitting, purchase, and use of environmental technologies. The Air Po...

  10. An independent verification and validation of the Future Theater Level Model conceptual model

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.S. III; Kruse, K.L.; Martellaro, A.J.; Packard, S.L.; Thomas, B. Jr.; Turley, V.K.

    1994-08-01

    This report describes the methodology and results of independent verification and validation performed on a combat model in its design stage. The combat model is the Future Theater Level Model (FTLM), under development by The Joint Staff/J-8. J-8 has undertaken its development to provide an analysis tool that addresses the uncertainties of combat more directly than previous models and yields more rapid study results. The methodology adopted for this verification and validation consisted of document analyses. Included were detailed examination of the FTLM design documents (at all stages of development), the FTLM Mission Needs Statement, and selected documentation for other theater level combat models. These documents were compared to assess the FTLM as to its design stage, its purpose as an analytical combat model, and its capabilities as specified in the Mission Needs Statement. The conceptual design passed those tests. The recommendations included specific modifications as well as a recommendation for continued development. The methodology is significant because independent verification and validation have not been previously reported as being performed on a combat model in its design stage. The results are significant because The Joint Staff/J-8 will be using the recommendations from this study in determining whether to proceed with develop of the model.

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, FILTRATION GROUP, AEROSTAR FP-98 MINIPLEAT V-BLANK FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the AeroStar FP-98 Minipleat V-Bank Filter air filter for dust and bioaerosol filtration manufactured by Filtration Group. The pressure drop across the filter was 137 Pa clean and 348 Pa ...

  12. Statement to the Fifty-eighth Regular Session of the United Nations General Assembly. 3 November 2003, New York, USA

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The past year has been a time of significant challenges and achievements for the IAEA. In the area of nuclear non-proliferation, the Agency has been at the centre of attention and has demonstrated its ability to perform objective and credible verification - but a number of difficult and unresolved situations continue to exist. In the area of nuclear safety and security, our work is making a difference and we see overall improvement, but much remains to be done. In the nuclear technology field, the Agency is contributing to sustainable development through its technical co-operation programme, with the benefits of nuclear applications increasingly recognized. And while nuclear power continues to hold great potential as an environmentally clean source of energy, it remains in a holding position due to a number of associated concerns. This statement reviews in some detail the following Agency's activities: Nuclear Technology and nuclear power; non-power nuclear application; nuclear safety and security; status of international conventions; safety standards; protection against nuclear and radiological terrorism; verification of nuclear non-proliferation; implementation of safeguards in Korea, Iran and Middle East; implementation of UN resolutions related to Iraq

  13. AN ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) TESTING OF TWO HYDROGEN SULFIDE ANALYZERS: HORIBA INSTRUMENTS, INC., APSA-360 AND TELEDYNE-API MODEL 101E

    Science.gov (United States)

    The Environmental Technology Verification (ETV) Program, beginning as an initiative of the U.S. Environmental Protection Agency (EPA) in 1995, verifies the performance of commercially available, innovative technologies that can be used to measure environmental quality. The ETV p...

  14. Verification of the thermal design of electronic equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hienonen, R.; Karjalainen, M.; Lankinen, R. [VTT Automation, Espoo (Finland). ProTechno

    1997-12-31

    The project `Verification of the thermal design of electronic equipment` studied the methodology to be followed in the verification of thermal design of electronic equipment. This project forms part of the `Cool Electronics` research programme funded by TEKES, the Finnish Technology Development Centre. This project was carried out jointly by VTT Automation, Lappeenranta University of Technology, Nokia Research Center and ABB Industry Oy VSD-Technology. The thermal design of electronic equipment has a significant impact on the cost, reliability, tolerance to different environments, selection of components and materials, and ergonomics of the product. This report describes the method for verification of thermal design. It assesses the goals set for thermal design, environmental requirements, technical implementation of the design, thermal simulation and modelling, and design qualification testing and the measurements needed. The verification method covers all packaging levels of electronic equipment from the system level to the electronic component level. The method described in this report can be used as part of the quality system of a corporation. The report includes information about the measurement and test methods needed in the verification process. Some measurement methods for the temperature, flow and pressure of air are described. (orig.) Published in Finnish VTT Julkaisuja 824. 22 refs.

  15. Research on database realization technology of seismic information system in CTBT verification

    International Nuclear Information System (INIS)

    Zheng Xuefeng; Shen Junyi; Zhang Huimin; Jing Ping; Sun Peng; Zheng Jiangling

    2005-01-01

    Developing CTBT verification technology has become the most important method that makes sure CTBT to be fulfilled conscientiously. The seismic analysis based on seismic information system (SIS) is playing an important rule in this field. Based on GIS, the SIS will be very sufficient and powerful in spatial analysis, topologic analysis and visualization. However, the critical issue to implement the whole system function depends on the performance of SIS DB. Based on the ArcSDE Geodatabase data model, not only have the spatial data and attribute data seamless integrated management been realized with RDBMS ORACLE really, but also the most functions of ORACLE have been reserved. (authors)

  16. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  17. BAGHOUSE FILTRATION PRODUCTS VERIFICATION TESTING, HOW IT BENEFITS THE BOILER BAGHOUSE OPERATOR

    Science.gov (United States)

    The paper describes the Environmental Technology Verification (ETV) Program for baghouse filtration products developed by the Air Pollution Control Technology Verification Center, one of six Centers under the ETV Program, and discusses how it benefits boiler baghouse operators. A...

  18. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  19. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  20. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  1. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  2. Selected problems in auditing the financial statements of credit institutions

    OpenAIRE

    Joanna Wielgórska-Leszczyńska

    2016-01-01

    The article presents issues deserving special attention in the area of auditing the financial statements of credit institution. Without a doubt, these are the financial instruments, including credit exposures. To properly audit these instruments it is required to verify the accuracy of the valuation. Such verification in the case of credit exposures is preceded by appropriate category qualification followed by impairment write-off determined considering the established security. T...

  3. GENERIC VERIFICATION PROTOCOL FOR AQUEOUS CLEANER RECYCLING TECHNOLOGIES

    Science.gov (United States)

    This generic verification protocol has been structured based on a format developed for ETV-MF projects. This document describes the intended approach and explain plans for testing with respect to areas such as test methodology, procedures, parameters, and instrumentation. Also ...

  4. A framework for nuclear agreement and verification

    International Nuclear Information System (INIS)

    Ali, A.

    1991-01-01

    This chapter assesses the prospects for a nuclear agreement between India and Pakistan. The chapter opens with a review of past and present political environments of the two countries. The discussion proceeds to describe the linkage of global arms control agreements, prospects for verification of a Comprehensive Test Ban Treaty, the role of nuclear power in any agreements, the intrusiveness of verification, and possible post-proliferation agreements. Various monitoring and verification technologies are described (mainly satellite oriented). The chapter concludes with an analysis of the likelihood of persuading India and Pakistan to agree to a nonproliferation arrangement

  5. Development of the advanced PHWR technology -Verification tests for CANDU advanced fuel-

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jang Hwan; Suk, Hoh Chun; Jung, Moon Kee; Oh, Duk Joo; Park, Joo Hwan; Shim, Kee Sub; Jang, Suk Kyoo; Jung, Heung Joon; Park, Jin Suk; Jung, Seung Hoh; Jun, Ji Soo; Lee, Yung Wook; Jung, Chang Joon; Byun, Taek Sang; Park, Kwang Suk; Kim, Bok Deuk; Min, Kyung Hoh [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    This is the `94 annual report of the CANDU advanced fuel verification test project. This report describes the out-of pile hydraulic tests at CANDU-hot test loop for verification of CANFLEX fuel bundle. It is also describes the reactor thermal-hydraulic analysis for thermal margin and flow stability. The contents in this report are as follows; (1) Out-of pile hydraulic tests for verification of CANFLEX fuel bundle. (a) Pressure drop tests at reactor operation condition (b) Strength test during reload at static condition (c) Impact test during reload at impact load condition (d) Endurance test for verification of fuel integrity during life time (2) Reactor thermal-hydraulic analysis with CANFLEX fuel bundle. (a) Critical channel power sensitivity analysis (b) CANDU-6 channel flow analysis (c) Flow instability analysis. 61 figs, 29 tabs, 21 refs. (Author).

  6. Development of the advanced PHWR technology -Verification tests for CANDU advanced fuel-

    International Nuclear Information System (INIS)

    Jung, Jang Hwan; Suk, Hoh Chun; Jung, Moon Kee; Oh, Duk Joo; Park, Joo Hwan; Shim, Kee Sub; Jang, Suk Kyoo; Jung, Heung Joon; Park, Jin Suk; Jung, Seung Hoh; Jun, Ji Soo; Lee, Yung Wook; Jung, Chang Joon; Byun, Taek Sang; Park, Kwang Suk; Kim, Bok Deuk; Min, Kyung Hoh

    1995-07-01

    This is the '94 annual report of the CANDU advanced fuel verification test project. This report describes the out-of pile hydraulic tests at CANDU-hot test loop for verification of CANFLEX fuel bundle. It is also describes the reactor thermal-hydraulic analysis for thermal margin and flow stability. The contents in this report are as follows; (1) Out-of pile hydraulic tests for verification of CANFLEX fuel bundle. (a) Pressure drop tests at reactor operation condition (b) Strength test during reload at static condition (c) Impact test during reload at impact load condition (d) Endurance test for verification of fuel integrity during life time (2) Reactor thermal-hydraulic analysis with CANFLEX fuel bundle. (a) Critical channel power sensitivity analysis (b) CANDU-6 channel flow analysis (c) Flow instability analysis. 61 figs, 29 tabs, 21 refs. (Author)

  7. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  8. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 14 September 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 14 September 1998. The following aspects from the Agency's activity are presented: nuclear safety, technical co-operation programme, safeguards and verification, fissile material treaty, nuclear material released from the military sector, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), Agency's inspections in Iraq in relation to its clandestine nuclear programme, and Agency's safeguards in the Middle East region

  9. Influence of Customer Focused Mission Statement on Customer Satisfaction

    Directory of Open Access Journals (Sweden)

    Chijioke Nwachukwu

    2017-01-01

    Full Text Available The purpose of this study is to examine the influence of customer‑focused mission statements on customer satisfaction in selected cell phone manufacturing companies in the United States. The study employed content analysis for the mission statement and data from America customer satisfaction index (ACSI. In analysing our data, Pearson correlation, and multiple regression techniques were used. The result showed that product and service, technology, philosophy, self‑concept, and public image mission statement components are strongly positively correlated with customer satisfaction. Customer, survival, growth and profitability and market mission statement components are insignificantly negatively correlated with customer satisfaction. The study, therefore, recommends that companies that want to remain competitive by enhancing customer satisfaction should formulate mission statements from a customer perspective so that they include product and service, technology, philosophy, self‑concept, and public image components. The main limitation of the study represents the sample size and structure. This study empirically investigated the correlation and association of nine mission statement components with customer satisfaction.

  10. Inventory of present verification techniques. Viewpoint of EURATOM

    International Nuclear Information System (INIS)

    Kloeckner, W.; Eecken, D. Van der; Gmelin, W.

    1998-01-01

    Starting from the role of Euratom as an established regional safeguards system, an overview is given of verification techniques currently practised by Euratom. In the stage-light of a rapidly changing and complex international safeguards scene, Euratom considers it has an important role to play. Having in mind the possibilities created by accelerating modern technology, recommendations are given for an enhanced use of technological means in safeguards. The viewpoint of Euratom is that the majority of methodologies and techniques in place may very well be copied to or used for a cut-off verification system currently under discussion

  11. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  12. Projected Impact of Compositional Verification on Current and Future Aviation Safety Risk

    Science.gov (United States)

    Reveley, Mary S.; Withrow, Colleen A.; Leone, Karen M.; Jones, Sharon M.

    2014-01-01

    The projected impact of compositional verification research conducted by the National Aeronautic and Space Administration System-Wide Safety and Assurance Technologies on aviation safety risk was assessed. Software and compositional verification was described. Traditional verification techniques have two major problems: testing at the prototype stage where error discovery can be quite costly and the inability to test for all potential interactions leaving some errors undetected until used by the end user. Increasingly complex and nondeterministic aviation systems are becoming too large for these tools to check and verify. Compositional verification is a "divide and conquer" solution to addressing increasingly larger and more complex systems. A review of compositional verification research being conducted by academia, industry, and Government agencies is provided. Forty-four aviation safety risks in the Biennial NextGen Safety Issues Survey were identified that could be impacted by compositional verification and grouped into five categories: automation design; system complexity; software, flight control, or equipment failure or malfunction; new technology or operations; and verification and validation. One capability, 1 research action, 5 operational improvements, and 13 enablers within the Federal Aviation Administration Joint Planning and Development Office Integrated Work Plan that could be addressed by compositional verification were identified.

  13. Research on key technology of the verification system of steel rule based on vision measurement

    Science.gov (United States)

    Jia, Siyuan; Wang, Zhong; Liu, Changjie; Fu, Luhua; Li, Yiming; Lu, Ruijun

    2018-01-01

    The steel rule plays an important role in quantity transmission. However, the traditional verification method of steel rule based on manual operation and reading brings about low precision and low efficiency. A machine vison based verification system of steel rule is designed referring to JJG1-1999-Verificaiton Regulation of Steel Rule [1]. What differentiates this system is that it uses a new calibration method of pixel equivalent and decontaminates the surface of steel rule. Experiments show that these two methods fully meet the requirements of the verification system. Measuring results strongly prove that these methods not only meet the precision of verification regulation, but also improve the reliability and efficiency of the verification system.

  14. Statement to the Forty-ninth Regular Session of the IAEA General Conference 2005, 26 September 2005, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The Director General reviewed how far the Agency has come in recent years, in terms of each of the three pillars of activity that support the Agency's mission - technology, safety and verification - and described what, in his view, should be the vision for the future. The part on Nuclear Power Technology dealt with changes in nuclear power, advances in nuclear innovation, decommissioning of nuclear facilities, waste and fuel cycle issues including multilateral approaches, uranium production and nuclear knowledge management. A major part of the Agency's scientific and technical work involves the transfer of peaceful nuclear technology in applications related to health, agriculture, water management and preservation of the environment. The part on Nuclear Safety and Security described the status of international conventions, safety standards and missions, research reactor utilization, safety and security, radiological protection of patients, safety of radioactive waste management, safety of transport of radioactive material, the Chernobyl Forum, the nuclear security and protection against nuclear terrorism, regulatory infrastructures for radiation safety and the control of radioactive sources and the conversion of HEU to LEU at research reactors. In the area of verification, the status of safeguards agreements and additional protocols, the safeguards implementation report and safeguards statement for 2004, integrated safeguards, small quantities protocols, verification activities in Iraq, implementation of safeguards in the DPRK, implementation of the NPT safeguards agreements in the Islamic Republic of Iran and application of IAEA safeguards in the Middle East were discussed. Items of the Technical Cooperation Programme included TC programme management and TC programme funding. This was followed by management of the agency, biennial budgeting, 2006-2007 programme and budgeting, agency staffing issues, public outreach and public awareness. It concluded with a few key

  15. Development of evaluation and performance verification technology for radiotherapy radiation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. Y.; Jang, S. Y.; Kim, B. H. and others

    2005-02-15

    No matter how much the importance is emphasized, the exact assessment of the absorbed doses administered to the patients to treat the various diseases such as lately soaring malignant tumors with the radiotherapy practices is the most important factor. In reality, several over-exposed patients from the radiotherapy practice become very serious social issues. Especially, the development of a technology to exactly assess the high doses and high energies (In general, dose administered to the patients with the radiotherapy practices are very huge doses, and they are about three times higher than the lethal doses) generated by the radiation generators and irradiation equipment is a competing issue to be promptly conducted. Over fifty medical centers in Korea operate the radiation generators and irradiation equipment for the radiotherapy practices. However, neither the legal and regulatory systems to implement a quality assurance program are sufficiently stipulated nor qualified personnel who could run a program to maintain the quality assurance and control of those generators and equipment for the radiotherapy practices in the medical facilities are sufficiently employed. To overcome the above deficiencies, a quality assurance program such as those developed in the technically advanced countries should be developed to exactly assess the doses administered to patients with the radiotherapy practices and develop the necessary procedures to maintain the continuing performance of the machine or equipment for the radiotherapy. The QA program and procedures should induce the fluent calibration of the machine or equipment with quality, and definitely establish the safety of patients in the radiotherapy practices. In this study, a methodology for the verification and evaluation of the radiotherapy doses is developed, and several accurate measurements, evaluations of the doses delivered to patients and verification of the performance of the therapy machine and equipment are

  16. Test/QA Plan for Verification of Cavity Ringdown Spectroscopy Systems for Ammonia Monitoring in Stack Gas

    Science.gov (United States)

    The purpose of the cavity ringdown spectroscopy (CRDS) technology test and quality assurance plan is to specify procedures for a verification test applicable to commercial cavity ringdown spectroscopy technologies. The purpose of the verification test is to evaluate the performa...

  17. Advancing Disarmament Verification Tools: A Task for Europe?

    International Nuclear Information System (INIS)

    Göttsche, Malte; Kütt, Moritz; Neuneck, Götz; Niemeyer, Irmgard

    2015-01-01

    A number of scientific-technical activities have been carried out to establish more robust and irreversible disarmament verification schemes. Regardless of the actual path towards deeper reductions in nuclear arsenals or their total elimination in the future, disarmament verification will require new verification procedures and techniques. This paper discusses the information that would be required as a basis for building confidence in disarmament, how it could be principally verified and the role Europe could play. Various ongoing activities are presented that could be brought together to produce a more intensified research and development environment in Europe. The paper argues that if ‘effective multilateralism’ is the main goal of the European Union’s (EU) disarmament policy, EU efforts should be combined and strengthened to create a coordinated multilateral disarmament verification capacity in the EU and other European countries. The paper concludes with several recommendations that would have a significant impact on future developments. Among other things, the paper proposes a one-year review process that should include all relevant European actors. In the long run, an EU Centre for Disarmament Verification could be envisaged to optimize verification needs, technologies and procedures.

  18. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  19. Sample representativeness verification of the FADN CZ farm business sample

    Directory of Open Access Journals (Sweden)

    Marie Prášilová

    2011-01-01

    Full Text Available Sample representativeness verification is one of the key stages of statistical work. After having joined the European Union the Czech Republic joined also the Farm Accountancy Data Network system of the Union. This is a sample of bodies and companies doing business in agriculture. Detailed production and economic data on the results of farming business are collected from that sample annually and results for the entire population of the country´s farms are then estimated and assessed. It is important hence, that the sample be representative. Representativeness is to be assessed as to the number of farms included in the survey and also as to the degree of accordance of the measures and indices as related to the population. The paper deals with the special statistical techniques and methods of the FADN CZ sample representativeness verification including the necessary sample size statement procedure. The Czech farm population data have been obtained from the Czech Statistical Office data bank.

  20. Sandia technology. Volume 13, number 2 Special issue: verification of arms control treaties

    International Nuclear Information System (INIS)

    1989-01-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  1. Report on the Trilateral Initiative. IAEA verification of weapon-origin material in the Russian Federation and the United States

    International Nuclear Information System (INIS)

    Shea, Thomas E.

    2001-01-01

    Just over five years ago, the Trilateral Initiative was launched to investigate the technical, legal and financial issues associated with IAEA verification of weapon-origin fissile material in the Russian Federation and the United States. Since then, the Joint Working Group has developed concepts and equipment suitable for such a verification mission, anticipating that the States would submit classified forms of fissile material to IAEA verification under new agreements developed for this purpose. This article summarizes the accomplishments to date and identifies the future steps foreseen under the Trilateral Initiative. As there is no legal commitment on the Parties to this Initiative as yet, the issues considered are still changing. Since it was launched, the Initiative has been given a sense of importance and weight, raising the expectations of the international community. The Final Document of the 2000 Conference on the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), for example, under the review of Article VI of the Treaty, includes the statement to 'complete and implement the Trilateral Initiative'. It was launched following independent statements by the President of the United States beginning in 1993, and by the President of the Russian Federation in 1996. It is an Initiative between the IAEA, the Russian Federation and the United States that is in the context of Article VI of the NPT. The intention is to examine the technical, legal and financial issues associated with IAEA verification of weapon origin and other fissile material released from defense programmes in those two countries

  2. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  3. In Brief: Geoengineering draft statement

    Science.gov (United States)

    Showstack, Randy

    2009-04-01

    The American Meteorological Society (AMS) has prepared a draft policy statement on geoengineering the climate system, which the AMS Council is considering for approval. The statement notes, “Geoengineering will not substitute for either aggressive mitigation or proactive adaptation. It could contribute to a comprehensive risk management strategy to slow climate change and alleviate its negative impacts, but the potential for adverse and unintended consequences implies a need for adequate research, appropriate regulation, and transparent consideration.” The statement, if adopted, indicates that AMS recommends enhanced research on the scientific and technological potential for geoengineering the climate system; additional study of the historical, ethical, legal, political, and societal aspects of the geoengineering issues; and the development and analysis of policy options to promote transparency and international cooperation in exploring geoengineering options along with restrictions on reckless efforts to manipulate the climate system. AMS is accepting comments on the draft statement until 23 April. For more information, visit http://ametsoc.org/policy/draftstatements/index.html#draft.

  4. Selected problems in auditing the financial statements of credit institutions

    Directory of Open Access Journals (Sweden)

    JOANNA WIELGÓRSKA-LESZCZYŃSKA

    2016-06-01

    Full Text Available The article presents issues deserving special attention in the area of auditing the financial statements of credit institution. Without a doubt, these are the financial instruments, including credit exposures. To properly audit these instruments it is required to verify the accuracy of the valuation. Such verification in the case of credit exposures is preceded by appropriate category qualification followed by impairment write-off determined considering the established security. Thus, the audit process is complex and requires assessment by the auditor of exogenous and endogenous factors affecting the operation of credit institutions.

  5. 76 FR 54810 - Submission for Review: 3206-0215, Verification of Full-Time School Attendance, RI 25-49

    Science.gov (United States)

    2011-09-02

    ... other technological collection techniques or other forms of information technology, e.g., permitting... or faxed to (202) 395-6974. SUPPLEMENTARY INFORMATION: RI 25-49, Verification of Full-Time School... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: 3206-0215, Verification of Full-Time School...

  6. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  7. Technology verification phase. Dynamic isotope power system. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.G.

    1982-03-10

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance. (LCL)

  8. Technology verification phase. Dynamic isotope power system. Final report

    International Nuclear Information System (INIS)

    Halsey, D.G.

    1982-01-01

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance

  9. 78 FR 69175 - Proposed Information Collection (Financial Statement); Comment Request

    Science.gov (United States)

    2013-11-18

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0047] Proposed Information Collection (Financial Statement); Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans... use of other forms of information technology. Title: Financial Statement, VA Form 26-6807. OMB Control...

  10. Experimental verification of layout physical verification of silicon photonics

    Science.gov (United States)

    El Shamy, Raghi S.; Swillam, Mohamed A.

    2018-02-01

    Silicon photonics have been approved as one of the best platforms for dense integration of photonic integrated circuits (PICs) due to the high refractive index contrast among its materials. Silicon on insulator (SOI) is a widespread photonics technology, which support a variety of devices for lots of applications. As the photonics market is growing, the number of components in the PICs increases which increase the need for an automated physical verification (PV) process. This PV process will assure reliable fabrication of the PICs as it will check both the manufacturability and the reliability of the circuit. However, PV process is challenging in the case of PICs as it requires running an exhaustive electromagnetic (EM) simulations. Our group have recently proposed an empirical closed form models for the directional coupler and the waveguide bends based on the SOI technology. The models have shown a very good agreement with both finite element method (FEM) and finite difference time domain (FDTD) solvers. These models save the huge time of the 3D EM simulations and can be easily included in any electronic design automation (EDA) flow as the equations parameters can be easily extracted from the layout. In this paper we present experimental verification for our previously proposed models. SOI directional couplers with different dimensions have been fabricated using electron beam lithography and measured. The results from the measurements of the fabricate devices have been compared to the derived models and show a very good agreement. Also the matching can reach 100% by calibrating certain parameter in the model.

  11. 76 FR 8848 - Proposed Information Collection (Financial Statement); Comment Request

    Science.gov (United States)

    2011-02-15

    ... (Financial Statement); Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans... use of other forms of information technology. Title: Financial Statement, VA Form 26-6807. OMB Control... creditworthiness requirements. The data is also used to determine a borrower's financial condition in connection...

  12. Distributed Engine Control Empirical/Analytical Verification Tools, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — In this Phase I project, Impact Technologies, in collaboration with Prof. R.K. Yedavalli, propose a novel verification environment for eventual rapid certification...

  13. Consumer Sleep Technology: An American Academy of Sleep Medicine Position Statement.

    Science.gov (United States)

    Khosla, Seema; Deak, Maryann C; Gault, Dominic; Goldstein, Cathy A; Hwang, Dennis; Kwon, Younghoon; O'Hearn, Daniel; Schutte-Rodin, Sharon; Yurcheshen, Michael; Rosen, Ilene M; Kirsch, Douglas B; Chervin, Ronald D; Carden, Kelly A; Ramar, Kannan; Aurora, R Nisha; Kristo, David A; Malhotra, Raman K; Martin, Jennifer L; Olson, Eric J; Rosen, Carol L; Rowley, James A

    2018-05-15

    Consumer sleep technologies (CSTs) are widespread applications and devices that purport to measure and even improve sleep. Sleep clinicians may frequently encounter CST in practice and, despite lack of validation against gold standard polysomnography, familiarity with these devices has become a patient expectation. This American Academy of Sleep Medicine position statement details the disadvantages and potential benefits of CSTs and provides guidance when approaching patient-generated health data from CSTs in a clinical setting. Given the lack of validation and United States Food and Drug Administration (FDA) clearance, CSTs cannot be utilized for the diagnosis and/or treatment of sleep disorders at this time. However, CSTs may be utilized to enhance the patient-clinician interaction when presented in the context of an appropriate clinical evaluation. The ubiquitous nature of CSTs may further sleep research and practice. However, future validation, access to raw data and algorithms, and FDA oversight are needed. © 2018 American Academy of Sleep Medicine.

  14. CTBT integrated verification system evaluation model supplement

    International Nuclear Information System (INIS)

    EDENBURN, MICHAEL W.; BUNTING, MARCUS; PAYNE, ARTHUR C. JR.; TROST, LAWRENCE C.

    2000-01-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0

  15. Development of Out-pile Test Technology for Fuel Assembly Performance Verification

    Energy Technology Data Exchange (ETDEWEB)

    Chun, Tae Hyun; In, W. K.; Oh, D. S. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)] (and others)

    2007-03-15

    Out-pile tests with full scale fuel assembly are to verify the design and to evaluate the performance of the final products. HTL for the hydraulic tests and FAMeCT for mechanical/structural tests were constructed in this project. The maximum operating conditions of HTL are 30 bar, 320 .deg. C, and 500 m3/hr. This facility can perform the pressure drop test, fuel assembly uplift test, and flow induced vibration test. FAMeCT can perform the bending and vibration tests. The verification of the developed facilities were carried out by comparing the reference data of the fuel assembly which was obtained at the Westinghouse Co. The compared data showed a good coincidence within uncertainties. FRETONUS was developed for high temperature and high pressure fretting wear simulator and performance test. A performance test was conducted for 500 hours to check the integrity, endurance, data acquisition capability of the simulator. The technology of turbulent flow analysis and finite element analysis by computation was developed. From the establishments of out-pile test facilities for full scale fuel assembly, the domestic infrastructure for PWR fuel development has been greatly upgraded.

  16. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  17. DIMENSIONAL VERIFICATION AND QUALITY CONTROL OF IMPLANTS PRODUCED BY ADDITIVE MANUFACTURING

    Directory of Open Access Journals (Sweden)

    Teodor Toth

    2015-07-01

    Full Text Available Purpose: Development of computer technology and alternative manufacturing methods in form of additive manufacturing leads to the manufacture of products with complex shapes. In the field of medicine they include, inter alia, custom-made implants manufactured for a particular patient, such as cranial implants, maxillofacial implants, etc. With regard to the fact that such implants are inserted into a patient’s body, it is necessary to perform the verification, including the shape and dimensional verification. The article deals with the application of the industrial computer tomography within the process of inspection and verification of selected custom-made implant types.Methodology/Approach: The Department of Biomedical Engineering and Measurement performs the verification of medicinal products manufactured by the additive manufacturing technologies from the Ti-6Al-4V (Grade 5 titanium alloy, using the coordinate measuring machine Carl Zeiss Contura G2 and the industrial computed tomography machine Carl Zeiss Metrotom 1500. These equipment fulfil the requirements for the identification and evaluation of dimensions of both, the external and the internal structures. Findings: The article presents the possibilities of the computed tomography utilisation in the inspection of individual implant manufacture using the additive manufacturing technologies. The results indicate that with the adjustment of appropriate input parameters (alignment, this technology is appropriate for the analysis of shape deviations, when compared with the CAD model.Research Limitation/implication: With the increasing distance of measured object from X-ray source, the machine’s resolution function decreases. Decreasing of resolution has a minor impact on the measured dimensions (relatively high tolerances, but has a significant impact on the evaluation of porosity and inclusions. Originality/Value of paper: Currently, the verification of a manufactured implant  can be

  18. Generic impact statement for commercial radioactive waste management

    International Nuclear Information System (INIS)

    Unruh, C.M.

    1976-01-01

    ERDA is preparing a generic environmental impact statement on the treatment and disposal of waste resulting from commercial reactors and post fission operations in the light water reactor (LWR) fuel cycle. Expert contributions will be provided by many of the ERDA national laboratories and contractors. The waste management aspects of the statement will be based on available technology as presented in the recently issued ''Alternatives for Managing Waste from Reactors and Post Fission Operations in the LWR Fuel Cycle,'' ERDA-76-43 Document. This 1500 page, five volume Technical Alternative Document (TAD) describes the status of technology (to September, 1975) for handling post fission radioactive waste generated by the production of electricity by nuclear power light water reactor-generator systems. The statement will be generic in nature discussing typical or hypothetical facilities in typical or hypothetical environments. It is not intended to replace environmental statements required in support of specific projects nor for Nuclear Regulatory Commission licensing procedures. A major purpose of the generic statement is to inform the public and to solicit comments on the ERDA program for: (1) the final disposition of commercial radioactive waste, (2) waste treatment, (3) waste interim storage, and (4) transportation of waste. The statement will discuss the ERDA contingency program to provide retrievable storage of such waste if they should be transferred to Federal custody prior to the availability of the geologic isolation facilities for terminal disposal. The generic statement will not address radioactive waste resulting from U.S. Defense Programs, the mining or milling of uranium, the management of waste from the breeder reactor program, waste from other nations, nor will it include an evaluation of the impact of waste resulting from power sources other than light water reactors

  19. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  20. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security.

  1. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  2. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  3. ILK statement on sustainability - evaluation of nuclear energy and other electricity supply technologies

    International Nuclear Information System (INIS)

    2004-01-01

    The electricity utility sector is of central importance for economic growth and societal development. While numerous societal and economic benefits arise from electricity consumption, its production can also have impacts which may not be fully and unanimously reconciled with the concept of sustainability. Consideration of sustainability issues plays an increasingly important role in decisions affecting the current and future energy supply. Judgements on the sustainability of specific electricity supply options are, however, mostly made in an ad hoc manner, and are susceptible to bias and arbitrariness. The German Federal Government singles out nuclear energy in particular as not sustainable for the future and considers it in a fundamentally critical manner separately from the other options. The ILK's opinion is that all options of interest, including nuclear, need to be evaluated in a comparative perspective based on a systematic and comprehensive approach. Therefore, the ILK considered it worthwhile to investigate this matter in more detail and express its views in the form of the present statement. The ILK statement on sustainability takes into consideration the most relevant international and national developments. These form the background and input for the establishment of ILK's position. A limited scope comparative study on the sustainability of different electricity supply technologies under German conditions was carried out by the Paul Scherrer Institut (PSI) in order to demonstrate the applicability of a systematic approach and generate reasonably consistent results from which robust conclusions can be derived. (orig.) [de

  4. Testing and Demonstrating Speaker Verification Technology in Iraqi-Arabic as Part of the Iraqi Enrollment Via Voice Authentication Project (IEVAP) in Support of the Global War on Terrorism (GWOT)

    National Research Council Canada - National Science Library

    Withee, Jeffrey W; Pena, Edwin D

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment...

  5. Valx: A System for Extracting and Structuring Numeric Lab Test Comparison Statements from Text.

    Science.gov (United States)

    Hao, Tianyong; Liu, Hongfang; Weng, Chunhua

    2016-05-17

    To develop an automated method for extracting and structuring numeric lab test comparison statements from text and evaluate the method using clinical trial eligibility criteria text. Leveraging semantic knowledge from the Unified Medical Language System (UMLS) and domain knowledge acquired from the Internet, Valx takes seven steps to extract and normalize numeric lab test expressions: 1) text preprocessing, 2) numeric, unit, and comparison operator extraction, 3) variable identification using hybrid knowledge, 4) variable - numeric association, 5) context-based association filtering, 6) measurement unit normalization, and 7) heuristic rule-based comparison statements verification. Our reference standard was the consensus-based annotation among three raters for all comparison statements for two variables, i.e., HbA1c and glucose, identified from all of Type 1 and Type 2 diabetes trials in ClinicalTrials.gov. The precision, recall, and F-measure for structuring HbA1c comparison statements were 99.6%, 98.1%, 98.8% for Type 1 diabetes trials, and 98.8%, 96.9%, 97.8% for Type 2 diabetes trials, respectively. The precision, recall, and F-measure for structuring glucose comparison statements were 97.3%, 94.8%, 96.1% for Type 1 diabetes trials, and 92.3%, 92.3%, 92.3% for Type 2 diabetes trials, respectively. Valx is effective at extracting and structuring free-text lab test comparison statements in clinical trial summaries. Future studies are warranted to test its generalizability beyond eligibility criteria text. The open-source Valx enables its further evaluation and continued improvement among the collaborative scientific community.

  6. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 9 December 1999

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1999-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 9 December 1999. The following aspects from the Agency's activity are briefly presented: IAEA's safeguards, physical protection of nuclear material, the status of Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), and Agency's actions in connection with Y2K possible problems

  7. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 8 December 1997

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1997-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 8 December 1997. The following aspects from the Agency's activity are presented: nuclear energy, Agency's inspections in Iraq in relation to its clandestine nuclear programme, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), and conclusion of safeguards agreements and additional protocols

  8. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  9. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  10. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  11. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  12. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  13. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  14. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  15. 76 FR 15054 - Proposed Information Collection (Supporting Statement Regarding Marriage); Comment Request

    Science.gov (United States)

    2011-03-18

    ... (Supporting Statement Regarding Marriage); Comment Request AGENCY: Veterans Benefits Administration... eligibility for benefits based on a common law marriage. DATES: Written comments and recommendations on the... use of other forms of information technology. Title: Supporting Statement Regarding Marriage, VA Form...

  16. Introductory statement to the Board of Governors. Vienna, 17 March 2003

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    the agenda for the meeting covers a broad range of issues, once again touching on all three Agency pillars - technology, safety and verification. The following topics related to each of these pillars, as well as a number of management issues: Nuclear Technology; Advanced Reactor and Fuel Cycle Designs; Nuclear Desalination; Sterile insect technique (SIT) Malaria; Nuclear De-Mining Techniques; Knowledge Management; Nuclear Safety, Radiation Safety, and Waste and Transport Safety; Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management; Safety Standards; Research Reactor Safety; Conference on Security of Radioactive Sources; Nuclear Verification; Status of Safeguards Agreements and Additional Protocols; Visit to Iran; Status of Safeguards Agreement with the DPRK; Inspections in Iraq; Convention on the Physical Protection of Nuclear Materials; Management Issues; Planning for the 2004-2005 Programme and Budget. In conclusion it is stated: the Agency's verification role is currently in the spotlight, but the state-of-the-art verification regime we are trying to build will be effective only if all Member States fulfil their respective legal obligations. We are continuing to press for a comprehensive and effective nuclear safety regime - but pockets of weakness remain, in both the nuclear and the radiation safety areas. In the nuclear security area, the Secretariat has made intensive efforts to prepare and implement an action plan - which is already making a positive impact - but much remains to be done, including better control of radioactive sources. Nuclear technologies provide significant opportunities for economic and social development - but we need to work together to maximize the benefits and minimize the risks of these technologies

  17. Nuclear cooperation targets global challenges. States back main pillars of the IAEA's work to strengthen nuclear safety, verification and technology transfer

    International Nuclear Information System (INIS)

    2000-01-01

    States meeting at the 44th IAEA General Conference in Vienna have set a challenging agenda for international nuclear cooperation into the 21st century that targets issues of global safety, security, and sustainable development. They adopted resolutions endorsing the Agency's programmes for strengthening activities under its three main pillars of work - nuclear verification, safety, and technology - that are closely linked to major challenges before the world. The document presents the main actions taken during the conference

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, JCH FUEL SOLUTIONS, INC., JCH ENVIRO AUTOMATED FUEL CLEANING AND MAINTENANCE SYSTEM

    Science.gov (United States)

    The verification testing was conducted at the Cl facility in North Las Vegas, NV, on July 17 and 18, 2001. During this period, engine emissions, fuel consumption, and fuel quality were evaluated with contaminated and cleaned fuel.To facilitate this verification, JCH repre...

  19. An overview of CTBT verification technologies and status of IMS networks

    International Nuclear Information System (INIS)

    Basham, P.

    2002-01-01

    The CTBT history is described in brief. Nuclear test environments and verification regime are presented with illustrations. Geographical location of seismic, hydroacoustic, infrasound and radionuclide monitoring networks are indicated on globe maps. Benefits of the International Monitoring System (IMS) to host countries are listed

  20. Introductory statement to the Board of Governors. Vienna, 28 November 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The Technical Assistance and Co-operation Committee (TACC) reviewed the draft TC programme for 2003-2004 and recommended it to the Board for approval. In addition, the committee recommended the approval of TC programme funding for 2003. As discussed during the TACC meeting, the TC programme is a principal mechanism for expanding the contribution that nuclear technologies make to peace and development. At the World Summit on Sustainable Development in Johannesburg earlier this year, the Agency was able to highlight contributions that we make - through both our TC and regular budget programmes - to four of the major issues addressed by the Summit: water, energy, health and agriculture. Regarding TC programme implementation, it is stated that the delivery of services, training and equipment is progressing at a similar rate to last year, when we reported a record performance. One measure of this progress is the level of new obligations, which at the end of October was more than $63 million. As discussed at the TACC meeting, the impact of TC programme implementation is augmented through our partnerships with other international organizations, non-traditional donors and recipient States themselves. A few other topics, are covered in this statement: Nuclear Verification, Safeguards Agreements and Additional Protocols, Resumption of Inspections in Iraq, Status of Safeguards Agreement with the Democratic People's Republic of Korea, Convention on the Physical Protection of Nuclear Material, Conference on the Security of Radiation Sources, IAEA 2004-2005 Programme and budget. The Agency is assuming rapidly growing responsibilities with significant implications in practically all areas of work, including verification, safety and security, and sustainable development. This clearly means that the business cannot continue as usual. Additional resources are needed, as well as full backing and support. This means a close partnership between the Secretariat and Member States will

  1. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  2. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  3. Verification of classified fissile material using unclassified attributes

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Fearey, B.L.; Puckett, J.M.; Tape, J.W.

    1998-01-01

    This paper reports on the most recent efforts of US technical experts to explore verification by IAEA of unclassified attributes of classified excess fissile material. Two propositions are discussed: (1) that multiple unclassified attributes could be declared by the host nation and then verified (and reverified) by the IAEA in order to provide confidence in that declaration of a classified (or unclassified) inventory while protecting classified or sensitive information; and (2) that attributes could be measured, remeasured, or monitored to provide continuity of knowledge in a nonintrusive and unclassified manner. They believe attributes should relate to characteristics of excess weapons materials and should be verifiable and authenticatable with methods usable by IAEA inspectors. Further, attributes (along with the methods to measure them) must not reveal any classified information. The approach that the authors have taken is as follows: (1) assume certain attributes of classified excess material, (2) identify passive signatures, (3) determine range of applicable measurement physics, (4) develop a set of criteria to assess and select measurement technologies, (5) select existing instrumentation for proof-of-principle measurements and demonstration, and (6) develop and design information barriers to protect classified information. While the attribute verification concepts and measurements discussed in this paper appear promising, neither the attribute verification approach nor the measurement technologies have been fully developed, tested, and evaluated

  4. Detached Statements

    Directory of Open Access Journals (Sweden)

    Mark McBride

    2018-04-01

    Full Text Available Joseph Raz has introduced an interesting class of statements —detached statements— into the philosophical lexicon. In brief, such statements are (informa- tive normative statements, yet the speaker does not, in so uttering them, express or convey acceptance of the point of view of the hearer to whom they are addressed (as contrasted with committed statements, where the speaker does express or convey such acceptance. I propose to offer a novel analysis of such statements (and to clear away some confusions about them. In brief, such statements will be analysed as wide-scope normative conditionals.

  5. NPP Temelin instrumentation and control system upgrade and verification

    International Nuclear Information System (INIS)

    Ubra, O.; Petrlik, J.

    1998-01-01

    Two units of Ver 1000 type of the Czech nuclear power plant Temelin, which are under construction are being upgraded with the latest instrumentation and control system delivered by WEC. To confirm that the functional design of the new Reactor Control and Limitation System, Turbine Control System and Plant Control System are in compliance with the Czech customer requirements and that these requirements are compatible with NPP Temelin upgraded technology, the verification of the control systems has been performed. The method of transient analysis has been applied. Some details of the NPP Temelin Reactor Control and Limitation System verification are presented.(author)

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PHYSICAL REMOVAL OF MICROBIOLOGICAL AND PARTICULATE CONTAMINANTS IN DRINKING WATER : SEPARMATIC™ FLUID SYSTEMS DIATOMACEOUS EARTH PRESSURE TYPE FILTER SYSTEM MODEL 12P-2

    Science.gov (United States)

    The verification test of the SeparmaticTM DE Pressure Type Filter System Model 12P-2 was conducted at the UNH Water Treatment Technology Assistance Center (WTTAC) in Durham, New Hampshire. The source water was finished water from the Arthur Rollins Treatment Plant that was pretr...

  7. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  8. IDEF method for designing seismic information system in CTBT verification

    International Nuclear Information System (INIS)

    Zheng Xuefeng; Shen Junyi; Jin Ping; Zhang Huimin; Zheng Jiangling; Sun Peng

    2004-01-01

    Seismic information system is of great importance for improving the capability of CTBT verification. A large amount of money has been appropriated for the research in this field in the U.S. and some other countries in recent years. However, designing and developing a seismic information system involves various technologies about complex system design. This paper discusses the IDEF0 method to construct function models and the IDEF1x method to make information models systemically, as well as how they are used in designing seismic information system in CTBT verification. (authors)

  9. Annual report and accounting statements 2007: ELETROBRAS

    International Nuclear Information System (INIS)

    2007-01-01

    This document reports the actives of the ELETROBRAS during the year 2007 related to: electricity market, international activities, strategic planning, financial indicators, business analysis, relationship with investors, energy marketing, operational research, technological development, financial statements, social responsibility and environment

  10. Experimental verification of active IR stealth technology by controlling the surface temperature using a thermoelectric element

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Geon; Han, Kuk Il; Choi, Jun Hyuk; Kim, Tae Kuk [Dept. of Mechanical Engineering, Chung Ang University, Seoul (Korea, Republic of)

    2016-10-15

    In this paper, we propose a technique for IR low-observability that uses an active IR signal tuning through the real time control of the object surface temperature according to the varying background environment. This is achieved by applying the proper object surface temperature obtained to result in the minimum radiance difference between the object and the background. Experimental verification by using the thermoelectric temperature control element shows that the IR radiance contrast between the object and the background can be reduced up to 99% during the night and up to 95% during the day time as compared to the un-tuned original radiance contrast values. The stealth technology demonstrated in this paper may be applied for many military systems needed for the IR stealth performance when a suitable temperature control unit is developed.

  11. Experimental verification of active IR stealth technology by controlling the surface temperature using a thermoelectric element

    International Nuclear Information System (INIS)

    Kim, Dong Geon; Han, Kuk Il; Choi, Jun Hyuk; Kim, Tae Kuk

    2016-01-01

    In this paper, we propose a technique for IR low-observability that uses an active IR signal tuning through the real time control of the object surface temperature according to the varying background environment. This is achieved by applying the proper object surface temperature obtained to result in the minimum radiance difference between the object and the background. Experimental verification by using the thermoelectric temperature control element shows that the IR radiance contrast between the object and the background can be reduced up to 99% during the night and up to 95% during the day time as compared to the un-tuned original radiance contrast values. The stealth technology demonstrated in this paper may be applied for many military systems needed for the IR stealth performance when a suitable temperature control unit is developed

  12. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  13. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  14. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  15. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  16. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  17. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  18. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  19. Usage of internal statements in making consolidated financial statement

    Directory of Open Access Journals (Sweden)

    V.N. Herman

    2016-12-01

    Full Text Available The emergence of the consolidated financial statements is the result of integration processes in the businesses that lead to pooling of different companies. As consolidated financial statements present an aggregated look at the financial position of a parent and its subsidiaries, they let you gauge the overall health of an entire group of companies as opposed to one company’s standalone position. Consolidation of financial statements requires from the participants of joining elaborating their individual statements. The article describes the general scheme of consolidation process and defines the key trends of consolidation adjustments, in particular, financial investments, internal operations, goodwill and exchange rate differences. It is found out that to get information about internal operations and financial investments such data have to be synthesized from internal statements. This approach allows using the same accounting methods to parent and subsidiary entities. The objects, the users and the subject domain of internal statements are determined in order to make consolidation of financial statements of joining.

  20. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  1. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  2. System Description: Embedding Verification into Microsoft Excel

    OpenAIRE

    Collins, Graham; Dennis, Louise Abigail

    2000-01-01

    The aim of the PROSPER project is to allow the embedding of existing verification technology into applications in such a way that the theorem proving is hidden, or presented to the end user in a natural way. This paper describes a system built to test whether the PROSPER toolkit satisfied this aim. The system combines the toolkit with Microsoft Excel, a popular commercial spreadsheet application.

  3. Reconceptualizing Media Literacy in the Social Studies: A Pragmatist Critique of the NCSS Position Statement on Media Literacy

    Science.gov (United States)

    Mason, Lance; Metzger, Scott Alan

    2012-01-01

    The National Council for the Social Studies Position Statement on Media Literacy argues that media literacy can facilitate participatory democracy if students' interest in media is harnessed. The statement conceives of media technology as neutral and under-conceptualizes socializing aspects of media technologies that foster atomized individualism.…

  4. Static and Dynamic Verification of Critical Software for Space Applications

    Science.gov (United States)

    Moreira, F.; Maia, R.; Costa, D.; Duro, N.; Rodríguez-Dapena, P.; Hjortnaes, K.

    Space technology is no longer used only for much specialised research activities or for sophisticated manned space missions. Modern society relies more and more on space technology and applications for every day activities. Worldwide telecommunications, Earth observation, navigation and remote sensing are only a few examples of space applications on which we rely daily. The European driven global navigation system Galileo and its associated applications, e.g. air traffic management, vessel and car navigation, will significantly expand the already stringent safety requirements for space based applications Apart from their usefulness and practical applications, every single piece of onboard software deployed into the space represents an enormous investment. With a long lifetime operation and being extremely difficult to maintain and upgrade, at least when comparing with "mainstream" software development, the importance of ensuring their correctness before deployment is immense. Verification &Validation techniques and technologies have a key role in ensuring that the onboard software is correct and error free, or at least free from errors that can potentially lead to catastrophic failures. Many RAMS techniques including both static criticality analysis and dynamic verification techniques have been used as a means to verify and validate critical software and to ensure its correctness. But, traditionally, these have been isolated applied. One of the main reasons is the immaturity of this field in what concerns to its application to the increasing software product(s) within space systems. This paper presents an innovative way of combining both static and dynamic techniques exploiting their synergy and complementarity for software fault removal. The methodology proposed is based on the combination of Software FMEA and FTA with Fault-injection techniques. The case study herein described is implemented with support from two tools: The SoftCare tool for the SFMEA and SFTA

  5. THE STATEMENT OF CASH FLOWS USING FINANCIAL STATEMENT EQUATIONS

    OpenAIRE

    Harold Fletcher; Thomas Ulrich

    2010-01-01

    This paper addresses one of the more difficult topics in teaching MBA level financial management, the statement of cash flows. By employing financial statement equations in preparing the statement of cash flows, students: (1) are employing tools that they are more familiar and comfortable with which mitigates their anxiety and enhances their understanding, (2) are better able to understand the logic of the statement of cash flows and the relationships that exist between it and the income stat...

  6. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  7. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  8. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  9. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  10. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DEVILBISS JGHV-531-46FF HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss JGHV-531-46FF high-volume, low-pressure pressure-feed spray gun, hereafter referred to as the DeVilbiss JGHV, which is designed for use in industrial finishing. The test coating chosen by ITW Industrial Fi...

  12. Design and Verification of Critical Pressurised Windows for Manned Spaceflight

    Science.gov (United States)

    Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.

    2014-06-01

    The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.

  13. 77 FR 43064 - Meeting; Technology Advisory Committee

    Science.gov (United States)

    2012-07-23

    ... customer fund segregation laws, and making false statements in financial statements filed with the... COMMODITY FUTURES TRADING COMMISSION Meeting; Technology Advisory Committee AGENCY: Commodity Futures Trading Commission (CFTC). ACTION: Notice of emergency meeting of technology advisory committee...

  14. Data verification and evaluation techniques for groundwater monitoring programs

    International Nuclear Information System (INIS)

    Mercier, T.M.; Turner, R.R.

    1990-12-01

    To ensure that data resulting from groundwater monitoring programs are of the quality required to fulfill program objectives, it is suggested that a program of data verification and evaluation be implemented. These procedures are meant to supplement and support the existing laboratory quality control/quality assurance programs by identifying aberrant data resulting from a variety of unforeseen circumstances: sampling problems, data transformations in the lab, data input at the lab, data transfer, end-user data input. Using common-sense principles, pattern recognition techniques, and hydrogeological principles, a computer program was written which scans the data for suspected abnormalities and produces a text file stating sample identifiers, the suspect data, and a statement of how the data has departed from the expected. The techniques described in this paper have been developed to support the Y-12 Plant Groundwater Protection Program Management Plan

  15. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  16. Portsmouth Gaseous Diffusion Plant expansion, Piketon, Ohio. Volume 1. Draft environmental statement

    Energy Technology Data Exchange (ETDEWEB)

    1976-06-01

    Subject to authorizing legislation and funding, ERDA will proceed with steps for additional uranium enrichment capacity at the Portsmouth Gaseous Diffusion Plant near Piketon, Ohio. This environmental statement was prepared by ERDA to cover this action. The statement was prepared in accordance with the National Environmental Policy Act of 1969, and ERDA's implementing regulations, 10 CFR Chapter III, Part 711. The statement describes the reasonably foreseeable environmental, social, economic and technological costs and benefits of the construction and operation of the expanded enrichment plant and its reasonably available alternatives and their anticipated effects.

  17. Portsmouth Gaseous Diffusion Plant expansion, Piketon, Ohio. Volume 1. Draft environmental statement

    International Nuclear Information System (INIS)

    1976-06-01

    Subject to authorizing legislation and funding, ERDA will proceed with steps for additional uranium enrichment capacity at the Portsmouth Gaseous Diffusion Plant near Piketon, Ohio. This environmental statement was prepared by ERDA to cover this action. The statement was prepared in accordance with the National Environmental Policy Act of 1969, and ERDA's implementing regulations, 10 CFR Chapter III, Part 711. The statement describes the reasonably foreseeable environmental, social, economic and technological costs and benefits of the construction and operation of the expanded enrichment plant and its reasonably available alternatives and their anticipated effects

  18. A briefing to verification and validation of computer software

    International Nuclear Information System (INIS)

    Zhang Aisen; Xie Yalian

    2012-01-01

    Nowadays, the computer equipment and information processing technology is coming into the engineering of instrument and process control. Owing to its convenient and other advantages, more and more utilities are more than happy to use it. After initial utilization in basic functional controlling, the computer equipment and information processing technology is widely used in safety critical control. Consequently, the people pay more attentions to the quality of computer software. How to assess and ensure its quality are the most concerned problems. The verification and validation technology of computer software are important steps to the quality assurance. (authors)

  19. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    Science.gov (United States)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  20. Behavioral biometrics for verification and recognition of malicious software agents

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  1. 76 FR 29805 - Submission for Review: Verification of Full-Time School Attendance, RI 25-49

    Science.gov (United States)

    2011-05-23

    ... other technological collection techniques or other forms of information technology, e.g., permitting... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: Verification of Full-Time School Attendance... Federal agencies the opportunity to comment on a revised information collection request (ICR) 3206-0215...

  2. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 16 March 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 16 March 1998. The following aspects from the Agency's activity are presented: nuclear terrorism convention, Agency safety services, study of the radiological conditions at the atolls of Mururoa and Fangataufa, model additional protocols, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), treaty of Bangkok, and Agency's inspections in Iraq in relation to its clandestine nuclear programme

  3. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  4. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    Science.gov (United States)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  5. Statement to the fifty-seventh regular session of the United Nations General Assembly. New York, Nov. 11, 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    Since the establishment in 1957 of the International Atomic Energy Agency, we have been dedicated to the achievement and promotion of a vision, 'Atoms For Peace': on the one hand, the prevention of nuclear weapons proliferation, with the aim of their eventual elimination - and on the other, the sharing of safe and secure nuclear technologies in peaceful applications that benefit humankind. I will speak briefly today about the IAEA's progress in working toward those goals. The most prominent issues covered in this statement include: Nuclear Technology, meaning nuclear power technology, radioactive waste management; non-power nuclear applications; nuclear safety; protection against nuclear terrorism; verification of nuclear non-proliferation, with the emphasis on implementation of United Nations Security Council Resolutions Related to Iraq and status of safeguards agreement with the Democratic People's Republic of Korea; application of IAEA Safeguards in the Middle East; Nuclear Arms Control Efforts; and the Management of the IAEA. This overview of the past year of IAEA activities reflects a continuing evolution in all our areas of work - and, the dynamic nature of our programme in anticipating and responding to that evolution. The Agency continues to play a key role in ensuring that the benefits of nuclear technology are shared globally, that nuclear activities are conducted safely, that nuclear and radioactive materials and facilities are adequately protected, and that a credible inspection regime exists to verify compliance with non-proliferation commitments. Naturally, the ability to effectively perform those functions depends on the commitment and support of our Member States

  6. IAEA verification experiment at the Portsmouth Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Subudhi, M.; Calvert, O.L.; Bonner, T.N.; Cherry, R.C.; Whiting, N.E.

    1998-01-01

    In April 1996, the United States (US) added the Portsmouth Gaseous Diffusion Plant to the list of facilities eligible for the application of International Atomic Energy Agency (IAEA) safeguards. At that time, the US proposed that the IAEA carry out a Verification Experiment at the plant with respect to the downblending of about 13 metric tons of highly enriched uranium (HEU) in the form of UF 6 . This material is part of the 226 metric tons of fissile material that President Clinton has declared to be excess to US national-security needs and which will be permanently withdrawn from the US nuclear stockpile. In September 1997, the IAEA agreed to carry out this experiment, and during the first three weeks of December 1997, the IAEA verified the design information concerning the downblending process. The plant has been subject to short-notice random inspections since December 17, 1997. This paper provides an overview of the Verification Experiment, the monitoring technologies used in the verification approach, and some of the experience gained to date

  7. Introductory statement to the Board of Governors. 8 March 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The agenda for this meeting covers a broad range of issues, once again touching on all three Agency pillars - technology, safety and verification. The topics related to each of these pillars, as well as a number of management issues are discussed: Nuclear Technology (2004 Nuclear Technology Review (NTR), the third comprehensive edition covering the fundamentals of nuclear technology development, including: power applications; applications for food, water and health; and applications for environmental and industrial processes); Waste Management and Disposal; Food and Agriculture; Human Health; Environmental Applications; IAEA Collaborating Centres; Nuclear Safety, Radiation Safety, and Waste and Transport Safety; Nuclear Safety, Radiation Safety, and Waste and Transport Safety (the Nuclear Safety Review for 2003, providing an overview of current and emerging nuclear safety trends and issues); Safety Standards; Safety Missions; Research Reactor Safety; ransport Safety; Nuclear Verification; Implementation of Safeguards in the Democratic People's Republic of Korea, the Islamic Republic of Iran, and Socialist People's Libyan Arab Jamahiriya; Implications for the Non-Proliferation Regime, and Additional Measures; Financing of the Technical Cooperation Fund; Security Upgrades at the Vienna International Centre

  8. Component Verification and Certification in NASA Missions

    Science.gov (United States)

    Giannakopoulou, Dimitra; Penix, John; Norvig, Peter (Technical Monitor)

    2001-01-01

    Software development for NASA missions is a particularly challenging task. Missions are extremely ambitious scientifically, have very strict time frames, and must be accomplished with a maximum degree of reliability. Verification technologies must therefore be pushed far beyond their current capabilities. Moreover, reuse and adaptation of software architectures and components must be incorporated in software development within and across missions. This paper discusses NASA applications that we are currently investigating from these perspectives.

  9. Presentation of Consolidated Statement of Cash Flows under IAS 7, Statement of Cash Flows

    OpenAIRE

    Calota Traian-Ovidiu; Tănase Alin-Eliodor

    2013-01-01

    The consolidated financial statements must includ a specific statement, regarding cash flows from all activities of the entity, called „consolidated statement of cash flow”. Information for preparing cash flow statements can be found in all other components of the financial statements, such as financial position, statement of comprehensive income and statement of changes in equity. The cash flow statement shall report cash flows during the period classified by operating, investing and financi...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: IN-DRAIN TREATMENT DEVICE. HYDRO INTERNATIONAL UP-FLO™ FILTER

    Science.gov (United States)

    Verification testing of the Hydro International Up-Flo™ Filter with one filter module and CPZ Mix™ filter media was conducted at the Penn State Harrisburg Environmental Engineering Laboratory in Middletown, Pennsylvania. The Up-Flo™ Filter is designed as a passive, modular filtr...

  11. North Korea's nuclear weapons program:verification priorities and new challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Duk-ho (Korean Consulate General in New York)

    2003-12-01

    A comprehensive settlement of the North Korean nuclear issue may involve military, economic, political, and diplomatic components, many of which will require verification to ensure reciprocal implementation. This paper sets out potential verification methodologies that might address a wide range of objectives. The inspection requirements set by the International Atomic Energy Agency form the foundation, first as defined at the time of the Agreed Framework in 1994, and now as modified by the events since revelation of the North Korean uranium enrichment program in October 2002. In addition, refreezing the reprocessing facility and 5 MWe reactor, taking possession of possible weapons components and destroying weaponization capabilities add many new verification tasks. The paper also considers several measures for the short-term freezing of the North's nuclear weapon program during the process of negotiations, should that process be protracted. New inspection technologies and monitoring tools are applicable to North Korean facilities and may offer improved approaches over those envisioned just a few years ago. These are noted, and potential bilateral and regional verification regimes are examined.

  12. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 25 November 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 25 November 1998. The following aspects from the Agency's activity are presented: inspections in Iraq in relation to its clandestine nuclear programme, conclusion of Additional Protocols to safeguards agreements, the strengthened safeguards system, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), safety review at the Mochovce nuclear power plant in Slovakia, and the year 2000 (Y2K) computer system problems in the Agency's Member States

  13. The use of measurement uncertainty in nuclear materials accuracy and verification

    International Nuclear Information System (INIS)

    Alique, O.; Vaccaro, S.; Svedkauskaite, J.

    2015-01-01

    EURATOM nuclear safeguards are based on the nuclear operators’ accounting for and declaring of the amounts of nuclear materials in their possession, as well as on the European Commission verifying the correctness and completeness of such declarations by means of conformity assessment practices. Both the accountancy and the verification processes comprise the measurements of amounts and characteristics of nuclear materials. The uncertainties associated to these measurements play an important role in the reliability of the results of nuclear material accountancy and verification. The document “JCGM 100:2008 Evaluation of measurement data – Guide to the expression of uncertainty in measurement” - issued jointly by the International Bureau of Weights and Measures (BIPM) and international organisations for metrology, standardisation and accreditation in chemistry, physics and electro technology - describes a universal, internally consistent, transparent and applicable method for the evaluation and expression of uncertainty in measurements. This paper discusses different processes of nuclear materials accountancy and verification where measurement uncertainty plays a significant role. It also suggests the way measurement uncertainty could be used to enhance the reliability of the results of the nuclear materials accountancy and verification processes.

  14. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  15. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  16. Non proliferation regimes undertakings: Benefits and limits of synergies in verification technologies and procedures

    International Nuclear Information System (INIS)

    Richard, M.

    2001-01-01

    Full text: Thirty years ago the NPT was entering into force. Therewith, when a State became party to the NPT, it had, in accordance with article III.1 of the Treaty, an undertaking to conclude a Comprehensive Safeguards agreement with the IAEA and accept safeguards verification on source or special fissionable material in all peaceful nuclear activities within its territories in order to verify that such material is not diverted. This multilateral instrument was the foundation stone of the non-proliferation regime and marked the actual birth of internationally accepted measures to verily compliance with politically stringent agreements. Since that time several important multilateral or bilateral instruments on non-proliferation and disarmament have been negotiated and adopted to curb the development and the acquisition of Weapons of Mass Destruction (WMD) most of them since the middle of the eighties and the collapse of the Soviet Union. Amongst the multilateral instruments are the Convention on the Prohibition of Bacteriological Weapon and Toxin Weapons (1972), the Convention on the Prohibition of Chemical Weapons (1993), the Comprehensive Test Ban Treaty (1996), the Strengthening of the IAEA Safeguards and the Additional Protocol (1997), with some still in negotiation like the Protocol of the Convention on the Prohibition of Bacteriological and Toxin Weapons, and some on which negotiation is still a wish like the Fissile Material Cut-off Treaty. Bilateral disarmament agreements between the United States of America and the Russian Federation such as the INF Treaty, START I and II, the agreements on the elimination of excess defence nuclear material as well as the Trilateral Initiative with the IAEA pave the way to nuclear disarmament with the reduction of both the number of nuclear weapons arsenal and the fissile material inventories. The politically stringent undertakings of States that have become parties to those agreements would not be possible without the

  17. Technology Transfer: A Contact Sport

    Science.gov (United States)

    Paynter, Nina P.

    1995-01-01

    Technology transfer is a dynamic process, involving dynamic people as the bridge between NASA Langley Research Center and the outside world. This bridge, for nonaerospace applications, is known as the Technology Applications Group. The introduction of new innovations and expertise where they are needed occurs through a 'push' and 'pull' process. A 'push' occurs when a new technology is first developed with high commercial potential and then a company is found to licence or further develop the technology. The 'pull' process occurs through problem statements. A company or group will submit a written statement of what they need and the shortcomings of commercially available technology. The Technology Transfer Team (T3) reviews these problem statements and decides where NASA LaRC can offer assistance. A researcher or group of researchers are then identified who can help solve the problem and they are put in contact with the company. Depending upon the situation in either method, a Space Act Agreement (SAA), or outline of the responsibilities for each party, is developed.

  18. Rio 2016 financial statements

    OpenAIRE

    2015-01-01

    These documents include the report from independent auditors balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements.

  19. Symposium on International Safeguards: Preparing for Future Verification Challenges

    International Nuclear Information System (INIS)

    2010-01-01

    The purpose of the symposium is to foster dialogue and information exchange involving Member States, the nuclear industry and members of the broader nuclear non-proliferation community to prepare for future verification challenges. Topics addressed during the 2010 symposium include the following: - Supporting the global nuclear non-proliferation regime: Building support for strengthening international safeguards; Enhancing confidence in compliance with safeguards obligations; Legal authority as a means to enhance effectiveness and efficiency; Verification roles in support of arms control and disarmament. - Building collaboration and partnerships with other international forums: Other verification and non-proliferation regimes; Synergies between safety, security and safeguards regimes. - Improving cooperation between IAEA and States for safeguards implementation: Strengthening State systems for meeting safeguards obligations; Enhancing safeguards effectiveness and efficiency through greater cooperation; Lessons learned: recommendations for enhancing integrated safeguards implementation. - Addressing safeguards challenges in an increasingly interconnected world: Non-State actors and covert trade networks; Globalization of nuclear information and technology. - Preparing for the global nuclear expansion and increasing safeguards workload: Furthering implementation of the State-level concept and integrated safeguards; Information-driven safeguards; Remote data-driven safeguards inspections; Safeguards in States without comprehensive safeguards agreements. - Safeguarding advanced nuclear facilities and innovative fuel cycles: Proliferation resistance; Safeguards by design; Safeguards approaches for advanced facilities. - Advanced technologies and methodologies: For verifying nuclear material and activities; For detecting undeclared nuclear material and activities; For information collection, analysis and integration. - Enhancing the development and use of safeguards

  20. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  1. Independent assembly technology for DCS safety equipment in nuclear power plant

    International Nuclear Information System (INIS)

    Hao Aixia

    2014-01-01

    A independent assembly technology of identification and verification was proposed, which included special process, wiring process and verification process. The safety reliability and practicability of the proposed technology were verified according to the application in FirmSys assembly implemented by China Techenergy Co., Ltd. (author)

  2. System and Component Software Specification, Run-time Verification and Automatic Test Generation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The following background technology is described in Part 5: Run-time Verification (RV), White Box Automatic Test Generation (WBATG). Part 5 also describes how WBATG...

  3. In Brief: Science academies' statement on climate change

    Science.gov (United States)

    Showstack, Randy

    2009-06-01

    “It is essential that world leaders agree on emissions reductions needed to combat negative consequences of anthropogenic climate change,” national science academies from 13 countries declared in a joint statement issued on 11 June. The statement, issued by the academies of the G8 countries—including England, France, Russia, and the United States—and five other countries (Brazil, China, India, Mexico, and South Africa), came in advance of a G8 meeting in Italy in July and prior to United Nations Framework Convention on Climate Change (UNFCCC) negotiations in Denmark in December. “The G8+5 should lead the transition to an energy-efficient and low-carbon world economy, and foster innovation and research and development for both mitigation and adaptation technologies,” the statement noted. The academies urged governments to agree at the UNFCCC negotiations to adopt a long-term global goal and short-term emissions reduction targets so that by 2050 global emissions would be reduced by about 50% from 1990 levels.

  4. Inspection and verification of waste packages for near surface disposal

    International Nuclear Information System (INIS)

    2000-01-01

    Extensive experience has been gained with various disposal options for low and intermediate level waste at or near surface disposal facilities. Near surface disposal is based on proven and well demonstrated technologies. To ensure the safety of near surface disposal facilities when available technologies are applied, it is necessary to control and assure the quality of the repository system's performance, which includes waste packages, engineered features and natural barriers, as well as siting, design, construction, operation, closure and institutional controls. Recognizing the importance of repository performance, the IAEA is producing a set of technical publications on quality assurance and quality control (QA/QC) for waste disposal to provide Member States with technical guidance and current information. These publications cover issues on the application of QA/QC programmes to waste disposal, long term record management, and specific QA/QC aspects of waste packaging, repository design and R and D. Waste package QA/QC is especially important because the package is the primary barrier to radionuclide release from a disposal facility. Waste packaging also involves interface issues between the waste generator and the disposal facility operator. Waste should be packaged by generators to meet waste acceptance requirements set for a repository or disposal system. However, it is essential that the disposal facility operator ensure that waste packages conform with disposal facility acceptance requirements. Demonstration of conformance with disposal facility acceptance requirements can be achieved through the systematic inspection and verification of waste packages at both the waste generator's site and at the disposal facility, based on a waste package QA/QC programme established by the waste generator and approved by the disposal operator. However, strategies, approaches and the scope of inspection and verification will be somewhat different from country to country

  5. Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

    Directory of Open Access Journals (Sweden)

    Chenlin Huang

    2016-01-01

    Full Text Available Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.

  6. Texts of joint USA-USSR statements following the summit meeting in Washington, D.C., 31 May - 3 June 1990

    International Nuclear Information System (INIS)

    1990-07-01

    The texts of joint USA-USSR statements following the summit meeting in Washington, D.C., 31 May - 3 June 1990 are reproduced. One is a joint statement on non-proliferation of nuclear weapons, missile and missile technology and chemical weapons, another one is a joint statement on the International Thermonuclear Experimental Reactor and the last one is a joint statement on Cooperation in Peaceful Uses of Atomic Energy

  7. Verification report for SIMREP 1.1

    International Nuclear Information System (INIS)

    Tarapore, P.S.

    1987-06-01

    SIMREP 1.1 is a discrete event computer simulation of repository operations in the surface waste-handling facility. The logic for this model is provided by Fluor Technology, Inc., the Architect/Engineer of the salt repository. The verification methods included a line-by-line review of the code, a detailed examination of a generated trace of all simulated events over a given period of operations, and a comparison of the simulation output results with expected values. SIMREP 1.1 performs in the required manner under the given range of input conditions

  8. Online 3D EPID-based dose verification: Proof of concept

    Energy Technology Data Exchange (ETDEWEB)

    Spreeuw, Hanno; Rozendaal, Roel, E-mail: r.rozendaal@nki.nl; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben [Department of Radiation Oncology, The Netherlands Cancer Institute, Amsterdam 1066 CX (Netherlands); Herk, Marcel van [University of Manchester, Manchester Academic Health Science Centre, The Christie NHS Foundation Trust, Manchester M20 4BX (United Kingdom)

    2016-07-15

    , including dose verification, took 266 ± 11 ms on a dual octocore Intel Xeon E5-2630 CPU running at 2.40 GHz. The introduced delivery errors were detected after 5–10 s irradiation time. Conclusions: A prototype online 3D dose verification tool using portal imaging has been developed and successfully tested for two different kinds of gross delivery errors. Thus, online 3D dose verification has been technologically achieved.

  9. Online 3D EPID-based dose verification: Proof of concept

    International Nuclear Information System (INIS)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; Herk, Marcel van

    2016-01-01

    , including dose verification, took 266 ± 11 ms on a dual octocore Intel Xeon E5-2630 CPU running at 2.40 GHz. The introduced delivery errors were detected after 5–10 s irradiation time. Conclusions: A prototype online 3D dose verification tool using portal imaging has been developed and successfully tested for two different kinds of gross delivery errors. Thus, online 3D dose verification has been technologically achieved.

  10. Online 3D EPID-based dose verification: Proof of concept.

    Science.gov (United States)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; van Herk, Marcel

    2016-07-01

    266 ± 11 ms on a dual octocore Intel Xeon E5-2630 CPU running at 2.40 GHz. The introduced delivery errors were detected after 5-10 s irradiation time. A prototype online 3D dose verification tool using portal imaging has been developed and successfully tested for two different kinds of gross delivery errors. Thus, online 3D dose verification has been technologically achieved.

  11. Can self-verification strivings fully transcend the self-other barrier? Seeking verification of ingroup identities.

    Science.gov (United States)

    Gómez, Angel; Seyle, D Conor; Huici, Carmen; Swann, William B

    2009-12-01

    Recent research has demonstrated self-verification strivings in groups, such that people strive to verify collective identities, which are personal self-views (e.g., "sensitive") associated with group membership (e.g., "women"). Such demonstrations stop short of showing that the desire for self-verification can fully transcend the self-other barrier, as in people working to verify ingroup identities (e.g., "Americans are loud") even when such identities are not self-descriptive ("I am quiet and unassuming"). Five studies focus on such ingroup verification strivings. Results indicate that people prefer to interact with individuals who verify their ingroup identities over those who enhance these identities (Experiments 1-5). Strivings for ingroup identity verification were independent of the extent to which the identities were self-descriptive but were stronger among participants who were highly invested in their ingroup identities, as reflected in high certainty of these identities (Experiments 1-4) and high identification with the group (Experiments 1-5). In addition, whereas past demonstrations of self-verification strivings have been limited to efforts to verify the content of identities (Experiments 1 to 3), the findings also show that they strive to verify the valence of their identities (i.e., the extent to which the identities are valued; Experiments 4 and 5). Self-verification strivings, rather than self-enhancement strivings, appeared to motivate participants' strivings for ingroup identity verification. Links to collective self-verification strivings and social identity theory are discussed.

  12. Strategic priorities of Iranian companies: an application of mission statement content analysis

    OpenAIRE

    Shahriar AZIZI; Vahid MAKIZADEH

    2014-01-01

    The mission statement describes the strategic priorities of a company. It determines the roadmap for strategic decision in the corporation. Research on mission statement elements is an interesting field because it clarifies the strategic priorities of the company. This paper aims to analyze these priorities among 48 large Iranian companies active in four selected industries based on David’s (1989) nine-element model. These components include customer, market, general image, product, technolog...

  13. CTBT Integrated Verification System Evaluation Model

    Energy Technology Data Exchange (ETDEWEB)

    Edenburn, M.W.; Bunting, M.L.; Payne, A.C. Jr.

    1997-10-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia`s Monitoring Systems and Technology Center and has been funded by the US Department of Energy`s Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, top-level, modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM`s unique features is that it integrates results from the various CTBT sensor technologies (seismic, infrasound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection) and location accuracy of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system`s performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. This report describes version 1.2 of IVSEM.

  14. The Healy Clean Coal Project: Design verification tests

    International Nuclear Information System (INIS)

    Guidetti, R.H.; Sheppard, D.B.; Ubhayakar, S.K.; Weede, J.J.; McCrohan, D.V.; Rosendahl, S.M.

    1993-01-01

    As part of the Healy Clean Coal Project, TRW Inc., the supplier of the advanced slagging coal combustors, has successfully completed design verification tests on the major components of the combustion system at its Southern California test facility. These tests, which included the firing of a full-scale precombustor with a new non-storage direct coal feed system, supported the design of the Healy combustion system and its auxiliaries performed under Phase 1 of the project. Two 350 million BTU/hr combustion systems have been designed and are now ready for fabrication and erection, as part of Phase 2 of the project. These systems, along with a back-end Spray Dryer Absorber system, designed and supplied by Joy Technologies, will be integrated with a Foster Wheeler boiler for the 50 MWe power plant at Healy, Alaska. This paper describes the design verification tests and the current status of the project

  15. Experience in verification regimes. United States On-Site Inspection Agency

    International Nuclear Information System (INIS)

    Reppert, J.

    1998-01-01

    Experiences are described of the United States On-site Inspection Agency in verification regimes all over the world where it has been applied in the last 30 years. The challenge for the future is to extend the benefits of the applied tools to all states in all regions to enhance stability and to create conditions for peace at lower levels of armaments than currently exist. The USA need to engage states currently caught in cycles of violence and arms escalation. They must examine technologies which together with on-site aspects of verification or transparency regimes can provide a comprehensive picture at affordable costs. They foresee a growth in combined training with new states entering for the first time into regime that include arms control and transparency measure

  16. Excerpts from the introductory statement by IAEA Director General Dr. Mohamed ElBaradei. IAEA Board of Governors, Vienna, 22 March 1999

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1999-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 22 March 1999. The following aspects from the Agency's activity are presented: nuclear safety, measures against illicit trafficking and for the physical protection of nuclear material, status of safeguards agreements and additional protocols, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), and inspections in Iraq in relation to its clandestine nuclear programme

  17. Implementation Plan for the Hawaii Geothermal Project Environmental Impact Statement (DOE Review Draft:)

    Energy Technology Data Exchange (ETDEWEB)

    None

    1992-09-18

    The US Department of Energy (DOE) is preparing an Environmental Impact Statement (EIS) that identifies and evaluates the environmental impacts associated with the proposed Hawaii Geothermal Project (HGP), as defined by the State of Hawaii in its 1990 proposal to Congress (DBED 1990). The location of the proposed project is shown in Figure 1.1. The EIS is being prepared pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as implemented by the President's Council on Environmental Quality (CEQ) regulations (40 CFR Parts 1500-1508) and the DOE NEPA Implementing Procedures (10 CFR 1021), effective May 26, 1992. The State's proposal for the four-phase HGP consists of (1) exploration and testing of the geothermal resource beneath the slopes of the active Kilauea volcano on the Island of Hawaii (Big Island), (2) demonstration of deep-water power cable technology in the Alenuihaha Channel between the Big Island and Mau, (3) verification and characterization of the geothermal resource on the Big Island, and (4) construction and operation of commercial geothermal power production facilities on the Big Island, with overland and submarine transmission of electricity from the Big Island to Oahu and possibly other islands. DOE prepared appropriate NEPA documentation for separate federal actions related to Phase 1 and 2 research projects, which have been completed. This EIS will consider Phases 3 and 4, as well as reasonable alternatives to the HGP. Such alternatives include biomass coal, solar photovoltaic, wind energy, and construction and operation of commercial geothermal power production facilities on the Island of Hawaii (for exclusive use on the Big Island). In addition, the EIs will consider the reasonable alternatives among submarine cable technologies, geothermal extraction, production, and power generating technologies; pollution control technologies; overland and submarine power transmission routes; sites reasonably suited to

  18. Recent technology on steam turbine performance improvement

    International Nuclear Information System (INIS)

    Hirada, M.; Watanabe, E.; Tashiro, H.

    1991-01-01

    Continuous efforts have been made to improve turbine efficiency by applying the latest aerodynamic technologies to meet the energy saving requirement. In recent years, there has been considerable improvement in the field of computational fluid dynamics and these new technologies have been applied to the new blade design for HP, IP and LP turbines. Experimental verification for the new blade in turbine tests has established the overall turbine performance improvement and the excellent correspondence of flow pattern to the predicted value. This paper introduces the latest design technologies for the newly developed high efficiency blade and the verification test results

  19. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  20. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  1. Estimation of costs for applications of remediation technologies for the Department of Energy's Programmatic Environmental Impact Statement

    International Nuclear Information System (INIS)

    Villegas, A.J.; Hansen, R.I.; Humphreys, K.K.; Paananen, J.M.; Gildea, L.F.

    1994-01-01

    The Programmatic Environmental impact Statement (PEIS) being developed by the US Department of Energy (DOE) for environmental restoration (ER) and waste management (WM) activities expected to be carried out across the DOE's nationwide complex of facilities is assessing the impacts of removing, transporting, treating, storing, and disposing of waste from these ER and WM activities. Factors being considered include health and safety impacts to the public and to workers, impacts on the environment, costs and socio-economic impacts, and near-term and residual risk during those ER and WM operations. The purpose of this paper is to discuss the methodology developed specifically for the PEIS to estimate costs associated with the deployment and application of individual remediation technologies. These individual costs are used in developing order-of-magnitude cost estimates for the total remediation activities. Costs are developed on a per-unit-of-material-to-be-treated basis (i.e., $/m 3 ) to accommodate remediation projects of varying sizes. The primary focus of this cost-estimating effort was the development of capital and operating unit cost factors based on the amount of primary media to be removed, handled, and treated. The unit costs for individual treatment technologies were developed using information from a variety of sources, mainly from periodicals, EPA documentation, handbooks, vendor contacts, and cost models. The unit cost factors for individual technologies were adjusted to 1991 dollars

  2. Verification of combined thermal-hydraulic and heat conduction analysis code FLOWNET/TRUMP

    International Nuclear Information System (INIS)

    Maruyama, Soh; Fujimoto, Nozomu; Sudo, Yukio; Kiso, Yoshihiro; Murakami, Tomoyuki.

    1988-09-01

    This report presents the verification results of the combined thermal-hydraulic and heat conduction analysis code, FLOWNET/TRUMP which has been utilized for the core thermal hydraulic design, especially for the analysis of flow distribution among fuel block coolant channels, the determination of thermal boundary conditions for fuel block stress analysis and the estimation of fuel temperature in the case of fuel block coolant channel blockage accident in the design of the High Temperature Engineering Test Reactor(HTTR), which the Japan Atomic Energy Research Institute has been planning to construct in order to establish basic technologies for future advanced very high temperature gas-cooled reactors and to be served as an irradiation test reactor for promotion of innovative high temperature new frontier technologies. The verification of the code was done through the comparison between the analytical results and experimental results of the Helium Engineering Demonstration Loop Multi-channel Test Section(HENDEL T 1-M ) with simulated fuel rods and fuel blocks. (author)

  3. Verification of combined thermal-hydraulic and heat conduction analysis code FLOWNET/TRUMP

    Science.gov (United States)

    Maruyama, Soh; Fujimoto, Nozomu; Kiso, Yoshihiro; Murakami, Tomoyuki; Sudo, Yukio

    1988-09-01

    This report presents the verification results of the combined thermal-hydraulic and heat conduction analysis code, FLOWNET/TRUMP which has been utilized for the core thermal hydraulic design, especially for the analysis of flow distribution among fuel block coolant channels, the determination of thermal boundary conditions for fuel block stress analysis and the estimation of fuel temperature in the case of fuel block coolant channel blockage accident in the design of the High Temperature Engineering Test Reactor(HTTR), which the Japan Atomic Energy Research Institute has been planning to construct in order to establish basic technologies for future advanced very high temperature gas-cooled reactors and to be served as an irradiation test reactor for promotion of innovative high temperature new frontier technologies. The verification of the code was done through the comparison between the analytical results and experimental results of the Helium Engineering Demonstration Loop Multi-channel Test Section(HENDEL T(sub 1-M)) with simulated fuel rods and fuel blocks.

  4. New data structures and algorithms for logic synthesis and verification

    CERN Document Server

    Amaru, Luca Gaetano

    2017-01-01

    This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines. · Provides a comprehensive, theoretical study on majority and biconditional logic for logic synthesis; · Updates the current scenario in synthesis and verification – especially in light of emerging technologies; · Demonstrates applications to CMOS technology and emerging technologies.

  5. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  6. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  7. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  8. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  9. Evaluation of verification methods for input-accountability measurements

    International Nuclear Information System (INIS)

    Maeck, W.J.

    1980-01-01

    As part of TASTEX related programs two independent methods have been evaluated for the purpose of providing verification of the amount of Pu charged to the head-end of a nuclear fuel processing plant. The first is the Pu/U (gravimetric method), TASTEX Task-L, and the second is the Tracer Method, designated Task-M. Summaries of the basic technology, results of various studies under actual plant conditions, future requirements, are given for each of the Tasks

  10. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  11. Experimental verification of internal dosimetry calculations. Annual progress report

    International Nuclear Information System (INIS)

    1980-05-01

    During the past year a dosimetry research program has been established in the School of Nuclear Engineering at the Georgia Institute of Technology. The major objective of this program has been to provide research results upon which a useful internal dosimetry system could be based. The important application of this dosimetry system will be the experimental verification of internal dosimetry calculations such as those published by the MIRD Committee

  12. Nonintrusive verification attributes for excess fissile materials

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Eccleston, G.W.; Fearey, B.L.

    1997-10-01

    Under US initiatives, over two hundred metric tons of fissile materials have been declared to be excess to national defense needs. These excess materials are in both classified and unclassified forms. The US has expressed the intent to place these materials under international inspections as soon as practicable. To support these commitments, members of the US technical community are examining a variety of nonintrusive approaches (i.e., those that would not reveal classified or sensitive information) for verification of a range of potential declarations for these classified and unclassified materials. The most troublesome and potentially difficult issues involve approaches for international inspection of classified materials. The primary focus of the work to date has been on the measurement of signatures of relevant materials attributes (e.g., element, identification number, isotopic ratios, etc.), especially those related to classified materials and items. The authors are examining potential attributes and related measurement technologies in the context of possible verification approaches. The paper will discuss the current status of these activities, including their development, assessment, and benchmarking status

  13. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  14. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  15. Working Group 3: Broader Perspectives on Non-proliferation and Nuclear Verification

    International Nuclear Information System (INIS)

    Dreicer, M.; Pregenzer, A.; Stein, G.

    2013-01-01

    This working group (WG) focused on the technical topics related to international security and stability in global nonproliferation and arms control regimes and asked how nonproliferation tools and culture might facilitate verification of future nuclear treaties. The review of existing and future nonproliferation and disarmament regimes (Comprehensive Test Ban Treaty - CTBT, UNSC Resolution 1540, UK/Norway/VERTIC exercise, Fissile Material Cut-off Treaty - FMCT) offered a view on challenges, possibilities, and limitations for future initiatives. The concepts that the WG considered, with potential use in implementing future nuclear verification treaties, are: Triple S Culture (Safety, Security, Safeguards), State-Level Approach, Safeguards-by-Design, risk-based approaches, managed access, inspections, and protection of sensitive information. Under these concepts, many existing tools, considered by the WG could be used for nuclear verification. Export control works to control sensitive technology and expertise. Global implementation is complicated and multi-faceted and would benefit from greater consistency and efficiency. In most cases, international cooperation and development international capability would supplement efforts. This document is composed of the slides and the paper of the presentation. (A.C.)

  16. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  17. Complex-Wide Waste Flow Analysis V1.0 verification and validation report

    International Nuclear Information System (INIS)

    Hsu, K.M.; Lundeen, A.S.; Oswald, K.B.; Shropshire, D.E.; Robinson, J.M.; West, W.H.

    1997-01-01

    The complex-wide waste flow analysis model (CWWFA) was developed to assist the Department of Energy (DOE) Environmental Management (EM) Office of Science and Technology (EM-50) to evaluate waste management scenarios with emphasis on identifying and prioritizing technology development opportunities to reduce waste flows and public risk. In addition, the model was intended to support the needs of the Complex-Wide Environmental Integration (EMI) team supporting the DOE's Accelerating Cleanup: 2006 Plan. CWWFA represents an integrated environmental modeling system that covers the life cycle of waste management activities including waste generation, interim process storage, retrieval, characterization and sorting, waste preparation and processing, packaging, final interim storage, transport, and disposal at a final repository. The CWWFA shows waste flows through actual site-specific and facility-specific conditions. The system requirements for CWWFA are documented in the Technical Requirements Document (TRD). The TRD is intended to be a living document that will be modified over the course of the execution of CWWFA development. Thus, it is anticipated that CWWFA will continue to evolve as new requirements are identified (i.e., transportation, small sites, new streams, etc.). This report provides a documented basis for system verification of CWWFA requirements. System verification is accomplished through formal testing and evaluation to ensure that all performance requirements as specified in the TRD have been satisfied. A Requirement Verification Matrix (RVM) was used to map the technical requirements to the test procedures. The RVM is attached as Appendix A. Since February of 1997, substantial progress has been made toward development of the CWWFA to meet the system requirements. This system verification activity provides a baseline on system compliance to requirements and also an opportunity to reevaluate what requirements need to be satisfied in FY-98

  18. Financial Statement Math

    OpenAIRE

    2007-01-01

    game tool Game Tool Interactive Media Element The purpose of this interactive exercise is to help you understand the math in the income statement and balance sheet., Give the proper mathematical computations in order to correctly prepare the income statement and the balance sheet.The exercise is divided into 3 parts: The income Statement, The Balance Sheet - Assets, The Balance Sheet - Liabilities, GB3050 Financial Reporting and Analysis

  19. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  20. Environmental Technology Verification Report for Abraxis Ecologenia® 17β-Estradiol (E2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    This verification test was conducted according to procedures specifiedin the Test/QA Planfor Verification of Enzyme-Linked Immunosorbent Assay (ELISA) Test Kis for the Quantitative Determination of Endocrine Disrupting Compounds (EDCs) in Aqueous Phase Samples. Deviations to the...

  1. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  2. Sustaining a verification regime in a nuclear weapon-free world. VERTIC research report no. 4

    International Nuclear Information System (INIS)

    Moyland, S. van

    1999-01-01

    Sustaining high levels of commitment to and enthusiasm for the verification regime in a nuclear weapon-free world (NWFW) would be a considerable challenge, but the price of failure would be high. No verification system for a complete ban on a whole of weapon of mass destruction (WMD) has been in existence long enough to provide a precedent or the requisite experience. Nevertheless, lessons from the International Atomic Energy Agency's (IAEA) nuclear safeguards system are instructive. A potential problem over the long haul is the gradual erosion of the deterrent effect of verification that may result from the continual overlooking of minor instances of non-compliance. Flaws in the verification system must be identified and dealt with early lest they also corrode the system. To achieve this the verification organisation's inspectors and analytical staff will need sustained support, encouragement, resources and training. In drawing attention to weaknesses, they must be supported by management and at the political level. The leaking of sensitive information, either industrial or military, by staff of the verification regime is a potential problem. 'Managed access' techniques should be constantly examined and improved. The verification organisation and states parties will need to sustain close co-operation with the nuclear and related industries. Frequent review mechanisms must be established. States must invest time and effort to make them effective. Another potential problem is the withering of resources for sustained verification. Verification organisations tend to be pressured by states to cut or last least cap costs, even if the verification workload increases. The verification system must be effective as knowledge and experience allows. The organisation will need continuously to update its scientific methods and technology. This requires in-house resources plus external research and development (R and D). Universities, laboratories and industry need incentives to

  3. An Unattended Verification Station for UF6 Cylinders: Development Status

    International Nuclear Information System (INIS)

    Smith, E.; McDonald, B.; Miller, K.; Garner, J.; March-Leuba, J.; Poland, R.

    2015-01-01

    In recent years, the International Atomic Energy Agency (IAEA) has pursued innovative techniques and an integrated suite of safeguards measures to address the verification challenges posed by advanced centrifuge technologies and the growth in separative work unit capacity at modern centrifuge enrichment plants. These measures would include permanently installed, unattended instruments capable of performing the routine and repetitive measurements previously performed by inspectors. Among the unattended instruments currently being explored by the IAEA is an Unattended Cylinder Verification Stations (UCVS) that could provide independent verification of the declared relative enrichment, U-235 mass and total uranium mass of all declared cylinders moving through the plant, as well as the application and verification of a ''Non-destructive Assay Fingerprint'' to preserve verification knowledge on the contents of each cylinder throughout its life in the facility. As IAEA's vision for a UCVS has evolved, Pacific Northwest National Laboratory (PNNL) and Los Alamos National Laboratory have been developing and testing candidate non-destructive assay (NDA) methods for inclusion in a UCVS. Modeling and multiple field campaigns have indicated that these methods are capable of assaying relative cylinder enrichment with a precision comparable to or substantially better than today's high-resolution handheld devices, without the need for manual wall-thickness corrections. In addition, the methods interrogate the full volume of the cylinder, thereby offering the IAEA a new capability to assay the absolute U-235 mass in the cylinder, and much-improved sensitivity to substituted or removed material. Building on this prior work, and under the auspices of the United States Support Programme to the IAEA, a UCVS field prototype is being developed and tested. This paper provides an overview of: a) hardware and software design of the prototypes, b) preparation

  4. A Syntactic-Semantic Approach to Incremental Verification

    OpenAIRE

    Bianculli, Domenico; Filieri, Antonio; Ghezzi, Carlo; Mandrioli, Dino

    2013-01-01

    Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general framework for the definition of verification procedures, which are made incremental by the framework...

  5. 76 FR 47216 - Statement of Organization, Functions and Delegations of Authority

    Science.gov (United States)

    2011-08-04

    ... Compensation (RR4) functional statement to better align functional responsibility, improve the management and delivery of information technology services, improve management and administrative efficiencies, and optimize use of available staff resources within the Healthcare Systems Bureau (RR). Chapter RR--Healthcare...

  6. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  7. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  8. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  9. Integrating Human Performance and Technology

    International Nuclear Information System (INIS)

    Farris, Ronald K.; Medema, Heather

    2012-01-01

    Human error is a significant factor in the cause and/or complication of events that occur in the commercial nuclear industry. In recent years, great gains have been made using Human Performance (HU) tools focused on targeting individual behaviors. However, the cost of improving HU is growing and resistance to add yet another HU tool certainly exists, particularly for those tools that increase the paperwork for operations. Improvements in HU that are the result of leveraging existing technology, such as hand-held mobile technologies, have the potential to reduce human error in controlling system configurations, safety tag-outs, and other verifications. Operator rounds, valve lineup verifications, containment closure verifications, safety and equipment protection, and system tagging can be supported by field-deployable wireless technologies. These devices can also support the availability of critical component data in the main control room and other locations. This research pilot project reviewing wireless hand-held technology is part of the Light Water Reactor Sustainability Program (LWRSP), a research and development (R and D) program sponsored by the U. S. Department of Energy (DOE). The project is being performed in close collaboration with industry R and D programs to provide the technical foundations for licensing, and managing the long-term, safe, and economical operation of current nuclear power plants. The LWRSP vision is to develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of the current nuclear reactor fleet. (author)

  10. Integrating Human Performance and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ronald K. Farris; Heather Medema

    2012-05-01

    Human error is a significant factor in the cause and/or complication of events that occur in the commercial nuclear industry. In recent years, great gains have been made using Human Performance (HU) tools focused on targeting individual behaviors. However, the cost of improving HU is growing and resistance to add yet another HU tool certainly exists, particularly for those tools that increase the paperwork for operations. Improvements in HU that are the result of leveraging existing technology, such as hand-held mobile technologies, have the potential to reduce human error in controlling system configurations, safety tag-outs, and other verifications. Operator rounds, valve line-up verifications, containment closure verifications, safety & equipment protection, and system tagging can be supported by field-deployable wireless technologies. These devices can also support the availability of critical component data in the main control room and other locations. This research pilot project reviewing wireless hand-held technology is part of the Light Water Reactor Sustainability Program (LWRSP), a research and development (R&D) program sponsored by the U. S. Department of Energy (DOE). The project is being performed in close collaboration with industry R&D programs to provide the technical foundations for licensing, and managing the long-term, safe, and economical operation of current nuclear power plants. The LWRSP vision is to develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of the current nuclear reactor fleet.

  11. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  12. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  13. American Society of Clinical Oncology Policy Statement Update: Genetic and Genomic Testing for Cancer Susceptibility.

    Science.gov (United States)

    Robson, Mark E; Bradbury, Angela R; Arun, Banu; Domchek, Susan M; Ford, James M; Hampel, Heather L; Lipkin, Stephen M; Syngal, Sapna; Wollins, Dana S; Lindor, Noralane M

    2015-11-01

    The American Society of Clinical Oncology (ASCO) has long affirmed that the recognition and management of individuals with an inherited susceptibility to cancer are core elements of oncology care. ASCO released its first statement on genetic testing in 1996 and updated that statement in 2003 and 2010 in response to developments in the field. In 2014, the Cancer Prevention and Ethics Committees of ASCO commissioned another update to reflect the impact of advances in this area on oncology practice. In particular, there was an interest in addressing the opportunities and challenges arising from the application of massively parallel sequencing-also known as next-generation sequencing-to cancer susceptibility testing. This technology introduces a new level of complexity into the practice of cancer risk assessment and management, requiring renewed effort on the part of ASCO to ensure that those providing care to patients with cancer receive the necessary education to use this new technology in the most effective, beneficial manner. The purpose of this statement is to explore the challenges of new and emerging technologies in cancer genetics and provide recommendations to ensure their optimal deployment in oncology practice. Specifically, the statement makes recommendations in the following areas: germline implications of somatic mutation profiling, multigene panel testing for cancer susceptibility, quality assurance in genetic testing, education of oncology professionals, and access to cancer genetic services. © 2015 by American Society of Clinical Oncology.

  14. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 8 June 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 8 June 1998. The following aspects from the Agency's activity are presented: nuclear testing, technical co-operation, programme and budget, safeguards, safeguards implementation report, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), Agency's inspections in Iraq in relation to its clandestine nuclear programme, security of material, measures to strengthen international co-operation in nuclear, radiation and waste safety, study of the radiological situation at the atolls of Mururoa and Fangataufa, and Agency's role in safety assessment of the Mochovce nuclear power plant

  15. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  16. 7 CFR 3052.310 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 3052.310 Section 3052.310....310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements... appropriate, cash flows for the fiscal year audited. The financial statements shall be for the same...

  17. In-core Instrument Subcritical Verification (INCISV) - Core Design Verification Method - 358

    International Nuclear Information System (INIS)

    Prible, M.C.; Heibel, M.D.; Conner, S.L.; Sebastiani, P.J.; Kistler, D.P.

    2010-01-01

    According to the standard on reload startup physics testing, ANSI/ANS 19.6.1, a plant must verify that the constructed core behaves sufficiently close to the designed core to confirm that the various safety analyses bound the actual behavior of the plant. A large portion of this verification must occur before the reactor operates at power. The INCISV Core Design Verification Method uses the unique characteristics of a Westinghouse Electric Company fixed in-core self powered detector design to perform core design verification after a core reload before power operation. A Vanadium self powered detector that spans the length of the active fuel region is capable of confirming the required core characteristics prior to power ascension; reactivity balance, shutdown margin, temperature coefficient and power distribution. Using a detector element that spans the length of the active fuel region inside the core provides a signal of total integrated flux. Measuring the integrated flux distributions and changes at various rodded conditions and plant temperatures, and comparing them to predicted flux levels, validates all core necessary core design characteristics. INCISV eliminates the dependence on various corrections and assumptions between the ex-core detectors and the core for traditional physics testing programs. This program also eliminates the need for special rod maneuvers which are infrequently performed by plant operators during typical core design verification testing and allows for safer startup activities. (authors)

  18. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  19. On Verification of PLC-Programs Written in the LD-Language

    Directory of Open Access Journals (Sweden)

    E. V. Kuzmin

    2012-01-01

    Full Text Available We discuss some questions connected with the construction of a technology of analysing correctness of Programmable Logic Controller programs. We consider an example of modeling and automated verification of PLC-programs written in the Ladder Diagram language (including timed function blocks of the IEC 61131-3 standard. We use the Cadence SMV for symbolic model checking. Program properties are written in the linear-time temporal logic LTL.

  20. A comparison of the value relevance of interim and annual financial statements

    Directory of Open Access Journals (Sweden)

    Mbalenhle Zulu

    2017-03-01

    Aim: It explores whether the value relevance of interim financial statements is higher than the value relevance of annual financial statements. Finally, it investigates whether accounting information published in interim and annual financial statements has incremental value relevance. Setting: Data for the period from 1999 to 2012 were collected from a sample of non-financial companies listed on the Johannesburg Stock Exchange. Method: The Ohlson model to investigate the value relevance of accounting information was used for the study. Results: The results show that interim book value of equity is value relevant while interim earnings are not. Interim financial statements appear to have higher value relevance than annual financial statements. The value relevance of interim and annual accounting information has remained fairly constant over the sample period. Incremental comparisons provide evidence that additional book value of equity and earnings that accrue to a company between interim and annual reporting dates are value relevant. Conclusion: The study was conducted over a long sample period (1999–2012, in an era when a technology-driven economy and more timely reporting media could have had an effect on the value relevance of published accounting information. To the best of our knowledge, this is the first study to evaluate and compare the value relevance of published interim and annual financial statements.

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HVLP COATING EQUIPMENT, SHARPE MANUFACTURING COMPANY PLATINUM 2012 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the Sharpe Platinum 2013 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the Sharpe Platinum, which is designed for use in automotive refinishing. The test coating chosen by Sharpe Manufacturi...

  2. VEG-01: Veggie Hardware Verification Testing

    Science.gov (United States)

    Massa, Gioia; Newsham, Gary; Hummerick, Mary; Morrow, Robert; Wheeler, Raymond

    2013-01-01

    The Veggie plant/vegetable production system is scheduled to fly on ISS at the end of2013. Since much of the technology associated with Veggie has not been previously tested in microgravity, a hardware validation flight was initiated. This test will allow data to be collected about Veggie hardware functionality on ISS, allow crew interactions to be vetted for future improvements, validate the ability of the hardware to grow and sustain plants, and collect data that will be helpful to future Veggie investigators as they develop their payloads. Additionally, food safety data on the lettuce plants grown will be collected to help support the development of a pathway for the crew to safely consume produce grown on orbit. Significant background research has been performed on the Veggie plant growth system, with early tests focusing on the development of the rooting pillow concept, and the selection of fertilizer, rooting medium and plant species. More recent testing has been conducted to integrate the pillow concept into the Veggie hardware and to ensure that adequate water is provided throughout the growth cycle. Seed sanitation protocols have been established for flight, and hardware sanitation between experiments has been studied. Methods for shipping and storage of rooting pillows and the development of crew procedures and crew training videos for plant activities on-orbit have been established. Science verification testing was conducted and lettuce plants were successfully grown in prototype Veggie hardware, microbial samples were taken, plant were harvested, frozen, stored and later analyzed for microbial growth, nutrients, and A TP levels. An additional verification test, prior to the final payload verification testing, is desired to demonstrate similar growth in the flight hardware and also to test a second set of pillows containing zinnia seeds. Issues with root mat water supply are being resolved, with final testing and flight scheduled for later in 2013.

  3. International exchange on nuclear safety related expert systems: The role of software verification and validation

    International Nuclear Information System (INIS)

    Sun, B.K.H.

    1996-01-01

    An important lesson learned from the Three Mile Island accident is that human errors can be significant contributors to risk. Recent advancement in computer hardware and software technology helped make expert system techniques potentially viable tools for improving nuclear power plant safety and reliability. As part of the general man-machine interface technology, expert systems have recently become increasingly prominent as a potential solution to a number of previously intractable problems in many phases of human activity, including operation, maintenance, and engineering functions. Traditional methods for testing and analyzing analog systems are no longer adequate to handle the increased complexity of software systems. The role of Verification and Validation (V and V) is to add rigor to the software development and maintenance cycle to guarantee the high level confidence needed for applications. Verification includes the process and techniques for confirming that all the software requirements in one stage of the development are met before proceeding on to the next stage. Validation involves testing the integrated software and hardware system to ensure that it reliably fulfills its intended functions. Only through a comprehensive V and V program can a high level of confidence be achieved. There exist many different standards and techniques for software verification and validation, yet they lack uniform approaches that provides adequate levels of practical guidance which can be used by users for nuclear power plant applications. There is a need to unify different approaches for addressing software verification and validation and to develop practical and cost effective guidelines for user and regulatory acceptance. (author). 8 refs

  4. 7 CFR 1212.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1212.51 Section 1212.51... statements. (a) The Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be limited to, a balance sheet, income statement...

  5. Have personal statements become impersonal? An evaluation of personal statements in anesthesiology residency applications.

    Science.gov (United States)

    Max, Bryan A; Gelfand, Brian; Brooks, Meredith R; Beckerly, Rena; Segal, Scott

    2010-08-01

    To evaluate personal statements submitted to a major academic anesthesiology program to determine the prevalence of common features and overall subjective quality, and to survey anesthesiology program directors as to how they utilized these statements during the resident selection process. Structured analysis of de-identified personal statements and Internet-based survey of program directors. Large academic anesthesiology training program. 670 applicant personal statements and academic anesthesiology program directors. Prevalence of 13 specific essay features and 8 quality ratings were calculated for the essays and correlated with other aspects of the residency application, as abstracted from the Electronic Residency Application Service (ERAS) files. A 6-question survey regarding use of personal statements was collected from program directors. 70 of 131 program directors queried responded to our survey. Interest in physiology and pharmacology, enjoyment of a hands-on specialty, and desire to comfort anxious patients were each mentioned in more than half of the essays. Candidates invited for an interview had essays that received higher quality ratings than essays of those not invited (P = 0.02 to P essay. Only 41% found the personal statement to be very or somewhat important in selecting candidates for interview invitations. However, over 90% stated that they used the statements during actual interviews with invited applicants. The data showed a high prevalence of common features found within personal statements and a general ambivalence amongst those program directors for whom the statements were intended. Copyright 2010 Elsevier Inc. All rights reserved.

  6. Transparency in practice: Evidence from 'verification analyses' issued by the Polish Agency for Health Technology Assessment in 2012-2015.

    Science.gov (United States)

    Ozierański, Piotr; Löblová, Olga; Nicholls, Natalia; Csanádi, Marcell; Kaló, Zoltán; McKee, Martin; King, Lawrence

    2018-01-08

    Transparency is recognised to be a key underpinning of the work of health technology assessment (HTA) agencies, yet it has only recently become a subject of systematic inquiry. We contribute to this research field by considering the Polish Agency for Health Technology Assessment (AHTAPol). We situate the AHTAPol in a broader context by comparing it with the National Institute for Health and Care Excellence (NICE) in England. To this end, we analyse all 332 assessment reports, called verification analyses, that the AHTAPol issued from 2012 to 2015, and a stratified sample of 22 Evidence Review Group reports published by NICE in the same period. Overall, by increasingly presenting its key conclusions in assessment reports, the AHTAPol has reached the transparency standards set out by NICE in transparency of HTA outputs. The AHTAPol is more transparent than NICE in certain aspects of the HTA process, such as providing rationales for redacting assessment reports and providing summaries of expert opinions. Nevertheless, it is less transparent in other areas of the HTA process, such as including information on expert conflicts of interest. Our findings have important implications for understanding HTA in Poland and more broadly. We use them to formulate recommendations for policymakers.

  7. Analysis on descriptions of precautionary statements in package inserts of medicines

    Directory of Open Access Journals (Sweden)

    Tsuchiya F

    2012-02-01

    Full Text Available Keita Nabeta1, Masaomi Kimura2, Michiko Ohkura2, Fumito Tsuchiya31Graduate School of Engineering and Science, Shibaura Institute of Technology, Toyosu 3-7-5, Koto-ku, Tokyo, 135-8548 Japan; 2Faculty of Engineering, Shibaura Institute of Technology, Toyosu 3-7-5, Koto-ku, Tokyo, 135-8548 Japan; 3School of Pharmacy, International University of Health and Welfare, Minami-Aoyama 1-24-1, Minato-ku, Tokyo, 107-0062 JapanBackground: To prevent medical accidents, users must be informed of the cautions written in medical package inserts. To realize countermeasures by utilizing information systems, we must also implement a drug information database. However, this is not easy to develop, since the descriptions in package inserts are too complex and their information poorly structured. It is necessary to analyze package insert information and propose a data structure.Methods: We analyzed the descriptions of 'precautions for application' in package inserts via text mining methods. In order to summarize statements, we applied dependency analysis to statements and visualized their relations between predicate words and other words. Furthermore, we extracted words representing timing to execute the order.Results: We found that there are four types of statements: direct orders such as "使用する" (use, causative orders such as "使用させる" (make someone use, direct interdictions such as "使用しない" (do not use, and causative interdictions such as "使用させない" (do not make user use. As for words representing timing, we extracted six groups: "at the time of delivery," "at the time of preparation," "in use," "after use," and "at the time of storage." From these results, we obtained points of consideration concerning the subjects of orders in the statements and timing of their execution.Conclusion: From the obtained knowledge, we can define the information structure used to describe the precautionary statement. It should contain information such

  8. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  9. HANFORD SCIENCE & TECHNOLOGY NEEDS STATEMENTS 2002

    Energy Technology Data Exchange (ETDEWEB)

    WIBLE, R.A.

    2002-04-01

    This document: (a) provides a comprehensive listing of the Hanford sites science and technology needs for fiscal year (FY) 2002; and (b) identifies partnering and commercialization opportunities within industry, other federal and state agencies, and the academic community. These needs were prepared by the Hanford projects (within the Project Hanford Management Contract, the Environmental Restoration Contract and the River Protection Project) and subsequently reviewed and endorsed by the Hanford Site Technology Coordination Group (STCG). The STCG reviews included participation of DOE-RL and DOE-ORP Management, site stakeholders, state and federal regulators, and Tribal Nations. These needs are reviewed and updated on an annual basis and given a broad distribution.

  10. Independent verification survey report for exposure units Z2-24, Z2-31, Z2-32, AND Z2-36 in zone 2 of the East Tennessee technology park Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    King, David A. [Oak Ridge Inst. for Science and Education (ORISE), Oak Ridge, TN (United States)

    2013-10-01

    The U.S. Department of Energy (DOE) Oak Ridge Office of Environmental Management selected Oak Ridge Associated Universities (ORAU), through the Oak Ridge Institute for Science and Education (ORISE) contract, to perform independent verification (IV) at Zone 2 of the East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. ORAU has concluded IV surveys, per the project-specific plan (PSP) (ORAU 2013a) covering exposure units (EUs) Z2-24, -31, -32, and -36. The objective of this effort was to verify the target EUs comply with requirements in the Zone 2 Record of Decision (ROD) (DOE 2005), as implemented by using the dynamic verification strategy presented in the dynamic work plan (DWP) (BJC 2007); and confirm commitments in the DWP were adequately implemented, as verified via IV surveys and soil sampling.

  11. On the judicial reception of natural science and engineering forecasts on complex technical systems, for example nuclear power stations

    International Nuclear Information System (INIS)

    Winter, G.; Schaefer, R.

    1985-01-01

    Procedural and substantive law offer criteria for the selection, definition and assessment of experts' statements concerning failures in nuclear power stations. The criterion 'practical reasonableness' contains both a pragmatical dimension which allows for a gradiation of the verification expenditure, and an 'assessing' dimension with requirements for the statement of reasons. The criterion 'state of science and technology' in the meaning of the German Atomic Energy Act (Sec. 7 para. 2) should not only, as is shown by examples of errors, include prevailing opinions but also the views of outsiders. (orig.)

  12. A service-oriented architecture for integrating the modeling and formal verification of genetic regulatory networks

    Directory of Open Access Journals (Sweden)

    Page Michel

    2009-12-01

    Full Text Available Abstract Background The study of biological networks has led to the development of increasingly large and detailed models. Computer tools are essential for the simulation of the dynamical behavior of the networks from the model. However, as the size of the models grows, it becomes infeasible to manually verify the predictions against experimental data or identify interesting features in a large number of simulation traces. Formal verification based on temporal logic and model checking provides promising methods to automate and scale the analysis of the models. However, a framework that tightly integrates modeling and simulation tools with model checkers is currently missing, on both the conceptual and the implementational level. Results We have developed a generic and modular web service, based on a service-oriented architecture, for integrating the modeling and formal verification of genetic regulatory networks. The architecture has been implemented in the context of the qualitative modeling and simulation tool GNA and the model checkers NUSMV and CADP. GNA has been extended with a verification module for the specification and checking of biological properties. The verification module also allows the display and visual inspection of the verification results. Conclusions The practical use of the proposed web service is illustrated by means of a scenario involving the analysis of a qualitative model of the carbon starvation response in E. coli. The service-oriented architecture allows modelers to define the model and proceed with the specification and formal verification of the biological properties by means of a unified graphical user interface. This guarantees a transparent access to formal verification technology for modelers of genetic regulatory networks.

  13. Statement to the Board of Governors. 29 November 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Full text: I refer to my introductory statement at the opening of the Board last Thursday, in which I informed you that, with one exception, the Agency had been able to complete its verification of Iran's suspension of its enrichment related and reprocessing activities. That exception related to Iran's request to 'use up to 20 sets of [centrifuge] components for R and D purposes'. At that time, I noted that we were still in discussion on this matter. On 28 November 2004, I received a letter from Iran in which it refers to the 20 sets of centrifuge components, and states that Iran 'permits the IAEA to place these sets of components under Agency surveillance'. In the letter Iran also states that it 'will not conduct any testing of these sets of components'. In that letter, Iran also informed me that, as previously indicated, it would provide the Agency with the identification numbers of these components. Today, Agency inspectors put surveillance cameras in place to monitor the 20 sets of centrifuge components. The identification numbers have also been received. As a consequence, all measures necessary for the verification of Iran's suspension of enrichment related activities are now in place. Naturally, in accordance with the draft resolution before you, I will inform Board members should the suspension not be fully sustained, or should the Agency be prevented from verifying all elements of the suspension. (IAEA)

  14. Reading and understanding financial statements.

    Science.gov (United States)

    White, Joseph P

    2005-01-01

    Feeling comfortable reading and understanding financial statements is critical to the success of healthcare executives and physicians involved in management. Businesses use three primary financial statements: a balance sheet represents the equation, Assets = Liabilities + Equity; an income statement represents the equation, Revenues - Expenses = Net Income; a statement of cash flows reports all sources and uses of cash during the represented period. The balance sheet expresses financial indicators at one particular moment in time, whereas the income statement and the statement of cash flows show activity that occurred over a stretch of time. Additional information is disclosed in attached footnotes and other supplementary materials. There are two ways to prepare financial statements. Cash-basis accounting recognizes revenue when it is received and expenses when they are paid. Accrual-basis accounting recognizes revenue when it is earned and expenses when they are incurred. Although cash-basis is acceptable, periodically using the accrual method reveals important information about receivables and liabilities that could otherwise remain hidden. Become more engaged with your financial statements by spending time reading them, tracking key performance indicators, and asking accountants and financial advisors questions. This will help you better understand your business and build a successful future.

  15. Fiscal 1997 report of the development of high efficiency waste power generation technology. No.2 volume. Pilot plant verification test; Kokoritsu haikibutsu hatsuden gijutsu kaihatsu (pilot plant jissho shiken). 1997 nendo hokokusho (daini bunsatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    As to a high efficiency waste power generation system using general waste as fuel, the details of the following were described: design/construction management and operational study of pilot plant, design/manufacture/construction of pilot plant, and study of an optimal total system. Concerning the construction management and operational study, the paper described the application for governmental/official inspection procedures and taking inspection, process management of pilot plant, site patrol, safety management, management of trial run of pilot plant, drawing-up of a verification test plan and test run, etc. Relating to the design/manufacture/construction of pilot plant, an outline of the pilot plant was described. The paper also stated points to be considered in design of furnace structure and boiler structure, points to be considered of the verification test, etc. As to the study of an optimal total system, the following were described: survey of waste gasification/slagging power generation technology, basic study on RDF production process, survey of trends of waste power generation technology in the U.S., etc. 52 refs., 149 figs., 121 tabs.

  16. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  17. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  18. Z-2 Architecture Description and Requirements Verification Results

    Science.gov (United States)

    Graziosi, Dave; Jones, Bobby; Ferl, Jinny; Scarborough, Steve; Hewes, Linda; Ross, Amy; Rhodes, Richard

    2016-01-01

    The Z-2 Prototype Planetary Extravehicular Space Suit Assembly is a continuation of NASA's Z series of spacesuits. The Z-2 is another step in NASA's technology development roadmap leading to human exploration of the Martian surface. The suit was designed for maximum mobility at 8.3 psid, reduced mass, and to have high fidelity life support interfaces. As Z-2 will be man-tested at full vacuum in NASA JSC's Chamber B, it was manufactured as Class II, making it the most flight-like planetary walking suit produced to date. The Z-2 suit architecture is an evolution of previous EVA suits, namely the ISS EMU, Mark III, Rear Entry I-Suit and Z-1 spacesuits. The suit is a hybrid hard and soft multi-bearing, rear entry spacesuit. The hard upper torso (HUT) is an all-composite structure and includes a 2-bearing rolling convolute shoulder with Vernier sizing mechanism, removable suit port interface plate (SIP), elliptical hemispherical helmet and self-don/doff shoulder harness. The hatch is a hybrid aluminum and composite construction with Apollo style gas connectors, custom water pass-thru, removable hatch cage and interfaces to primary and auxiliary life support feed water bags. The suit includes Z-1 style lower arms with cam brackets for Vernier sizing and government furnished equipment (GFE) Phase VI gloves. The lower torso includes a telescopic waist sizing system, waist bearing, rolling convolute waist joint, hard brief, 2 bearing soft hip thigh, Z-1 style legs with ISS EMU style cam brackets for sizing, and conformal walking boots with ankle bearings. The Z-2 Requirements Verification Plan includes the verification of more than 200 individual requirements. The verification methods include test, analysis, inspection, demonstration or a combination of methods. Examples of unmanned requirements include suit leakage, proof pressure testing, operational life, mass, isometric man-loads, sizing adjustment ranges, internal and external interfaces such as in-suit drink bag

  19. Quantitative analysis of patient-specific dosimetric IMRT verification

    International Nuclear Information System (INIS)

    Budgell, G J; Perrin, B A; Mott, J H L; Fairfoul, J; Mackay, R I

    2005-01-01

    Patient-specific dosimetric verification methods for IMRT treatments are variable, time-consuming and frequently qualitative, preventing evidence-based reduction in the amount of verification performed. This paper addresses some of these issues by applying a quantitative analysis parameter to the dosimetric verification procedure. Film measurements in different planes were acquired for a series of ten IMRT prostate patients, analysed using the quantitative parameter, and compared to determine the most suitable verification plane. Film and ion chamber verification results for 61 patients were analysed to determine long-term accuracy, reproducibility and stability of the planning and delivery system. The reproducibility of the measurement and analysis system was also studied. The results show that verification results are strongly dependent on the plane chosen, with the coronal plane particularly insensitive to delivery error. Unexpectedly, no correlation could be found between the levels of error in different verification planes. Longer term verification results showed consistent patterns which suggest that the amount of patient-specific verification can be safely reduced, provided proper caution is exercised: an evidence-based model for such reduction is proposed. It is concluded that dose/distance to agreement (e.g., 3%/3 mm) should be used as a criterion of acceptability. Quantitative parameters calculated for a given criterion of acceptability should be adopted in conjunction with displays that show where discrepancies occur. Planning and delivery systems which cannot meet the required standards of accuracy, reproducibility and stability to reduce verification will not be accepted by the radiotherapy community

  20. Crowd-Sourced Help with Emergent Knowledge for Optimized Formal Verification (CHEKOFV)

    Science.gov (United States)

    2016-03-01

    up game Binary Fission, which was deployed during Phase Two of CHEKOFV. Xylem: The Code of Plants is a casual game for players using mobile ...there are the design and engineering challenges of building a game infrastructure that integrates verification technology with crowd participation...the backend processes that annotate the originating software. Allowing players to construct their own equations opened up the flexibility to receive

  1. Image intelligence online consulting: A flexible and remote access to strategic information applied to verification of declaration

    International Nuclear Information System (INIS)

    Chassy, A.F. de; Denizot, L.

    2001-01-01

    Commercial satellite imagery is giving International Institutions specialized Information Departments access to a great source of valuable intelligence. High resolution and multiple sensors have also led to a growing complexity of interpretation that calls for a greater need of consulting, verification and training in the field in order to make it eligible as an operational source of verification. Responding to this need, Fleximage is extending its Image Intelligence (IMINT) training program to include a fully operational and flexible online consulting and training program. Image Intelligence (IMINT) Online Program, a new approach to acquiring IMINT expertise, supported by Internet technologies, and managed by a professional team of experts and technical staff. Fleximage has developed a virtual learning environment on the Internet for acquiring IMINT expertise. Called the IMINT Online Program, this dynamic learning environment provides complete flexibility and personalization of the process for acquiring expertise. The IMINT online program includes two services: Online Consulting and Online Training. The Online Consulting service is designed for the technical staff of an organization who are already operational in the field of image intelligence. Online Consulting enables these staff members to acquire pertinent expertise online that can be directly applied to their professional activity, such as IAEA verification tasks. The IMINT virtual Consulting and Training services indicated above are made possible thanks to the latest in Internet-based technologies including: multimedia CD-ROM, Internet technologies, rich media content (Audio, Video and Flash), application sharing, platform Maintenance Tools, secured connections and authentication, knowledge database technologies. IMINT Online Program operates owing to: specialized experts in fields relating to IMINT. These experts carry out the tasks of consultants, coaches, occasional speakers, and course content designers

  2. Environmental Technologies Summary Book

    International Nuclear Information System (INIS)

    2009-02-01

    This book lists the companies and their technology, which have new excellent technology authentication and technology verification. They are as in the following : sewage advanced treatment technology using a three-stage Bio-Ceramic Filtration by Shinwoo engineering.co.kr, Twist Filter by Sungshin engineering.co.kr, Sewage advanced treatment technology using CIMEN-DOC by Taeyeong/CI biotech.co.kr, DeNipho using pump ejector and Bio Green Media by Green Technology.co.kr, Automatic integrated management system using Envi-SIS by Sallasanup.com Kozone.co.kr and Geoworks.co.kr.

  3. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  4. The Process for the Formulation of the International Telehealth Position Statement for Occupational Therapy

    Science.gov (United States)

    JACOBS, KAREN; CASON, JANA; MCCULLOUGH, ANN

    2015-01-01

    The World Federation of Occupational Therapists (WFOT) consists of 84 member organizations representing over 420,000 occupational therapists internationally (WFOT, 2014). In 2014, WFOT published the WFOT Telehealth Position Statement on the use of telehealth in occupational therapy. The process for the formulation of the official document involved reviewing WFOT member organizations’ telehealth position statements and data collected from a survey sent to member organizations’ delegates in April 2014. Qualitative data from 39 countries yielded factors to consider in five key areas: licensure/registration requirements, the cost of technology, privacy and security, reimbursement/payment models, and other issues (e.g., need for collaboration/transfer of knowledge, client selection, provider competencies, standard of care). The WFOT Telehealth Position Statement addressed each of these areas. The collaborative effort resulting in the development of the WFOT Telehealth Position Statement serves as a model for other international organizations. PMID:27563380

  5. Methods of Verification, Accountability and Control of Special Nuclear Material

    International Nuclear Information System (INIS)

    Stewart, J.E.

    1999-01-01

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data

  6. EOPs at NPP Temelin: Analytical support for EOPs verification

    International Nuclear Information System (INIS)

    Bica, M.

    1999-01-01

    The process of implementation of symptom-based emergency operating procedures (EOPs) started at the NPP Temelin in 1993. The process has the following phases: development of symptom-based EOPs; EOPs verification; EOPs validation; operating personnel training; EOPs control and experience feedback. The development of Temelin specific EOPs was based on technology and know-how transfer using the Emergency Response Guidelines Methodology developed by the Westinghouse Owner Group. In this lecture the implementation of symptom-based EOPs in the the NPP Temelin is described

  7. CONSOLIDATED FINANCIAL STATEMENTS UNDER IFRS

    OpenAIRE

    Tănase Alin-Eliodor; Calotă Traian-Ovidiu

    2013-01-01

    This article is focuses on accounting consolidation techniques and the preparation of consolidation worksheets for the components of financial statements (statement of comprehensive income, statement of changes in equity, and financial position). The presented group includes parent company, two subsidiaries (only one fully controlled by the parent company) and a jointly controlled entity. The financial statements are presented under the following standards IFRS 3 Business Combination, IAS 27 ...

  8. INNOVATIVE TECHNOLOGY VERIFICATION REPORT " ...

    Science.gov (United States)

    The RemediAidTm Total Petroleum Hydrocarbon Starter Kit (RemediAidTm kit) developed by CHEMetries, Inc. (CHEMetrics), and AZUR Environmental Ltd was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Hueneme, California. The purpose of the demonstration was to collect reliable performance and cost data for the RemediAid Tm kit and six other field measurement devices for total petroleum hydrocarbons (TPH) in soil. In addition to assessing ease of device operation, the key objectives of the demonstration included determining the (1) method detection limit, (2) accuracy and precision, (3) effects of interferents and soil moisture content on TPH measurement, (4) sample throughput, and (5) TPH measurement costs for each device. The demonstration involved analysis of both performance evaluation samples and environmental samples collected in five areas contaminated with gasoline, diesel, lubricating oil, or other petroleum products. The performance and cost results for a given field measurement device were compared to those for an off-site laboratory reference method,

  9. 75 FR 42575 - Electronic Signature and Storage of Form I-9, Employment Eligibility Verification

    Science.gov (United States)

    2010-07-22

    ... Electronic Signature and Storage of Form I-9, Employment Eligibility Verification AGENCY: U.S. Immigration... published an interim final rule to permit electronic signature and storage of the Form I-9. 71 FR 34510... because electronic signature and storage technologies are optional, DHS expects that small entities will...

  10. Final environmental impact statement. Management of commercially generated radioactive waste. Volume 1 of 3

    Energy Technology Data Exchange (ETDEWEB)

    1980-10-01

    This EIS analyzes the significant environmental impacts that could occur if various technologies for management and disposal of high-level and transuranic wastes from commercial nuclear power reactors were to be developed and implemented. This EIS will serve as the environmental input for the decision on which technology, or technologies, will be emphasized in further research and development activities in the commercial waste management program. The action proposed in this EIS is to (1) adopt a national strategy to develop mined geologic repositories for disposal of commercially generated high-level and transuranic radioactive waste (while continuing to examine subseabed and very deep hole disposal as potential backup technologies) and (2) conduct a R and D program to develop such facilities and the necessary technology to ensure the safe long-term containment and isolation of these wastes. The Department has considered in this statement: development of conventionally mined deep geologic repositories for disposal of spent fuel from nuclear power reactors and/or radioactive fuel reprocessing wastes; balanced development of several alternative disposal methods; and no waste disposal action. This EIS reflects the public review of and comments offered on the draft statement. Included are descriptions of the characteristics of nuclear waste, the alternative disposal methods under consideration, and potential environmental impacts and costs of implementing these methods. Because of the programmatic nature of this document and the preliminary nature of certain design elements assumed in assessing the environmental consequences of the various alternatives, this study has been based on generic, rather than specific, systems. At such time as specific facilities are identified for particular sites, statements addressing site-specific aspects will be prepared for public review and comment.

  11. Final environmental impact statement. Management of commercially generated radioactive waste. Volume 1 of 3

    International Nuclear Information System (INIS)

    1980-10-01

    This EIS analyzes the significant environmental impacts that could occur if various technologies for management and disposal of high-level and transuranic wastes from commercial nuclear power reactors were to be developed and implemented. This EIS will serve as the environmental input for the decision on which technology, or technologies, will be emphasized in further research and development activities in the commercial waste management program. The action proposed in this EIS is to (1) adopt a national strategy to develop mined geologic repositories for disposal of commercially generated high-level and transuranic radioactive waste (while continuing to examine subseabed and very deep hole disposal as potential backup technologies) and (2) conduct a R and D program to develop such facilities and the necessary technology to ensure the safe long-term containment and isolation of these wastes. The Department has considered in this statement: development of conventionally mined deep geologic repositories for disposal of spent fuel from nuclear power reactors and/or radioactive fuel reprocessing wastes; balanced development of several alternative disposal methods; and no waste disposal action. This EIS reflects the public review of and comments offered on the draft statement. Included are descriptions of the characteristics of nuclear waste, the alternative disposal methods under consideration, and potential environmental impacts and costs of implementing these methods. Because of the programmatic nature of this document and the preliminary nature of certain design elements assumed in assessing the environmental consequences of the various alternatives, this study has been based on generic, rather than specific, systems. At such time as specific facilities are identified for particular sites, statements addressing site-specific aspects will be prepared for public review and comment

  12. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION (POSTER)

    Science.gov (United States)

    ETV is presenting a poster at the EPA's 2005 Science Forum from May 16-18, 2005 in Washington, DC. This poster will contain a summary of the performance results realized by the six verified diesel retrofit technologies, as well as potential impacts that could be realized if sigi...

  13. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  14. 2004 Power marketing program final EIS - final environmental impact statement. Volume 2 - appendices

    International Nuclear Information System (INIS)

    1997-02-01

    This volume contains appendices to the Final Environmental Impact Statement (FEIS) for the Power Marketing Program proposal of the Western Area Power Administration. The FEIS identified peaking power scheduling as the environmentally preferred alternative, and presented the analysis of alternatives and environmental impacts. Sixteen appendices to the FEIS are included in this document. The appendices are: Statutory and Legal Framework; Sierra Nevada Region Customer Groups and Economic Regions; Renewable Technology Cost Information Matrix; Hydrological Assumptions; Recreation Resources; Archaeological and Historical Resources; Incremental Power Resources; Air Quality Regulatory Structure; Energy Generation; Stage Contents Relationships for Regulating Reservoirs; Power Costs; Socioeconomic Impacts; Projected Air Resource Impacts; Land use, Water Quality, and Solid Waste Impact Factors; Draft Environmental Impact Statement Comments and Responses, and Contractor Disclosure Statements. 21 figs., 24 tabs

  15. Support of Construction and Verification of Out-of-Pile Fuel Assembly Test Facilities

    International Nuclear Information System (INIS)

    Park, Nam Gyu; Kim, K. T.; Park, J. K.

    2006-12-01

    Fuel assembly and components should be verified by the out-of-pile test facilities in order to load the developed fuel in reactor. Even though most of the component-wise tests have been performed using the facilities in land, the assembly-wise tests has been depended on the oversees' facility due to the lack of the facilities. KAERI started to construct the assembly-wise mechanical/hydraulic test facilities and KNF, as an end user, is supporting the mechanical/hydraulic test facility construction by using the technologies studied through the fuel development programs. The works performed are as follows: - Test assembly shipping container design and manufacturing support - Fuel handling tool design : Gripper, Upper and lower core simulators for assembly mechanical test facility, Internals for assembly hydraulic test facility - Manufacture of test specimens : skeleton and assembly for preliminary functional verification of assembly mechanical/hydraulic test facilities, two assemblies for the verification of assembly mechanical/hydraulic test facilities, Instrumented rod design and integrity evaluation - Verification of assembly mechanical/hydraulic test facilities : test data evaluation

  16. Groundwater flow code verification ''benchmarking'' activity (COVE-2A): Analysis of participants' work

    International Nuclear Information System (INIS)

    Dykhuizen, R.C.; Barnard, R.W.

    1992-02-01

    The Nuclear Waste Repository Technology Department at Sandia National Laboratories (SNL) is investigating the suitability of Yucca Mountain as a potential site for underground burial of nuclear wastes. One element of the investigations is to assess the potential long-term effects of groundwater flow on the integrity of a potential repository. A number of computer codes are being used to model groundwater flow through geologic media in which the potential repository would be located. These codes compute numerical solutions for problems that are usually analytically intractable. Consequently, independent confirmation of the correctness of the solution is often not possible. Code verification is a process that permits the determination of the numerical accuracy of codes by comparing the results of several numerical solutions for the same problem. The international nuclear waste research community uses benchmarking for intercomparisons that partially satisfy the Nuclear Regulatory Commission (NRC) definition of code verification. This report presents the results from the COVE-2A (Code Verification) project, which is a subset of the COVE project

  17. Support of Construction and Verification of Out-of-Pile Fuel Assembly Test Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Nam Gyu; Kim, K. T.; Park, J. K. [KNF, Daejeon (Korea, Republic of)] (and others)

    2006-12-15

    Fuel assembly and components should be verified by the out-of-pile test facilities in order to load the developed fuel in reactor. Even though most of the component-wise tests have been performed using the facilities in land, the assembly-wise tests has been depended on the oversees' facility due to the lack of the facilities. KAERI started to construct the assembly-wise mechanical/hydraulic test facilities and KNF, as an end user, is supporting the mechanical/hydraulic test facility construction by using the technologies studied through the fuel development programs. The works performed are as follows: - Test assembly shipping container design and manufacturing support - Fuel handling tool design : Gripper, Upper and lower core simulators for assembly mechanical test facility, Internals for assembly hydraulic test facility - Manufacture of test specimens : skeleton and assembly for preliminary functional verification of assembly mechanical/hydraulic test facilities, two assemblies for the verification of assembly mechanical/hydraulic test facilities, Instrumented rod design and integrity evaluation - Verification of assembly mechanical/hydraulic test facilities : test data evaluation.

  18. Spent fuel verification options for final repository safeguards in Finland. A study on verification methods, their feasibility and safety aspects

    International Nuclear Information System (INIS)

    Hautamaeki, J.; Tiitta, A.

    2000-12-01

    The verification possibilities of the spent fuel assemblies from the Olkiluoto and Loviisa NPPs and the fuel rods from the research reactor of VTT are contemplated in this report. The spent fuel assemblies have to be verified at the partial defect level before the final disposal into the geologic repository. The rods from the research reactor may be verified at the gross defect level. Developing a measurement system for partial defect verification is a complicated and time-consuming task. The Passive High Energy Gamma Emission Tomography and the Fork Detector combined with Gamma Spectrometry are the most potential measurement principles to be developed for this purpose. The whole verification process has to be planned to be as slick as possible. An early start in the planning of the verification and developing the measurement devices is important in order to enable a smooth integration of the verification measurements into the conditioning and disposal process. The IAEA and Euratom have not yet concluded the safeguards criteria for the final disposal. E.g. criteria connected to the selection of the best place to perform the verification. Measurements have not yet been concluded. Options for the verification places have been considered in this report. One option for a verification measurement place is the intermediate storage. The other option is the encapsulation plant. Crucial viewpoints are such as which one offers the best practical possibilities to perform the measurements effectively and which would be the better place in the safeguards point of view. Verification measurements may be needed both in the intermediate storages and in the encapsulation plant. In this report also the integrity of the fuel assemblies after wet intermediate storage period is assessed, because the assemblies have to stand the handling operations of the verification measurements. (orig.)

  19. 38 CFR 41.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Financial statements. 41...) AUDITS OF STATES, LOCAL GOVERNMENTS, AND NON-PROFIT ORGANIZATIONS Auditees § 41.310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements that reflect its financial...

  20. Simulation-based MDP verification for leading-edge masks

    Science.gov (United States)

    Su, Bo; Syrel, Oleg; Pomerantsev, Michael; Hagiwara, Kazuyuki; Pearman, Ryan; Pang, Leo; Fujimara, Aki

    2017-07-01

    For IC design starts below the 20nm technology node, the assist features on photomasks shrink well below 60nm and the printed patterns of those features on masks written by VSB eBeam writers start to show a large deviation from the mask designs. Traditional geometry-based fracturing starts to show large errors for those small features. As a result, other mask data preparation (MDP) methods have become available and adopted, such as rule-based Mask Process Correction (MPC), model-based MPC and eventually model-based MDP. The new MDP methods may place shot edges slightly differently from target to compensate for mask process effects, so that the final patterns on a mask are much closer to the design (which can be viewed as the ideal mask), especially for those assist features. Such an alteration generally produces better masks that are closer to the intended mask design. Traditional XOR-based MDP verification cannot detect problems caused by eBeam effects. Much like model-based OPC verification which became a necessity for OPC a decade ago, we see the same trend in MDP today. Simulation-based MDP verification solution requires a GPU-accelerated computational geometry engine with simulation capabilities. To have a meaningful simulation-based mask check, a good mask process model is needed. The TrueModel® system is a field tested physical mask model developed by D2S. The GPU-accelerated D2S Computational Design Platform (CDP) is used to run simulation-based mask check, as well as model-based MDP. In addition to simulation-based checks such as mask EPE or dose margin, geometry-based rules are also available to detect quality issues such as slivers or CD splits. Dose margin related hotspots can also be detected by setting a correct detection threshold. In this paper, we will demonstrate GPU-acceleration for geometry processing, and give examples of mask check results and performance data. GPU-acceleration is necessary to make simulation-based mask MDP verification

  1. Status of the Agency's verification activities in Iraq as of 8 January 2003. Statement by the Director General. New York, 09 January 2003

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The following information is provided to update the Council on the activities of the IAEA pursuant to Security Council resolution 1441 (2002) and other relevant resolutions. It describes the verification activities performed thus far, next steps, and where we are at this stage

  2. 7 CFR 1206.41 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1206.41 Section 1206.41... Financial statements. (a) As requested by the Department, the Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be...

  3. 78 FR 50118 - Policy Statement on Adequacy and Compatibility of Agreement State Programs; Statement of...

    Science.gov (United States)

    2013-08-16

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0081] Policy Statement on Adequacy and Compatibility of Agreement State Programs; Statement of Principles and Policy for the Agreement State Program AGENCY: Nuclear Regulatory Commission. ACTION: Policy statements; extension of comment period. SUMMARY: The U.S. Nuclear...

  4. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  5. International Energy Agency Ocean Energy Systems Task 10 Wave Energy Converter Modeling Verification and Validation

    DEFF Research Database (Denmark)

    Wendt, Fabian F.; Yu, Yi-Hsiang; Nielsen, Kim

    2017-01-01

    This is the first joint reference paper for the Ocean Energy Systems (OES) Task 10 Wave Energy Converter modeling verification and validation group. The group is established under the OES Energy Technology Network program under the International Energy Agency. OES was founded in 2001 and Task 10 ...

  6. Dose concentration and dose verification for radiotherapy of cancer

    International Nuclear Information System (INIS)

    Maruyama, Koichi

    2005-01-01

    The number of cancer treatments using radiation therapy is increasing. The background of this increase is the accumulated fact that the number of successful cases is comparative to or even better than surgery for some types of cancer due to the improvement in irradiation technology and radiation planning technology. This review describes the principles and technology of radiation therapy, its characteristics, particle therapy that improves the dose concentration, its historical background, the importance of dose concentration, present situation and future possibilities. There are serious problems that hinder the superior dose concentration of particle therapy. Recent programs and our efforts to solve these problems are described. A new concept is required to satisfy the notion of evidence based medicine, i.e., one has to develop a method of dose verification, which is not yet available. This review is for researchers, medical doctors and radiation technologists who are developing this field. (author)

  7. 7 CFR 1218.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1218.51 Section 1218.51... § 1218.51 Financial statements. (a) As requested by the Secretary, the Council shall prepare and submit financial statements to the Secretary on a periodic basis. Each such financial statement shall include, but...

  8. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  9. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  10. Objectives of Financial Statements. Report of the Study Group on the Objectives of Financial Statements.

    Science.gov (United States)

    American Inst. of Certified Public Accountants, New York, NY.

    This report discusses the objectives of financial statements. Emphasis is placed on the function of objectives; users, their goals, and their information needs; the primary enterprise goal and earning power; accountability and financial statements; financial statements--reporting on the goal attainment of business enterprises; financial…

  11. The verification of neutron activation analysis support system (cooperative research)

    Energy Technology Data Exchange (ETDEWEB)

    Sasajima, Fumio; Ichimura, Shigeju; Ohtomo, Akitoshi; Takayanagi, Masaji [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Sawahata, Hiroyuki; Ito, Yasuo [Tokyo Univ. (Japan). Research Center for Nuclear Science and Technology; Onizawa, Kouji [Radiation Application Development Association, Tokai, Ibaraki (Japan)

    2000-12-01

    Neutron activation analysis support system is the system in which even the user who has not much experience in the neutron activation analysis can conveniently and accurately carry out the multi-element analysis of the sample. In this verification test, subjects such functions, usability, precision and accuracy of the analysis and etc. of the neutron activation analysis support system were confirmed. As a method of the verification test, it was carried out using irradiation device, measuring device, automatic sample changer and analyzer equipped in the JRR-3M PN-3 facility, and analysis software KAYZERO/SOLCOI based on the k{sub 0} method. With these equipments, calibration of the germanium detector, measurement of the parameter of the irradiation field and analysis of three kinds of environmental standard sample were carried out. The k{sub 0} method adopted in this system is primarily utilized in Europe recently, and it is the analysis method, which can conveniently and accurately carried out the multi-element analysis of the sample without requiring individual comparison standard sample. By this system, total 28 elements were determined quantitatively, and 16 elements with the value guaranteed as analytical data of the NIST (National Institute of Standards and Technology) environment standard sample were analyzed in the accuracy within 15%. This report describes content and verification result of neutron activation support system. (author)

  12. Teaching Philosophy Statements

    Science.gov (United States)

    Faryadi, Qais

    2015-01-01

    This article examines the rationale for my teaching philosophy. Using a personal perspective, I explain my objectives, mission, and vision in writing my philosophy of teaching statements. This article also creates a road map and reference points for educators who want to write their own teaching philosophy statements to help them make informed…

  13. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  14. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  15. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  16. Hanford science and technology needs statements, 2000

    Energy Technology Data Exchange (ETDEWEB)

    BERLIN, G.T.

    1999-07-16

    In the aftermath of the Cold War, the United States has begun addressing the environmental consequences of five decades of nuclear weapons production. In November 1989, DOE established the Office of Environmental Restoration and Waste Management (EM) as the central authority for cleaning up the DOE weapons complex legacy of pollution, for preventing further environmental contamination, and for instituting responsible environmental management. While performing its tasks, EM found that many aspects of its large and complex mission could not be achieved using existing science and technology or without incurring unreasonable costs, risks, or schedule impacts. Consequently, a process was developed to solicit needs from around the DOE complex and focus the science and technology resources of EM-50, the National Laboratories, private industry, and colleges and universities on those needs. This document describes those needs that the Hanford Site has identified as requiring additional science or technology to complete.

  17. Hanford science and technology needs statements, 1999

    Energy Technology Data Exchange (ETDEWEB)

    Berlin, G.T.

    1998-09-30

    In the aftermath of the Cold War, the US has begun addressing the environmental consequences of five decades of nuclear weapons production. In November 1989, DOE established the Office of Environmental Restoration and Waste Management (EM) as the central authority for cleaning up the DOE weapons complex legacy of pollution, for preventing further environmental contamination, and for instituting responsible environmental management. While performing its tasks, EM found that many aspects of its large and complex decisions could not be achieved using existing science and technology or without incurring unreasonable costs, risks, or schedule impacts. Consequently, a process was developed to solicit needs from around the DOE complex and focus the science and technology resources of EM-50, the National Laboratories, private industry, and collages and universities on those needs. This document describes those needs which the Hanford Site has identified as requiring additional science or technology to complete.

  18. Surveillance and Measurement System (SAMS). Innovative Technology Summary Report

    International Nuclear Information System (INIS)

    2001-01-01

    The United States Department of Energy (DOE) continually seeks safer and more cost-effective technologies for the decontamination and decommissioning (D and D) of nuclear facilities. The Deactivation and Decommissioning Focus Area (DDFA) of the DOE's Office of Science and Technology sponsors large-scale demonstration and deployment projects (LSDDPs) to identify and demonstrate technologies that will be safer and more cost-effective. At these LSDDPs, developers and vendors of improved or innovative technologies showcase products that are potentially beneficial to the DOE's projects as well as others in the D and D community. Benefits sought include decreased health and safety risks to personnel and the environment, increased productivity, and decreased cost of operation. The Idaho National Engineering and Environmental Laboratory (INEEL) LSDDP generated a list of need statements defining specific needs or problems where improved technologies could be incorporated into ongoing D and D tasks. Advances in characterization technologies are continuously being sought to decrease the cost of sampling and increase the speed of obtaining results. Currently it can take as long as 90 days to receive isotopic analysis of radioactive samples from laboratories on soil, liquid, and paint samples. The cost to analyze these types of samples for radionuclides is about $150 per sample. This demonstration investigated the feasibility of using the Surveillance and Measurement System (SAMS) (innovative technology) to make in situ isotopic radiation measurements in paint and soil. Sample collection and on-site laboratory analysis (baseline technology) is currently being used on D and D sampling activities. Benefits expected from using the innovative technology include: Significant decrease in time to receive results on radiological samples; Decrease in cost associated with sample collection, preparation, analysis, and disposal; Equivalent data quality to laboratory analysis; and Fewer

  19. Agreements on climatic protection - the verification problem. IKARUS. Instrumente fuer Klimagas-Reduktionsstrategien. Final report. Subproject 9: International Greenhouse Gas Verification

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, W.; Hoffmann, H.J.; Katscher, W.; Kotte, U.; Lauppe, W.D.; Stein, G.

    1995-12-31

    The sustained reduction of climate gas emissions associated with the generation, conversion and utilization of energy is clearly becoming an ever more important task in energy and environmental policy. Different strategies are conceivable in order to fulfil this mission. The aim of the IKARUS Project (Instrumente fuer Klimagas-Reduktionsstrategien - Instruments for Greenhouse Gas Reduction Strategies) was to provide a set of tools with which strategies can be developed and reconstructed (making conceptual use of the various technologies) and also tested with respect to their internal consistency and examined with regard to their economic impacts. Corresponding to the great complexity of the task in hand and the technological range of energy applications, the set of instruments is very extensive. It consists of two parts: a data base with a comprehensive data collection and several computer models of various types.The ``Verification`` project was integrated into IKARUS as a link between the national project and the international environment, enabling the examination of technologies and methods for verifying the compliance of statesparty to the Framwork Convention on Climate Change (FCCC).(orig/KW)

  20. Planning for quality stewardship: The sitewide environmental impact statement

    International Nuclear Information System (INIS)

    Webb, D.

    1995-01-01

    The U.S Department of Energy is responsible for managing many large tracts of Federal land throughout this country. These sites host the nation's nuclear weapons complex, national laboratories, environmental restoration facilities, and serve other uses. The Department faces unique problems in administering this land. Many have multiple activities taking place at the same time; for example, a site may simultaneously be used for energy research, technology development, waste disposal and wildlife habitat. The sites often use radioactive and other hazardous materials and many are contaminated as a result of past management practices. In 1992 the Department institutes a policy, as stated in its National Environmental Policy Act regulations [10 CFR 1021], to prepare sitewide environmental impact statements for its large, multipurpose sites. For the first time, through the sitewide environmental impact statement process, the Department has an effective tool to plan for quality stewardship of the lands and resources entrusted to its care. The sitewide environmental impact statement is a specialized type of programmatic environmental impact statement which allows the Department to look at the geographically connected actions taking place at a given site. The sitewide statement allows a comprehensive look at the operational baseline for the entire site to determine the total cumulative impact of ongoing operations at the site. The Department can identify areas where a change in management practices would mitigate undesirable impacts; areas not at issue could continue under existing practices. As a result, an environmentally-sound operating envelope can be established. This, in turn, can serve in the future as a threshold to decide if new proposals would result in significant impacts to the site as a whole, to simplify future National Environmental Policy Act reviews

  1. Development and utilization of the NRC policy statement on the regulation of advanced nuclear power plants

    International Nuclear Information System (INIS)

    Williams, P.M.; King, T.L.

    1988-06-01

    On March 26, 1985, the US Nuclear Regulatory Commission issued for public comment a ''Proposed Policy for Regulation of Advanced Nuclear Power Plants'' (50 FR 11884). This report presents and discusses the Commission's final version of that policy as titled and published on July 8, 1986 ''Regulation of Advanced Nuclear Power Plants, Statement of Policy'' (51 FR 24643). It provides an overview of comments received from the public, of the significant changes from the proposed Policy Statement to the final Policy Statement, and of the Commission's response to six questions contained in the proposed Policy Statement. The report also discusses the definition for advanced reactors, the establishment of an Advanced Reactors Group, the staff review approach and information needs, and the utilization of the Policy Statement in relation to other NRC programs, including the policies for safety goals, severe accidents and standardization. In addition, guidance for advanced reactors with respect to operating experience, technology development, foreign information and data, and prototype testing is provided. Finally, a discussion on the use of less prescriptive and nonprescriptive design criteria for advanced reactors, which the Policy Statement encourages, is presented

  2. System design and verification process for LHC programmable trigger electronics

    CERN Document Server

    Crosetto, D

    1999-01-01

    The rapid evolution of electronics has made it essential to design systems in a technology-independent form that will permit their realization in any future technology. This article describes two practical projects that have been developed for fast, programmable, scalable, modular electronics for the first-level trigger of Large Hadron Collider (LHC) experiments at CERN, Geneva. In both projects, one for the front-end electronics and the second for executing first- level trigger algorithms, the whole system requirements were constrained to two types of replicated components. The overall problem is described, the 3D-Flow design is introduced as a novel solution, and current solutions to the problem are described and compared with the 3D-Flow solution. The design/verification methodology proposed allows the user's real-time system algorithm to be verified down to the gate-level simulation on a technology- independent platform, thus yielding the design for a system that can be implemented with any technology at ...

  3. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  4. Gender Verification of Female Olympic Athletes.

    Science.gov (United States)

    Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

    2002-01-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

  5. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  6. Validation of Embedded System Verification Models

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.

    The result of a model-based requirements verification shows that the model of a system satisfies (or not) formalised system requirements. The verification result is correct only if the model represents the system adequately. No matter what modelling technique we use, what precedes the model

  7. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  8. Virtual reality verification of workplace design guidelines for the process plant control room

    International Nuclear Information System (INIS)

    Droeivoldsmo, Asgeir; Nystad, Espen; Helgar, Stein

    2001-02-01

    Early identification of potential human factors guideline-violations and corrective input into the design process is desired for efficient and cost-effective control room design. Virtual reality (VR) technology makes it possible to perform evaluation of the design of the control room at an early stage of the design process, but can we trust the results from such evaluations? This paper describes an experimental validation of a VR model against the real world in five different guideline verification tasks. Results indicate that guideline verification in the VR model can be done with satisfactory accuracy for a number of evaluations. However, some guideline categories require further development of measurement tools and use of a model with higher resolution than the model used in this study. (Author). 30 refs., 4 figs., 1 tab

  9. Management of commercial high-level and transuranium-contaminated radioactive wastes. Environmental statement

    International Nuclear Information System (INIS)

    1974-09-01

    This Draft Environmental Statement is issued to assess the environmental impact of the AEC's program to manage commercial high-level and transuranium-contaminated radioactive wastes. These are the types of commercial radioactive wastes for which AEC custody is required by present or anticipated regulations. The program consists of three basic parts: development of a Retrievable Surface Storage Facility (RSSF) for commercial high-level waste, using existing technology; evaluating geological formations and sites for the development of a Geological Disposal Pilot Plant (GDPP) which would lead to permanent disposal; and providing retrievable storage for the transuranium-contaminated waste pending availability of permanent disposal. Consideration has been given to all environmental aspects of the program, using waste generation projections through the year 2000. Radiological and other impacts of implementing the program are expected to be minimal, but will be discussed in further environmental statements which will support budget actions for specific repositories. The alternatives discussed in this Draft Environmental Statement are presented. (U.S.)

  10. Photon technology. Hard photon technology; Photon technology. Hard photon gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    Research results of hard photon technology have been summarized as a part of novel technology development highly utilizing the quantum nature of photon. Hard photon technology refers to photon beam technologies which use photon in the 0.1 to 200 nm wavelength region. Hard photon has not been used in industry due to the lack of suitable photon sources and optical devices. However, hard photon in this wavelength region is expected to bring about innovations in such areas as ultrafine processing and material synthesis due to its atom selective reaction, inner shell excitation reaction, and spatially high resolution. Then, technological themes and possibility have been surveyed. Although there are principle proposes and their verification of individual technologies for the technologies of hard photon generation, regulation and utilization, they are still far from the practical applications. For the photon source technology, the laser diode pumped driver laser technology, laser plasma photon source technology, synchrotron radiation photon source technology, and vacuum ultraviolet photon source technology are presented. For the optical device technology, the multi-layer film technology for beam mirrors and the non-spherical lens processing technology are introduced. Also are described the reduction lithography technology, hard photon excitation process, and methods of analysis and measurement. 430 refs., 165 figs., 23 tabs.

  11. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  12. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  13. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  14. Fundamentals of Financial Statements Audit

    OpenAIRE

    World Bank

    2011-01-01

    The purpose of an audit is to enhance the degree of confidence of intended users in the financial statements. The objective of an audit of financial statements is to enable an auditor to express an opinion as to whether the financial statements are prepared, in all material respects, in accordance with International Financial Reporting Standards or another identified financial reporting fr...

  15. Annual report and accounting statements 2007: ELETROBRAS; Relatorio anual e demonstracoes contabeis 2007: ELETROBRAS

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    This document reports the actives of the ELETROBRAS during the year 2007 related to: electricity market, international activities, strategic planning, financial indicators, business analysis, relationship with investors, energy marketing, operational research, technological development, financial statements, social responsibility and environment

  16. A Model for Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2015-01-01

    Runtime verification concerns checking whether a system execution satisfies a given property. In this paper we propose a model for collaborative runtime verification where a network of local monitors collaborates in order to verify properties of the system. A local monitor has only a local view on

  17. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  18. Self-verification and contextualized self-views.

    Science.gov (United States)

    Chen, Serena; English, Tammy; Peng, Kaiping

    2006-07-01

    Whereas most self-verification research has focused on people's desire to verify their global self-conceptions, the present studies examined self-verification with regard to contextualized selfviews-views of the self in particular situations and relationships. It was hypothesized that individuals whose core self-conceptions include contextualized self-views should seek to verify these self-views. In Study 1, the more individuals defined the self in dialectical terms, the more their judgments were biased in favor of verifying over nonverifying feedback about a negative, situation-specific self-view. In Study 2, consistent with research on gender differences in the importance of relationships to the self-concept, women but not men showed a similar bias toward feedback about a negative, relationship-specific self-view, a pattern not seen for global self-views. Together, the results support the notion that self-verification occurs for core self-conceptions, whatever form(s) they may take. Individual differences in self-verification and the nature of selfhood and authenticity are discussed.

  19. Verification of RESRAD-build computer code, version 3.1

    International Nuclear Information System (INIS)

    2003-01-01

    RESRAD-BUILD is a computer model for analyzing the radiological doses resulting from the remediation and occupancy of buildings contaminated with radioactive material. It is part of a family of codes that includes RESRAD, RESRAD-CHEM, RESRAD-RECYCLE, RESRAD-BASELINE, and RESRAD-ECORISK. The RESRAD-BUILD models were developed and codified by Argonne National Laboratory (ANL); version 1.5 of the code and the user's manual were publicly released in 1994. The original version of the code was written for the Microsoft DOS operating system. However, subsequent versions of the code were written for the Microsoft Windows operating system. The purpose of the present verification task (which includes validation as defined in the standard) is to provide an independent review of the latest version of RESRAD-BUILD under the guidance provided by ANSI/ANS-10.4 for verification and validation of existing computer programs. This approach consists of a posteriori V and V review which takes advantage of available program development products as well as user experience. The purpose, as specified in ANSI/ANS-10.4, is to determine whether the program produces valid responses when used to analyze problems within a specific domain of applications, and to document the level of verification. The culmination of these efforts is the production of this formal Verification Report. The first step in performing the verification of an existing program was the preparation of a Verification Review Plan. The review plan consisted of identifying: Reason(s) why a posteriori verification is to be performed; Scope and objectives for the level of verification selected; Development products to be used for the review; Availability and use of user experience; and Actions to be taken to supplement missing or unavailable development products. The purpose, scope and objectives for the level of verification selected are described in this section of the Verification Report. The development products that were used

  20. National Accounts Energy Alliance : Field test and verification of CHP components and systems

    Energy Technology Data Exchange (ETDEWEB)

    Sweetser, R. [Exergy Partners Corporation, Herndon, VA (United States)

    2003-07-01

    Exergy is a consulting firm which specializes in capitalizing on opportunities that result from the nexus of utility deregulation and global climate change in both the construction and energy industries. The firm offers assistance in technical business and market planning, product development and high impact marketing and technology transfer programs. The author discussed National Accounts Energy Alliance (NAEA) program on distributed energy resources (DER) and identified some advantageous areas such as homeland security (less possible terrorist targets to be protected), food safety (protection of food supply and delivery system), reliability, power quality, energy density, grid congestion and energy price. In the future, an essential role in moderating energy prices for commercial buildings will probably be played by distributed generation (DG) and combined heat and power (CHP). The technical merits of these technologies is being investigated by national accounts and utilities partnering with non-profit organizations, the United States Department of Energy (US DOE), state governments and industry. In that light, in 2001 an Alliance program was developed, which allows investors to broaden their knowledge from the application and verification of Advanced Energy Technologies. This program was the result of a synergy between the American Gas Foundation and the Gas Technology Institute (GTI), and it assists investors with their strategic planning. It was proven that a customer-led Energy Technology Test and Verification Program (TA and VP) could be cost-effective and successful. The NAEA activities in five locations were reviewed and discussed. They were: (1) Russell Development, Portland, Oregon; (2) A and P-Waldbaums, Hauppage, New York; (3) HEB, Southern, Texas; (4) Cinemark, Plano, Texas; and McDonald's, Tampa, Florida. 4 tabs., figs.

  1. Introductory statement to the Board of Governors, 5 March 2007, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    The agenda for the meeting includes nuclear technology, safety and verification - all three of the Agency's areas of activity. In his introductory statement to the Board of Governors, 05 March 2007, the Director General of the IAEA, discussed the status and trends concerning nuclear power which will have an increasing role as part of the global energy mix and that the growth in demand will mainly be from developing countries. He presented the 'Nuclear technology Review 2007' and an information document entitled 'Considerations to Launch a Nuclear power Programme'. To assist with subsequent steps in nuclear power planning the IAEA has established an inter-departmental nuclear power support programme. The IAEA has also produced an information document summarizing key considerations from all perspectives like safety, security, infrastructure development, technical cooperation, legal considerations and others. The Agency's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO) is moving to phase 2. The IAEA is also developing common user requirements for small and medium size reactors. The 'Nuclear Safety Review for the Year 2006' provides an overview of current and emerging nuclear safety trends and issues. The newly established 'Integrated Regulatory Review Service (IRRS)' is intended to help Member States enhance their legislative and regulatory infrastructures, and to harmonize regulatory approaches in all areas of safety. Two workshop on the shipment of radioactive material are scheduled for latin America and Asia. Concerning the issue of nuclear verification the status of safeguards agreements and additional protocols was discussed. The return of IAEA personnel to the Democratic People's Republic of Korea is envisioned to conduct all necessary monitoring and verification as agreed by the IAEA and the DPRK. The report on the implementation of the NPT safeguards agreement and relevant provisions of UN Security Council resolution 1737 in the

  2. 17 CFR 250.28 - Inconsistent financial statements.

    Science.gov (United States)

    2010-04-01

    ... Accounts § 250.28 Inconsistent financial statements. Except as otherwise authorized or required by the..., financial statements which are inconsistent with the book accounts of such company or financial statements... prevent the distribution or publication of reasonable condensations or of unaudited financial statements...

  3. Meaning of counterfactual statements in quantum physics

    International Nuclear Information System (INIS)

    Stapp, H.P.

    1998-01-01

    David Mermin suggests that my recent proof pertaining to quantum nonlocality is undermined by an essential ambiguity pertaining to the meaning of counterfactual statements in quantum physics. The ambiguity he cites arises from his imposition of a certain criterion for the meaningfulness of such counterfactual statements. That criterion conflates the meaning of a counterfactual statement with the details of a proof of its validity in such a way as to make the meaning of such a statement dependent upon the context in which it occurs. That dependence violates the normal demand in logic that the meaning of a statement be defined by the words in the statement itself, not by the context in which the statement occurs. My proof conforms to that normal requirement. I describe the context-independent meaning within my proof of the counterfactual statements in question. copyright 1998 American Association of Physics Teachers

  4. 75 FR 39621 - Proposed Information Collection (Income-Net Worth and Employment Statement) Activity: Comment...

    Science.gov (United States)

    2010-07-09

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0002] Proposed Information Collection (Income-Net Worth and Employment Statement) Activity: Comment Request AGENCY: Veterans Benefits Administration... techniques or the use of other forms of information technology. Title: Income-Net Worth and Employment...

  5. 77 FR 20888 - Proposed Information Collection (Income, Net Worth, and Employment Statement) Activity: Comment...

    Science.gov (United States)

    2012-04-06

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0002] Proposed Information Collection (Income, Net Worth, and Employment Statement) Activity: Comment Request AGENCY: Veterans Benefits... techniques or the use of other forms of information technology. Title: Income, Net Worth, and Employment...

  6. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    Science.gov (United States)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  7. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... use of information on the statements shall be limited to that necessary to carry out the purposes of... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary...

  8. 48 CFR 52.247-6 - Financial Statement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Financial Statement. 52....247-6 Financial Statement. As prescribed in 47.207-1(e), insert the following provision in... furnish financial statements: Financial Statement (APR 1984) The offeror shall, upon request, promptly...

  9. Hanford Waste Vitrification Plant applied technology plan

    International Nuclear Information System (INIS)

    Kruger, O.L.

    1990-09-01

    This Applied Technology Plan describes the process development, verification testing, equipment adaptation, and waste form qualification technical issues and plans for resolution to support the design, permitting, and operation of the Hanford Waste Vitrification Plant. The scope of this Plan includes work to be performed by the research and development contractor, Pacific Northwest Laboratory, other organizations within Westinghouse Hanford Company, universities and companies with glass technology expertise, and other US Department of Energy sites. All work described in this Plan is funded by the Hanford Waste Vitrification Plant Project and the relationship of this Plan to other waste management documents and issues is provided for background information. Work to performed under this Plan is divided into major areas that establish a reference process, develop an acceptable glass composition envelope, and demonstrate feed processing and glass production for the range of Hanford Waste Vitrification Plant feeds. Included in this work is the evaluation and verification testing of equipment and technology obtained from the Defense Waste Processing Facility, the West Valley Demonstration Project, foreign countries, and the Hanford Site. Development and verification of product and process models and other data needed for waste form qualification documentation are also included in this Plan. 21 refs., 4 figs., 33 tabs

  10. Technological risk

    Energy Technology Data Exchange (ETDEWEB)

    Dierkes, M; Coppock, R; Edwards, S

    1980-01-01

    The book begins with brief statements from representatives of political organizations. Part II presents an overview of the discussion about the control and management of technological progress. Parts III and IV discuss important elements in citizens' perception of technological risks and the development of consensus on how to deal with them. In Part V practical problems in the application of risk assessment and management, and in Part VI additional points are summarized.

  11. Technological risk

    International Nuclear Information System (INIS)

    Dierkes, M.; Coppock, R.; Edwards, S.

    1980-01-01

    The book begins with brief statements from representatives of political organizations. Part II presents an overview of the discussion about the control and management of technological progress. Parts III and IV discuss important elements in citizens' perception of technological risks and the development of consensus on how to deal with them. In Part V practical problems in the application of risk assessment and management, and in Part VI additional points are summarized. (DG)

  12. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  13. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  14. 32 CFR 651.23 - Environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Environmental impact statement. 651.23 Section...) ENVIRONMENTAL QUALITY ENVIRONMENTAL ANALYSIS OF ARMY ACTIONS (AR 200-2) Records and Documents § 651.23 Environmental impact statement. An Environmental Impact statement (EIS) is a detailed written statement required...

  15. 46 CFR 504.7 - Environmental impact statements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Environmental impact statements. 504.7 Section 504.7... POLICY ANALYSIS § 504.7 Environmental impact statements. (a) General. (1) An environmental impact... environmental impact statements. (1) A draft environmental impact statement (DEIS) will initially be prepared in...

  16. 22 CFR 216.7 - Environmental impact statements.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Environmental impact statements. 216.7 Section... Environmental impact statements. (a) Applicability. An Environmental Impact Statement shall be prepared when... Environmental Impact Statement relating to paragraph (a)(2) of this section shall comply with the CEQ...

  17. Verification of DRAGON: the NXT tracking module

    International Nuclear Information System (INIS)

    Zkiek, A.; Marleau, G.

    2007-01-01

    The version of DRAGON-IST that has been verified for the calculation of the incremental cross sections associated with CANDU reactivity devices is version 3.04Bb that was released in 2001. Since then, various improvements were implemented in the code including the NXT: module that can track assemblies of clusters in 2-D and 3-D geometries. Here we will discuss the verification plan for the NXT: module of DRAGON, illustrate the verification procedure we selected and present our verification results. (author)

  18. Environmental impact statement law and environmental impact statement administration regulation

    International Nuclear Information System (INIS)

    Feldmann, F.J.

    1991-01-01

    The contribution does not deal with the question - as might be suggested by the heading - that the execution of the environmental impact statement law might be uncertain if there are no further accompanying legal transformatory acts. Putting the environmental impact statements into action is concerned in partiuclar with procedural provisions regarding the Federal Act on Protection against Nuisances and the Atomic Energy Act. The author deals with aspects of the environmental impact statement law and the state-of-the-art achieved so far. He also deals with legislative intent, with further points of putting the law into practice, i.e. the information requirements in the administrative provisions and the integrating aspect, the amalgamating aspect, the requirements made on the state of the environment, and the significance of administrative provisions. Also treated are legal procedures in the Federal Laender and on an international level. (RST) [de

  19. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  20. GASB Statement No. 3 Guides Deposits, Investments.

    Science.gov (United States)

    Barker, Linda A.

    1986-01-01

    Discusses an April 1986 Governmental Accounting Standards Board statement concerning disclosures of repurchase and reverse repurchase agreements. The statement tries to help financial statement users assess the risks a goverment entity takes when investing public funds. It is effective for financial statement periods ending after December 15,…

  1. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  2. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  3. Safety Verification for Probabilistic Hybrid Systems

    DEFF Research Database (Denmark)

    Zhang, Lijun; She, Zhikun; Ratschan, Stefan

    2010-01-01

    The interplay of random phenomena and continuous real-time control deserves increased attention for instance in wireless sensing and control applications. Safety verification for such systems thus needs to consider probabilistic variations of systems with hybrid dynamics. In safety verification o...... on a number of case studies, tackled using a prototypical implementation....

  4. 42 CFR 460.208 - Financial statements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Financial statements. 460.208 Section 460.208... ELDERLY (PACE) Data Collection, Record Maintenance, and Reporting § 460.208 Financial statements. (a... must submit a certified financial statement that includes appropriate footnotes. (2) The financial...

  5. Position Statement on Active Outdoor Play

    Science.gov (United States)

    Tremblay, Mark S.; Gray, Casey; Babcock, Shawna; Barnes, Joel; Costas Bradstreet, Christa; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-01-01

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9) and cross-sectorial individuals/organizations (N = 17), and an extensive stakeholder consultation process (N = 1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development. PMID:26062040

  6. Position Statement on Active Outdoor Play.

    Science.gov (United States)

    Tremblay, Mark S; Gray, Casey; Babcock, Shawna; Barnes, Joel; Bradstreet, Christa Costas; Carr, Dawn; Chabot, Guylaine; Choquette, Louise; Chorney, David; Collyer, Cam; Herrington, Susan; Janson, Katherine; Janssen, Ian; Larouche, Richard; Pickett, William; Power, Marlene; Sandseter, Ellen Beate Hansen; Simon, Brenda; Brussoni, Mariana

    2015-06-08

    A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3-12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky) outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N=9) and cross-sectorial individuals/organizations (N=17), and an extensive stakeholder consultation process (N=1908). More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: "Access to active play in nature and outdoors--with its risks--is essential for healthy child development. We recommend increasing children's opportunities for self-directed play outdoors in all settings--at home, at school, in child care, the community and nature." The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  7. Position Statement on Active Outdoor Play

    Directory of Open Access Journals (Sweden)

    Mark S. Tremblay

    2015-06-01

    Full Text Available A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9 and cross-sectorial individuals/organizations (N = 17, and an extensive stakeholder consultation process (N = 1908. More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  8. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT. STORMWATER SOURCE AREA TREATMENT DEVICE. THE TERRE HILL CONCRETE PRODUCTS TERRE KLEEN™ 09

    Science.gov (United States)

    Verification testing of the Terre Hill Concrete Products Terre Kleen™ 09 was conducted on a 1.27 acre portion of the City of Harrisburg, Pennsylvania Department of Public Works facility. The Terre Kleen™ devices combines primary and secondary chambers, baffles, a screen, and incl...

  10. Which technology to select for primary focal treatment of prostate cancer?-European Section of Urotechnology (ESUT) position statement.

    Science.gov (United States)

    Ganzer, Roman; Arthanareeswaran, Vinodh Kumar Adithyaa; Ahmed, Hashim U; Cestari, Andrea; Rischmann, Pascal; Salomon, Georg; Teber, Dogu; Liatsikos, Evangelos; Stolzenburg, Jens-Uwe; Barret, Eric

    2018-05-09

    With growing interest in focal therapy (FT) of prostate cancer (PCa) there is an increasing armamentarium of treatment modalities including high-intensity focused ultrasound (HIFU), cryotherapy, focal laser ablation (FLA), irreversible electroporation (IRE), vascular targeted photodynamic therapy (VTP), focal brachytherapy (FBT) and stereotactic ablative radiotherapy (SABR). Currently there are no clear recommendations as to which of these technologies are appropriate for individual patient characteristics. Our intention was to review the literature for special aspects of the different technologies that might be of advantage depending on individual patient and tumour characteristics. The current literature on FT was screened for the following factors: morbidity, repeatability, tumour risk category, tumour location, tumour size and prostate volume and anatomical issues. The ESUT expert panel arrived at consensus regarding a position statement on a structured pathway for available FT technologies based on a combination of the literature and expert opinion. Side effects were low across different studies and FT modalities with urinary continence rates of 90-100% and erectile dysfunction between 5 and 52%. Short to medium cancer control based on post-treatment biopsies were variable between ablative modalities. Expert consensus suggested that posterior lesions are better amenable to FT using HIFU. Cryotherapy provides best possible outcomes for anterior tumours. Apical lesions, when treated with FBT, may yield the least urethral morbidity. Further prospective trials are required to assess medium to long term disease control of different ablative modalities for FT. Amongst different available FT modalities our ESUT expert consensus suggests that some may be better for diffe`rent tumour locations. Tumour risk, tumour size, tumour location, and prostate volume are all important factors to consider and might aid in designing future FT trials.

  11. Lessons Learned From Microkernel Verification — Specification is the New Bottleneck

    Directory of Open Access Journals (Sweden)

    Thorsten Bormer

    2012-11-01

    Full Text Available Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software systems is rare – for reasons beyond the large scale of verification effort needed due to the size alone. In this paper we report on lessons learned for verification of large software systems based on the experience gained in microkernel verification in the Verisoft XT project. We discuss a number of issues that impede widespread introduction of formal verification in the software life-cycle process.

  12. The verification of DRAGON: progress and lessons learned

    International Nuclear Information System (INIS)

    Marleau, G.

    2002-01-01

    The general requirements for the verification of the legacy code DRAGON are somewhat different from those used for new codes. For example, the absence of a design manual for DRAGON makes it difficult to confirm that the each part of the code performs as required since these requirements are not explicitly spelled out for most of the DRAGON modules. In fact, this conformance of the code can only be assessed, in most cases, by making sure that the contents of the DRAGON data structures, which correspond to the output generated by a module of the code, contains the adequate information. It is also possible in some cases to use the self-verification options in DRAGON to perform additional verification or to evaluate, using an independent software, the performance of specific functions in the code. Here, we will describe the global verification process that was considered in order to bring DRAGON to an industry standard tool-set (IST) status. We will also discuss some of the lessons we learned in performing this verification and present some of the modification to DRAGON that were implemented as a consequence of this verification. (author)

  13. Simulation Environment Based on the Universal Verification Methodology

    CERN Document Server

    AUTHOR|(SzGeCERN)697338

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC desi...

  14. Advanced control and instrumentation systems in nuclear power plants. Design, verification and validation

    International Nuclear Information System (INIS)

    Haapanen, P.

    1995-01-01

    The Technical Committee Meeting on design, verification and validation of advanced control and instrumentation systems in nuclear power plants was held in Espoo, Finland on 20 - 23 June 1994. The meeting was organized by the International Atomic Energy Agency's (IAEA) International Working Group's (IWG) on Nuclear Power Plant Control and Instrumentation (NPPCI) and on Advanced Technologies for Water Cooled Reactors (ATWR). VTT Automation together with Imatran Voima Oy and Teollisuuden Voima Oy responded about the practical arrangements of the meeting. In total 96 participants from 21 countries and the Agency took part in the meeting and 34 full papers and 8 posters were presented. Following topics were covered in the papers: (1) experience with advanced and digital systems, (2) safety and reliability analysis, (3) advanced digital systems under development and implementation, (4) verification and validation methods and practices, (5) future development trends. (orig.)

  15. 7 CFR 4280.140 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4280.140 Section 4280.140... Efficiency Improvements Program Section B. Guaranteed Loans § 4280.140 Financial statements. (a) The... financial statements, at its sole discretion when the Agency is concerned about the applicant's credit risk. ...

  16. 40 CFR 156.68 - First aid statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false First aid statement. 156.68 Section... aid statement. (a) Product as sold and distributed. Each product must bear a first aid statement if... with water prior to use, the label may also include a statement describing how the first aid measures...

  17. A CONTENT ANALYSIS OF THE MISSION STATEMENTS OF IRAN, TURKEY, INDIA AND UNITED STATES PHARMACEUTICAL COMPANIES

    Directory of Open Access Journals (Sweden)

    Shahriar AZIZI

    2014-06-01

    Full Text Available Pharmaceutical companies play a critical role in healthcare economy. Articulating mission statement of a Pharmaceutical company results in guiding strategies and activities of the firm. In this survey, mission statements of Iranian, Turkish, Indian and American pharmaceutical companies are analyzed. By using content analysis, frequencies of nine elements of the mission statement according to Fred R. David including: customers, product/service, market, technology, survival/growth/profitability, philosophy, self-perception, public image and employee were investigated. 98 mission statements of pharmaceutical companies (32 iranain companies, 16 Turkish companies, 30 Indian companies, and 20 American companies were analyzed. Simple correspondence analysis was used to extract the perceptual map. Results indicate that two dimensions of perceptual map include: focus of mission (throughput or input/output, and focus of mission elements (market or support. Iranian companies placed on the quarter of throughput /support, American and Turkish companies placed on the quarter of throughput/market. Indian companies placed on the quarter of input and output/market.

  18. Hierarchical Representation Learning for Kinship Verification.

    Science.gov (United States)

    Kohli, Naman; Vatsa, Mayank; Singh, Richa; Noore, Afzel; Majumdar, Angshul

    2017-01-01

    Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinship-cues. The visual stimuli presented to the participants determine their ability to recognize kin relationship using the whole face as well as specific facial regions. The effect of participant gender and age and kin-relation pair of the stimulus is analyzed using quantitative measures such as accuracy, discriminability index d' , and perceptual information entropy. Utilizing the information obtained from the human study, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner. We propose a novel approach for feature representation termed as filtered contractive deep belief networks (fcDBN). The proposed feature representation encodes relational information present in images using filters and contractive regularization penalty. A compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is utilized to verify the kin accurately. A new WVU kinship database is created, which consists of multiple images per subject to facilitate kinship verification. The results show that the proposed deep learning framework (KVRL-fcDBN) yields the state-of-the-art kinship verification accuracy on the WVU kinship database and on four existing benchmark data sets. Furthermore, kinship information is used as a soft biometric modality to boost the performance of face verification via product of likelihood ratio and support vector machine based approaches. Using the proposed KVRL-fcDBN framework, an improvement of over 20% is observed in the performance of face verification.

  19. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  20. X-ray volume imaging in bladder radiotherapy verification

    International Nuclear Information System (INIS)

    Henry, Ann M.; Stratford, Julia; McCarthy, Claire; Davies, Julie; Sykes, Jonathan R.; Amer, Ali; Marchant, Tom; Cowan, Richard; Wylie, James; Logue, John; Livsey, Jacqueline; Khoo, Vincent S.; Moore, Chris; Price, Pat

    2006-01-01

    Purpose: To assess the clinical utility of X-ray volume imaging (XVI) for verification of bladder radiotherapy and to quantify geometric error in bladder radiotherapy delivery. Methods and Materials: Twenty subjects undergoing conformal bladder radiotherapy were recruited. X-ray volume images and electronic portal images (EPIs) were acquired for the first 5 fractions and then once weekly. X-ray volume images were co-registered with the planning computed tomography scan and clinical target volume coverage assessed in three dimensions (3D). Interfraction bladder volume change was described by quantifying changes in bladder volume with time. Bony setup errors were compared from both XVI and EPI. Results: The bladder boundary was clearly visible on coronal XVI views in nearly all images, allowing accurate 3D treatment verification. In 93.5% of imaged fractions, the clinical target volume was within the planning target volume. Most subjects displayed consistent bladder volumes, but 25% displayed changes that could be predicted from the first three XVIs. Bony setup errors were similar whether calculated from XVI or EPI. Conclusions: Coronal XVI can be used to verify 3D bladder radiotherapy delivery. Image-guided interventions to reduce geographic miss and normal tissue toxicity are feasible with this technology

  1. Self-verification motives at the collective level of self-definition.

    Science.gov (United States)

    Chen, Serena; Chen, Karen Y; Shaw, Lindsay

    2004-01-01

    Three studies examined self-verification motives in relation to collective aspects of the self. Several moderators of collective self-verification were also examined--namely, the certainty with which collective self-views are held, the nature of one's ties to a source of self-verification, the salience of the collective self, and the importance of group identification. Evidence for collective self-verification emerged across all studies, particularly when collective self-views were held with high certainty (Studies 1 and 2), perceivers were somehow tied to the source of self-verification (Study 1), the collective self was salient (Study 2), and group identification was important (Study 3). To the authors' knowledge, these studies are the first to examine self-verification at the collective level of self-definition. The parallel and distinct ways in which self-verification processes may operate at different levels of self-definition are discussed.

  2. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be in...

  3. 7 CFR 1209.239 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1209.239 Section 1209.239..., AND CONSUMER INFORMATION ORDER Rules and Regulations General § 1209.239 Financial statements. (a) As requested by the Secretary, the Council shall prepare and submit financial statements to the Secretary on a...

  4. 7 CFR 29.2 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION Policy Statement and Regulations Governing the Extension of Tobacco Inspection and Price Support Services to New Markets and to Additional Sales on Designated Markets § 29.2 Policy statement. Inspection... 7 Agriculture 2 2010-01-01 2010-01-01 false Policy statement. 29.2 Section 29.2 Agriculture...

  5. 7 CFR 29.9402 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION Policy Statement and Regulations Governing Availability of Tobacco Inspection and Price Support Services to Flue-Cured Tobacco on Designated Markets § 29.9402 Policy statement. The sets of inspectors... 7 Agriculture 2 2010-01-01 2010-01-01 false Policy statement. 29.9402 Section 29.9402 Agriculture...

  6. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  7. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  8. Autonomic networking-on-chip bio-inspired specification, development, and verification

    CERN Document Server

    Cong-Vinh, Phan

    2011-01-01

    Despite the growing mainstream importance and unique advantages of autonomic networking-on-chip (ANoC) technology, Autonomic Networking-On-Chip: Bio-Inspired Specification, Development, and Verification is among the first books to evaluate research results on formalizing this emerging NoC paradigm, which was inspired by the human nervous system. The FIRST Book to Assess Research Results, Opportunities, & Trends in ""BioChipNets"" The third book in the Embedded Multi-Core Systems series from CRC Press, this is an advanced technical guide and reference composed of contributions from prominent re

  9. Design and verification of bituminous mixtures with the increased content of reclaimed asphalt pavement

    Science.gov (United States)

    Bańkowski, Wojciech; Król, Jan; Gałązka, Karol; Liphardt, Adam; Horodecka, Renata

    2018-05-01

    Recycling of bituminous pavements is an issue increasingly being discussed in Poland. The analysis of domestic and foreign experience indicates a need to develop this technology in our country, in particular the hot feeding and production technologies. Various steps are being taken in this direction, including research projects. One of them is the InnGA project entitled: “Reclaimed asphalt pavement: Innovative technology of bituminous mixtures using material from reclaimed asphalt pavement”. The paper presents the results of research involving the design of bituminous mixtures in accordance with the required properties and in excess of the content of reclaimed asphalt permitted by the technical guidelines. It presents selected bituminous mixtures with the content of RAP of up to 50% and the results of tests from verification of industrial production of those mixtures. The article discusses the details of the design process of mixtures with a high content of reclaimed asphalt, the carried out production tests and discusses the results of tests under the verification of industrial production. Testing included basic tests according to the Polish technical requirements of WT- 2 and the extended functional testing. The conducted tests and analyses helped to determine the usefulness of the developed bituminous mixtures for use in experimental sections and confirmed the possibility of using an increased amount of reclaimed asphalt up to 50% in mixtures intended for construction of national roads.

  10. CEA - 2012 Annual Report, 2012 Financial Statements

    International Nuclear Information System (INIS)

    2013-01-01

    In its first part, this report proposes an overview of activities within the CEA. They concern the CEA's programs on low on carbon energies and associated fundamental researches, on defence and global security and associated fundamental researches, on information technologies and associated fundamental researches, on health technologies and associated fundamental researches, and on very large research infrastructures and associated fundamental researches. The second part addresses the scientific assessment, activities related to teaching and training, to innovation towards enterprises, and to support to valorization. It also indicates prices awarded to the CEA. The third part addresses CEA management and institutional relationships, human resources, international relationships, activities related to communication and information diffusion, and risk management. The fourth part describes the CEA organization, its governance and its various bodies. The second volume contains the financial statements for 2012

  11. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms of...

  12. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  13. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  14. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  15. Corporate Information Management Financial Statements

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1995-01-01

    The audit objective was to determine whether the OASD(C31) methods for preparing FY 1996 CIM, general purpose financial statements will result in auditable and complete general purpose financial statements...

  16. DarcyTools, Version 2.1. Verification and validation

    International Nuclear Information System (INIS)

    Svensson, Urban

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  17. Verification and quality control of routine hematology analyzers.

    Science.gov (United States)

    Vis, J Y; Huisman, A

    2016-05-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and linearity throughout the expected range of results. Yet, which standard should be met or which verification limit be used is at the discretion of the laboratory specialist. This paper offers practical guidance on verification and quality control of automated hematology analyzers and provides an expert opinion on the performance standard that should be met by the contemporary generation of hematology analyzers. Therefore (i) the state-of-the-art performance of hematology analyzers for complete blood count parameters is summarized, (ii) considerations, challenges, and pitfalls concerning the development of a verification plan are discussed, (iii) guidance is given regarding the establishment of reference intervals, and (iv) different methods on quality control of hematology analyzers are reviewed. © 2016 John Wiley & Sons Ltd.

  18. DarcyTools, Version 2.1. Verification and validation

    Energy Technology Data Exchange (ETDEWEB)

    Svensson, Urban [Computer-aided Fluid Engineering AB, Norrkoeping (Sweden)

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  19. Simulation based mask defect repair verification and disposition

    Science.gov (United States)

    Guo, Eric; Zhao, Shirley; Zhang, Skin; Qian, Sandy; Cheng, Guojie; Vikram, Abhishek; Li, Ling; Chen, Ye; Hsiang, Chingyun; Zhang, Gary; Su, Bo

    2009-10-01

    As the industry moves towards sub-65nm technology nodes, the mask inspection, with increased sensitivity and shrinking critical defect size, catches more and more nuisance and false defects. Increased defect counts pose great challenges in the post inspection defect classification and disposition: which defect is real defect, and among the real defects, which defect should be repaired and how to verify the post-repair defects. In this paper, we address the challenges in mask defect verification and disposition, in particular, in post repair defect verification by an efficient methodology, using SEM mask defect images, and optical inspection mask defects images (only for verification of phase and transmission related defects). We will demonstrate the flow using programmed mask defects in sub-65nm technology node design. In total 20 types of defects were designed including defects found in typical real circuit environments with 30 different sizes designed for each type. The SEM image was taken for each programmed defect after the test mask was made. Selected defects were repaired and SEM images from the test mask were taken again. Wafers were printed with the test mask before and after repair as defect printability references. A software tool SMDD-Simulation based Mask Defect Disposition-has been used in this study. The software is used to extract edges from the mask SEM images and convert them into polygons to save in GDSII format. Then, the converted polygons from the SEM images were filled with the correct tone to form mask patterns and were merged back into the original GDSII design file. This merge is for the purpose of contour simulation-since normally the SEM images cover only small area (~1 μm) and accurate simulation requires including larger area of optical proximity effect. With lithography process model, the resist contour of area of interest (AOI-the area surrounding a mask defect) can be simulated. If such complicated model is not available, a simple

  20. Verification-Based Interval-Passing Algorithm for Compressed Sensing

    OpenAIRE

    Wu, Xiaofu; Yang, Zhen

    2013-01-01

    We propose a verification-based Interval-Passing (IP) algorithm for iteratively reconstruction of nonnegative sparse signals using parity check matrices of low-density parity check (LDPC) codes as measurement matrices. The proposed algorithm can be considered as an improved IP algorithm by further incorporation of the mechanism of verification algorithm. It is proved that the proposed algorithm performs always better than either the IP algorithm or the verification algorithm. Simulation resul...

  1. Multi-canister overpack project - verification and validation, MCNP 4A

    International Nuclear Information System (INIS)

    Goldmann, L.H.

    1997-01-01

    This supporting document contains the software verification and validation (V and V) package used for Phase 2 design of the Spent Nuclear Fuel Multi-Canister Overpack. V and V packages for both ANSYS and MCNP are included. Description of Verification Run(s): This software requires that it be compiled specifically for the machine it is to be used on. Therefore to facilitate ease in the verification process the software automatically runs 25 sample problems to ensure proper installation and compilation. Once the runs are completed the software checks for verification by performing a file comparison on the new output file and the old output file. Any differences between any of the files will cause a verification error. Due to the manner in which the verification is completed a verification error does not necessarily indicate a problem. This indicates that a closer look at the output files is needed to determine the cause of the error

  2. A spectral blanking-out controller for demonstration of information barrier technology

    International Nuclear Information System (INIS)

    Liu Suping; Gong Jian; Hu Guangchun; Zhang Jianhua

    2006-01-01

    Information barrier technology has become more and more important in the R and D of radiation fingerprint verification associated with classified items such as nuclear warheads, nuclear components and military-used nuclear materials. The function of information barriers is two-fold: one is to prevent the classified information from leaking out; the other is to provide creditable verification. To fulfill these two functions, the information barriers for a viable verification system (including all its hardware and software) must be designed on the basic principles of protecting classified information and the ability to authenticate. The Spectral Blanking-out Controller (SBC) is developed to illustrate the two functions of the information barriers and to explore some practice measures to meet the required design fundamentals. This paper briefs the task assigned to the SBC, the specific design concerns and the practical information barrier measures. The R and D of the SBC embodies the concepts of information barrier technology and has to conform to the basic guidelines: If a verification system is expected to possess strict information barriers, the design of the system must be integrative with due considerations given to the factors such as the efficiency of the verification technique, the possible measures to protect the classified information from directly or indirectly leaking out, the complete openness in all aspects of the system for the inspectors to authenticate the system for the sake of achieving certain degree of confidence on the verification results. (authors)

  3. 76 FR 11256 - Notice of Proposed Information Collection: Comment Request Loan Sales Bidder Qualification Statement

    Science.gov (United States)

    2011-03-01

    ... Information Collection: Comment Request Loan Sales Bidder Qualification Statement AGENCY: Office of the... Sales Office, Room 3136, Department of Housing and Urban Development, 451 Seventh Street, SW... techniques of other forms of information technology, e.g., permitting electronic submission of responses...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS FLG-631-318 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss FLG-631-318 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss FLG, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refi...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS GTI-600G, HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss GTi-600G high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss GTi, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refinis...

  6. Final environmental impact statement. Management of commercially generated radioactive waste. Volume 3. Public comments hearing board report

    International Nuclear Information System (INIS)

    1980-10-01

    This EIS analyzes the significant environmental impacts that could occur if various technologies for management and disposal of high-level and transuranic wastes from commercial nuclear power reactors were to be developed and implemented. This EIS will serve as the environmental input for the decision on which technology, or technologies, will be emphasized in further research and development activities in the commercial waste management program. The action proposed in this EIS is to (1) adopt a national strategy to develop mined geologic repositories for disposal of commercially generated high-level and transuranic radioactive waste (while continuing to examine subseabed and very deep hole disposal as potential backup technologies) and (2) conduct a R and D program to develop such facilities and the necessary technology to ensure the safe long-term containment and isolation of these wastes. The Department has considered in this statement: development of conventionally mined deep geologic repositories for disposal of spent fuel from nuclear power reactors and/or radioactive fuel reprocessing wastes; balanced development of several alternative disposal methods; and no waste disposal action. This volume contains written public comments and hearing board responses and reports offered on the draft statement

  7. Final environmental impact statement. Management of commercially generated radioactive waste. Volume 3. Public comments hearing board report

    Energy Technology Data Exchange (ETDEWEB)

    1980-10-01

    This EIS analyzes the significant environmental impacts that could occur if various technologies for management and disposal of high-level and transuranic wastes from commercial nuclear power reactors were to be developed and implemented. This EIS will serve as the environmental input for the decision on which technology, or technologies, will be emphasized in further research and development activities in the commercial waste management program. The action proposed in this EIS is to (1) adopt a national strategy to develop mined geologic repositories for disposal of commercially generated high-level and transuranic radioactive waste (while continuing to examine subseabed and very deep hole disposal as potential backup technologies) and (2) conduct a R and D program to develop such facilities and the necessary technology to ensure the safe long-term containment and isolation of these wastes. The Department has considered in this statement: development of conventionally mined deep geologic repositories for disposal of spent fuel from nuclear power reactors and/or radioactive fuel reprocessing wastes; balanced development of several alternative disposal methods; and no waste disposal action. This volume contains written public comments and hearing board responses and reports offered on the draft statement.

  8. On the organisation of program verification competitions

    NARCIS (Netherlands)

    Huisman, Marieke; Klebanov, Vladimir; Monahan, Rosemary; Klebanov, Vladimir; Beckert, Bernhard; Biere, Armin; Sutcliffe, Geoff

    In this paper, we discuss the challenges that have to be addressed when organising program verification competitions. Our focus is on competitions for verification systems where the participants both formalise an informally stated requirement and (typically) provide some guidance for the tool to

  9. Hosted Services for Advanced V and V Technologies: An Approach to Achieving Adoption without the Woes of Usage

    Science.gov (United States)

    Koga, Dennis (Technical Monitor); Penix, John; Markosian, Lawrence Z.; OMalley, Owen; Brew, William A.

    2003-01-01

    Attempts to achieve widespread use of software verification tools have been notably unsuccessful. Even 'straightforward', classic, and potentially effective verification tools such as lint-like tools face limits on their acceptance. These limits are imposed by the expertise required applying the tools and interpreting the results, the high false positive rate of many verification tools, and the need to integrate the tools into development environments. The barriers are even greater for more complex advanced technologies such as model checking. Web-hosted services for advanced verification technologies may mitigate these problems by centralizing tool expertise. The possible benefits of this approach include eliminating the need for software developer expertise in tool application and results filtering, and improving integration with other development tools.

  10. Simulation environment based on the Universal Verification Methodology

    International Nuclear Information System (INIS)

    Fiergolski, A.

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC design; (2) the C3PD 180 nm HV-CMOS active sensor ASIC design; (3) the FPGA-based DAQ system of the CLICpix chip. This paper, based on the experience from the above projects, introduces briefly UVM and presents a set of tips and advices applicable at different stages of the verification process-cycle.

  11. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  12. Automatic Verification of Timing Constraints for Safety Critical Space Systems

    Science.gov (United States)

    Fernandez, Javier; Parra, Pablo; Sanchez Prieto, Sebastian; Polo, Oscar; Bernat, Guillem

    2015-09-01

    In this paper is presented an automatic process of verification. We focus in the verification of scheduling analysis parameter. This proposal is part of process based on Model Driven Engineering to automate a Verification and Validation process of the software on board of satellites. This process is implemented in a software control unit of the energy particle detector which is payload of Solar Orbiter mission. From the design model is generated a scheduling analysis model and its verification model. The verification as defined as constraints in way of Finite Timed Automatas. When the system is deployed on target the verification evidence is extracted as instrumented points. The constraints are fed with the evidence, if any of the constraints is not satisfied for the on target evidence the scheduling analysis is not valid.

  13. Development of technologies for national control of and accountancy for nuclear materials

    International Nuclear Information System (INIS)

    Choi, Young Myung; Kwack, E. H.; Kim, B. K.

    2002-03-01

    The aim of this project is to establish a rigid foundation of national safeguards and to develop the new technologies for the nuclear control. This project is composed of four different technologies; 1. Monitoring technology for nuclear materials, 2. Detection technology for a single particle, 3. Safeguards information management technology, 4. Physical protection technology. Various studies such as a remote verification system for CANDU spent fuel in dry storage canister, a spent fuel verification system using an optical fiber scintillator, and development of softwares for safeguards and physical protection were performed in the frist phase('99-'01). As a result of this research, it has been identified that the developed technologies could be a crucial means of the control for the nuclear material and facilities related. We are planing to accomplish a steady national safeguard system in the second phase('02-'06). This research will help to elevate the transparency and credibility in national nuclear activities by improving the relative technologies

  14. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    International Nuclear Information System (INIS)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D.

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs

  15. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D. [and others

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs.

  16. High-speed autoverifying technology for printed wiring boards

    Science.gov (United States)

    Ando, Moritoshi; Oka, Hiroshi; Okada, Hideo; Sakashita, Yorihiro; Shibutani, Nobumi

    1996-10-01

    We have developed an automated pattern verification technique. The output of an automated optical inspection system contains many false alarms. Verification is needed to distinguish between minor irregularities and serious defects. In the past, this verification was usually done manually, which led to unsatisfactory product quality. The goal of our new automated verification system is to detect pattern features on surface mount technology boards. In our system, we employ a new illumination method, which uses multiple colors and multiple direction illumination. Images are captured with a CCD camera. We have developed a new algorithm that uses CAD data for both pattern matching and pattern structure determination. This helps to search for patterns around a defect and to examine defect definition rules. These are processed with a high speed workstation and a hard-wired circuits. The system can verify a defect within 1.5 seconds. The verification system was tested in a factory. It verified 1,500 defective samples and detected all significant defects with only a 0.1 percent of error rate (false alarm).

  17. Be Vigilant on Financial Statements.

    Science.gov (United States)

    Freed, DeBow

    2002-01-01

    Highlights areas on university's financial statements that warrant careful review by trustees and suggests ways they can check to see whether an institution's financial statements are clear and valid indicators of its financial status. (EV)

  18. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  19. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  20. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  1. HTGR technology development: status and direction

    International Nuclear Information System (INIS)

    Kasten, P.R.

    1982-01-01

    During the last two years there has been an extensive and comprehensive effort expended primarily by General Atomic (GA) in generating a revised technology development plan. Oak Ridge National Laboratory (ORNL) has assisted in this effort, primarily through its interactions over the past years in working together with GA in technology development, but also through detailed review of the initial versions of the technology development plan as prepared by GA. The plan covers Fuel Technology, Materials Technology (including metals, graphite, and ceramics), Plant Technology (including methods, safety, structures, systems, heat exchangers, control and electrical, and mechanical), and Component Design Verification and Support areas

  2. 10 CFR 51.29 - Scoping-environmental impact statement and supplement to environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Scoping-environmental impact statement and supplement to environmental impact statement. 51.29 Section 51.29 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED... Environmental Policy Act-Regulations Implementing Section 102(2) Scoping § 51.29 Scoping-environmental impact...

  3. Seismic verification of underground explosions

    International Nuclear Information System (INIS)

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper

  4. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  5. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  6. FINANCIAL STATEMENTS FOR LEGAL PERSONS WITHOUT PATRIMONIAL PURPOSE

    OpenAIRE

    DUMITRU FRANCA; MORARU MARIA

    2012-01-01

    Annual financial statements and annual financial statements that are simplified represent a whole. According to the law of accounting, annual financial statements must be accompanied by a written declaration of assumption of responsibility by the leadership of the legal person for annual financial statements in accordance with Accounting rules for legal persons without patrimonial purpose. Annual financial statements are prepared in a clear manner and should be consistent with the provisions ...

  7. Verification of Open Interactive Markov Chains

    OpenAIRE

    Brazdil, Tomas; Hermanns, Holger; Krcal, Jan; Kretinsky, Jan; Rehak, Vojtech

    2012-01-01

    Interactive Markov chains (IMC) are compositional behavioral models extending both labeled transition systems and continuous-time Markov chains. IMC pair modeling convenience - owed to compositionality properties - with effective verification algorithms and tools - owed to Markov properties. Thus far however, IMC verification did not consider compositionality properties, but considered closed systems. This paper discusses the evaluation of IMC in an open and thus compositional interpretation....

  8. Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation

    Science.gov (United States)

    Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

    2000-01-01

    This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

  9. H.E. Mr. Ronaldo Mota Sardenberg, Minister for Science, Technology and Innovation, Brazil

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    Photo 01: Signature of the joint statement by H.E. Mr Ronaldo Mota Sardenberg, Minister for Science, Technology and Innovation, Brazil (centre) with CERN Director-General, L. Maiani (right) and C. Melo. Photo 02: Signature of the joint statement by H.E. Mr Ronaldo Mota Sardenberg, Minister for Science, Technology and Innovation, Brazil (left) and CERN Director-General, L. Maiani. Photo 03: H.E. Mr Ronaldo Mota Sardenberg, Minister for Science, Technology and Innovation, Brazil and CERN Director-General, L. Maiani.

  10. Design verification for large reprocessing plants (Proposed procedures)

    International Nuclear Information System (INIS)

    Rolandi, G.

    1988-07-01

    In the 1990s, four large commercial reprocessing plants will progressively come into operation: If an effective and efficient safeguards system is to be applied to these large and complex plants, several important factors have to be considered. One of these factors, addressed in the present report, concerns plant design verification. Design verification provides an overall assurance on plant measurement data. To this end design verification, although limited to the safeguards aspects of the plant, must be a systematic activity, which starts during the design phase, continues during the construction phase and is particularly performed during the various steps of the plant's commissioning phase. The detailed procedures for design information verification on commercial reprocessing plants must be defined within the frame of the general provisions set forth in INFCIRC/153 for any type of safeguards related activities and specifically for design verification. The present report is intended as a preliminary contribution on a purely technical level, and focusses on the problems within the Agency. For the purpose of the present study the most complex case was assumed: i.e. a safeguards system based on conventional materials accountancy, accompanied both by special input and output verification and by some form of near-real-time accountancy involving in-process inventory taking, based on authenticated operator's measurement data. C/S measures are also foreseen, where necessary to supplement the accountancy data. A complete ''design verification'' strategy comprehends: informing the Agency of any changes in the plant system which are defined as ''safeguards relevant''; ''reverifying by the Agency upon receiving notice from the Operator on any changes, on ''design information''. 13 refs

  11. 49 CFR 805.735-21 - Confidentiality of statements.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD EMPLOYEE RESPONSIBILITIES AND CONDUCT § 805.735-21 Confidentiality of statements. Subject to the provisions of § 805.735-24 concerning review of employee statements, each statement of... Personnel Officer is personally responsible for the retention of employee statements in confidence and may...

  12. Verification and testing of the RTOS for safety-critical embedded systems

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Na Young [Seoul National University, Seoul (Korea, Republic of); Kim, Jin Hyun; Choi, Jin Young [Korea University, Seoul (Korea, Republic of); Sung, Ah Young; Choi, Byung Ju [Ewha Womans University, Seoul (Korea, Republic of); Lee, Jang Soo [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    Development in Instrumentation and Control (I and C) technology provides more convenience and better performance, thus, adopted in many fields. To adopt newly developed technology, nuclear industry requires rigorous V and V procedure and tests to assure reliable operation. Adoption of digital system requires verification and testing of the OS for licensing. Commercial real-time operating system (RTOS) is targeted to apply to various, unpredictable needs, which makes it difficult to verify. For this reason, simple, application-oriented realtime OS is developed for the nuclear application. In this work, we show how to verify the developed RTOS at each development lifecycle. Commercial formal tool is used in specification and verification of the system. Based on the developed model, software in C language is automatically generated. Tests are performed for two purposes; one is to identify consistency between the verified model and the generated code, the other is to find errors in the generated code. The former assumes that the verified model is correct, and the latter incorrect. Test data are generated separately to satisfy each purpose. After we test the RTOS software, we implement the test board embedded with the developed RTOS and the application software, which simulates the safety critical plant protection function. Testing to identify whether the reliability criteria is satisfied or not is also designed in this work. It results in that the developed RTOS software works well when it is embedded in the system.

  13. Verification and testing of the RTOS for safety-critical embedded systems

    International Nuclear Information System (INIS)

    Lee, Na Young; Kim, Jin Hyun; Choi, Jin Young; Sung, Ah Young; Choi, Byung Ju; Lee, Jang Soo

    2003-01-01

    Development in Instrumentation and Control (I and C) technology provides more convenience and better performance, thus, adopted in many fields. To adopt newly developed technology, nuclear industry requires rigorous V and V procedure and tests to assure reliable operation. Adoption of digital system requires verification and testing of the OS for licensing. Commercial real-time operating system (RTOS) is targeted to apply to various, unpredictable needs, which makes it difficult to verify. For this reason, simple, application-oriented realtime OS is developed for the nuclear application. In this work, we show how to verify the developed RTOS at each development lifecycle. Commercial formal tool is used in specification and verification of the system. Based on the developed model, software in C language is automatically generated. Tests are performed for two purposes; one is to identify consistency between the verified model and the generated code, the other is to find errors in the generated code. The former assumes that the verified model is correct, and the latter incorrect. Test data are generated separately to satisfy each purpose. After we test the RTOS software, we implement the test board embedded with the developed RTOS and the application software, which simulates the safety critical plant protection function. Testing to identify whether the reliability criteria is satisfied or not is also designed in this work. It results in that the developed RTOS software works well when it is embedded in the system

  14. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Andersen, J.H.; Skou, A.

    1995-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  15. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Andersen, J.H.; Kristensen, C.H.; Skou, A.

    1996-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  16. THE ENVIRONMENTAL TECHNOLOGIES ACCEPTANCE (ETA) PROGRAM

    International Nuclear Information System (INIS)

    Behr-Andres, Christina B.

    2001-01-01

    The Environmental Technologies Acceptance (ETA) Program at the Energy and Environmental Research Center (EERC) is intended to advance the development, commercial acceptance, and timely deployment of selected private sector technologies for the cleanup of sites in the nuclear defense complex as well as the greater market. As shown in Table 1, this cooperative agreement funded by the National Energy Technology Laboratory (NETL) consists of three tasks: Technology Selection, Technology Development, and Technology Verification. As currently conceived, the ETA will address the needs of as many technologies as appropriate under its current 3-year term. This report covers activities during the first 6 months of the 3-year ETA program

  17. 7 CFR 1775.21 - Audit or financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Audit or financial statements. 1775.21 Section 1775... Audit or financial statements. The grantee will provide an audit report or financial statements as... year. (b) Grantees expending less than $500,000 will provide annual financial statements covering the...

  18. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  19. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  20. Current status of verification practices in clinical biochemistry in Spain.

    Science.gov (United States)

    Gómez-Rioja, Rubén; Alvarez, Virtudes; Ventura, Montserrat; Alsina, M Jesús; Barba, Núria; Cortés, Mariano; Llopis, María Antonia; Martínez, Cecilia; Ibarz, Mercè

    2013-09-01

    Verification uses logical algorithms to detect potential errors before laboratory results are released to the clinician. Even though verification is one of the main processes in all laboratories, there is a lack of standardization mainly in the algorithms used and the criteria and verification limits applied. A survey in clinical laboratories in Spain was conducted in order to assess the verification process, particularly the use of autoverification. Questionnaires were sent to the laboratories involved in the External Quality Assurance Program organized by the Spanish Society of Clinical Biochemistry and Molecular Pathology. Seven common biochemical parameters were included (glucose, cholesterol, triglycerides, creatinine, potassium, calcium, and alanine aminotransferase). Completed questionnaires were received from 85 laboratories. Nearly all the laboratories reported using the following seven verification criteria: internal quality control, instrument warnings, sample deterioration, reference limits, clinical data, concordance between parameters, and verification of results. The use of all verification criteria varied according to the type of verification (automatic, technical, or medical). Verification limits for these parameters are similar to biological reference ranges. Delta Check was used in 24% of laboratories. Most laboratories (64%) reported using autoverification systems. Autoverification use was related to laboratory size, ownership, and type of laboratory information system, but amount of use (percentage of test autoverified) was not related to laboratory size. A total of 36% of Spanish laboratories do not use autoverification, despite the general implementation of laboratory information systems, most of them, with autoverification ability. Criteria and rules for seven routine biochemical tests were obtained.

  1. Opening statements and general statements by delegation

    International Nuclear Information System (INIS)

    1978-01-01

    23 delegations have submitted general reports and statements on the situation and evolution of the nuclear fuel cycle. Each report reflects the particular interests of the country that submitted it. All in all, these reports provide general background information on the subject of the conference

  2. 40 CFR 1508.11 - Environmental impact statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Environmental impact statement. 1508.11 Section 1508.11 Protection of Environment COUNCIL ON ENVIRONMENTAL QUALITY TERMINOLOGY AND INDEX § 1508.11 Environmental impact statement. Environmental impact statement means a detailed written...

  3. Dosimetry challenges for implementing emerging technologies

    Energy Technology Data Exchange (ETDEWEB)

    Yin Fangfang; Oldham, Mark; Cai Jing; Wu Qiuwen, E-mail: Fangfang.yin@duke.ed [Department of Radiation Oncology Duke University Medical Center, Durham, NC 27516 (United States)

    2010-11-01

    During the last 10 years, radiation therapy technologies have gone through major changes, mainly related introduction of sophisticated delivery and imaging techniques to improve the target localization accuracy and dose conformity. While implementation of these emerging technologies such as image-guided SRS/SBRT, IMRT/IMAT, IGRT, 4D motion management, and special delivery technologies showed substantial clinical gains for patient care, many other factors, such as training/quality, efficiency/efficacy, and cost/effectiveness etc. remain to be challenging. This talk will address technical challenges for dosimetry verification of implementing these emerging technologies in radiation therapy.

  4. Final environmental statement for the geothermal leasing program

    Energy Technology Data Exchange (ETDEWEB)

    1973-12-31

    This second of the four volumes of the Geothermal Leasing Program final impact statement contains the individual environmental statements for the leasing of federally owned geothermal resources for development in three specific areas: Clear Lake-Geysers; Mono Lake-Long Valley; and Imperial Valley, all in California. It also includes a summary of the written comments received and departmental responses relative to the Draft Environmental Impact Statement issued in 1971; comments and responses on the Draft Environmental Impact Statement; consultation and coordination in the development of the proposal and in the preparation of the Draft Environmental Statement; and coordination in the review of the Draft Environmental Statement.

  5. AICPA allows low-cost options for compiled financial statements.

    Science.gov (United States)

    Reinstein, Alan; Luecke, Randall W

    2002-02-01

    The AICPA Accounting and Review Services Committee's (ARSC) SSARS No. 8, Amendment to Statement on Standards for Accounting and Review Services No. 1, Compilation and Review of Financial Statements, issued in October 2000, allows financial managers to provide plain-paper, compiled financial statements for the exclusive use of management. Such financial statements were disallowed in 1979 when the AICPA issued SSARS No. 1, Compilation and Review of Financial Statements. With the issuance of SSARS No. 8, financial managers can prepare plain-paper, compiled financial statements when third parties are not expected to rely on the financial statements, management acknowledges such restrictions in writing, and management acknowledges its primary responsibility for the adequacy of the financial statements.

  6. Verification test of an engineering-scale multi-purpose radwaste incinerator

    International Nuclear Information System (INIS)

    Wang Peiyi; Zhou Lianquan; Ma Mingxie; Qiu Mingcai; Yang Liguo; Li Xiaohai; Zhang Xiaobin; Lu Xiaowu; Dong Jingling; Wang Xujin; Li Chuanlian; Yang Baomin

    2002-01-01

    The verification test of an engineering-scale multi-purpose radwaste incinerator was implemented. The test items include performance determination for the system when solid wastes (include resins) or spent oil were incinerating and off gas was cleaning, tracer test for determining decontamination factor and 72 h continuos running test. 500 h tests verify the reliability and feasibility of designs of technological process, main structure, instrument control and system safety. The incineration system ran smoothly, devices and instruments worked stably. The specifications such as capacity, volume reduction factor, carbon remainder in ash and decontamination factor all meet the design requirements

  7. Introductory statement to the Board of Governors, 14 June 2005, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The agenda for this meeting covers a broad range of issues, including the Agency's Annual Report, the Technical Cooperation Report, the Safeguards Implementation Report, and the report of the Programme and Budget Committee. The Agency's Technical Cooperation (TC) Programme deals with the TC Management Change Initiative and the TC Programme Funding. The Agency continues to expand its partnerships with other United Nations system organizations, international financial institutions, regional organizations and other relevant bodies, to expand the scope and achieve synergy with respect to our activities in the area of nuclear applications and technical cooperation. Results of the Paris Conference on the Future of Nuclear Power are discussed. Issues on Nuclear Safety and Security covered the convention on nuclear safety, transport safety regulations, the London conference on nuclear security, the convention on the physical protection of nuclear material and recent emergency response exercise. Nuclear Verification is describing the Safeguards Implementation Report and Safeguards Statement for 2004, the status of safeguards agreements and additional protocols, the implementation of safeguards in the Democratic People's Republic of Korea, the implementation of safeguards in the Islamic republic of Iran, the small quantity protocols and the committee on Safeguards and verification. Results of the 2005 NPT Review Conference are presented as well as the report of the Programme and Budget Committee and the report of the external auditor. The Secretariat remains committed to the implementation of a programme that aims to address the increasing challenges we are facing in both areas of our activities: human security and human development. The Secretariat will do its best with your guidance and support to ensure efficient and effective implementation of the programme

  8. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  9. 7 CFR 1794.61 - Environmental impact statement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Environmental impact statement. 1794.61 Section 1794..., DEPARTMENT OF AGRICULTURE (CONTINUED) ENVIRONMENTAL POLICIES AND PROCEDURES Procedure for Environmental Impact Statements § 1794.61 Environmental impact statement. An EIS shall be prepared in accordance with...

  10. Independent verification in operations at nuclear power plants

    International Nuclear Information System (INIS)

    Donderi, D.C.; Smiley, A.; Ostry, D.J.; Moray, N.P.

    1995-09-01

    A critical review of approaches to independent verification in operations used in nuclear power plant quality assurance programs in other countries, was conducted for this study. This report identifies the uses of independent verification and provides an assessment of the effectiveness of the various approaches. The findings indicate that at Canadian nuclear power plants as much, if not more, independent verification is performed than at power plants in the other countries included in the study. Additional requirements in this area are not proposed for Canadian stations. (author)

  11. Automated Technology for Verificiation and Analysis

    DEFF Research Database (Denmark)

    -of-the-art research on theoretical and practical aspects of automated analysis, verification, and synthesis. Among 74 research papers and 10 tool papers submitted to ATVA 2009, the Program Committee accepted 23 as regular papers and 3 as tool papers. In all, 33 experts from 17 countries worked hard to make sure......This volume contains the papers presented at the 7th International Symposium on Automated Technology for Verification and Analysis held during October 13-16 in Macao SAR, China. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state...

  12. Financial Statements

    International Development Research Centre (IDRC) Digital Library (Canada)

    Financial Statements and accompanying notes provided on .... to good governance principles. there is the risk that ...... responsibilities of the centre's internal auditor includes reviewing internal controls, including accounting and financial.

  13. Stakeholder Orientation in Cruise Lines’ Mission Statements

    Directory of Open Access Journals (Sweden)

    Lara Penco

    2017-11-01

    Full Text Available Consistent with the extant management literature, mission statements are crucial for the sustainability and growth of any firms and have been considered to be a tool for the strategic management process. Despite the considerable attention awarded to this theme, the role of the mission statement in the strategic management of tourism firms has not been sufficiently highlighted. The present paper tries to bridge this literature gap and aims to (i analyze the content of mission statements; and (ii investigate the stakeholder orientation of cruise line mission statements. We apply a content analysis method to analyze the mission statements of 44 cruise lines, employing three different perspectives: (1 the inclusion of stakeholder groups; (2 mentions of specific “mission” components; (3 reference to four goals usually assigned to mission statements. The analysis was performed using the software package QDA-Miner. The results suggest that it is possible to identify four clusters of firms that present similar content in their mission statements, and that cruise companies tend to reserve a major attention to customers. This contribution presents some valuable research implications mainly useful for researchers and academics, but also maybe of benefit to professionals and investors.

  14. AN ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PERFORMANCE TESTING OF THE INDUSTRIAL TEST SYSTEM, INC. CYANIDE REAGENTSTRIP™ TEST KIT

    Science.gov (United States)

    Cyanide can be present in various forms in water. The cyanide test kit evaluated in this verification study (Industrial Test System, Inc. Cyanide Regent Strip ™ Test Kit) was designed to detect free cyanide in water. This is done by converting cyanide in water to cyanogen...

  15. The construction of environments for development of test and verification technology -The development of advanced instrumentation and control technology-

    International Nuclear Information System (INIS)

    Kwon, Kee Choon; Ham, Chang Shick; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Kim, Jae Hee; Lee, Chang Soo

    1994-07-01

    Several problems were identified in digitalizing the I and C systems of NPPs. A scheme is divided into hardware and software to resolve these problems. Hardware verification and validation analyzed about common mode failure, commercial grade dedication process, electromagnetic competibility. We have reviewed codes and standards to be a consensus criteria among vendor, licenser. Then we have described the software licensing procedures under 10 CFR 50 and 10 CFR 52 in the United States Nuclear Regulatory Commision (NRC) and presented vendor's approaches to scope with the licensing barrier. At last, we have surveyed the technical issues related to developing and licensing the high integrity software for digital I and C systems. (Author)

  16. Understanding Financial Statements. Financial Matters. Board Basics.

    Science.gov (United States)

    McCarthy, John H.; Turner, Robert M.

    1998-01-01

    This booklet for trustees of higher education institutions offers guidelines to help trustees understand the institution's financial statements. Individual sections describe the three major financial statements and cover topics such as: (1) standards of the Financial Accounting Standards Board; (2) the "statement of financial position,"…

  17. 40 CFR 6.207 - Environmental impact statements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Environmental impact statements. 6.207... ACTIONS EPA's NEPA Environmental Review Procedures § 6.207 Environmental impact statements. (a) The Responsible Official will prepare an environmental impact statement (EIS) (see 40 CFR 1508.11) for major...

  18. 39 CFR 775.11 - Environmental impact statements.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Environmental impact statements. 775.11 Section... POLICY ACT PROCEDURES § 775.11 Environmental impact statements. (a) Determining scope. Before an environmental impact statement is prepared, the following procedures must be followed to determine what issues...

  19. Environmental Technology Verification Report for Abraxis Ecologenia® Ethynylestradiol (EE2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis Ecologenia Ethynylestradiol (EE2) ...

  20. Auditing nuclear materials statements

    International Nuclear Information System (INIS)

    Anon.

    1973-01-01

    A standard that may be used as a guide for persons making independent examinations of nuclear materials statements or reports regarding inventory quantities on hand, receipts, production, shipment, losses, etc. is presented. The objective of the examination of nuclear materials statements by the independent auditor is the expression of an opinion on the fairness with which the statements present the nuclear materials position of a nuclear materials facility and the movement of such inventory materials for the period under review. The opinion is based upon an examination made in accordance with auditing criteria, including an evaluation of internal control, a test of recorded transactions, and a review of measured discards and materials unaccounted for (MUF). The standard draws heavily upon financial auditing standards and procedures published by the American Institute of Certified Public Accountants