WorldWideScience

Sample records for technology verification statement

  1. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: BROME AGRI SALES, LTD., MAXIMIZER SEPARATOR, MODEL MAX 1016 - 03/01/WQPC-SWP

    Science.gov (United States)

    Verification testing of the Brome Agri Sales Ltd. Maximizer Separator, Model MAX 1016 (Maximizer) was conducted at the Lake Wheeler Road Field Laboratory Swine Educational Unit in Raleigh, North Carolina. The Maximizer is an inclined screen solids separator that can be used to s...

  3. 37 CFR 201.30 - Verification of Statements of Account.

    Science.gov (United States)

    2010-07-01

    ... States Code. (b) Definitions—(1) Annual Statement of Account, generally accepted auditing standards (GAAS... party interested in instituting the verification procedure of their intent to join with it and to... procedure of up to one additional month if either one requests it. Verification procedures shall be...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT, PERFORMANCE OF INDUCTION MIXERS FOR DISINFECTION OF WET WEATHER FLOWS, US FILTER/STRANCO PRODUCTS WATER CHAMP R F SERIES CHEMICAL INDUCTION SYSTEM

    Science.gov (United States)

    The Wet-Weather Flow Technologies Pilot of the EPA's Technology Verification (ETV) Program under a partnership with NSF International has verified the performawnce of the USFilter/Stranco Products chemical induction mixer used for disinfection of wet-weather flows. The USFilter t...

  5. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  7. INNOVATIVE TECHNOLOGY VERIFICATION REPORT XRF ...

    Science.gov (United States)

    The Niton XLt 700 Series (XLt) XRF Services x-ray fluorescence (XRF) analyzer was demonstrated under the U.S. Environmental Protection Agency (EPA) Superfund Innovative Technology Evaluation (SITE) Program. The field portion of the demonstration was conducted in January 2005 at the Kennedy Athletic, Recreational and Social Park (KARS) at Kennedy Space Center on Merritt Island, Florida. The demonstration was designed to collect reliable performance and cost data for the XLt analyzer and seven other commercially available XRF instruments for measuring trace elements in soil and sediment. The performance and cost data were evaluated to document the relative performance of each XRF instrument. This innovative technology verification report describes the objectives and the results of that evaluation and serves to verify the performance and cost of the XLt analyzer. Separate reports have been prepared for the other XRF instruments that were evaluated as part of the demonstration. The objectives of the evaluation included determining each XRF instrument’s accuracy, precision, sample throughput, and tendency for matrix effects. To fulfill these objectives, the field demonstration incorporated the analysis of 326 prepared samples of soil and sediment that contained 13 target elements. The prepared samples included blends of environmental samples from nine different sample collection sites as well as spiked samples with certified element concentrations. Accuracy

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  9. Environmental Technology Verification Report and Statement for Baghouse Filtration Products, W. L. Gore & Associates, Inc. 5117 High Durability PPS Laminate Filtration Media (Tested March-April 2012)

    Science.gov (United States)

    Baghouses are air pollution control devices used to control particulate emissions from stationary sources and are among the technologies evaluated by the APCT Center. Baghouses and their accompanying filter media have long been one of the leading particulate control techniques fo...

  10. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  11. Advanced Technologies for Design Information Verification

    Energy Technology Data Exchange (ETDEWEB)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-07-08

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  12. Subsurface barrier verification technologies, informal report

    International Nuclear Information System (INIS)

    Heiser, J.H.

    1994-06-01

    One of the more promising remediation options available to the DOE waste management community is subsurface barriers. Some of the uses of subsurface barriers include surrounding and/or containing buried waste, as secondary confinement of underground storage tanks, to direct or contain subsurface contaminant plumes and to restrict remediation methods, such as vacuum extraction, to a limited area. To be most effective the barriers should be continuous and depending on use, have few or no breaches. A breach may be formed through numerous pathways including: discontinuous grout application, from joints between panels and from cracking due to grout curing or wet-dry cycling. The ability to verify barrier integrity is valuable to the DOE, EPA, and commercial sector and will be required to gain full public acceptance of subsurface barriers as either primary or secondary confinement at waste sites. It is recognized that no suitable method exists for the verification of an emplaced barrier's integrity. The large size and deep placement of subsurface barriers makes detection of leaks challenging. This becomes magnified if the permissible leakage from the site is low. Detection of small cracks (fractions of an inch) at depths of 100 feet or more has not been possible using existing surface geophysical techniques. Compounding the problem of locating flaws in a barrier is the fact that no placement technology can guarantee the completeness or integrity of the emplaced barrier. This report summarizes several commonly used or promising technologies that have been or may be applied to in-situ barrier continuity verification

  13. Advanced Technologies for Design Information Verification

    International Nuclear Information System (INIS)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-01-01

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  15. Hanford science and technology needs statements document

    Energy Technology Data Exchange (ETDEWEB)

    Piper, L.L.

    1997-12-31

    This document is a compilation of the Hanford science and technology needs statements for FY 1998. The needs were developed by the Hanford Site Technology Coordination Group (STCG) with full participation and endorsement of site user organizations, stakeholders, and regulators. The purpose of this document is to: (a) provide a comprehensive listing of Hanford science and technology needs, and (b) identify partnering and commercialization opportunities with industry, other federal and state agencies, and the academic community. The Hanford STCG reviews and updates the needs annually. Once completed, the needs are communicated to DOE for use in the development and prioritization of their science and technology programs, including the Focus Areas, Cross-Cutting Programs, and the Environmental Management Science Program. The needs are also transmitted to DOE through the Accelerating Cleanup: 2006 Plan. The public may access the need statements on the Internet on: the Hanford Home Page (www.hanford.gov), the Pacific Rim Enterprise Center`s web site (www2.pacific-rim.org/pacific rim), or the STCG web site at DOE headquarters (em-52.em.doegov/ifd/stcg/stcg.htm). This page includes links to science and technology needs for many DOE sites. Private industry is encouraged to review the need statements and contact the Hanford STCG if they can provide technologies that meet these needs. On-site points of contact are included at the ends of each need statement. The Pacific Rim Enterprise Center (206-224-9934) can also provide assistance to businesses interested in marketing technologies to the DOE.

  16. Consortium for Verification Technology Fellowship Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sadler, Lorraine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    As one recipient of the Consortium for Verification Technology (CVT) Fellowship, I spent eight days as a visiting scientist at the University of Michigan, Department of Nuclear Engineering and Radiological Sciences (NERS). During this time, I participated in multiple department and research group meetings and presentations, met with individual faculty and students, toured multiple laboratories, and taught one-half of a one-unit class on Risk Analysis in Nuclear Arms control (six 1.5 hour lectures). The following report describes some of the interactions that I had during my time as well as a brief discussion of the impact of this fellowship on members of the consortium and on me/my laboratory’s technical knowledge and network.

  17. Environmental Technology Verification Report: Taconic Energy, Inc. TEA Fuel Additive

    Science.gov (United States)

    The Greenhouse Gas Technology Center (GHG Center) is one of six verification organizations operating under EPA’s ETV program. One sector of significant interest to GHG Center stakeholders is transportation - particularly technologies that result in fuel economy improvements. Taco...

  18. Technology for bolus verification in proton therapy

    Science.gov (United States)

    Shipulin, K. N.; Mytsin, G. V.; Agapov, A. V.

    2015-01-01

    To ensure the conformal depth-dose distribution of a proton beam within a target volume, complex shaped range shifters (so-called boluses), which account for the heterogeneous structure of patient tissue and organs in the beam path, were calculated and manufactured. The precise manufacturing of proton compensators used for patient treatment is a vital step in quality assurance in proton therapy. In this work a software-hardware complex that verifies the quality and precision of bolus manufacturing at the Medico-Technical Complex (MTC) was developed. The boluses consisted of a positioning system with two photoelectric biosensors. We evaluated 20 boluses used in proton therapy of five patients. A total number of 2562 experimental points were measured, of which only two points had values that differed from the calculated value by more than 0.5 mm. The other data points displayed a deviation within ±0.5 mm from the calculated value. The technology for bolus verification developed in this work can be used for the high precision testing of geometrical parameters of proton compensators in radiotherapy.

  19. Hanford science and technology needs statements, 2000

    International Nuclear Information System (INIS)

    BERLIN, G.T.

    1999-01-01

    This document: (a) provides a comprehensive listing of the Hanford sites science and technology needs for fiscal year (FY) 2000; and (b) identifies partnering and commercialization opportunities within industry, other federal and state agencies, and the academic community. These needs were prepared by the Hanford projects (within the Project Hanford Management Contract and the Environmental Restoration Contract) and subsequently reviewed and endorsed by the Hanford Site Technology Coordination Group (STCG). The STCG reviews included participation of DOE-RL Management, site stakeholders, state and federal regulators, and Tribal Nations. The Science and Technology Needs Document is organized by major problem areas and coincides with the STCG subgroups which are as follows: Deactivation and Decommissioning, Mixed Waste, Subsurface Contaminants, High Level Waste Tanks, and Spent Nuclear Fuel. Each problem area begins with a technology needs index table. This table is followed by detailed descriptions of each technology need, including a problem statement and current baseline information associated with that need. Following the technology need description for each problem area is a table listing the science needs, followed by detailed descriptions of the functional need and the problem to be solved as currently understood. Finally, a crosswalk table is provided at the end of each problem area which ties together last years needs and this years needs, provides brief justification for elimination of any needs, and identifies any other significant changes which took place during the revision process

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT LASER TOUCH AND TECHNOLOGIES, LLC LASER TOUCH MODEL LT-B512

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Laser Touch model LT-B512 targeting device manufactured by Laser Touch and Technologies, LLC, for manual spray painting operations. The relative transfer efficiency (TE) improved an avera...

  2. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  3. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC., PNEUMATIC BLADDER PUMP GW 1400 SERIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  6. Verification of statements about story worlds that deviate from normal conceptions of time: what is true about Einstein's Dreams?

    Science.gov (United States)

    Graesser, A C; Kassler, M A; Kreuz, R J; McLain-Allen, B

    1998-04-01

    College students read chapters from a novel written by Alan Lightman (Einstein's Dreams) and later provided verification judgments on the truth/falsity of test statements. Each chapter described a different fictional village that incorporated assumptions about time that deviate from our normal TIME schema, e.g., citizens knowing exactly when the world will end, time flowing backward instead of forward. These novel assumptions about time provided interesting insights about life and reality. In two experiments, we examined whether readers could accurately incorporate these novel assumptions about time in the fictional story worlds, as manifested in the verification judgments for statements after story comprehension. The test statements included verbatim typical, verbatim atypical, inference typical, and inference atypical information from the perspective of mundane reality that meshes with a normal TIME schema. Verification ratings were collected on a 6-point scale in Experiment 1, whereas Experiment 2 used a signal-response technique in which binary true/false decisions were extracted at-.5, 1.5, 3.5, 5.5, and 10.0 s. The college students were measured on literary expertise, reading skill, working memory span, and reading time. Readers with comparatively high literary expertise showed truth discrimination scores that were compatible with a schema copy plus tag model, which assumes that readers are good at detecting and remembering atypical verbatim information; this model predicts better (and faster) truth discrimination for verbatim atypical statements than for verbatim typical statements. In contrast, fast readers with comparatively low literary expertise were compatible with a filtering model; this model predicts that readers gloss over (or suppress) atypical verbatim information and show advantages for verbatim typical information. All groups of readers had trouble inferentially propagating the novel assumptions about time in a fictional story world, but the

  7. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION (POSTER)

    Science.gov (United States)

    ETV is presenting a poster at the EPA's 2005 Science Forum from May 16-18, 2005 in Washington, DC. This poster will contain a summary of the performance results realized by the six verified diesel retrofit technologies, as well as potential impacts that could be realized if sigi...

  8. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    Science.gov (United States)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION--FUELCELL ENERGY, INC.: DFC 300A MOLTEN CARBONATE FUEL CELL COMBINED HEAT AND POWER SYSTEM

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  10. Battery Technology Life Verification Test Manual Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Jon P. Christophersen

    2012-12-01

    The purpose of this Technology Life Verification Test (TLVT) Manual is to help guide developers in their effort to successfully commercialize advanced energy storage devices such as battery and ultracapacitor technologies. The experimental design and data analysis discussed herein are focused on automotive applications based on the United States Advanced Battery Consortium (USABC) electric vehicle, hybrid electric vehicle, and plug-in hybrid electric vehicle (EV, HEV, and PHEV, respectively) performance targets. However, the methodology can be equally applied to other applications as well. This manual supersedes the February 2005 version of the TLVT Manual (Reference 1). It includes criteria for statistically-based life test matrix designs as well as requirements for test data analysis and reporting. Calendar life modeling and estimation techniques, including a user’s guide to the corresponding software tool is now provided in the Battery Life Estimator (BLE) Manual (Reference 2).

  11. Hanford science and technology needs statements, 1999

    Energy Technology Data Exchange (ETDEWEB)

    Berlin, G.T.

    1998-09-30

    In the aftermath of the Cold War, the US has begun addressing the environmental consequences of five decades of nuclear weapons production. In November 1989, DOE established the Office of Environmental Restoration and Waste Management (EM) as the central authority for cleaning up the DOE weapons complex legacy of pollution, for preventing further environmental contamination, and for instituting responsible environmental management. While performing its tasks, EM found that many aspects of its large and complex decisions could not be achieved using existing science and technology or without incurring unreasonable costs, risks, or schedule impacts. Consequently, a process was developed to solicit needs from around the DOE complex and focus the science and technology resources of EM-50, the National Laboratories, private industry, and collages and universities on those needs. This document describes those needs which the Hanford Site has identified as requiring additional science or technology to complete.

  12. Hanford science and technology needs statements, 2000

    Energy Technology Data Exchange (ETDEWEB)

    BERLIN, G.T.

    1999-07-16

    In the aftermath of the Cold War, the United States has begun addressing the environmental consequences of five decades of nuclear weapons production. In November 1989, DOE established the Office of Environmental Restoration and Waste Management (EM) as the central authority for cleaning up the DOE weapons complex legacy of pollution, for preventing further environmental contamination, and for instituting responsible environmental management. While performing its tasks, EM found that many aspects of its large and complex mission could not be achieved using existing science and technology or without incurring unreasonable costs, risks, or schedule impacts. Consequently, a process was developed to solicit needs from around the DOE complex and focus the science and technology resources of EM-50, the National Laboratories, private industry, and colleges and universities on those needs. This document describes those needs that the Hanford Site has identified as requiring additional science or technology to complete.

  13. HANFORD SCIENCE & TECHNOLOGY NEEDS STATEMENTS 2002

    Energy Technology Data Exchange (ETDEWEB)

    WIBLE, R.A.

    2002-04-01

    This document: (a) provides a comprehensive listing of the Hanford sites science and technology needs for fiscal year (FY) 2002; and (b) identifies partnering and commercialization opportunities within industry, other federal and state agencies, and the academic community. These needs were prepared by the Hanford projects (within the Project Hanford Management Contract, the Environmental Restoration Contract and the River Protection Project) and subsequently reviewed and endorsed by the Hanford Site Technology Coordination Group (STCG). The STCG reviews included participation of DOE-RL and DOE-ORP Management, site stakeholders, state and federal regulators, and Tribal Nations. These needs are reviewed and updated on an annual basis and given a broad distribution.

  14. Test/QA Plan for Verification of Leak Detection and Repair Technologies

    Science.gov (United States)

    The purpose of the leak detection and repair (LDAR) test and quality assurance plan is to specify procedures for a verification test applicable to commercial LDAR technologies. The purpose of the verification test is to evaluate the performance of participating technologies in b...

  15. Task Force Report: Assessment of Nuclear Monitoring and Verification Technologies

    Science.gov (United States)

    2014-01-01

    UNCLASSIFIED  Recommendation:  State/Bureau  of  Arms  Control,  Verification  and  Compliance  ( AVC )  (diplomatic), DOE/National Nuclear Security...Department.     Recommendation:  State/ AVC ,  DOE/NNSA,  and  DoD/Acquisition,  Technology,  and  Logistics  (AT&L)  should  review  current U.S.  facility...agencies, State/ AVC , ASD(NCB), NNSA and NCPC should create  the processes and oversee the following steps:       Establish  a  “White  Team”  whose

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SHARPE MANUFACTURING TITANIUM T1-CG SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ANEST IWATA CORPORATION W400-LV SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BIOQUELL, INC. CLARIS C HYDROGEN PEROXIDE GAS GENERATOR

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Clarus C Hydrogen Peroxide Gas Generator, a biological decontamination device manufactured by BIOQUELL, Inc. The unit was tested by evaluating its ability to decontaminate seven types...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - MENARDI-CRISWELL 50-504 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - STANDARD FILTER CORPORATION PE16ZU FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - INSPEC FIBRES 5512BRF FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - AIR PURATOR CORPORATION HUYGLAS 1405M FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - BHA GROUP, INC. QG061 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    Science.gov (United States)

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - ALBANY INTERNATIONAL CORP. INDUSTRIAL PROCESS TECHNOLOGIES PRIMATEX PLUS I FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  6. Specification of needs statements for training simulation development, verification and validation

    NARCIS (Netherlands)

    Roza, Z.C.; Stubbé, H.E.

    2009-01-01

    The first step in any system life-cycle is the specification of a needs statement. Such a statement expresses the need for a system in terms of the problem that has to be addressed, how the system will be deployed to address the problem (i.e. intended use), and an initial (user) requirements

  7. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  8. Development of evaluation and performance verification technology for radiotherapy radiation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. Y.; Jang, S. Y.; Kim, B. H. and others

    2005-02-15

    No matter how much the importance is emphasized, the exact assessment of the absorbed doses administered to the patients to treat the various diseases such as lately soaring malignant tumors with the radiotherapy practices is the most important factor. In reality, several over-exposed patients from the radiotherapy practice become very serious social issues. Especially, the development of a technology to exactly assess the high doses and high energies (In general, dose administered to the patients with the radiotherapy practices are very huge doses, and they are about three times higher than the lethal doses) generated by the radiation generators and irradiation equipment is a competing issue to be promptly conducted. Over fifty medical centers in Korea operate the radiation generators and irradiation equipment for the radiotherapy practices. However, neither the legal and regulatory systems to implement a quality assurance program are sufficiently stipulated nor qualified personnel who could run a program to maintain the quality assurance and control of those generators and equipment for the radiotherapy practices in the medical facilities are sufficiently employed. To overcome the above deficiencies, a quality assurance program such as those developed in the technically advanced countries should be developed to exactly assess the doses administered to patients with the radiotherapy practices and develop the necessary procedures to maintain the continuing performance of the machine or equipment for the radiotherapy. The QA program and procedures should induce the fluent calibration of the machine or equipment with quality, and definitely establish the safety of patients in the radiotherapy practices. In this study, a methodology for the verification and evaluation of the radiotherapy doses is developed, and several accurate measurements, evaluations of the doses delivered to patients and verification of the performance of the therapy machine and equipment are

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: MOBILE SOURCE RETROFIT AIR POLLUTION CONTROL DEVICES: CLEAN CLEAR FUEL TECHNOLOGIES, INC.’S, UNIVERSAL FUEL CELL

    Science.gov (United States)

    The U.S. EPA's Office of Research and Development operates the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative technologies through performance verification and information dissemination. Congress funds ETV in response to the belief ...

  10. Transparencies used in describing the CTBT verification regime and its four monitoring technologies

    International Nuclear Information System (INIS)

    Basham, P.

    1999-01-01

    This presentation includes description of the CTBT verification regime and its four monitoring technologies, (namely, seismic monitoring, hydro acoustic monitoring, infrasound monitoring and radionuclides monitoring) CTBT global verification system, sequence of steps needed for installing an international monitoring system station which includes: site survey, site preparation and construction, equipment procurement and installation, final tests and certification

  11. Technology verification phase. Dynamic isotope power system. Final report

    International Nuclear Information System (INIS)

    Halsey, D.G.

    1982-01-01

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance

  12. Technology verification phase. Dynamic isotope power system. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.G.

    1982-03-10

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance. (LCL)

  13. Integrating Requirements Engineering, Modeling, and Verification Technologies into Software and Systems Engineering

    National Research Council Canada - National Science Library

    Broy, Manfred; Leucker, Martin

    2007-01-01

    The objective of this project is the development of an integrated suite of technologies focusing on end-to-end software development supporting requirements analysis, design, implementation, and verification...

  14. ENVIRONMENTAL TECHNOLOGY PROTOCOL VERIFICATION REPORT, EMISSIONS OF VOCS AND ALDEHYDES FROM COMMERCIAL FURNITURE (WITH APPENDICES)

    Science.gov (United States)

    As part of a U.S. Environmental Protection Agency Environmental Technology Verification program, the Research Triangle Institute (RTI) developed a test protocol for measuring volatile organic compounds and aldehydes in a large chamber. RTI convened stakeholders for the commercial...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION: ALLIED PHOTOCHEMICAL KROHNZONE 7014 UV-CURABLE COATING

    Science.gov (United States)

    This Environmental Technology Verification report reports on reasearch done on a UV-curable automotive paint. The paint was tested for thickness, appearance, gloss, salt spray resistance, humidity resistance, adhesion, impact, mandrel bend, MEK rub, and abrasion resistance.

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: NEW CONDENSATOR, INC.--THE CONDENSATOR DIESEL ENGINE RETROFIT CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    EPA's Environmental Technology Verification Program has tested New Condensator Inc.'s Condensator Diesel Engine Retrofit Crankcase Ventilation System. Brake specific fuel consumption (BSFC), the ratio of engine fuel consumption to the engine power output, was evaluated for engine...

  17. Statements Relating to the Impact of Technological Change. Technology and the American Economy, Appendix, Volume VI.

    Science.gov (United States)

    National Commission on Technology, Automation and Economic Progress, Washington, DC.

    Forty-seven statements by industrial and business spokesmen, union and association representatives, and professors concern the broad impact of technological change on individuals, establishments, and society in general. Some of the longer presentations are (1) "The Poverty and Unemployment Crisis," by Walter Buckingham, (2) "Technological…

  18. Dynamic Isotope Power System: technology verification phase, program plan, 1 October 1978

    International Nuclear Information System (INIS)

    1979-01-01

    The technology verification phase program plan of the Dynamic Isotope Power System (DIPS) project is presented. DIPS is a project to develop a 0.5 to 2.0 kW power system for spacecraft using an isotope heat source and a closed-cycle Rankine power-system with an organic working fluid. The technology verification phase's purposes are to increase the system efficiency to over 18%, to demonstrate system reliability, and to provide an estimate for flight test scheduling. Progress toward these goals is reported

  19. TEST DESIGN FOR ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) OF ADD-ON NOX CONTROL UTILIZING OZONE INJECTION

    Science.gov (United States)

    The paper discusses the test design for environmental technology verification (ETV) of add-0n nitrogen oxides (NOx) control utilizing ozone injection. (NOTE: ETV is an EPA-established program to enhance domestic and international market acceptance of new or improved commercially...

  20. ENVIORNMENTAL TECHNOLOGY VERIFICATION REPORT: ANEST IWATA CORPORATION LPH400-LV HVLP SPRAY GUN

    Science.gov (United States)

    This Enviornmental Technology Verification reports on the characteristics of a paint spray gun. The research showed that the spray gun provided absolute and relative increases in transfer efficiency over the base line and provided a reduction in the use of paint.

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, TETRATEC PTFE PRODUCTS, TETRATEX 6212 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, BHA GROUP, INC., QP131 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, POLYMER GROUP, INC., DURAPEX PET FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - W.L. GORE & ASSOCIATES, INC. L4347 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - BASF CORPORATION AX/BA-14/9-SAXP FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  6. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, FLINT HILLS RESOURCES, LP, CCD15010 DIESEL FUEL FORMULATION WITH HITEC4121 ADDITIVE

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  8. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  9. Update on Monitoring Technologies for International Safeguards and Fissile Material Verification

    International Nuclear Information System (INIS)

    Croessmann, C. Dennis; Glidewell, Don D.; Mangan, Dennis L.; Smathers, Douglas C.

    1999-01-01

    Monitoring technologies are playing an increasingly important part in international safeguards and fissile material verification. The developments reduce the time an inspector must spend at a site while assuring continuity of knowledge. Monitoring technologies' continued development has produced new seal systems and integrated video surveillance advances under consideration for Trilateral Initiative use. This paper will present recent developments for monitoring systems at Embalse, Argentina, VNHEF, Sarov, Russian, and Savannah River Site, Aiken, South Carolina

  10. Operational Concept of the NEXTSat-1 for Science Mission and Space Core Technology Verification

    Directory of Open Access Journals (Sweden)

    Goo-Hwan Shin

    2014-03-01

    Full Text Available The next generation small satellite-1 (NEXTSat-1 program has been kicked off in 2012, and it will be launched in 2016 for the science missions and the verification of space core technologies. The payloads for these science missions are the Instrument for the Study of Space Storms (ISSS and NIR Imaging Spectrometer for Star formation history (NISS. The ISSS and the NISS have been developed by Korea Advanced Institute of Science and Technology (KAIST and Korea Astronomy and Space science Institute (KASI respectively. The ISSS detects plasma densities and particle fluxes of 10 MeV energy range near the Earth and the NISS uses spectrometer. In order to verify the spacecraft core technologies in the space, the total of 7 space core technologies (SCT will be applied to the NEXTSat-1 for space verification and those are under development. Thus, the operation modes for the ISSS and the NISS for space science missions and 7 SCTs for technology missions are analyzed for the required operation time during the NEXTSat-1’s mission life time of 2 years. In this paper, the operational concept of the NEXTSat-1’s science missions as well as the verification of space core technologies are presented considering constraints of volume, mass, and power after launch.

  11. Independent Verification Survey Report For Zone 1 Of The East Tennessee Technology Park In Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    King, David A.

    2012-01-01

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs)

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP), FINAL TECHNOLOGY APPLICATIONS GROUP TAGNITE--TESTING AND QUALITY ASSURANCE PLAN (T/QAP)

    Science.gov (United States)

    The overall objective of the Environmental Testing and Verification Coatings and Coating Equipment Program is to verify pollution prevention and performance characteristics of coating technologies and make the results of the testing available to prospective coating technology use...

  13. RAPID FREEFORM SHEET METAL FORMING: TECHNOLOGY DEVELOPMENT AND SYSTEM VERIFICATION

    Energy Technology Data Exchange (ETDEWEB)

    Kiridena, Vijitha [Ford Scientific Research Lab., Dearborn, MI (United States); Verma, Ravi [Boeing Research and Technology (BR& T), Seattle, WA (United States); Gutowski, Timothy [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Roth, John [Pennsylvania State Univ., University Park, PA (United States)

    2018-03-31

    The objective of this project is to develop a transformational RApid Freeform sheet metal Forming Technology (RAFFT) in an industrial environment, which has the potential to increase manufacturing energy efficiency up to ten times, at a fraction of the cost of conventional technologies. The RAFFT technology is a flexible and energy-efficient process that eliminates the need for having geometry-specific forming dies. The innovation lies in the idea of using the energy resource at the local deformation area which provides greater formability, process control, and process flexibility relative to traditional methods. Double-Sided Incremental Forming (DSIF), the core technology in RAFFT, is a new concept for sheet metal forming. A blank sheet is clamped around its periphery and gradually deformed into a complex 3D freeform part by two strategically aligned stylus-type tools that follow a pre-described toolpath. The two tools, one on each side of the blank, can form a part with sharp features for both concave and convex shapes. Since deformation happens locally, the forming force at any instant is significantly decreased when compared to traditional methods. The key advantages of DSIF are its high process flexibility, high energy-efficiency, low capital investment, and the elimination of the need for massive amounts of die casting and machining. Additionally, the enhanced formability and process flexibility of DSIF can open up design spaces and result in greater weight savings.

  14. Radio-xenon monitoring technology for CTBT verification

    Energy Technology Data Exchange (ETDEWEB)

    An, J. S.; Yoon, W. K.; Shin, J. S.; Kim, J. S.; Lee, Y. G.; Na, W. W

    1998-03-01

    To help ensure compliance with a comprehensive nuclear test ban treaty (CTBT), it is important that monitoring technologies for detecting covert nuclear testing be available. Monitoring methods are included seismic, hydroacoustic, infra-sound, and radionuclide technologies. Conducting a test underground, underwater, under such condition, gaseous radionuclides detection would be useful method for detecting of nuclear detonation. This report described on as to performance of detecting equipment and detecting principle of radioactive described on as to performance of detecting equipment and detecting principle of radioactive noble gas detection for CTBT. Although the quantity of xenon radionuclides entering the atmosphere from a nuclear detonation may be very large, the combination of dilution in the atmosphere plus radioactive decay requires very sensitive measurements to detect these radionuclides. Furthermore, xenon radionuclides can be enter the atmosphere from sources other than nuclear detonation, including operating nuclear reactors, producing and using medical isotopes and nuclear fuel reprocessing. Since measurement of the activity ratios of xenon radionuclides is important for determine of their origin. (author). 19 refs., 13 tabs., 18 figs

  15. Opening Statement [International Safeguards Symposium on Preparing for Future Verification Challenges, Vienna (Austria), 1-5 November 2010

    International Nuclear Information System (INIS)

    Martikka, E.

    2013-01-01

    The main task of ESARDA is to advance and harmonize R and D in the area of safeguards. It is also a forum for the exchange of information and ideas between nuclear facility operators, safeguards authorities, and organizations and people engaged in R and D. ESARDA aims to bring together all those involved in safeguards, so that progress and continuous improvement in international safeguards can be achieved efficiently and to professional standards. The principal issues are coordination of research, exchange of information and joint execution of R and D programmes. The heart of ESARDA activities are its Working Groups, which were established to promote and undertake collaborative R and D and information exchange in particular fields. ESARDA has nine Working Groups covering: - Destructive analysis, non-destructive analysis, containment and surveillance, safeguards implementation, integrated safeguards, and nuclear material accounting and control; - Training and knowledge - we note that over the past six years, ESARDA has educated more than 250 students, and that in 2011, ESARDA will run three courses - in Ispra (Italy), France and Sweden; - Verification technologies and methodologies, and the latest in novel technologies and approaches. The Editorial Committee, which takes care of all external communications, publishes the ESARDA Bulletin, and organizes biennial meetings and symposia. During its 40 year history, ESARDA has been active in building an effective European safeguards world and has reached a remarkable position in the international safeguards community. Success has followed from responding to the needs of our customers. To be successful in the future, we must be sensitive to changes and challenges in our operational environment, and understand how our customers and their needs are developing and changing. During the past year, the ESARDA Steering Committee set up a new Reflection Group, with the task of assessing the international and European context, and

  16. VZLUSAT-1: verification of new materials and technologies for space

    Science.gov (United States)

    Daniel, Vladimir; Urban, Martin; Nentvich, Ondrej; Stehlikova, Veronika

    2016-09-01

    CubeSats are a good opportunity to test new technologies and materials on orbit. These innovations can be later used for improving of properties and life length of Cubesat or other satellites as well. VZLUSAT-1 is a small satellite from the CubeSat family, which will carry a wide scale of payloads with different purposes. The poster is focused on measuring of degradation and properties measurement of new radiation hardened composite material in orbit due to space environment. Material properties changes can be studied by many methods and in many disciplines. One payload measures mechanical changes in dependence on Young's modulus of elasticity which is got from non-destructive testing by mechanical vibrations. The natural frequencies we get using Fast Fourier Transform. The material is tested also by several thermometers which measure heat distribution through the composite, as well as reflectivity in dependence on different coatings. The satellite also will measure the material radiation shielding properties. There are PIN diodes which measure the relative shielding efficiency of composite and how it will change in time in space environment. Last one of material space testing is measurement of outgassing from tested composite material. It could be very dangerous for other parts of satellite, like detectors, when anything was outgassing, for example water steam. There are several humidity sensors which are sensitive to steam and other gases and measures temperatures as well.

  17. New Approaches and New Technologies for the Verification of Nuclear Disarmament

    International Nuclear Information System (INIS)

    Keir, David

    2013-01-01

    ESARDA’s New Approaches/Novel Technologies Working group has recently begun to take a great interest in technology for use in arms control verification, in parallel with a focus on Nuclear Safeguards technology. A topic-based meeting of members of the NA/NT Subgroup was hosted at Joint Research Centre (JRC), ITU-Nuclear Security Unit in Ispra (Italy), to further explore the technical issues and opportunities presented by the need for new approaches and technologies in a future verified nuclear weapons dismantlement regime. Nuclear warheads must contain radioactive material and, by their nature, gamma rays and neutrons are likely to penetrate to the outside of the warhead casing and even metal containers. Therefore radiation signatures should be detectable by appropriate pieces of equipment. For this reason, researchers in the field of technical verification of nuclear warhead dismantlement have studied and developed technologies for Non-Destructive Assay (NDA). This paper presents a generic dismantlement pathway for verified nuclear warhead dismantlement, based on the scenario employed by the UK-Norway initiative for their exercise in 2008/9. Using this as a framework the types of measurement challenge likely to be presented to a verifying inspector are discussed. The problem of intrusiveness of measurements in relation to the issue of proliferative release of classified information about the warhead attributes is discussed and the concept of ‘information barriers is introduced as a possible solution to this issue. A list of candidate technologies for use in verification activities, with or without information barriers is then presented and, since most of these are new or novel approaches to the issue, an already-established system for classifying them – in terms of state of development and complexity of use in this context – is proposed. Finally, the concept of capturing this information as a library of ‘data sheets’, designed for periodic review as

  18. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  19. DOE/LLNL verification symposium on technologies for monitoring nuclear tests related to weapons proliferation

    International Nuclear Information System (INIS)

    Nakanishi, K.K.

    1993-01-01

    The rapidly changing world situation has raised concerns regarding the proliferation of nuclear weapons and the ability to monitor a possible clandestine nuclear testing program. To address these issues, Lawrence Livermore National Laboratory's (LLNL) Treaty Verification Program sponsored a symposium funded by the US Department of Energy's (DOE) Office of Arms Control, Division of Systems and Technology. The DOE/LLNL Symposium on Technologies for Monitoring Nuclear Tests Related to Weapons Proliferation was held at the DOE's Nevada Operations Office in Las Vegas, May 6--7,1992. This volume is a collection of several papers presented at the symposium. Several experts in monitoring technology presented invited talks assessing the status of monitoring technology with emphasis on the deficient areas requiring more attention in the future. In addition, several speakers discussed proliferation monitoring technologies being developed by the DOE's weapons laboratories

  20. Status and Application of Spatial Information Technology as a Nuclear Verification Tool

    Energy Technology Data Exchange (ETDEWEB)

    Jo, Seong Youn; Shin, Jang Soo [Korea Institute of Nuclear Non-proliferation And Control, Daejeon (Korea, Republic of)

    2010-05-15

    The spatial information like satellite imagery and GIS data has been widely used for site development planning and monitoring in the area where the access is not allowed with any reason. The IAEA adopts this new method of analysis for enhancing its verification capability and is utilizing to search if there is any undeclared nuclear activities in the nuclear facilities worldwide. The ROK entered the group of the leading countries in the field of space technology with the successful launching of the KompSat I and II, and holds its high position in the IT technology which can draw useful analytic results from the satellite imagery. It implies that the ROK has some potential and related infra required for using the satellite imagery for the purpose of nuclear safeguards. However, we are in the very early stage to apply these advanced techniques to nuclear verification, because we don't have enough work forces enough to deal with these useful tools. It is necessary to review some previous examples about establishing satellite imagery analysis system like the IAEA. In this report, the IAEA's activities related verification using satellite imagery is reviewed and some examples on safeguards application is presented. A way to use satellite images for national inspection also is suggested

  1. Working Group 2: Future Directions for Safeguards and Verification, Technology, Research and Development

    International Nuclear Information System (INIS)

    Zykov, S.; Blair, D.

    2013-01-01

    For traditional safeguards it was recognized that the hardware presently available is, in general, addressing adequately fundamental IAEA needs, and that further developments should therefore focus mainly on improving efficiencies (i.e. increasing cost economies, reliability, maintainability and user-friendliness, keeping abreast of continual advancements in technologies and of the evolution of verification approaches). Specific technology areas that could benefit from further development include: -) Non-destructive measurement systems (NDA), in particular, gamma-spectroscopy and neutron counting techniques; -) Containment and surveillance tools, such as tamper indicating seals, video-surveillance, surface identification methods, etc.; -) Geophysical methods for design information verification (DIV) and safeguarding of geological repositories; and -) New tools and methods for real-time monitoring. Furthermore, the Working Group acknowledged that a 'building block' (or modular) approach should be adopted towards technology development, enabling equipment to be upgraded efficiently as technologies advance. Concerning non-traditional safeguards, in the area of satellite-based sensors, increased spatial resolution and broadened spectral range were identified as priorities. In the area of wide area surveillance, the development of LIDAR-like tools for atmospheric sensing was discussed from the perspective of both potential benefits and certain limitations. Recognizing the limitations imposed by the human brain in terms of information assessment and analysis, technologies are needed that will enable the more effective utilization of all information, regardless of its format and origin. The paper is followed by the slides of the presentation. (A.C.)

  2. Statement

    International Nuclear Information System (INIS)

    Park, H.

    2003-01-01

    . Therefore, KAERI decided upon immediate decommissioning of both research reactors. Currently, the Republic of Korea has 17 NPPs in operation.They consist of 13 PWR and 4 CANDU type PHWR reactors.The first NPP in the Republic of Korea was Kori-1, which started operation in 1978. Taking into account its design life span of 30 years, it will be shut down in 2008. But the utility company for the NPP, the Korea Hydro-Nuclear Co. (KHNC), is promoting the extension of its life. However, it is expected that there will be many difficulties in obtaining public acceptance. In considering the decommissioning of the NPP, it is recommended that heavily populated countries such as the Republic of Korea choose immediate decommissioning. According to the power supply plan of Korea, 11 more NPPs are being planned for construction and operation until the year 2015. However, it is not easy to get new sites for them. Therefore, it is desirable to locate the new reactors at current sites. Most of the sites have duplicate reactors, but their life spans are not comparable with each other. Therefore, decommissioning should wait until both reactors at the site have reached the end of their life. After decommissioning of the retired reactor, it is desirable to install the Korean Standard Nuclear Plant (KSNP), which has a capacity of 1400 MW(e). This will be one way of resolving the siting problem and reducing the cost of decommissioning and construction. If the Republic of Korea decides to start decommissioning NPPs in 2013, it is necessary to secure the necessary and related technologies for successful decommissioning through R and D. Therefore, during the decommissioning of KRR-1 and KRR-2, basic technologies will be developed and demonstrated under middle to long term R and D programmes. The object of the first stage of the programme, from August 2001 to March 2004, is technology development related to the decommissioning of the research reactor. During the second stage of the programme, April

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES/CLEAN DIESEL TECHNOLOGIES FUEL BORNE CATALYST WITH CLEANAIR SYSTEM'S DIESEL OXIDATION CATALYST

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with CleanAir System's Diesel Oxidation Catalyst manufactured by Clean Diesel Technologies, Inc. The technology is a fuel-borne catalyst used in ultra low sulfur d...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES: CLEAN DIESEL TECHNOLOGIES FUEL-BORNE CATALYST WITH MITSUI/PUREARTH CATALYZED WIRE MESH FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with Mitsui/PUREarth Catalyzed Wire Mesh Filter manufactured by Clean Diesel Technologies, Inc. The technology is a platinum/cerium fuel-borne catalyst in commerci...

  5. US monitoring and verification technology: on-site inspection experience and future challenges

    International Nuclear Information System (INIS)

    Gullickson, R.L.; Carlson, D.; Ingraham, J.; Laird, B.

    2013-01-01

    The United States has a long and successful history of cooperation with treaty partners in monitoring and verification. For strategic arms reduction treaties, our collaboration has resulted in the development and application of systems with limited complexity and intrusiveness. As we progress beyond New START (NST) along the 'road to zero', the reduced number of nuclear weapons is likely to require increased confidence in monitoring and verification techniques. This may place increased demands on the technology to verify the presence of a nuclear weapon and even confirm the presence of a certain type. Simultaneously, this technology must include the ability to protect each treaty partner's sensitive nuclear weapons information. Mutual development of this technology by treaty partners offers the best approach for acceptance in treaty negotiations. This same approach of mutual cooperation and development is essential for developing nuclear test monitoring technology in support of the Comprehensive Nuclear Test Ban Treaty (CTBT). Our ability to detect low yield and evasive testing will be enhanced through mutually developed techniques and experiments using laboratory laser experiments and high explosives tests in a variety of locations and geologies. (authors)

  6. Technology Foresight and nuclear test verification: a structured and participatory approach

    Science.gov (United States)

    Noack, Patrick; Gaya-Piqué, Luis; Haralabus, Georgios; Auer, Matthias; Jain, Amit; Grenard, Patrick

    2013-04-01

    As part of its mandate, the CTBTO's nuclear explosion monitoring programme aims to maintain its sustainability, effectiveness and its long-term relevance to the verification regime. As such, the PTS is conducting a Technology Foresight programme of activities to identify technologies, processes, concepts and ideas that may serve said purpose and become applicable within the next 20 years. Through the Technology Foresight activities (online conferences, interviews, surveys, workshops and other) we have involved the wider science community in the fields of seismology, infrasound, hydroacoustics, radionuclide technology, remote sensing and geophysical techniques. We have assembled a catalogue of over 200 items, which incorporate technologies, processes, concepts and ideas which will have direct future relevance to the IMS (International Monitoring System), IDC (International Data Centre) and OSI (On-Site Inspection) activities within the PTS. In order to render this catalogue as applicable and useful as possible for strategy and planning, we have devised a "taxonomy" based on seven categories, against which each technology is assessed through a peer-review mechanism. These categories are: 1. Focus area of the technology in question: identify whether the technology relates to (one or more of the following) improving our understanding of source and source physics; propagation modelling; data acquisition; data transport; data processing; broad modelling concepts; quality assurance and data storage. 2. Current Development Stage of the technology in question. Based on a scale from one to six, this measure is specific to PTS needs and broadly reflects Technology Readiness Levels (TRLs). 3. Impact of the technology on each of the following capabilities: detection, location, characterization, sustainment and confidence building. 4. Development cost: the anticipated monetary cost of validating a prototype (i.e. Development Stage 3) of the technology in question. 5. Time to

  7. CTBT verification-related technologies for peaceful purposes: the French experiences of international cooperation

    International Nuclear Information System (INIS)

    Massinon, B.

    1999-01-01

    The French experience concerning CTBT verification-related technologies for peaceful purposes as well a the international cooperation in this field are presented. Possible objectives and cooperation program needs are cited. French experience in international cooperation is related to seismology and seismic hazards in Bolivia, Madagascar, Nepal and Indonesia and is considered as very constructive, meaning that technical experience is developed, consistent scientific results are obtained, and a considerable yield to the CTBT task is achieved. Large scientific benefits are expected from the CTBTO

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: UTC FUEL CELLS' PC25C POWER PLANT - GAS PROCESSING UNIT PERFORMANCE FOR ANAEROBIC DIGESTER GAS

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system based on the UTC Fuel Cell's PC25C Fuel Cell Power Plant was evaluated. The...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT-A AND A ENVIRONMENTAL SEALS, INC., SEAL ASSIST SYSTEM (SAS) PHASE II REPORT

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Seal Assist System (SAS) for natural gas reciprocating compressor rod packing manufactured by A&A Environmental Seals, Inc. The SAS uses a secondary containment gland to collect natural g...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: RESIDENTIAL ELECTRIC POWER GENERATION USING THE PLUG POWER SU1 FUEL CELL SYSTEM

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Plug Power SU1 Fuel Cell System manufactured by Plug Power. The SU1 is a proton exchange membrane fuel cell that requires hydrogen (H2) as fuel. H2 is generally not available, so the ...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, CUMMINS EMISSION SOLUTIONS AND CUMMINS FILTRATION DIESEL OXIDATION CATALYST AND CLOSED CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) Program. ETV seeks to provide high-quality, peer-reviewed data on technology performance. The Air Pollution Control Technology (APCT) Verification Center, a center under the ETV Program, is operated by Res...

  13. Sandia technology. Volume 13, number 2 Special issue: verification of arms control treaties

    International Nuclear Information System (INIS)

    1989-01-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  14. Sandia technology. Volume 13, number 2 Special issue : verification of arms control treaties.

    Energy Technology Data Exchange (ETDEWEB)

    1989-03-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, BWF AMERICA, INC. GRADE 700 MPS POLYESTER FELT FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size for particles equal to or smaller than...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, W.L. GORE & ASSOCIATES, INC. LYSB3 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size for particles equal to or smaller than...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, W.L. GORE & ASSOCIATES, INC., L4427 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  18. ETV Tech Brief: Rapid Fungi and Bacteria Detection Technologies

    Science.gov (United States)

    Technical brief that summarizes the results for Mycometer, Inc. Mycometer®-test and Bactiquant®-test, which are rapid detection technologies for fungi and bacteria. The brief summarizes the results of the verification report and statement.

  19. Introductory statement to the Board of Governors. Vienna, 16 June 2003. IAEA Board of Governors

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The statement covers a broad range of issues, including the Agency's Annual Report for 2002, the Technical Co-operation Report for 2002, the report of the Programme and Budget Committee, nuclear verification and the prevention of nuclear terrorism, namely, The Safeguards Implementation Report and Safeguards Statement for 2002; Status of Safeguards Agreements and Additional Protocols; Integrated Safeguards; Verification in Iraq; Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran; Verification in the Democratic People's Republic of Korea; Nuclear Security - Measures To Protect Against Nuclear Terrorism; Nuclear Technology (Agency's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO)); New Information Security Policy; Public Communication of the IAEA

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - LEAD IN DUST WIPE MEASUREMENT TECHNOLOGY, PALINTEST, SCANNING ANALYZER , SA-5000 SYSTEM

    Science.gov (United States)

    ETV works in partnership with recognized standards and testing organizations and stakeholder groups consisting of regulators, buyers, and vendor organizations, with the full participation of individual technology developers. The program evaluates the performance of innovative

  1. Ethics and new reproductive technologies: an international review of committee statements.

    Science.gov (United States)

    Walters, LeRoy

    1987-06-01

    Walters examines the statements of advisory committees in eight countries on new practices involving human reproduction: clinical in vitro fertilization; surrogate motherhood; and human embryo research. He analyzes the positions taken by the committees on the general acceptability of the new technologies, as well as on specific issues involved in assisted human reproduction. In chronological order, the statements examined are those of the U.S. Ethics Advisory Board; the Waller committee in Victoria, Australia; a South Australian committee; the Demack committee in Queensland; Britain's Council for Science and Society; Britain's Warnock committee; a Tasmania, Australia, committee; the Ontario Law Reform Commission; Australia's Family Law Council; West Germany's Benda committee; the American Fertility Society; a Western Australia committee; the Dutch Health Council; and the National Ethics Committee of France.

  2. Students' Use of Technological Tools for Verification Purposes in Geometry Problem Solving

    Science.gov (United States)

    Papadopoulos, Ioannis; Dagdilelis, Vassilios

    2008-01-01

    Despite its importance in mathematical problem solving, verification receives rather little attention by the students in classrooms, especially at the primary school level. Under the hypotheses that (a) non-standard tasks create a feeling of uncertainty that stimulates the students to proceed to verification processes and (b) computational…

  3. Research on key technology of the verification system of steel rule based on vision measurement

    Science.gov (United States)

    Jia, Siyuan; Wang, Zhong; Liu, Changjie; Fu, Luhua; Li, Yiming; Lu, Ruijun

    2018-01-01

    The steel rule plays an important role in quantity transmission. However, the traditional verification method of steel rule based on manual operation and reading brings about low precision and low efficiency. A machine vison based verification system of steel rule is designed referring to JJG1-1999-Verificaiton Regulation of Steel Rule [1]. What differentiates this system is that it uses a new calibration method of pixel equivalent and decontaminates the surface of steel rule. Experiments show that these two methods fully meet the requirements of the verification system. Measuring results strongly prove that these methods not only meet the precision of verification regulation, but also improve the reliability and efficiency of the verification system.

  4. Determination of multi-GNSS pseudo-absolute code biases and verification of receiver tracking technology

    Science.gov (United States)

    Villiger, Arturo; Schaer, Stefan; Dach, Rolf; Prange, Lars; Jäggi, Adrian

    2017-04-01

    It is common to handle code biases in the Global Navigation Satellite System (GNSS) data analysis as conventional differential code biases (DCBs): P1-C1, P1-P2, and P2-C2. Due to the increasing number of signals and systems in conjunction with various tracking modes for the different signals (as defined in RINEX3 format), the number of DCBs would increase drastically and the bookkeeping becomes almost unbearable. The Center for Orbit Determination in Europe (CODE) has thus changed its processing scheme to observable-specific signal biases (OSB). This means that for each observation involved all related satellite and receiver biases are considered. The OSB contributions from various ionosphere analyses (geometry-free linear combination) using different observables and frequencies and from clock analyses (ionosphere-free linear combination) are then combined on normal equation level. By this, one consistent set of OSB values per satellite and receiver can be obtained that contains all information needed for GNSS-related processing. This advanced procedure of code bias handling is now also applied to the IGS (International GNSS Service) MGEX (Multi-GNSS Experiment) procedure at CODE. Results for the biases from the legacy IGS solution as well as the CODE MGEX processing (considering GPS, GLONASS, Galileo, BeiDou, and QZSS) are presented. The consistency with the traditional method is confirmed and the new results are discussed regarding the long-term stability. When processing code data, it is essential to know the true observable types in order to correct for the associated biases. CODE has been verifying the receiver tracking technologies for GPS based on estimated DCB multipliers (for the RINEX 2 case). With the change to OSB, the original verification approach was extended to search for the best fitting observable types based on known OSB values. In essence, a multiplier parameter is estimated for each involved GNSS observable type. This implies that we could

  5. Quality Assurance in Environmental Technology Verification (ETV): Analysis and Impact on the EU ETV Pilot Programme Performance

    Science.gov (United States)

    Molenda, Michał; Ratman-Kłosińska, Izabela

    2018-03-01

    Many innovative environmental technologies never reach the market because they are new and cannot demonstrate a successful track record of previous applications. This fact is a serious obstacle on their way to the market. Lack of credible data on the performance of a technology causes mistrust of investors in innovations, especially from public sector, who seek effective solutions however without compromising the technical and financial risks associated with their implementation. Environmental technology verification (ETV) offers a credible, robust and transparent process that results in a third party confirmation of the claims made by the providers about the performance of the novel environmental technologies. Verifications of performance are supported by high quality, independent test data. In that way ETV as a tool helps establish vendor credibility and buyer confidence. Several countries across the world have implemented ETV in the form of national or regional programmes. ETV in the European Union was implemented as a voluntary scheme if a form of a pilot programme. The European Commission launched the Environmental Technology Pilot Programme of the European Union (EU ETV) in 2011. The paper describes the European model of ETV set up and put to operation under the Pilot Programme of Environmental Technologies Verification of the European Union. The goal, objectives, technological scope, involved entities are presented. An attempt has been made to summarise the results of the EU ETV scheme performance available for the period of 2012 when the programme has become fully operational until the first half of 2016. The study was aimed at analysing the overall organisation and efficiency of the EU ETV Pilot Programme. The study was based on the analysis of the documents the operation of the EU ETV system. For this purpose, a relevant statistical analysis of the data on the performance of the EU ETV system provided by the European Commission was carried out.

  6. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  7. Statement on the Science and Technology Program and the Role of Department of Defense Laboratories FY 1979,

    Science.gov (United States)

    1978-05-16

    Di~t Scci ~_STATEMENT ON THE SCIENCI AND TECHNOLOGY PROGRAM AND THE ROLE OF DEPARTMENT OF ’DEFENSE LABORATORIES DR. RUTH M. /DAVIS DEPUTY UNDER...what direction the technology should be pushed. It is often necessary to do the testing there, since many of our labs have unique test facilities. Lastly...overall in-house level would be approximately 30 percent. L 7 The direction concerning the level of in-house Technology Base activity was applied at

  8. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author).

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES--PUREM NORTH AMERICA LLC, PMF GREENTEC 1004205.00.0 DIESEL PARTICULATE FILTER

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) program to provide high quality, peer reviewed data on technology performance to those involved in the design, distribution, financing, permitting, purchase, and use of environmental technologies. The Air Po...

  10. Evaluation of detector array technology for the verification of advanced intensity-modulated radiotherapy

    Science.gov (United States)

    Hussien, Mohammad

    Purpose: Quality assurance (QA) for intensity modulated radiotherapy (IMRT) has evolved substantially. In recent years, various ionization chamber or diode detector arrays have become commercially available, allowing pre-treatment absolute dose verification with near real-time results. This has led to a wide uptake of this technology to replace point dose and film dosimetry and to facilitate QA streamlining. However, arrays are limited by their spatial resolution giving rise to concerns about their response to clinically relevant deviations. The common factor in all commercial array systems is the reliance on the gamma index (γ) method to provide the quantitative evaluation of the measured dose distribution against the Treatment Planning System (TPS) calculated dose distribution. The mathematical definition of the gamma index presents computational challenges that can cause a variation in the calculation in different systems. The purpose of this thesis was to evaluate the suitability of detector array systems, combined with their implementation of the gamma index, in the verification and dosimetry audit of advanced IMRT. Method: The response of various commercial detector array systems (Delta4®, ArcCHECK®, and the PTW 2D-Array seven29™ and OCTAVIUS II™ phantom combination, Gafchromic® EBT2 and composite EPID measurements) to simulated deliberate changes in clinical IMRT and VMAT plans was evaluated. The variability of the gamma index calculation in the different systems was also evaluated by comparing against a bespoke Matlab-based gamma index analysis software. A novel methodology for using a commercial detector array in a dosimetry audit of rotational radiotherapy was then developed. Comparison was made between measurements using the detector array and those performed using ionization chambers, alanine and radiochromic film. The methodology was developed as part of the development of a national audit of rotational radiotherapy. Ten cancer centres were

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: IN-DRAIN TREATMENT DEVICE. HYDRO INTERNATIONAL UP-FLO™ FILTER

    Science.gov (United States)

    Verification testing of the Hydro International Up-Flo™ Filter with one filter module and CPZ Mix™ filter media was conducted at the Penn State Harrisburg Environmental Engineering Laboratory in Middletown, Pennsylvania. The Up-Flo™ Filter is designed as a passive, modular filtr...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, MIRATECH CORPORATIONM GECO 3001 AIR/FUEL RATIO CONTROLLER

    Science.gov (United States)

    Details on the verification test design, measurement test procedures, and Quality assurance/Quality Control (QA/QC) procedures can be found in the test plan titled Testing and Quality Assurance Plan, MIRATECH Corporation GECO 3100 Air/Fuel Ratio Controller (SRI 2001). It can be d...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HVLP COATING EQUIPMENT, SHARPE MANUFACTURING COMPANY PLATINUM 2012 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the Sharpe Platinum 2013 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the Sharpe Platinum, which is designed for use in automotive refinishing. The test coating chosen by Sharpe Manufacturi...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DEVILBISS JGHV-531-46FF HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss JGHV-531-46FF high-volume, low-pressure pressure-feed spray gun, hereafter referred to as the DeVilbiss JGHV, which is designed for use in industrial finishing. The test coating chosen by ITW Industrial Fi...

  15. An overview of CTBT verification technologies and status of IMS networks

    International Nuclear Information System (INIS)

    Basham, P.

    2002-01-01

    The CTBT history is described in brief. Nuclear test environments and verification regime are presented with illustrations. Geographical location of seismic, hydroacoustic, infrasound and radionuclide monitoring networks are indicated on globe maps. Benefits of the International Monitoring System (IMS) to host countries are listed

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: STORMWATER SOURCE AREA TREATMENT DEVICE — BAYSAVER TECHNOLOGIES, INC. BAYSAVER SEPARATION SYSTEM, MODEL 10K

    Science.gov (United States)

    Verification testing of the BaySaver Separation System, Model 10K was conducted on a 10 acre drainage basin near downtown Griffin, Georgia. The system consists of two water tight pre-cast concrete manholes and a high-density polyethylene BaySaver Separator Unit. The BaySaver Mod...

  17. Non proliferation regimes undertakings: Benefits and limits of synergies in verification technologies and procedures

    International Nuclear Information System (INIS)

    Richard, M.

    2001-01-01

    Full text: Thirty years ago the NPT was entering into force. Therewith, when a State became party to the NPT, it had, in accordance with article III.1 of the Treaty, an undertaking to conclude a Comprehensive Safeguards agreement with the IAEA and accept safeguards verification on source or special fissionable material in all peaceful nuclear activities within its territories in order to verify that such material is not diverted. This multilateral instrument was the foundation stone of the non-proliferation regime and marked the actual birth of internationally accepted measures to verily compliance with politically stringent agreements. Since that time several important multilateral or bilateral instruments on non-proliferation and disarmament have been negotiated and adopted to curb the development and the acquisition of Weapons of Mass Destruction (WMD) most of them since the middle of the eighties and the collapse of the Soviet Union. Amongst the multilateral instruments are the Convention on the Prohibition of Bacteriological Weapon and Toxin Weapons (1972), the Convention on the Prohibition of Chemical Weapons (1993), the Comprehensive Test Ban Treaty (1996), the Strengthening of the IAEA Safeguards and the Additional Protocol (1997), with some still in negotiation like the Protocol of the Convention on the Prohibition of Bacteriological and Toxin Weapons, and some on which negotiation is still a wish like the Fissile Material Cut-off Treaty. Bilateral disarmament agreements between the United States of America and the Russian Federation such as the INF Treaty, START I and II, the agreements on the elimination of excess defence nuclear material as well as the Trilateral Initiative with the IAEA pave the way to nuclear disarmament with the reduction of both the number of nuclear weapons arsenal and the fissile material inventories. The politically stringent undertakings of States that have become parties to those agreements would not be possible without the

  18. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    International Nuclear Information System (INIS)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D.

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs

  19. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D. [and others

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs.

  20. A Formal Approach to the Verification of Networks on Chip

    Directory of Open Access Journals (Sweden)

    Schmaltz Julien

    2009-01-01

    Full Text Available Abstract The current technology allows the integration on a single die of complex systems-on-chip (SoCs that are composed of manufactured blocks (IPs, interconnected through specialized networks on chip (NoCs. IPs have usually been validated by diverse techniques (simulation, test, formal verification and the key problem remains the validation of the communication infrastructure. This paper addresses the formal verification of NoCs by means of a mechanized proof tool, the ACL2 theorem prover. A metamodel for NoCs has been developed and implemented in ACL2. This metamodel satisfies a generic correctness statement. Its verification for a particular NoC instance is reduced to discharging a set of proof obligations for each one of the NoC constituents. The methodology is demonstrated on a realistic and state-of-the-art design, the Spidergon network from STMicroelectronics.

  1. Resonating Statements

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of ...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  2. MAGMAsoft simulation applied in verification of technology to produce new range of alloy steel castings

    Directory of Open Access Journals (Sweden)

    A. Gwiżdż

    2010-07-01

    Full Text Available The article presents the results of MAGMAsoft application in simulation of the pouring and solidfication of castings made fromGS20Mn5 steel, basing on some principles adopted in the starting technology. The results of simulation were disclosed in the form of 3Ddrawings, showing the technology of pouring, selected stages of solidification, and porosity in castings made by the examined technology. Using simulation results, some modifications were introduced to the pouring technology, the simulation was repeated, and the results obtained for the technology before and after the modification were compared. Based on the guidelines provided in new technology, the pattern tooling was made. The process of mould preparation was described, along with the process of steel melting and pouring. Castings made by the new technology were X-rayed and subjected to heat treatment according to the newly developed cycle. Together with the main casting, test wedges were poured. Mechanical tests and structure examinations were performed. The results of the tests and investigations were evaluated.

  3. The experimental verification of the condition of the magnetic material caused by different technological processes

    CERN Document Server

    Tumanski, S

    2000-01-01

    The changes of electrical steel parameters caused by different technological processes have been tested using the magnetovision method. The effects of cutting into the strips, stamping the shape, laser scribing, annealing, bending and stressing have been investigated.

  4. Test/QA Plan for Verification of Coliform Detection Technologies for Drinking Water

    Science.gov (United States)

    The coliform detection technologies to be tested use chromatogenic and fluorogenic growth media to detect coliforms and E. coli based on the enzymatic activity of these organisms. The systems consist of single-use sample containers that contain pre-measured reagents and can be u...

  5. Satellite Power Systems (SPS) concept definition study. Volume 6: SPS technology requirements and verification

    Science.gov (United States)

    Hanley, G.

    1978-01-01

    Volume 6 of the SPS Concept Definition Study is presented and also incorporates results of NASA/MSFC in-house effort. This volume includes a supporting research and technology summary. Other volumes of the final report that provide additional detail are as follows: (1) Executive Summary; (2) SPS System Requirements; (3) SPS Concept Evolution; (4) SPS Point Design Definition; (5) Transportation and Operations Analysis; and Volume 7, SPS Program Plan and Economic Analysis.

  6. INNOVATIVE TECHNOLOGY VERIFICATION REPORT "FIELD MEASUREMENT TECHNOLOGIES FOR TOTAL PETROLEUM HYDROCARBONS IN SOIL" DEXSIL CORPORATION PETROFLAG SYSTEM

    Science.gov (United States)

    The PetroFLAGTm System developed by Dexsilo Corporation (Dexsil) was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Hueneme, California. The purpose o...

  7. Integration of multidisciplinary technologies for real time target visualization and verification for radiotherapy

    Directory of Open Access Journals (Sweden)

    Chang WC

    2014-06-01

    Full Text Available Wen-Chung Chang,1,* Chin-Sheng Chen,2,* Hung-Chi Tai,3 Chia-Yuan Liu,4,5 Yu-Jen Chen3 1Department of Electrical Engineering, National Taipei University of Technology, Taipei, Taiwan; 2Graduate Institute of Automation Technology, National Taipei University of Technology, Taipei, Taiwan; 3Department of Radiation Oncology, Mackay Memorial Hospital, Taipei, Taiwan; 4Department of Internal Medicine, Mackay Memorial Hospital, Taipei, Taiwan; 5Department of Medicine, Mackay Medical College, New Taipei City, Taiwan  *These authors contributed equally to this work Abstract: The current practice of radiotherapy examines target coverage solely from digitally reconstructed beam's eye view (BEV in a way that is indirectly accessible and that is not in real time. We aimed to visualize treatment targets in real time from each BEV. The image data of phantom or patients from ultrasound (US and computed tomography (CT scans were captured to perform image registration. We integrated US, CT, US/CT image registration, robotic manipulation of US, a radiation treatment planning system, and a linear accelerator to constitute an innovative target visualization system. The performance of this algorithm segmented the target organ in CT images, transformed and reconstructed US images to match each orientation, and generated image registration in real time mode with acceptable accuracy. This image transformation allowed physicians to visualize the CT image-reconstructed target via a US probe outside the BEV that was non-coplanar to the beam's plane. It allowed the physicians to remotely control the US probe that was equipped on a robotic arm to dynamically trace and real time monitor the coverage of the target within the BEV during a simulated beam-on situation. This target visualization system may provide a direct remotely accessible and real time way to visualize, verify, and ensure tumor targeting during radiotherapy. Keywords: ultrasound, computerized tomography

  8. CTBT verification-related technologies for peaceful purposes: Implementation of CTBT in Iran

    International Nuclear Information System (INIS)

    Ghafory-Ashtiany, M.; Hosseinie, Mohammad-Taghi

    1999-01-01

    Based on its strong policy on disarmament and non proliferation, Islamic Republic of Iran considers CTBT as one of the measures towards the safe world and free from nuclear weapons. It is believed that full implementation of this treaty increases international security as well as national security of every state signatory. It is also considered that it has many scientific and technological benefits for sustainable development of the countries. This paper deals with international monitoring system in Iran, including primary and auxiliary seismic stations, infrasound and radionuclides monitoring systems

  9. Nuclear cooperation targets global challenges. States back main pillars of the IAEA's work to strengthen nuclear safety, verification and technology transfer

    International Nuclear Information System (INIS)

    2000-01-01

    States meeting at the 44th IAEA General Conference in Vienna have set a challenging agenda for international nuclear cooperation into the 21st century that targets issues of global safety, security, and sustainable development. They adopted resolutions endorsing the Agency's programmes for strengthening activities under its three main pillars of work - nuclear verification, safety, and technology - that are closely linked to major challenges before the world. The document presents the main actions taken during the conference

  10. The Multimedia Essay. The Information Technologies as a Tool for The Humanities’ Statements

    Directory of Open Access Journals (Sweden)

    Piotr Cichocki

    2012-06-01

    Full Text Available The article applies for the educational experiment practiced during last several years at The Institute of Ethnology and Culture Anthropology, University of Warsaw, related to the multimedia essay. More accomplished than a multimedia presentation, more connected with textual analysis than a movie or videoclip, the multimedia essay may be mean especially fitted to humanities’ statements. The kind of attempts may result in the new discoursive hypertextual field, however nowadays they deal with dilemmas connected with copyrights and corporative control under the datas. Therefore the science is entangled with processes of constant change in the legislation.

  11. Verification of best available technology for the 300 Area Treated Effluent Disposal Facility (310 Facility)

    International Nuclear Information System (INIS)

    Wagner, R.N.

    1994-01-01

    This compilation of Project L-045H reference materials documents that the 300 Area Treated Effluent Disposal Facility (TEDF, also designated the 310 Facility) was designed, built, and will be operated in accordance with the best available technology (BAT) identified in the Engineering Summary Report. The facility is intended for treatment of 300 Area process sewer wastewater. The following unit operations for 300 Area process sewer water treatment are specified as: influent receipt; iron co-precipitation and sludge handling for removal of heavy metals and initial suspended solids; ion exchanged for removal of mercury and other heavy metals; ultraviolet (UV)/peroxide treatment for destruction of organic compounds, cyanide, coliforms, sulfide, and nitrite; and effluent discharge to the Columbia River with pH monitoring/control capability

  12. Development of the SEAtrace{trademark} barrier verification and validation technology. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Dunn, S.D.; Lowry, W.; Walsh, R.; Rao, D.V. [Science and Engineering Associates, Santa Fe, NM (United States); Williams, C. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.

    1998-08-01

    In-situ barrier emplacement techniques and materials for the containment of high-risk contaminants in soils are currently being developed by the Department of Energy (DOE). Because of their relatively high cost, the barriers are intended to be used in cases where the risk is too great to remove the contaminants, the contaminants are too difficult to remove with current technologies, or the potential movement of the contaminants to the water table is so high that immediate action needs to be taken to reduce health risks. Assessing the integrity of the barrier once it is emplaced, and during its anticipated life, is a very difficult but necessary requirement. Science and Engineering Associates, Inc., (SEA) and Sandia National Laboratories (SNL) have developed a quantitative subsurface barrier assessment system using gaseous tracers in support of the Subsurface Contaminants Focus Area barrier technology program. Called SEAtrace{trademark}, this system integrates an autonomous, multi-point soil vapor sampling and analysis system with a global optimization modeling methodology to locate and size barrier breaches in real time. The methodology for the global optimization code was completed and a prototype code written using simplifying assumptions. Preliminary modeling work to validate the code assumptions were performed using the T2VOC numerical code. A multi-point field sampling system was built to take soil gas samples and analyze for tracer gas concentration. The tracer concentration histories were used in the global optimization code to locate and size barrier breaches. SEAtrace{trademark} was consistently able to detect and locate leaks, even under very adverse conditions. The system was able to locate the leak to within 0.75 m of the actual value, and was able to determine the size of the leak to within 0.15 m.

  13. Testing and Demonstrating Speaker Verification Technology in Iraqi-Arabic as Part of the Iraqi Enrollment Via Voice Authentication Project (IEVAP) in Support of the Global War on Terrorism (GWOT)

    National Research Council Canada - National Science Library

    Withee, Jeffrey W; Pena, Edwin D

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment...

  14. Introductory statement to the Board of Governors. 13 September 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The agenda for this meeting includes topics related to all areas of Agency activity - nuclear technology, nuclear, radiation, transport and waste safety, verification of nuclear non-proliferation, technical cooperation funding and the IAEA management issues. In this statement, developments since the June Board are covered. The Agency continues to assume growing responsibilities in nearly all areas of its work, including verification, safety and security, and sustainable development. In this context, the value of the close partnership between the Secretariat and its Member States, is underlined, which will hopefully continue to be forthcoming

  15. Introductory statement to the Board of Governors. Vienna, 8 September 2003. IAEA Board of Governors

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The agenda for this meeting includes topics related to all areas of Agency activity - nuclear technology, nuclear, radiation, transport and waste safety, verification of nuclear non-proliferation, the IAEA management issues. In this statement, developments since the June Board are covered. The Agency continues to assume growing responsibilities in nearly all areas of its work, including verification, safety and security, and sustainable development. In this context, the value of the close partnership between the Secretariat and its Member States, is underlined, which will hopefully continue to be forthcoming

  16. Statement to the fifty-sixth regular session of the United Nations General Assembly. New York, 22 October 2001

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2001-01-01

    The statement briefly covers the IAEA's activities in terms of its three fundamental functions: to bring about the development and transfer of peaceful nuclear technologies; to build and maintain a global nuclear safety regime; and to prevent the proliferation of nuclear weapons and to ensure the security of nuclear materials and facilities. The specific topics covered include efforts to protect against nuclear terrorism, nuclear technology, nuclear safety, verification and security of nuclear material and installations, and management of the IAEA

  17. Estimation of costs for applications of remediation technologies for the Department of Energy's Programmatic Environmental Impact Statement

    International Nuclear Information System (INIS)

    Villegas, A.J.; Hansen, R.I.; Humphreys, K.K.; Paananen, J.M.; Gildea, L.F.

    1994-01-01

    The Programmatic Environmental impact Statement (PEIS) being developed by the US Department of Energy (DOE) for environmental restoration (ER) and waste management (WM) activities expected to be carried out across the DOE's nationwide complex of facilities is assessing the impacts of removing, transporting, treating, storing, and disposing of waste from these ER and WM activities. Factors being considered include health and safety impacts to the public and to workers, impacts on the environment, costs and socio-economic impacts, and near-term and residual risk during those ER and WM operations. The purpose of this paper is to discuss the methodology developed specifically for the PEIS to estimate costs associated with the deployment and application of individual remediation technologies. These individual costs are used in developing order-of-magnitude cost estimates for the total remediation activities. Costs are developed on a per-unit-of-material-to-be-treated basis (i.e., $/m 3 ) to accommodate remediation projects of varying sizes. The primary focus of this cost-estimating effort was the development of capital and operating unit cost factors based on the amount of primary media to be removed, handled, and treated. The unit costs for individual treatment technologies were developed using information from a variety of sources, mainly from periodicals, EPA documentation, handbooks, vendor contacts, and cost models. The unit cost factors for individual technologies were adjusted to 1991 dollars

  18. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  19. Statement of the Director General to the forty-third regular session of the General Conference of the International Atomic Energy Agency

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1999-01-01

    In his Statement on the forty-third regular session of the General Conference of the IAEA, the Director General of the Agency presented the past, present and future programme of the Agency in terms of the three 'pillars' that constitute its mandate: Nuclear technology (with emphasis on nuclear power and nuclear applications); Nuclear, radiation and waste safety (with emphasis on international conventions prescribing the basic legal norms for the safe use of nuclear energy, internationally accepted safety standards, and measures to assist Member States in the implementation of these conventions and standards, including technological solutions for improving safety); Nuclear verification and the security of material (with emphasis on IAEA safeguards, and physical protection of nuclear material), including possible new verification activities and specific verification issues (Iraq, DPRK, Middle East region). The Director General also touched in his Statement on two supporting elements that undergird these 'pillars': effective interaction with partners and the public, and achieving excellence in management

  20. Statement of capabilities: Micropower Impulse Radar (MIR) technology applied to mine detection and imaging

    Energy Technology Data Exchange (ETDEWEB)

    Azevedo, S.G.; Gavel, D.T.; Mast, J.E.; Warhus, J.P.

    1995-03-13

    The Lawrence Livermore National Laboratory (LLNL) has developed radar and imaging technologies with potential applications in mine detection by the armed forces and other agencies involved in demining efforts. These new technologies use a patented ultra-wideband (impulse) radar technology that is compact, low-cost, and low power. Designated as Micropower Impulse Radar, these compact, self-contained radars can easily be assembled into arrays to form complete ground penetrating radar imaging systems. LLNL has also developed tomographic reconstruction and signal processing software capable of producing high-resolution 2-D and 3-D images of objects buried in materials like soil or concrete from radar data. Preliminary test results have shown that a radar imaging system using these technologies has the ability to image both metallic and plastic land mine surrogate targets buried in 5 to 10 cm of moist soil. In dry soil, the system can detect buried objects to a depth of 30 cm and more. This report describes LLNL`s unique capabilities and technologies that can be applied to the demining problem.

  1. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Today formal verification is finding increasing acceptance in some areas, especially model abstraction and functional verification. Other major chal- lenges, like timing verification, remain before this technology can be posed as a complete alternative to simulation. This special issue is devoted to presenting some of the ...

  2. IMPROVING THE QUALITY OF THE INFORMATION PRESENTED IN FINANCIAL STATEMENTS BY USING INFORMATION TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    VASILE DUMITRAȘ

    2011-01-01

    Full Text Available Information technology can contribute significantly to business efficiency, including also enterprise governance, through appropriate and effective use. In most cases, it is difficult to determine which technologies are relevant to business needs and the use of appropriate options is not always clear. The development of information society, characterized by integration and automatization of processes and controls, by increased operational security of systems but also increasing dependence on them, and accompanied also by increased requirements of correct and operative information creates the need for new approaches of procedures and financial systems architectures.

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS FLG-631-318 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss FLG-631-318 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss FLG, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refi...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS GTI-600G, HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss GTi-600G high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss GTi, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refinis...

  5. Nuclear technology: Looking to the future. Introductory statement to the Scientific Forum, 18 September 2007, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    In his opening remarks to the 8th Scientific Forum Dr. Mohamed ElBaradei, Director General of the International Atomic Energy Agency, stated that the IAEA has been charged with sharing the benefits of nuclear technology with all countries and peoples, while preventing the misuse of this technology for destructive ends. For fifty years the IAEA has been carried out this mission. In the 8th Scientific Forum the IAEA is turning its vision to the future. The first session of the forum will deal with nuclear power. Coupled with concerns related to the risk of climate change and the security of energy supply, this anticipated growth in energy demand is leading to predictions of a greater role for nuclear power. Innovation will play a key role in determining the extent to which nuclear energy will meet future energy needs. Advanced fuel cycles are already being developed with the aim of better energy utilization of uranium, plutonium and other actinides; developing small reactors that meet the needs of developing countries; and with built in enhanced features for safety, security, waste minimization and proliferation resistance. The Agency?s International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO) is currently considering collaborative projects that would address some of these innovation needs. There are ongoing efforts to develop one or more mechanisms for the assurance of supply of nuclear fuel, and hopefully a multilateral mechanism for the management and control of the back end of the fuel cycle. The second session will focus on the use of nuclear technologies in food, agriculture and health. New developments in promising areas such as biotechnology, gene sequencing and nanotechnology, are anticipated to have a significant impact in the coming years on food and agriculture production. These initiatives will also generate benefits in human and animal health and land and water resource management. Nuclear applications stand to make key contributions

  6. Verification study on technology for preliminary investigation for HLW geological disposal. Part 2. Verification of surface geophysical prospecting through establishing site descriptive models

    International Nuclear Information System (INIS)

    Kondo, Hirofumi; Suzuki, Koichi; Hasegawa, Takuma; Goto, Keiichiro; Yoshimura, Kimitaka; Muramoto, Shigenori

    2012-01-01

    The Yokosuka demonstration and validation project using Yokosuka CRIEPI site has been conducted since FY 2006 as a cooperative research between NUMO (Nuclear Waste Management Organization of Japan) and CRIEPI. The objectives of this project are to examine and to refine the basic methodology of the investigation and assessment of properties of geological environment in the stage of Preliminary Investigation for HLW geological disposal. Within Preliminary Investigation technologies, surface geophysical prospecting is an important means of obtaining information from deep geological environment for planning borehole surveys. In FY 2010, both seismic prospecting (seismic reflection and vertical seismic profiling methods) for obtaining information about geological structure and electromagnetic prospecting (magneto-telluric and time domain electromagnetic methods) for obtaining information about resistivity structure reflecting the distribution of salt water/fresh water boundary to a depth of over several hundred meters were conducted in the Yokosuka CRIEPI site. Through these surveys, the contribution of geophysical prospecting methods in the surface survey stage to improving the reliability of site descriptive models was confirmed. (author)

  7. Nuclear disarmament verification

    Energy Technology Data Exchange (ETDEWEB)

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  8. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  9. Formal Methods Specification and Verification Guidebook for Software and Computer Systems. Volume 1; Planning and Technology Insertion

    Science.gov (United States)

    1995-01-01

    The Formal Methods Specification and Verification Guidebook for Software and Computer Systems describes a set of techniques called Formal Methods (FM), and outlines their use in the specification and verification of computer systems and software. Development of increasingly complex systems has created a need for improved specification and verification techniques. NASA's Safety and Mission Quality Office has supported the investigation of techniques such as FM, which are now an accepted method for enhancing the quality of aerospace applications. The guidebook provides information for managers and practitioners who are interested in integrating FM into an existing systems development process. Information includes technical and administrative considerations that must be addressed when establishing the use of FM on a specific project. The guidebook is intended to aid decision makers in the successful application of FM to the development of high-quality systems at reasonable cost. This is the first volume of a planned two-volume set. The current volume focuses on administrative and planning considerations for the successful application of FM.

  10. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    OpenAIRE

    Najlaa A. Abuadhmah; Muawya Naser; Azman Samsudin

    2010-01-01

    Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa...

  11. A survey on the high reliability software verification and validation technology for instrumentation and control in NPP

    International Nuclear Information System (INIS)

    Kwon, Kee Choon; Lee, Chang Soo; Dong, In Sook

    1994-01-01

    This document presents the technical status of the software verification and validation (V and V) efforts to support developing and licensing digital instrumentation and control (I and C) systems in nuclear power plants. We have reviewed codes and standards to be concensus criteria among vendor, licensee and licenser. Then we have described the software licensing procedures under 10 CFR 50 and 10 CFR 52 of the United States cope with the licensing barrier. At last, we have surveyed the technical issues related to developing and licensing the high integrity software for digital I and C systems. These technical issues let us know the development direction of our own software V and V methodology. (Author) 13 refs., 2 figs.,

  12. Excerpts from the introductory statement to the IAEA Board of Governors, Vienna, 7 December 2000

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 7 December 2000. The following aspects from the Agency's activities are briefly presented: nuclear verification (status of integrated safeguards, plan of action for safeguards agreements and additional protocols, safeguards related to the Democratic People's Republic of Korea), technology issues (results of the 6th Conference of the Parties to the Convention on Climate Change, international project on innovative reactor and fuel cycle technologies), and safety issues (depleted uranium, safety standard discussions with the International Civil Aviation Organization, exchange of regulators or other safety personnel, emergency response co-ordination)

  13. Assessment of technologies for hazardous waste site remediation: Non-treatment technologies and pilot scale facility implementation -- excavation -- storage technology -- safety analysis and review statement

    International Nuclear Information System (INIS)

    Johnson, H.R.; Overbey, W.K. Jr.; Koperna, G.J. Jr.

    1994-02-01

    The purpose of this study is to assess the state-of-the-art of excavation technology as related to environmental remediation applications. A further purpose is to determine which of the excavation technologies reviewed could be used by the US Corp of Engineers in remediating contaminated soil to be excavated in the near future for construction of a new Lock and Dam at Winfield, WV. The study is designed to identify excavation methodologies and equipment which can be used at any environmental remediation site but more specifically at the Winfield site on the Kanawha River in Putnam County, West Virginia. A technical approach was determined whereby a functional analysis was prepared to determine the functions to be conducted during the excavation phase of the remediation operations. A number of excavation technologies were identified from the literature. A set of screening criteria was developed that would examine the utility and ranking of the technologies with respect to the operations that needed to be conducted at the Winfield site. These criteria were performance, reliability, implementability, environmental safety, public health, and legal and regulatory compliance. The Loose Bulk excavation technology was ranked as the best technology applicable to the Winfield site. The literature was also examined to determine the success of various methods of controlling fugitive dust. Depending upon any changes in the results of chemical analyses, or prior remediation of the VOCs from the vadose zone, consideration should be given to testing a new ''Pneumatic Excavator'' which removes the VOCs liberated during the excavation process as they outgas from the soil. This equipment however would not be needed on locations with low levels of VOC emissions

  14. Assessment of technologies for hazardous waste site remediation: Non-treatment technologies and pilot scale facility implementation -- excavation -- storage technology -- safety analysis and review statement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, H.R.; Overbey, W.K. Jr.; Koperna, G.J. Jr.

    1994-02-01

    The purpose of this study is to assess the state-of-the-art of excavation technology as related to environmental remediation applications. A further purpose is to determine which of the excavation technologies reviewed could be used by the US Corp of Engineers in remediating contaminated soil to be excavated in the near future for construction of a new Lock and Dam at Winfield, WV. The study is designed to identify excavation methodologies and equipment which can be used at any environmental remediation site but more specifically at the Winfield site on the Kanawha River in Putnam County, West Virginia. A technical approach was determined whereby a functional analysis was prepared to determine the functions to be conducted during the excavation phase of the remediation operations. A number of excavation technologies were identified from the literature. A set of screening criteria was developed that would examine the utility and ranking of the technologies with respect to the operations that needed to be conducted at the Winfield site. These criteria were performance, reliability, implementability, environmental safety, public health, and legal and regulatory compliance. The Loose Bulk excavation technology was ranked as the best technology applicable to the Winfield site. The literature was also examined to determine the success of various methods of controlling fugitive dust. Depending upon any changes in the results of chemical analyses, or prior remediation of the VOCs from the vadose zone, consideration should be given to testing a new ``Pneumatic Excavator`` which removes the VOCs liberated during the excavation process as they outgas from the soil. This equipment however would not be needed on locations with low levels of VOC emissions.

  15. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  16. Introductory statement to the Board of Governors. Vienna, 9 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The agenda for the meeting includes topics related to all three pillars of Agency activities - technology, safety and verification. This statement, primarily covers developments since the Board held in June 2002. The topics dealt with are: nuclear technology; waste management; decommissioning of NPPs; management of nuclear knowledge; world summit on sustainable development; safety issues of nuclear activities; transport safety; occupational radiation protection; radiological protection of patients; verification of nuclear proliferation; status of comprehensive safeguards agreements and additional protocols; convention on the physical protection of nuclear material; implementation of Un security council resolutions related to Iraq; status of safeguards agreement with the Democratic Peoples Republic of Korea; application of IAEA safeguards in the Middle east; and management of the IAEA

  17. Statement of the Director General to the forty-second regular session of the General Conference of the International Atomic Energy Agency

    International Nuclear Information System (INIS)

    1998-01-01

    In his Statement on the forty-second regular session of the General Conference of the IAEA, the Director General of the Agency highlighted the role of the IAEA in four areas: nuclear power and the fuel cycle, nuclear and radiation safety, nuclear verification and the security of material, and transfer of technology. The final part of the Statement is devoted to the process of programme and management review initiated by the Director General to ensure that the Agency maintains and enhances its record as an effective and efficient organization

  18. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  19. The development of verification and validation technology for instrumentation and control in NPPs - A study on the software development methodology of a highly reliable software

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Yong Rae; Cha, Sung Deok; Lee, Woo Jin; Chae, Hong Seok; Yoon, Kwang Sik; Jeong, Ki Suk [Korea Advanced Institute of Science and Technology,= Taejon (Korea, Republic of)

    1996-07-01

    Nuclear industries have tried to use the digital I and C technology in developing advanced nuclear power plants. However, because the industries did= not establish the highly reliable software development methodologies and standards applied to developing the highly reliable and safe software for digital I and C systems, they were confronted with the difficulties to avoid software common mode failures. To mitigate the difficulties, the highly reliable software development environments and methodologies and validation and verification techniques should be the cornerstone of all digital implementation in nuclear power plants. The objectives of this project is to establish the highly reliable software development methodology to support developing digital instrumentation and control systems in nuclear power plants. In this project, we have investigated the business-oriented and the real-time software development methods and techniques for ensuring safety and reliability of the software. Also we have studied standards related to licensing the software for digital I and C systems. 50 refs., 51 figs. (author)

  20. Environmental statement

    International Nuclear Information System (INIS)

    Iannone, G.

    1995-01-01

    This paper focusses on one of the basic points of EU (European Union) regulation 1863/1993, namely the disclosure of information via an environmental statement. The author examines the uses to which the data may be put, emphasizes the importance of the environmental statement's contents and addressee, and describes the key function of external data control by an environmental verifier. Lastly, the author shows that the environmental statement could replace a number of documents that companies are now required to file with various agencies; this would reduce their administrative burden

  1. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  2. Excerpts from the introductory statement. IAEA Board of Governors. Vienna, 19 March 2001

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    In his introductory statement to the IAEA Board of Governors, the IAEA Director General gave an overview of the Agency's activities regarding technological issues in nuclear power and non-power applications; safety issues related to nuclear power plants and research reactors; decommissioning of nuclear facilities; safety of radiation sources; and marine transport of radioactive materials. Further in the document he gives a brief description of the Agency's activities in the field of nuclear verification; Agency's participation in a field mission to Kosovo on environmental assessment of the consequences of the use of depleted uranium in ammunition; safety standards discussions with ICAO

  3. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  4. Technology-enabled assessment of health professions education: consensus statement and recommendations from the Ottawa 2010 Conference

    DEFF Research Database (Denmark)

    Amin, Zubair; Boulet, John R; Cook, David A

    2011-01-01

    and needs, the need for better evidence to support use of technologies in health profession education assessment, and a number of challenges, particularly validity threats, that need to be addressed while incorporating technology in assessment. Our recommendations are intended for all practitioners across......The uptake of information and communication technologies (ICTs) in health professions education can have far-reaching consequences on assessment. The medical education community still needs to develop a deeper understanding of how technology can underpin and extend assessment practices....... This article was developed by the 2010 Ottawa Conference Consensus Group on technology-enabled assessment to guide practitioners and researchers working in this area. This article highlights the changing nature of ICTs in assessment, the importance of aligning technology-enabled assessment with local context...

  5. Technology-enabled assessment of health professions education: consensus statement and recommendations from the Ottawa 2010 Conference

    DEFF Research Database (Denmark)

    Amin, Zubair; Boulet, John R; Cook, David A

    2011-01-01

    The uptake of information and communication technologies (ICTs) in health professions education can have far-reaching consequences on assessment. The medical education community still needs to develop a deeper understanding of how technology can underpin and extend assessment practices....... This article was developed by the 2010 Ottawa Conference Consensus Group on technology-enabled assessment to guide practitioners and researchers working in this area. This article highlights the changing nature of ICTs in assessment, the importance of aligning technology-enabled assessment with local context...... and needs, the need for better evidence to support use of technologies in health profession education assessment, and a number of challenges, particularly validity threats, that need to be addressed while incorporating technology in assessment. Our recommendations are intended for all practitioners across...

  6. Future directions of nuclear verification

    International Nuclear Information System (INIS)

    Blix, H.

    1997-01-01

    Future directions of nuclear verification are discussed including the following topics: verification of non-proliferation commitments; practicalities of strengthening safeguards; new tasks in nuclear verification

  7. Independent verification survey report for exposure units Z2-24, Z2-31, Z2-32, AND Z2-36 in zone 2 of the East Tennessee technology park Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    King, David A. [Oak Ridge Inst. for Science and Education (ORISE), Oak Ridge, TN (United States)

    2013-10-01

    The U.S. Department of Energy (DOE) Oak Ridge Office of Environmental Management selected Oak Ridge Associated Universities (ORAU), through the Oak Ridge Institute for Science and Education (ORISE) contract, to perform independent verification (IV) at Zone 2 of the East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. ORAU has concluded IV surveys, per the project-specific plan (PSP) (ORAU 2013a) covering exposure units (EUs) Z2-24, -31, -32, and -36. The objective of this effort was to verify the target EUs comply with requirements in the Zone 2 Record of Decision (ROD) (DOE 2005), as implemented by using the dynamic verification strategy presented in the dynamic work plan (DWP) (BJC 2007); and confirm commitments in the DWP were adequately implemented, as verified via IV surveys and soil sampling.

  8. Technology-enabled assessment of health professions education: consensus statement and recommendations from the Ottawa 2010 Conference

    DEFF Research Database (Denmark)

    Amin, Zubair; Boulet, John R; Cook, David A

    2011-01-01

    The uptake of information and communication technologies (ICTs) in health professions education can have far-reaching consequences on assessment. The medical education community still needs to develop a deeper understanding of how technology can underpin and extend assessment practices. This arti......The uptake of information and communication technologies (ICTs) in health professions education can have far-reaching consequences on assessment. The medical education community still needs to develop a deeper understanding of how technology can underpin and extend assessment practices....... This article was developed by the 2010 Ottawa Conference Consensus Group on technology-enabled assessment to guide practitioners and researchers working in this area. This article highlights the changing nature of ICTs in assessment, the importance of aligning technology-enabled assessment with local context...... health professional education. Recommendations include adhering to principles of good assessment, the need for developing coherent institutional policy, using technologies to broaden the competencies to be assessed, linking patient-outcome data to assessment of practitioner performance, and capitalizing...

  9. Technology-enabled assessment of health professions education: consensus statement and recommendations from the Ottawa 2010 Conference

    DEFF Research Database (Denmark)

    Amin, Zubair; Boulet, John R; Cook, David A

    2011-01-01

    health professional education. Recommendations include adhering to principles of good assessment, the need for developing coherent institutional policy, using technologies to broaden the competencies to be assessed, linking patient-outcome data to assessment of practitioner performance, and capitalizing...

  10. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  11. Verification of ceramic structures

    NARCIS (Netherlands)

    Behar-Lafenetre, S.; Cornillon, L.; Rancurel, M.; Graaf, D. de; Hartmann, P.; Coe, G.; Laine, B.

    2012-01-01

    In the framework of the "Mechanical Design and Verification Methodologies for Ceramic Structures" contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and

  12. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  13. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  14. financial statements

    International Development Research Centre (IDRC) Digital Library (Canada)

    This Management's Discussion and Analysis (MD&A) provides a narrative discussion of the financial results and operational changes for the financial year ended on. 31 March 2015. This discussion should be read with the. Financial Statements and accompanying notes provided on pages 46-63, which were prepared in ...

  15. Rio 2016 financial statements

    OpenAIRE

    2015-01-01

    These documents include the report from independent auditors balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements.

  16. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION

    Science.gov (United States)

    This presentation wil be given at the EPA Science Forum 2005 in Washington, DC. According to recent estimates, there are approximately 7.9 million heavy-duty diesel trucks and buses in use in the United States. Emissions from these vehicles account for substantial portions of t...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: PHASE 1-ADI PILOT TEST UNIT NO. 2002-09 WITH MEDIA G2®

    Science.gov (United States)

    Integrity verification testing of the ADI International Inc. Pilot Test Unit No. 2002-09 with MEDIA G2® arsenic adsorption media filter system was conducted at the Hilltown Township Water and Sewer Authority (HTWSA) Well Station No. 1 in Sellersville, Pennsylvania from October 8...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: ADI INTERNATIONAL INC. ADI PILOT TEST UNIT NO. 2002-09 WITH MEDIA G2®; PHASE II

    Science.gov (United States)

    Verification testing of the ADI International Inc. Unit No. 2002-09 with MEDIA G2® arsenic adsorption media filter system was conducted at the Hilltown Township Water and Sewer Authority (HTWSA) Well Station No. 1 in Sellersville, Pennsylvania from October 8, 2003 through May 28,...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: WATTS PREMIER M-SERIES M-15,000 REVERSE OSMOSIS TREATMENT SYSTEM

    Science.gov (United States)

    Verification testing of the Watts Premier M-Series M-15,000 RO Treatment System was conducted over a 31-day period from April 26, 2004, through May 26, 2004. This test was conducted at the Coachella Valley Water District (CVWD) Well 7802 in Thermal, California. The source water...

  20. Introductory statement to the Board of Governors, 14 June 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The Statement to the Board of Governors includes the Agency's Annual Report, the Technical Cooperation Report, the Safeguards Implementation Report, the report of the Programme and Budget Committee, and a number of specific nuclear technology, safety and verification issues. The Technical Cooperation Report deals with TC Programme Management; Programme of Action for Cancer Therapy; TC Programme Funding; TC Programme Oversight. The Nuclear Technology part is concerned with Action Plan on Decommissioning of nuclear facilities, which incorporates the recommendations from the Agency's conference on safe decommissioning for nuclear activities held in 2002 in Berlin; Status of the IAEA International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). Nuclear Safety and Security covers Nuclear Installation Safety; Transport Safety; Emergency Preparedness and Response; Global Threat Reduction Initiative. Nuclear Verification is describing the Safeguards Implementation Report and Safeguards Statement for 2003; Implementation of Safeguards in the Democratic People's Republic of Korea, in the Islamic Republic of Iran; and in Iraq; Status of Safeguards Agreements and Additional Protocols; Integrated Safeguards. The Secretariat remains committed to the efficient and effective implementation of programmes that reflect the priorities of all our Member States

  1. Some major challenges: Nuclear non-proliferation, nuclear arms control and nuclear terrorism. Vienna, 29 October 2001. Statement to the symposium on international safeguards: Verification and nuclear material security

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2001-01-01

    The main topics dealt with the ensuring of an effective, universal and adequately financed system for the verification of nuclear non-proliferation, namely as follows: Effectiveness of the system; Participation in the system ; Financing of the system; Making Progress in Nuclear Arms Control; Protection Against Nuclear Terrorism. In the Safeguards Implementation Report (SIR) for 2000, the Agency was able to conclude that for all 140 states with safeguards agreements in place the nuclear material and other items placed under safeguards remained in peaceful nuclear activities or were otherwise adequately accounted for. The Agency currently safeguards over 900 facilities in 70 countries on a regular safeguards budget of approximately US $80 million per year. Turning to the major recent challenge, protection against nuclear terrorism, the IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The recent attacks in the United States were, however, a wake-up call to all that more can and must be done. In the week immediately following the tragedy, the IAEA General Conference adopted a resolution which requested a thorough review of Agency activities and programmes relevant to preventing acts of nuclear terrorism

  2. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  3. 38 CFR 74.20 - What is a verification examination and what will CVE examine?

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false What is a verification examination and what will CVE examine? 74.20 Section 74.20 Pensions, Bonuses, and Veterans' Relief DEPARTMENT... include: Financial statements; Federal personal and business tax returns; personal history statements; and...

  4. Test/QA Plan for Verification of Cavity Ringdown Spectroscopy Systems for Ammonia Monitoring in Stack Gas

    Science.gov (United States)

    The purpose of the cavity ringdown spectroscopy (CRDS) technology test and quality assurance plan is to specify procedures for a verification test applicable to commercial cavity ringdown spectroscopy technologies. The purpose of the verification test is to evaluate the performa...

  5. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  6. 76 FR 8848 - Proposed Information Collection (Financial Statement); Comment Request

    Science.gov (United States)

    2011-02-15

    ... (Financial Statement); Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits Administration (VBA), Department of Veterans... use of other forms of information technology. Title: Financial Statement, VA Form 26-6807. OMB Control...

  7. 78 FR 69175 - Proposed Information Collection (Financial Statement); Comment Request

    Science.gov (United States)

    2013-11-18

    ... (Financial Statement); Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits Administration (VBA), Department of Veterans... use of other forms of information technology. Title: Financial Statement, VA Form 26-6807. OMB Control...

  8. Fiscal 1997 report of the development of high efficiency waste power generation technology. No.2 volume. Pilot plant verification test; Kokoritsu haikibutsu hatsuden gijutsu kaihatsu (pilot plant jissho shiken). 1997 nendo hokokusho (daini bunsatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    As to a high efficiency waste power generation system using general waste as fuel, the details of the following were described: design/construction management and operational study of pilot plant, design/manufacture/construction of pilot plant, and study of an optimal total system. Concerning the construction management and operational study, the paper described the application for governmental/official inspection procedures and taking inspection, process management of pilot plant, site patrol, safety management, management of trial run of pilot plant, drawing-up of a verification test plan and test run, etc. Relating to the design/manufacture/construction of pilot plant, an outline of the pilot plant was described. The paper also stated points to be considered in design of furnace structure and boiler structure, points to be considered of the verification test, etc. As to the study of an optimal total system, the following were described: survey of waste gasification/slagging power generation technology, basic study on RDF production process, survey of trends of waste power generation technology in the U.S., etc. 52 refs., 149 figs., 121 tabs.

  9. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  10. Software verification and testing

    Science.gov (United States)

    1985-01-01

    General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

  11. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  12. Proceedings of the Defense Nuclear Agency Conference on Arms Control and Verification Technology (ACT) Held in Williamsburg, Virginia on 1-4 June 1992

    Science.gov (United States)

    1993-12-01

    vapor recovery system or flare . For instance, under these regulations, sampling connecting systems must be equipped with a closed-purge system or closed...12% 233U/U) PWR BWR Total HM (kg) 460 188 460 460(130 U)a Charge (kg) 235U 13.5 5.5 10.6 0.9 233U - - 13.8 Pu - - 3.7 - Discharge (kg) 235U 3.5 1.6...early 1991.5 The purpose of the ARS experiments was to simulate CW verification measurements under realistic conditions and to determine the maximum

  13. Managing the Verification Trajectory

    NARCIS (Netherlands)

    Ruys, T.C.; Brinksma, Hendrik

    In this paper we take a closer look at the automated analysis of designs, in particular of verification by model checking. Model checking tools are increasingly being used for the verification of real-life systems in an industrial context. In addition to ongoing research aimed at curbing the

  14. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  15. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  16. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  17. Monitoring and verification R&D

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  18. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  19. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  20. Annual report and accounting statements 2007: ELETROBRAS

    International Nuclear Information System (INIS)

    2007-01-01

    This document reports the actives of the ELETROBRAS during the year 2007 related to: electricity market, international activities, strategic planning, financial indicators, business analysis, relationship with investors, energy marketing, operational research, technological development, financial statements, social responsibility and environment

  1. Distributed Engine Control Empirical/Analytical Verification Tools, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — In this Phase I project, Impact Technologies, in collaboration with Prof. R.K. Yedavalli, propose a novel verification environment for eventual rapid certification...

  2. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  3. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  4. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  5. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  6. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  7. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  8. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  9. Sponsorship statement

    Science.gov (United States)

    2010-08-01

    The 25th IAHR Symposium on Hydraulic Machinery and Systems benefits from the generous support of the following sponsors: National Authority for Scientific Research, RomaniaANCS logo Hidroelectrica S.A., RomaniaHidroelectrica_logo Machine Buiding Factory - UCM Reşiţa, RomaniaUCM Resita logo Hydro-Engineering S.A., RomaniaHydro Engineering logo Voith Hydro Holding GmbH, GermanyVoith_logo Andritz Hydro GmbH, AustriaAndritz_logo_large logo Alstom Hydro, FranceAlstom logo Advanced Design Technology Ltd., United Kingdomadt_logo logo

  10. Statement on Human Cloning

    Science.gov (United States)

    ... for the Advancement of Science Statement on Human Cloning Tweet The American Association for the Advancement of ... for this statement on human cloning. Ban Reproductive Cloning AAAS endorses a legally enforceable ban on efforts ...

  11. Opening statement

    International Nuclear Information System (INIS)

    Nordenfelt, J.

    1992-01-01

    A brief survey of recent political events and international relations shows the significance of strengthening the efforts in the field of disarmament and non-proliferation in Asia and Pacific region. On the nuclear side there is a general agreement on the need of strengthening the IAEA safeguards system. Efforts are also under way to strengthen other existing regimes, for example, the Missile Technology Control regime and the Australia Group. There have been recent developments in important improvement and normalization of relations between the states involved in the region of Asia-Pacific. The United States and the former Soviet Union began to adjust their force structures in the region to reflect the emerging post-cold-war realities. In the wake of these changes, proposals have been made for various more formal mechanisms to be established to deal with arms control and other issues affecting regional peace and security. This shows the importance of regional meetings on the cited subjects

  12. Rio 2016 financial statements 2011

    OpenAIRE

    2015-01-01

    This document includes the report from independent auditors, the balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements as of December 2011.

  13. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  14. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  15. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  16. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  17. Closing Statement

    International Nuclear Information System (INIS)

    Varjoranta, T.

    2015-01-01

    For me, this week has been a success. I have been impressed with the range and depth of discussion that has taken place, not only in the formal sessions, but also in the coffee breaks, over lunch and into the evening. When we placed an international call for papers earlier this year, we did not expect that we would receive 400 abstracts and end up arranging 237 oral presentations and 91 poster sessions. There have been over 600 participants originating from 54 Member States and 11 invited organizations. A wealth of information and analysis arising from this week's deliberations is now available on the Agency website. This provides you with the chance to catch up on any presentations that you may have missed the first time, as well as providing a resource for future research and application. If you recall, the purpose of the symposium was to foster dialogue and exchange of information involving Member States, the nuclear industry and members of the broader nuclear non-proliferation community, including civil society. I believe we have succeeded on that score. We are living in a rapidly changing world and the nuclear world is no exception. More nuclear material and facilities are coming under safeguards all the time. International nuclear cooperation between States is intensifying with an expansion of trade and services in nuclear and related equipment, items and materials. Also, technologies are changing. Many older nuclear plants are being modernized and becoming more technologically sophisticated. The geographical focus of these expanding programmes also continues to change. Yet, our budget remains static. This means that the only way we can maintain our effectiveness in the face of rising demand for our services, is to become more productive. That is the backdrop to this symposium. The overarching theme was to link strategy, implementation and people: the three core processes of any business. As I said on Monday, the strength of the link between these three

  18. Open verification methodology cookbook

    CERN Document Server

    Glasser, Mark

    2009-01-01

    Functional verification is an art as much as a science. It requires not only creativity and cunning, but also a clear methodology to approach the problem. The Open Verification Methodology (OVM) is a leading-edge methodology for verifying designs at multiple levels of abstraction. It brings together ideas from electrical, systems, and software engineering to provide a complete methodology for verifying large scale System-on-Chip (SoC) designs. OVM defines an approach for developing testbench architectures so they are modular, configurable, and reusable. This book is designed to help both novic

  19. Requirement Assurance: A Verification Process

    Science.gov (United States)

    Alexander, Michael G.

    2011-01-01

    Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

  20. Accuracy Verification of Magnetic Resonance Imaging (MRI) Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    OpenAIRE

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silico...

  1. Environmental Technology Verification: Test Report of Mobile Source Emission Control Devices--Johnson Matthey PCRT2 1000, Version 2, Filter + Diesel Oxidation Catalyst

    Science.gov (United States)

    The Johnson Matthey PCRT2 1000, v.2 system is a partial continuously regenerating technology (PCRT) system that consists of a flow-through partial filter combined with a DOC. The system is designed for low temperature exhaust resulting from intermittent loads from medium and heav...

  2. Environmental impact statements

    International Nuclear Information System (INIS)

    Stewing, C.

    1986-01-01

    The adoption of US-type environmental impact statements is considered to be approaching. Environmental impact statements are defined as comprehensive analyses of the future effects of measures on environmental conditions with the aim of avoiding ecological disadvantages. The recommendation ratified by the European Communities on June 27, 1985 requires the environmental impact statement to be implemented as a mandatory procedure. The implementation is difficult to realize. Particular problems consist in the alignment of the environmental impact statement with existing administrative procedures and in the operationable formulation of the aims and results of the statement. Paragraph 72 of the administrative procedures law (VwVfG) shows that planning procedures and environmental impact statement are to be treated as two parallel regulations. The structural order of environmental impact statements must therefore be integrated into the regulations of planning procedures. (orig./HP) [de

  3. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  4. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  5. MARATHON Verification (MARV)

    Science.gov (United States)

    2017-08-01

    the verification and "lessons learned " from the semantic and technical issues we discovered as we implemented the approach. 15. SUBJECT TERMS...any programming language at use at CAA for modeling or other data analysis applications, to include R, Python , Scheme, Common Lisp, Julia, Mathematica

  6. Seismic verification of underground explosions

    International Nuclear Information System (INIS)

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper

  7. Accuracy Verification of Magnetic Resonance Imaging (MRI Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Safari

    2012-01-01

    Full Text Available Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  8. Accuracy verification of magnetic resonance imaging (MRI) technology for lower-limb prosthetic research: utilising animal soft tissue specimen and common socket casting materials.

    Science.gov (United States)

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  9. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  10. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  11. Integrated testing and verification system for research flight software

    Science.gov (United States)

    Taylor, R. N.

    1979-01-01

    The MUST (Multipurpose User-oriented Software Technology) program is being developed to cut the cost of producing research flight software through a system of software support tools. An integrated verification and testing capability was designed as part of MUST. Documentation, verification and test options are provided with special attention on real-time, multiprocessing issues. The needs of the entire software production cycle were considered, with effective management and reduced lifecycle costs as foremost goals.

  12. Statement to the forty-fourth regular session of the IAEA General Conference 2000. IAEA General Conference. Vienna, 18 September 2000

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    In his Statement on the forty-fourth regular session of the General Conference of the IAEA, the Director General of the Agency highlighted IAEA's achievements in connection with its major functions: as catalyst for the development and transfer of nuclear technology (nuclear power, nuclear fuel cycle and waste management, preservation of nuclear expertise, nuclear science and applications, laboratory and research activities, future challenges in nuclear technology), as a recognized authority on nuclear safety (international conventions, establishment of international standards, safety services, early shutdown of nuclear power plants, decommissioning issues, Kursk submarine accident, future challenges in nuclear safety), and as an instrument for the verification of nuclear non-proliferation (safeguards agreements and additional protocols, implementation of United Nations Security Council Resolutions relating to Iraq, safeguards agreement with the Democratic People's Republic of Korea, application of IAEA Safeguards in the Middle East, other verification activities, security of material, future challenges in verification. He also discussed the Agency's technical co-operation programme and the Agency management for maximum efficiency and effectiveness, and the new outreach policy

  13. Assessment of unsaturated zone transport for shallow land burial of radioactive waste: summary report of technology needs, model verification, and measurement efforts (FY 1978 to FY 1983)

    International Nuclear Information System (INIS)

    Jones, T.L.; Gee, G.W.

    1984-01-01

    Two main topics are addressed in this report. The first topic relates to the assessment process for shallow land burial site design. This overview includes basic descriptions of water balance, transport processes and technology needs for waste management at an arid (dry) site. The second topic deals with specific results of research activities at PNL related to water and radionuclide transport under arid, shallow land burial conditions. Technology needs at arid-zone (dry) sites are summarized and unique features of radionuclide disposal at dry sites are explained. The report emphasizes the need to understand the interaction between climate, soil, plants, engineered barriers, and buried waste in order to evaluate performance of a waste disposal system at a dry site. Water balance data, collected since FY 1978 at the Buried Waste Test Facility (BWTF) at Hanford, are used to illustrate the influence of climate variables (rainfall distribution patterns and evaporative conditions) on soil water storage and drainage at an arid site. For dry site conditions, with no vegetation and coarse soil, significant deep drainage was measured. Deep drainage below the root zone was also measured at a grass-covered site on the Hanford site after early spring rains, which emphasizes the need to carefully monitor site water balances even at arid (dry) sites. The monitoring technology, water balance, and radionuclide transport at arid sites are discussed, and the use of neutron probes, electrical resistance units, tensiometers, and psychrometers are explained, and examples are given on their applications in arid-site monitoring. Measurements of water flow and radionuclide transport coefficients needed to describe movement in unsaturated soils are documented. 40 references, 21 figures, 5 tables

  14. Proposed replacement nuclear research reactor at Lucas Heights Science and Technology Centre, NSW. Statement of evidence to the Parliamentary Standing Committee on Public Works

    International Nuclear Information System (INIS)

    1999-02-01

    This submission demonstrates the manner in which the replacement research reactor project is to be undertaken in accordance with all relevant Commonwealth requirements and standards. Successive submissions to Government have shown that the construction and operation of the replacement reactor will result in a range of significant benefits to Australia in the areas of health care, the national interest, scientific achievement and in industrial applications. ANSTO is confident that the construction and operation of the replacement research reactor will: meet the identified needs for an ongoing neutron source for Australia into the next century in a cost-effective manner; be effectively managed to ensure that the project is delivered to the agreed schedule and budget; involve an effective community consultation process with ongoing community consultation a feature of ANSTO's approach; will have negligible environmental and public health implications taking account of the environmental management measures and commitments made by ANSTO in the Environmental Impact Statement and the stringent licensing arrangement by ARPANSA

  15. Financial Statement Math

    OpenAIRE

    2007-01-01

    game tool Game Tool Interactive Media Element The purpose of this interactive exercise is to help you understand the math in the income statement and balance sheet., Give the proper mathematical computations in order to correctly prepare the income statement and the balance sheet.The exercise is divided into 3 parts: The income Statement, The Balance Sheet - Assets, The Balance Sheet - Liabilities, GB3050 Financial Reporting and Analysis

  16. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  17. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  18. Selected problems in auditing the financial statements of credit institutions

    OpenAIRE

    Joanna Wielgórska-Leszczyńska

    2016-01-01

    The article presents issues deserving special attention in the area of auditing the financial statements of credit institution. Without a doubt, these are the financial instruments, including credit exposures. To properly audit these instruments it is required to verify the accuracy of the valuation. Such verification in the case of credit exposures is preceded by appropriate category qualification followed by impairment write-off determined considering the established security. T...

  19. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  20. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  1. A saddle-point for data verification and materials accountancy to control nuclear material

    International Nuclear Information System (INIS)

    Beedgen, R.

    1983-01-01

    Materials accountancy is one of the main elements in international safeguards to determine whether or not nuclear material has been diverted in nuclear plants. The inspector makes independent measurements to verify the plant-operator's data before closing the materials balance with the operator's data. All inspection statements are in principle probability statements because of random errors in measuring the material and verification on a random sampling basis. Statistical test procedures help the inspector to decide under this uncertainty. In this paper a statistical test procedure representing a saddle-point is presented that leads to the highest guaranteed detection probability taking all concealing strategies into account. There are arguments favoring a separate statistical evaluation of data verification and materials accountancy. Following these considerations, a bivariate test procedure is explained that evaluates verification and accountancy separately. (orig.) [de

  2. Comments for A Conference on Verification in the 21st Century

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  3. Statement to the Forty-ninth Regular Session of the IAEA General Conference 2005, 26 September 2005, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The Director General reviewed how far the Agency has come in recent years, in terms of each of the three pillars of activity that support the Agency's mission - technology, safety and verification - and described what, in his view, should be the vision for the future. The part on Nuclear Power Technology dealt with changes in nuclear power, advances in nuclear innovation, decommissioning of nuclear facilities, waste and fuel cycle issues including multilateral approaches, uranium production and nuclear knowledge management. A major part of the Agency's scientific and technical work involves the transfer of peaceful nuclear technology in applications related to health, agriculture, water management and preservation of the environment. The part on Nuclear Safety and Security described the status of international conventions, safety standards and missions, research reactor utilization, safety and security, radiological protection of patients, safety of radioactive waste management, safety of transport of radioactive material, the Chernobyl Forum, the nuclear security and protection against nuclear terrorism, regulatory infrastructures for radiation safety and the control of radioactive sources and the conversion of HEU to LEU at research reactors. In the area of verification, the status of safeguards agreements and additional protocols, the safeguards implementation report and safeguards statement for 2004, integrated safeguards, small quantities protocols, verification activities in Iraq, implementation of safeguards in the DPRK, implementation of the NPT safeguards agreements in the Islamic Republic of Iran and application of IAEA safeguards in the Middle East were discussed. Items of the Technical Cooperation Programme included TC programme management and TC programme funding. This was followed by management of the agency, biennial budgeting, 2006-2007 programme and budgeting, agency staffing issues, public outreach and public awareness. It concluded with a few key

  4. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  5. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  6. Teaching Philosophy Statements

    Science.gov (United States)

    Faryadi, Qais

    2015-01-01

    This article examines the rationale for my teaching philosophy. Using a personal perspective, I explain my objectives, mission, and vision in writing my philosophy of teaching statements. This article also creates a road map and reference points for educators who want to write their own teaching philosophy statements to help them make informed…

  7. International monitoring of technology

    International Nuclear Information System (INIS)

    Fischer, W.; Stein, G.

    1990-01-01

    The monitoring of the civilian nuclear energy sector has been effected successfully by IAEA and EURATOM and has contributed to a reduction of fears within the communities of nations. Certainly, it will not be possible to subject the whole world and whole spectrum of technology to monitoring. However, the nations should be enabled to reduce their greatest fears concerning an abuse and a misuse of technology by verification, and to check the compliance with such international agreements which regulate the application of a number of technologies. There are some (as yet rudimentary) approaches to an international verification in the field of environmental protection and resource policies. Nuclear energy with its sophisticated verification procedure has taken one great step ahead of the other fields. The strengths and weaknesses of its verification regime should be learned from when filling the virgin fields of international technology monitoring and its instrument, i.e. international verification. (orig./HSCH) [de

  8. Statement to the Fifty-eighth Regular Session of the United Nations General Assembly. 3 November 2003, New York, USA

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The past year has been a time of significant challenges and achievements for the IAEA. In the area of nuclear non-proliferation, the Agency has been at the centre of attention and has demonstrated its ability to perform objective and credible verification - but a number of difficult and unresolved situations continue to exist. In the area of nuclear safety and security, our work is making a difference and we see overall improvement, but much remains to be done. In the nuclear technology field, the Agency is contributing to sustainable development through its technical co-operation programme, with the benefits of nuclear applications increasingly recognized. And while nuclear power continues to hold great potential as an environmentally clean source of energy, it remains in a holding position due to a number of associated concerns. This statement reviews in some detail the following Agency's activities: Nuclear Technology and nuclear power; non-power nuclear application; nuclear safety and security; status of international conventions; safety standards; protection against nuclear and radiological terrorism; verification of nuclear non-proliferation; implementation of safeguards in Korea, Iran and Middle East; implementation of UN resolutions related to Iraq

  9. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  10. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  11. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  12. 23rd June 2010 - Australian Nuclear Science and Technology Organization Chief Executive Officer A. Paterson signing a Joint Statement of Intent and the guest book with CERN Director-General R. Heuer; in the ATLAS visitor centre and control room with Former Collaboration Spokesperson P. Jenni.

    CERN Multimedia

    Maximilien Brice

    2010-01-01

    23rd June 2010 - Australian Nuclear Science and Technology Organization Chief Executive Officer A. Paterson signing a Joint Statement of Intent and the guest book with CERN Director-General R. Heuer; in the ATLAS visitor centre and control room with Former Collaboration Spokesperson P. Jenni.

  13. Proposed replacement nuclear research reactor at Lucas Heights Science and Technology Centre, NSW. Statement of evidence to the Parliamentary Standing Committee on Public Works

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-02-01

    This submission demonstrates the manner in which the replacement research reactor project is to be undertaken in accordance with all relevant Commonwealth requirements and standards. Successive submissions to Government have shown that the construction and operation of the replacement reactor will result in a range of significant benefits to Australia in the areas of health care, the national interest, scientific achievement and in industrial applications. ANSTO is confident that the construction and operation of the replacement research reactor will: meet the identified needs for an ongoing neutron source for Australia into the next century in a cost-effective manner; be effectively managed to ensure that the project is delivered to the agreed schedule and budget; involve an effective community consultation process with ongoing community consultation a feature of ANSTO`s approach; will have negligible environmental and public health implications taking account of the environmental management measures and commitments made by ANSTO in the Environmental Impact Statement and the stringent licensing arrangement by ARPANSA 24 refs., 8 tabs., 5 figs.

  14. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  15. CTBT integrated verification system evaluation model supplement

    International Nuclear Information System (INIS)

    EDENBURN, MICHAEL W.; BUNTING, MARCUS; PAYNE, ARTHUR C. JR.; TROST, LAWRENCE C.

    2000-01-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0

  16. Authoring and verification of clinical guidelines: a model driven approach.

    Science.gov (United States)

    Pérez, Beatriz; Porres, Ivan

    2010-08-01

    The goal of this research is to provide a framework to enable authoring and verification of clinical guidelines. The framework is part of a larger research project aimed at improving the representation, quality and application of clinical guidelines in daily clinical practice. The verification process of a guideline is based on (1) model checking techniques to verify guidelines against semantic errors and inconsistencies in their definition, (2) combined with Model Driven Development (MDD) techniques, which enable us to automatically process manually created guideline specifications and temporal-logic statements to be checked and verified regarding these specifications, making the verification process faster and cost-effective. Particularly, we use UML statecharts to represent the dynamics of guidelines and, based on this manually defined guideline specifications, we use a MDD-based tool chain to automatically process them to generate the input model of a model checker. The model checker takes the resulted model together with the specific guideline requirements, and verifies whether the guideline fulfils such properties. The overall framework has been implemented as an Eclipse plug-in named GBDSSGenerator which, particularly, starting from the UML statechart representing a guideline, allows the verification of the guideline against specific requirements. Additionally, we have established a pattern-based approach for defining commonly occurring types of requirements in guidelines. We have successfully validated our overall approach by verifying properties in different clinical guidelines resulting in the detection of some inconsistencies in their definition. The proposed framework allows (1) the authoring and (2) the verification of clinical guidelines against specific requirements defined based on a set of property specification patterns, enabling non-experts to easily write formal specifications and thus easing the verification process. Copyright 2010 Elsevier Inc

  17. Opening statements and general statements by delegation

    International Nuclear Information System (INIS)

    1978-01-01

    23 delegations have submitted general reports and statements on the situation and evolution of the nuclear fuel cycle. Each report reflects the particular interests of the country that submitted it. All in all, these reports provide general background information on the subject of the conference

  18. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  19. Parking Space Verification

    DEFF Research Database (Denmark)

    Høg Peter Jensen, Troels; Thomsen Schmidt, Helge; Dyremose Bodin, Niels

    2018-01-01

    With the number of privately owned cars increasing, the issue of locating an available parking space becomes apparant. This paper deals with the verification of vacant parking spaces, by using a vision based system looking over parking areas. In particular the paper proposes a binary classifier...... system, based on a Convolutional Neural Network, that is capable of determining if a parking space is occupied or not. A benchmark database consisting of images captured from different parking areas, under different weather and illumination conditions, has been used to train and test the system...

  20. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  1. Inventory of present verification techniques. Viewpoint of EURATOM

    International Nuclear Information System (INIS)

    Kloeckner, W.; Eecken, D. Van der; Gmelin, W.

    1998-01-01

    Starting from the role of Euratom as an established regional safeguards system, an overview is given of verification techniques currently practised by Euratom. In the stage-light of a rapidly changing and complex international safeguards scene, Euratom considers it has an important role to play. Having in mind the possibilities created by accelerating modern technology, recommendations are given for an enhanced use of technological means in safeguards. The viewpoint of Euratom is that the majority of methodologies and techniques in place may very well be copied to or used for a cut-off verification system currently under discussion

  2. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of ...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects....... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  3. Sample representativeness verification of the FADN CZ farm business sample

    Directory of Open Access Journals (Sweden)

    Marie Prášilová

    2011-01-01

    Full Text Available Sample representativeness verification is one of the key stages of statistical work. After having joined the European Union the Czech Republic joined also the Farm Accountancy Data Network system of the Union. This is a sample of bodies and companies doing business in agriculture. Detailed production and economic data on the results of farming business are collected from that sample annually and results for the entire population of the country´s farms are then estimated and assessed. It is important hence, that the sample be representative. Representativeness is to be assessed as to the number of farms included in the survey and also as to the degree of accordance of the measures and indices as related to the population. The paper deals with the special statistical techniques and methods of the FADN CZ sample representativeness verification including the necessary sample size statement procedure. The Czech farm population data have been obtained from the Czech Statistical Office data bank.

  4. Opening Statements and Speeches. Plenary Session. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Official opening statements, organizational reports, and papers on libraries in a technological world, which were presented at the 1983 International Federation of Library Associations (IFLA) conference include: (1) welcoming addresses by Franz Georg Kaltwasser and Mathilde Berghofer-Weichner; (2) opening speeches by Else Granheim (IFLA president)…

  5. Cash flow statement

    Directory of Open Access Journals (Sweden)

    Pavlović Miloš

    2013-01-01

    Full Text Available A cash flow is "bloodstream" of business and without constant cash flow a company would not be able to function. The cash flow statement is statutory financial report that provides information to the interested parties on cash inflows and outflows from operating, investing and financing activities during the accounting period. This paper will discuss the origin and significance of the cash slow statement; in addition, we will define the main categories of this statement and present the methodology of its composition in accordance with IAS 7.

  6. 12 CFR 715.7 - Supervisory Committee audit alternatives to a financial statement audit.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Supervisory Committee audit alternatives to a... REGULATIONS AFFECTING CREDIT UNIONS SUPERVISORY COMMITTEE AUDITS AND VERIFICATIONS § 715.7 Supervisory Committee audit alternatives to a financial statement audit. A credit union which is not required to obtain...

  7. Plan for a laser weapon verification research program

    Energy Technology Data Exchange (ETDEWEB)

    Karr, T.J.

    1990-03-01

    Currently there is great interest in the question of how, or even whether, a treaty limiting the development and deployment of laser weapons could be verified. The concept of cooperative laser weapon verification is that each party would place monitoring stations near the other party's declared or suspect laser weapon facilities. The monitoring stations would measure the primary laser observables'' such as power or energy, either directly or by collecting laser radiation scattered from the air or the target, and would verify that the laser is operated within treaty limits. This concept is modeled along the lines of the seismic network recently activated in the USSR as a joint project of the United States Geologic Survey and the Soviet Academy of Sciences. The seismic data, gathered cooperatively, can be used by each party as it wishes, including to support verification of future nuclear test ban treaties. For laser weapon verification the monitoring stations are envisioned as ground-based, and would verify treaty limitations on ground-based laser anti-satellite (ASAT) weapons and on the ground-based development of other laser weapons. They would also contribute to verification of limitations on air-, sea- and space-based laser weapons, and the technology developed for cooperative verification could also be used in national technical means of verification. 2 figs., 4 tabs.

  8. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  9. Statement of Donald Mancuso Deputy Inspector General Department of Defense Before the Subcommittee on Government Management Information and Technology House Government Reform Committee, United States House of Representatives on Defense Financial Management

    National Research Council Canada - National Science Library

    2000-01-01

    .... Likewise, new statutory requirements for audited annual financial statements caught the Department unprepared and without the automated systems needed to compile commercial type accounting data...

  10. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  11. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  12. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  13. Final guidelines for an Environmental Impact Statement on the proposed construction and operation of a replacement nuclear research reactor at the Lucas Heights Science and Technology Centre

    International Nuclear Information System (INIS)

    1998-01-01

    These guidelines are based on the requirements of paragraphs 4.1 and 4.3 of the Administrative Procedures under the Commonwealth Environment Protection (Impact of Proposals) Act 1974 (EPIP Act).The Australian Nuclear Science and Technology Organisation (ANSTO) has been designated as proponent under the EPIP Act in relation to the proposed replacement nuclear research reactor at the Lucas Heights Science and Technology Centre (LHSTC). The term 'environment' refers to all aspects of the surroundings of human beings, whether affecting human beings as individuals or in social groupings. It includes the natural environment, the built environment, and social aspects of our surroundings. The definition covers such factors as air, water, soils, flora,fauna, buildings, roads, employment, hazards and risks, and safety. As set out in the guidelines, the scope of this assessment shall encompass those issues and alternatives directly related to the construction and operation of a replacement nuclear research reactor at the LHSTC. The EIS will need to make clear the site selection criteria used, and the basis, in assessing Lucas Heights as being suitable for a new reactor. While the EIS will address all aspects of the construction and operation of a replacement nuclear research reactor, it will not address issues associated with the treatment of spent nuclear fuel rods from the existing High Flux Australian Reactor (HIFAR facility). The EIS will also address issues associated with the eventual decommissioning of the proposed replacement reactor, and eventual decommissioning of the existing HIFAR facility

  14. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  15. Model Based Verification of Cyber Range Event Environments

    Science.gov (United States)

    2015-12-10

    built a software development environment that uses to support the development and verification of on-board software for spacecraft. Tanizaki et al...Technologies, Piscataway, 2011. [16] Hiroaki Tanizaki , Toshiaki Aoki, and Takuya Katayama, "A Variability Management Method for Software

  16. Methodology and technology for peripheral and central blood pressure and blood pressure variability measurement: current status and future directions - Position statement of the European Society of Hypertension Working Group on blood pressure monitoring and cardiovascular variability.

    Science.gov (United States)

    Stergiou, George S; Parati, Gianfranco; Vlachopoulos, Charalambos; Achimastos, Apostolos; Andreadis, Emanouel; Asmar, Roland; Avolio, Alberto; Benetos, Athanase; Bilo, Grzegorz; Boubouchairopoulou, Nadia; Boutouyrie, Pierre; Castiglioni, Paolo; de la Sierra, Alejandro; Dolan, Eamon; Head, Geoffrey; Imai, Yutaka; Kario, Kazuomi; Kollias, Anastasios; Kotsis, Vasilis; Manios, Efstathios; McManus, Richard; Mengden, Thomas; Mihailidou, Anastasia; Myers, Martin; Niiranen, Teemu; Ochoa, Juan Eugenio; Ohkubo, Takayoshi; Omboni, Stefano; Padfield, Paul; Palatini, Paolo; Papaioannou, Theodore; Protogerou, Athanasios; Redon, Josep; Verdecchia, Paolo; Wang, Jiguang; Zanchetti, Alberto; Mancia, Giuseppe; O'Brien, Eoin

    2016-09-01

    Office blood pressure measurement has been the basis for hypertension evaluation for almost a century. However, the evaluation of blood pressure out of the office using ambulatory or self-home monitoring is now strongly recommended for the accurate diagnosis in many, if not all, cases with suspected hypertension. Moreover, there is evidence that the variability of blood pressure might offer prognostic information that is independent of the average blood pressure level. Recently, advancement in technology has provided noninvasive evaluation of central (aortic) blood pressure, which might have attributes that are additive to the conventional brachial blood pressure measurement. This position statement, developed by international experts, deals with key research and practical issues in regard to peripheral blood pressure measurement (office, home, and ambulatory), blood pressure variability, and central blood pressure measurement. The objective is to present current achievements, identify gaps in knowledge and issues concerning clinical application, and present relevant research questions and directions to investigators and manufacturers for future research and development (primary goal).

  17. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  18. 38 CFR 74.12 - What must a concern submit to apply for VetBiz VIP Verification Program?

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false What must a concern submit to apply for VetBiz VIP Verification Program? 74.12 Section 74.12 Pensions, Bonuses, and Veterans... personal and business tax returns, payroll records and personal history statements. An applicant must also...

  19. System and Component Software Specification, Run-time Verification and Automatic Test Generation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The following background technology is described in Part 5: Run-time Verification (RV), White Box Automatic Test Generation (WBATG). Part 5 also describes how WBATG...

  20. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  1. IDEF method for designing seismic information system in CTBT verification

    International Nuclear Information System (INIS)

    Zheng Xuefeng; Shen Junyi; Jin Ping; Zhang Huimin; Zheng Jiangling; Sun Peng

    2004-01-01

    Seismic information system is of great importance for improving the capability of CTBT verification. A large amount of money has been appropriated for the research in this field in the U.S. and some other countries in recent years. However, designing and developing a seismic information system involves various technologies about complex system design. This paper discusses the IDEF0 method to construct function models and the IDEF1x method to make information models systemically, as well as how they are used in designing seismic information system in CTBT verification. (authors)

  2. FY 1995 report on verification of geothermal exploration technology. Development of fracture reservoir exploration technology (development of seismic exploration); 1995 nendo chinetsu tansa gijutsunado kensho chosa. Danretsugata choryuso tansaho kaihatsu (danseiha riyo tansaho kaihatsu) hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This report provides the development of new exploration technology using elastic waves, such as reflection seismic survey, VSP, and seismic tomography, for precisely characterizing subsurface fractures in geothermal reservoirs. In order to investigate and improve the effective data acquisition and analysis methods for detecting a fault type of fractures, an experiment of a seismic tomography method was conducted using wells drilled in the Ogiri geothermal field, Aira-gun, Kagoshima Prefecture. An experiment of propagation characteristics of piezo type underground seismic source in the volcanic field was also conducted as a trend survey of underground seismic sources. The fracture type in the model field was systematically analyzed by measuring the core samples obtained in the demonstration test field through remanence measurement, fluid inclusion measurement, and zircon measurement using test equipment, and by analyzing results obtained from cores and results of seismic tomography obtained from the wells. Based on these results, the effectiveness and practical application of exploration methods using elastic waves were investigated. 80 refs., 250 figs., 49 tabs.

  3. Auditing nuclear materials statements

    International Nuclear Information System (INIS)

    Anon.

    1973-01-01

    A standard that may be used as a guide for persons making independent examinations of nuclear materials statements or reports regarding inventory quantities on hand, receipts, production, shipment, losses, etc. is presented. The objective of the examination of nuclear materials statements by the independent auditor is the expression of an opinion on the fairness with which the statements present the nuclear materials position of a nuclear materials facility and the movement of such inventory materials for the period under review. The opinion is based upon an examination made in accordance with auditing criteria, including an evaluation of internal control, a test of recorded transactions, and a review of measured discards and materials unaccounted for (MUF). The standard draws heavily upon financial auditing standards and procedures published by the American Institute of Certified Public Accountants

  4. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  5. Statement to the fifty-seventh regular session of the United Nations General Assembly. New York, Nov. 11, 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    Since the establishment in 1957 of the International Atomic Energy Agency, we have been dedicated to the achievement and promotion of a vision, 'Atoms For Peace': on the one hand, the prevention of nuclear weapons proliferation, with the aim of their eventual elimination - and on the other, the sharing of safe and secure nuclear technologies in peaceful applications that benefit humankind. I will speak briefly today about the IAEA's progress in working toward those goals. The most prominent issues covered in this statement include: Nuclear Technology, meaning nuclear power technology, radioactive waste management; non-power nuclear applications; nuclear safety; protection against nuclear terrorism; verification of nuclear non-proliferation, with the emphasis on implementation of United Nations Security Council Resolutions Related to Iraq and status of safeguards agreement with the Democratic People's Republic of Korea; application of IAEA Safeguards in the Middle East; Nuclear Arms Control Efforts; and the Management of the IAEA. This overview of the past year of IAEA activities reflects a continuing evolution in all our areas of work - and, the dynamic nature of our programme in anticipating and responding to that evolution. The Agency continues to play a key role in ensuring that the benefits of nuclear technology are shared globally, that nuclear activities are conducted safely, that nuclear and radioactive materials and facilities are adequately protected, and that a credible inspection regime exists to verify compliance with non-proliferation commitments. Naturally, the ability to effectively perform those functions depends on the commitment and support of our Member States

  6. Corporate Information Management Financial Statements

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1995-01-01

    The audit objective was to determine whether the OASD(C31) methods for preparing FY 1996 CIM, general purpose financial statements will result in auditable and complete general purpose financial statements...

  7. Statement on Plagiarism

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 13; Issue 5. Statement on Plagiarism. S Mahadevan N Mukunda. Editorial Volume 13 Issue 5 May 2008 pp 403-404. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/013/05/0403-0404. Author Affiliations.

  8. Consolidating Financial Statements.

    Science.gov (United States)

    Wood, Marcia R.

    This publication is designed to be a desktop reference and assist financial officers in both public and independent institutions of higher education in the preparation of consolidated financial statements. Chapter 1 covers generally accepted accounting principles and other accounting literature, and summarizes reporting rules of the Financial…

  9. Consolidated financial statements

    OpenAIRE

    Blaha, Miroslav

    2010-01-01

    This work provides basic information about consolidation and consolidated financial statements. In the beginning there are definisions of the members of the group under discussion and their relationship. Hereafter concepts of consolidation, accounting methods and methods of consolidation are discussed. It also compares approach of different accounting systems to consolidation.

  10. CONSOLIDATED FINANCIAL STATEMENTS UNDER IFRS

    OpenAIRE

    Tănase Alin-Eliodor; Calotă Traian-Ovidiu

    2013-01-01

    This article is focuses on accounting consolidation techniques and the preparation of consolidation worksheets for the components of financial statements (statement of comprehensive income, statement of changes in equity, and financial position). The presented group includes parent company, two subsidiaries (only one fully controlled by the parent company) and a jointly controlled entity. The financial statements are presented under the following standards IFRS 3 Business Combination, IAS 27 ...

  11. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    International Nuclear Information System (INIS)

    Betsill, J.D.; Gruebel, R.D.

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums

  12. Fundamentals of Financial Statements Audit

    OpenAIRE

    World Bank

    2011-01-01

    The purpose of an audit is to enhance the degree of confidence of intended users in the financial statements. The objective of an audit of financial statements is to enable an auditor to express an opinion as to whether the financial statements are prepared, in all material respects, in accordance with International Financial Reporting Standards or another identified financial reporting fr...

  13. Selected problems in auditing the financial statements of credit institutions

    Directory of Open Access Journals (Sweden)

    JOANNA WIELGÓRSKA-LESZCZYŃSKA

    2016-06-01

    Full Text Available The article presents issues deserving special attention in the area of auditing the financial statements of credit institution. Without a doubt, these are the financial instruments, including credit exposures. To properly audit these instruments it is required to verify the accuracy of the valuation. Such verification in the case of credit exposures is preceded by appropriate category qualification followed by impairment write-off determined considering the established security. Thus, the audit process is complex and requires assessment by the auditor of exogenous and endogenous factors affecting the operation of credit institutions.

  14. Selected problems in auditing the financial statements of credit institutions

    Directory of Open Access Journals (Sweden)

    Joanna Wielgórska-Leszczyńska

    2016-07-01

    Full Text Available The article presents issues deserving special attention in the area of auditing the financial statements ofcredit institution. Without a doubt, these are the financial instruments, including credit exposures. To properly audit these instruments it is required to verify the accuracy of the valuation. Such verification in the case of credit exposures is preceded by appropriate category qualification followed by impair-ment write-off determined considering the established security. Thus, the audit process is complex and requires assessment by the auditor of exogenous and endogenous factors affecting the operation ofcredit institutions.

  15. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  16. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of ...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects....

  17. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  18. CTBT Integrated Verification System Evaluation Model

    Energy Technology Data Exchange (ETDEWEB)

    Edenburn, M.W.; Bunting, M.L.; Payne, A.C. Jr.

    1997-10-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia`s Monitoring Systems and Technology Center and has been funded by the US Department of Energy`s Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, top-level, modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM`s unique features is that it integrates results from the various CTBT sensor technologies (seismic, infrasound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection) and location accuracy of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system`s performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. This report describes version 1.2 of IVSEM.

  19. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  20. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  1. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  2. Monitoring/Verification using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Stephan Weeks, Kevin Kyle, Manuel Manard

    2008-05-30

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations-management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. Fast GC is the leading field analytical method for gas phase separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  3. Monitoring/Verification Using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Kyle; Stephan Weeks

    2008-03-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operationsmanagement systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  4. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  5. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  6. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  7. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  8. VERIFICATION OF PARALLEL AUTOMATA-BASED PROGRAMS

    OpenAIRE

    M. A. Lukin

    2014-01-01

    The paper deals with an interactive method of automatic verification for parallel automata-based programs. The hierarchical state machines can be implemented in different threads and can interact with each other. Verification is done by means of Spin tool and includes automatic Promela model construction, conversion of LTL-formula to Spin format and counterexamples in terms of automata. Interactive verification gives the possibility to decrease verification time and increase the maxi...

  9. Translation of Financial Statements

    OpenAIRE

    Dalthan Simas; Otavio De Medeiros

    2005-01-01

    This paper has the purpose of surveying and critically analyzing the effects of accounting procedures which are closely related to groups of companies operating multinationally. These are the methods for translation of financial statements, e.g. the Temporal and the Closing- rate Methods, as far as those methods are embodied in accounting standards which have been either recommended or adopted by countries such as the UK and US. We conclude that with regard to changing prices, General Price L...

  10. Python Switch Statement

    Directory of Open Access Journals (Sweden)

    2008-06-01

    Full Text Available The Python programming language does not have a built in switch/case control structure as found in many other high level programming languages. It is thought by some that this is a deficiency in the language, and the control structure should be added. This paper demonstrates that not only is the control structure not needed, but that the methods available in Python are more expressive than built in case statements in other high level languages.

  11. Implementation Plan for the Hawaii Geothermal Project Environmental Impact Statement (DOE Review Draft:)

    Energy Technology Data Exchange (ETDEWEB)

    None

    1992-09-18

    The US Department of Energy (DOE) is preparing an Environmental Impact Statement (EIS) that identifies and evaluates the environmental impacts associated with the proposed Hawaii Geothermal Project (HGP), as defined by the State of Hawaii in its 1990 proposal to Congress (DBED 1990). The location of the proposed project is shown in Figure 1.1. The EIS is being prepared pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as implemented by the President's Council on Environmental Quality (CEQ) regulations (40 CFR Parts 1500-1508) and the DOE NEPA Implementing Procedures (10 CFR 1021), effective May 26, 1992. The State's proposal for the four-phase HGP consists of (1) exploration and testing of the geothermal resource beneath the slopes of the active Kilauea volcano on the Island of Hawaii (Big Island), (2) demonstration of deep-water power cable technology in the Alenuihaha Channel between the Big Island and Mau, (3) verification and characterization of the geothermal resource on the Big Island, and (4) construction and operation of commercial geothermal power production facilities on the Big Island, with overland and submarine transmission of electricity from the Big Island to Oahu and possibly other islands. DOE prepared appropriate NEPA documentation for separate federal actions related to Phase 1 and 2 research projects, which have been completed. This EIS will consider Phases 3 and 4, as well as reasonable alternatives to the HGP. Such alternatives include biomass coal, solar photovoltaic, wind energy, and construction and operation of commercial geothermal power production facilities on the Island of Hawaii (for exclusive use on the Big Island). In addition, the EIs will consider the reasonable alternatives among submarine cable technologies, geothermal extraction, production, and power generating technologies; pollution control technologies; overland and submarine power transmission routes; sites reasonably suited to

  12. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  13. Hot cell verification facility update

    International Nuclear Information System (INIS)

    Titzler, P.A.; Moffett, S.D.; Lerch, R.E.

    1985-01-01

    The Hot Cell Verification Facility (HCVF) provides a prototypic hot cell mockup to check equipment for functional and remote operation, and provides actual hands-on training for operators. The facility arrangement is flexible and assists in solving potential problems in a nonradioactive environment. HCVF has been in operation for six years, and the facility is a part of the Hanford Engineering Development Laboratory

  14. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  15. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  16. Runtime Verification in Distributed Computing

    NARCIS (Netherlands)

    Malakuti Khah Olun Abadi, Somayeh; Park, Jong Hyuk; Obaidat, Mohammad; Aksit, Mehmet; Bockisch, Christoph

    2011-01-01

    Runtime verification aims to check whether an application executes its behaviour as specified. Thereby the active execution trace of an application is checked in terms of the actual execution context; diagnosis and, possibly, recovery actions are taken when the specification is violated. In today’s

  17. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  18. Verification and validation for CIPRNet

    NARCIS (Netherlands)

    Voogd, J.

    2016-01-01

    In this chapter it is shown that if an appreciable risk is present in the use of Modelling and Simulation (M&S), Verification and Validation (V&V) should be employed to manage and mitigate that risk. The use of M&S in the domain of critical infrastructure (CI) will always be accompanied by such a

  19. Statement to the fifty-third session of the United Nations General Assembly, New York, 2 November 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document reproduces the statement of the Director General of the IAEA at the fifty-third session of the United Nations General Assembly in New York, USA, on 2 November 1998. The statement focuses on the priority work of the Agency under the following main headings: contribution to peace and security (including the IAEA's strengthened safeguards system, inspections in Iraq, safeguards verifications in the Democratic People's Republic of Korea, future prospects of verification, illicit trafficking in nuclear material), co-operation for development (the Agency's technical co-operation programme), and meeting global challenges in the field of energy, the environment and nuclear safety. The statement concludes with a description of the process of management review and reform initiated by the Director General to ensure that the Agency is responding efficiently and effectively to the needs of its Member States

  20. Insulin pump risks and benefits: a clinical appraisal of pump safety standards, adverse event reporting, and research needs: a joint statement of the European Association for the Study of Diabetes and the American Diabetes Association Diabetes Technology Working Group.

    Science.gov (United States)

    Heinemann, Lutz; Fleming, G Alexander; Petrie, John R; Holl, Reinhard W; Bergenstal, Richard M; Peters, Anne L

    2015-04-01

    -world setting; such data could provide vital information to help health care teams to educate and support users and thereby prevent AEs. As well as requiring more from the manufacturing companies, we call for public funding of more research addressing clinically important questions in relation to pump therapy: both observational studies and clinical trials. At present, there are significant differences in the regulatory systems between the US and European Union at both pre- and postmarketing stages; improvements in the European system are more urgently required. This statement concludes with a series of recommended specific actions for "meknovigilance" (i.e., a standardized safety approach to technology) that could be implemented to address the shortcomings we highlight. © 2015 by the American Diabetes Association and Springer-Verlag. Copying with attribution allowed for any noncommercial use of the work.

  1. Insulin pump risks and benefits: a clinical appraisal of pump safety standards, adverse event reporting and research needs. A joint statement of the European Association for the Study of Diabetes and the American Diabetes Association Diabetes Technology Working Group.

    Science.gov (United States)

    Heinemann, Lutz; Fleming, G Alexander; Petrie, John R; Holl, Reinhard W; Bergenstal, Richard M; Peters, Anne L

    2015-05-01

    -world setting; such data could provide vital information to help healthcare teams to educate and support users, and thereby prevent AEs. As well as requiring more from the manufacturing companies, we call for public funding of more research addressing clinically important questions in relation to pump therapy: both observational studies and clinical trials. At present there are significant differences in the regulatory systems between the USA and European Union at both pre- and post-marketing stages; improvements in the European system are more urgently required. This statement concludes with a series of recommended specific actions for 'meknovigilance' (i.e. a standardised safety approach to technology) which could be implemented to address the shortcomings we highlight.

  2. Technology.

    Science.gov (United States)

    Online-Offline, 1998

    1998-01-01

    Focuses on technology, on advances in such areas as aeronautics, electronics, physics, the space sciences, as well as computers and the attendant progress in medicine, robotics, and artificial intelligence. Describes educational resources for elementary and middle school students, including Web sites, CD-ROMs and software, videotapes, books,…

  3. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  4. A study of applications scribe frame data verifications using design rule check

    Science.gov (United States)

    Saito, Shoko; Miyazaki, Masaru; Sakurai, Mitsuo; Itoh, Takahisa; Doi, Kazumasa; Sakurai, Norioko; Okada, Tomoyuki

    2013-06-01

    In semiconductor manufacturing, scribe frame data generally is generated for each LSI product according to its specific process design. Scribe frame data is designed based on definition tables of scanner alignment, wafer inspection and customers specified marks. We check that scribe frame design is conforming to specification of alignment and inspection marks at the end. Recently, in COT (customer owned tooling) business or new technology development, there is no effective verification method for the scribe frame data, and we take a lot of time to work on verification. Therefore, we tried to establish new verification method of scribe frame data by applying pattern matching and DRC (Design Rule Check) which is used in device verification. We would like to show scheme of the scribe frame data verification using DRC which we tried to apply. First, verification rules are created based on specifications of scanner, inspection and others, and a mark library is also created for pattern matching. Next, DRC verification is performed to scribe frame data. Then the DRC verification includes pattern matching using mark library. As a result, our experiments demonstrated that by use of pattern matching and DRC verification our new method can yield speed improvements of more than 12 percent compared to the conventional mark checks by visual inspection and the inspection time can be reduced to less than 5 percent if multi-CPU processing is used. Our method delivers both short processing time and excellent accuracy when checking many marks. It is easy to maintain and provides an easy way for COT customers to use original marks. We believe that our new DRC verification method for scribe frame data is indispensable and mutually beneficial.

  5. Methods of Verification, Accountability and Control of Special Nuclear Material

    International Nuclear Information System (INIS)

    Stewart, J.E.

    1999-01-01

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data

  6. Experimental verification of internal dosimetry calculations. Annual progress report

    International Nuclear Information System (INIS)

    1980-05-01

    During the past year a dosimetry research program has been established in the School of Nuclear Engineering at the Georgia Institute of Technology. The major objective of this program has been to provide research results upon which a useful internal dosimetry system could be based. The important application of this dosimetry system will be the experimental verification of internal dosimetry calculations such as those published by the MIRD Committee

  7. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  8. Influence of Customer Focused Mission Statement on Customer Satisfaction

    Directory of Open Access Journals (Sweden)

    Chijioke Nwachukwu

    2017-01-01

    Full Text Available The purpose of this study is to examine the influence of customer‑focused mission statements on customer satisfaction in selected cell phone manufacturing companies in the United States. The study employed content analysis for the mission statement and data from America customer satisfaction index (ACSI. In analysing our data, Pearson correlation, and multiple regression techniques were used. The result showed that product and service, technology, philosophy, self‑concept, and public image mission statement components are strongly positively correlated with customer satisfaction. Customer, survival, growth and profitability and market mission statement components are insignificantly negatively correlated with customer satisfaction. The study, therefore, recommends that companies that want to remain competitive by enhancing customer satisfaction should formulate mission statements from a customer perspective so that they include product and service, technology, philosophy, self‑concept, and public image components. The main limitation of the study represents the sample size and structure. This study empirically investigated the correlation and association of nine mission statement components with customer satisfaction.

  9. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  10. European Respiratory Society statement

    DEFF Research Database (Denmark)

    Miravitlles, Marc; Dirksen, Asger; Ferrarotti, Ilaria

    2017-01-01

    lung disease. A large proportion of individuals affected remain undiagnosed and therefore without access to appropriate care and treatment.The most recent international statement on AATD was published by the American Thoracic Society and the European Respiratory Society in 2003. Since then there has...... the efficacy and safety of augmentation therapy, the only specific treatment available for the pulmonary disease associated with AATD.As AATD is a rare disease, it is crucial to organise national and international registries and collect information prospectively about the natural history of the disease...

  11. Data verification and evaluation techniques for groundwater monitoring programs

    International Nuclear Information System (INIS)

    Mercier, T.M.; Turner, R.R.

    1990-12-01

    To ensure that data resulting from groundwater monitoring programs are of the quality required to fulfill program objectives, it is suggested that a program of data verification and evaluation be implemented. These procedures are meant to supplement and support the existing laboratory quality control/quality assurance programs by identifying aberrant data resulting from a variety of unforeseen circumstances: sampling problems, data transformations in the lab, data input at the lab, data transfer, end-user data input. Using common-sense principles, pattern recognition techniques, and hydrogeological principles, a computer program was written which scans the data for suspected abnormalities and produces a text file stating sample identifiers, the suspect data, and a statement of how the data has departed from the expected. The techniques described in this paper have been developed to support the Y-12 Plant Groundwater Protection Program Management Plan

  12. 7 CFR 1212.51 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... statements. (a) The Board shall prepare and submit financial statements to the Department on a periodic basis. Each such financial statement shall include, but not be limited to, a balance sheet, income statement... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial statements. 1212.51 Section 1212.51...

  13. 1987 Statement on Software Copyright: An ICCE Policy Statement.

    Science.gov (United States)

    Computing Teacher, 1987

    1987-01-01

    Building on the 1983 policy statement developed by the International Council for Computers in Education (ICCE), this statement recommends the adoption of a school district copyright policy, adoption of the suggested software use guidelines, and use of the copyright page of software documentation to ascertain user's rights, obligations, and licence…

  14. Technology

    Directory of Open Access Journals (Sweden)

    Xu Jing

    2016-01-01

    Full Text Available The traditional answer card reading method using OMR (Optical Mark Reader, most commonly, OMR special card special use, less versatile, high cost, aiming at the existing problems proposed a method based on pattern recognition of the answer card identification method. Using the method based on Line Segment Detector to detect the tilt of the image, the existence of tilt image rotation correction, and eventually achieve positioning and detection of answers to the answer sheet .Pattern recognition technology for automatic reading, high accuracy, detect faster

  15. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    The purpose of this thesis is to develop a method for verifying timed temporal properties of continuous dynamical systems, and to develop a method for verifying the safety of an interconnection of continuous systems. The methods must be scalable in the number of continuous variables...... to the high complexity of both the dynamical system and the specification. Therefore, there is a need for methods capable of verifying complex specifications of complex systems. The verification of high dimensional continuous dynamical systems is the key to verifying general systems. In this thesis......, an abstraction approach is taken to the verification problem. A method is developed for abstracting continuous dynamical systems by timed automata. This method is based on subdividing the state space into cells by use of subdivisioning functions that are decreasing along the vector field. To allow...

  16. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  17. MUSE WFM AO Science Verification

    Science.gov (United States)

    Leibundgut, B.; Bacon, R.; Jaffé, Y. L.; Johnston, E.; Kuntschner, H.; Selman, F.; Valenti, E.; Vernet, J.; Vogt, F.

    2017-12-01

    The goal of Science Verification (SV) as part of the transition into operations is to carry out scientific observations to test the end-to-end operations of a new instrument or new instrument modes. The Multi Unit Spectroscopic Explorer, (MUSE; Bacon et al., 2010), at the Very Large Telescope (VLT) can be operated in several modes. The wide-field mode has been offered since Period 94 (October 2014) for natural-seeing observations. With the commissioning of the Adaptive Optics Facility (AOF; Arsenault et al., 2017) the wide-field mode can be supported by ground-layer adaptive optics through four artificial laser guide stars and the adaptive optics module, Ground Atmospheric Layer Adaptive OptiCs for Spectroscopic Imaging (GALACSI). The MUSE wide-field mode adaptive optics Science Verification (hereafter referred to MUSE WFM AO SV) was scheduled from 12–14 August 2017. Out of 41 submitted proposals, 19 observing programmes were scheduled, covering a wide range of science topics and amounting to an allocation of 42 hours. This included sufficient oversubscription to cover all expected observing conditions. Due to inclement weather during the original SV nights, two more nights were allocated on 16 and 17 September 2017 to observe more programmes. In total, seven programmes were completed, six programmes received partial data, and the remaining six projects could not be started. We summarise here the planning, execution and first results from the Science Verification.

  18. Drug, devices, technologies, and techniques for blood management in minimally invasive and conventional cardiothoracic surgery: a consensus statement from the International Society for Minimally Invasive Cardiothoracic Surgery (ISMICS) 2011.

    Science.gov (United States)

    Menkis, Alan H; Martin, Janet; Cheng, Davy C H; Fitzgerald, David C; Freedman, John J; Gao, Changqing; Koster, Andreas; Mackenzie, G Scott; Murphy, Gavin J; Spiess, Bruce; Ad, Niv

    2012-01-01

    The objectives of this consensus conference were to evaluate the evidence for the efficacy and safety of perioperative drugs, technologies, and techniques in reducing allogeneic blood transfusion for adults undergoing cardiac surgery and to develop evidence-based recommendations for comprehensive perioperative blood management in cardiac surgery, with emphasis on minimally invasive cardiac surgery. The consensus panel short-listed the potential topics for review from a comprehensive list of potential drugs, devices, technologies, and techniques. The process of short-listing was based on the need to prioritize and focus on the areas of highest importance to surgeons, anesthesiologists, perfusionists, hematologists, and allied health care involved in the management of patients who undergo cardiac surgery whether through the conventional or minimally invasive approach. MEDLINE, Cochrane Library, and Embase databases were searched from their date of inception to May 2011, and supplemental hand searches were also performed. Detailed methodology and search strategies are outlined in each of the subsequently published systematic reviews. In general, all relevant synonyms for drugs (antifibrinolytic, aprotinin, [Latin Small Letter Open E]-aminocaproic acid, tranexamic acid [TA], desmopressin, anticoagulants, heparin, antiplatelets, anti-Xa agents, adenosine diphosphate inhibitors, acetylsalicylic acid [ASA], factor VIIa [FVIIa]), technologies (cell salvage, miniaturized cardiopulmonary bypass (CPB) circuits, biocompatible circuits, ultrafiltration), and techniques (transfusion thresholds, minimally invasive cardiac or aortic surgery) were searched and combined with terms for blood, red blood cells, fresh-frozen plasma, platelets, transfusion, and allogeneic exposure. The American Heart Association/American College of Cardiology system was used to label the level of evidence and class of each recommendation. Database search identified more than 6900 articles, with 4423 full

  19. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  20. SEMI-AUTOMATIC SPEAKER VERIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    E. V. Bulgakova

    2016-03-01

    Full Text Available Subject of Research. The paper presents a semi-automatic speaker verification system based on comparing of formant values, statistics of phone lengths and melodic characteristics as well. Due to the development of speech technology, there is an increased interest now in searching for expert speaker verification systems, which have high reliability and low labour intensiveness because of the automation of data processing for the expert analysis. System Description. We present a description of a novel system analyzing similarity or distinction of speaker voices based on comparing statistics of phone lengths, formant features and melodic characteristics. The characteristic feature of the proposed system based on fusion of methods is a weak correlation between the analyzed features that leads to a decrease in the error rate of speaker recognition. The system advantage is the possibility to carry out rapid analysis of recordings since the processes of data preprocessing and making decision are automated. We describe the functioning methods as well as fusion of methods to combine their decisions. Main Results. We have tested the system on the speech database of 1190 target trials and 10450 non-target trials, including the Russian speech of the male and female speakers. The recognition accuracy of the system is 98.59% on the database containing records of the male speech, and 96.17% on the database containing records of the female speech. It was also experimentally established that the formant method is the most reliable of all used methods. Practical Significance. Experimental results have shown that proposed system is applicable for the speaker recognition task in the course of phonoscopic examination.

  1. An independent verification and validation of the Future Theater Level Model conceptual model

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.S. III; Kruse, K.L.; Martellaro, A.J.; Packard, S.L.; Thomas, B. Jr.; Turley, V.K.

    1994-08-01

    This report describes the methodology and results of independent verification and validation performed on a combat model in its design stage. The combat model is the Future Theater Level Model (FTLM), under development by The Joint Staff/J-8. J-8 has undertaken its development to provide an analysis tool that addresses the uncertainties of combat more directly than previous models and yields more rapid study results. The methodology adopted for this verification and validation consisted of document analyses. Included were detailed examination of the FTLM design documents (at all stages of development), the FTLM Mission Needs Statement, and selected documentation for other theater level combat models. These documents were compared to assess the FTLM as to its design stage, its purpose as an analytical combat model, and its capabilities as specified in the Mission Needs Statement. The conceptual design passed those tests. The recommendations included specific modifications as well as a recommendation for continued development. The methodology is significant because independent verification and validation have not been previously reported as being performed on a combat model in its design stage. The results are significant because The Joint Staff/J-8 will be using the recommendations from this study in determining whether to proceed with develop of the model.

  2. Achievement report on developing superconductor power applied technologies in fiscal 1999 (2). Research and development of superconductor wire materials, research and development of superconductor power generators, research of total systems, research and development of freezing systems, and verification tests; 1999 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. 2. Chodendo senzai no kenkyu kaihatsu / chodendo hatsudenki no kenkyu kaihatsu / total system no kenkyu / reito system no kenkyu kaihatsu / jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    With an objective to achieve higher efficiency, higher density, and higher stability in power systems, research and development has been performed on superconductor power generators. This paper summarizes the achievements thereof in fiscal 1999. A verification test was given on the rotor of an ultra high speed responding generator. In a sudden short circuit test using the different phase charging method, no anomalies were found such as quench generation and vibration changes, wherein the healthiness of the generator was verified. In the VVVF actuation test, knowledge was acquired on the actuation method when the ultra high speed responding generator is applied to a combined cycle plant. After the verification test has been completed, the disassembly inspections such as visual check and non-destructive test were performed. With regard to the vacuum leakage found in the rotor under very low temperatures, the causes were presumed and the countermeasures were discussed by observing the weld structures. In the design research, the conception design on the 200-MW pilot generator was reviewed by reflecting the results of the verification tests on the model generator. At the same time, trial design was made on a 600-MW target generator. In summarizing the overall research achievements, the achievements and evaluations were summarized on technological issues that have been allotted to each research member. (NEDO)

  3. 76 FR 24570 - Proposed Information Collection (Veterans Mortgage Life Insurance-Change of Address Statement...

    Science.gov (United States)

    2011-05-02

    ... AFFAIRS Proposed Information Collection (Veterans Mortgage Life Insurance--Change of Address Statement... Mortgage Life Insurance. DATES: Written comments and recommendations on the proposed collection of... information technology. Title: Veterans Mortgage Life Insurance--Change of Address Statement, VA Form 29-0563...

  4. Usage of internal statements in making consolidated financial statement

    Directory of Open Access Journals (Sweden)

    V.N. Herman

    2016-12-01

    Full Text Available The emergence of the consolidated financial statements is the result of integration processes in the businesses that lead to pooling of different companies. As consolidated financial statements present an aggregated look at the financial position of a parent and its subsidiaries, they let you gauge the overall health of an entire group of companies as opposed to one company’s standalone position. Consolidation of financial statements requires from the participants of joining elaborating their individual statements. The article describes the general scheme of consolidation process and defines the key trends of consolidation adjustments, in particular, financial investments, internal operations, goodwill and exchange rate differences. It is found out that to get information about internal operations and financial investments such data have to be synthesized from internal statements. This approach allows using the same accounting methods to parent and subsidiary entities. The objects, the users and the subject domain of internal statements are determined in order to make consolidation of financial statements of joining.

  5. New data structures and algorithms for logic synthesis and verification

    CERN Document Server

    Amaru, Luca Gaetano

    2017-01-01

    This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines. · Provides a comprehensive, theoretical study on majority and biconditional logic for logic synthesis; · Updates the current scenario in synthesis and verification – especially in light of emerging technologies; · Demonstrates applications to CMOS technology and emerging technologies.

  6. Statement on virginity testing.

    Science.gov (United States)

    2015-07-01

    Virginity testing (virginity examination) is a gynecological examination that is intended to correlate the status and appearance of the hymen with previous sexual contact to determine whether a female has had or is habituated to sexual intercourse. Virginity examinations are practiced in many countries, often forcibly, including in detention places; on women who allege rape or are accused of prostitution; and as part of public or social policies to control sexuality. The Independent Forensic Expert Group (IFEG) - thirty-five preeminent independent forensic experts from eighteen countries specialized in evaluating and documenting the physical and psychological effects of torture and ill-treatment - released a statement on the practice in December 2014. In its statement, the IFEG outlines the physical and psychological effects of forcibly conducting virginity examinations on females based on its collective experience. The Group assesses whether, based on the effects, forcibly conducted virginity examinations constitute cruel, inhuman, or degrading treatment or torture. Finally, the IFEG addresses the medical interpretation, relevance, and ethical implications of such examinations. The IFEG concludes that virginity examinations are medically unreliable and have no clinical or scientific value. These examinations are inherently discriminatory and, in almost all instances, when conducted forcibly, result in significant physical and mental pain and suffering, thereby constituting cruel, inhuman and degrading treatment or torture. When virginity examinations are forcibly conducted and involve vaginal penetration, the examination should be considered as sexual assault and rape. Involvement of health professionals in these examinations violates the basic standards and ethics of the professions. Copyright © 2015 Torture. Published by Elsevier Ltd.. All rights reserved.

  7. Software verification and validation for commercial statistical packages utilized by the statistical consulting section of SRTC

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, T.B.

    2000-03-22

    The purpose of this report is to provide software verification and validation for the statistical packages used by the Statistical Consulting Section (SCS) of the Savannah River Technology Center. The need for this verification and validation stems from the requirements of the Quality Assurance programs that are frequently applicable to the work conducted by SCS. The IBM Personal Computer 300PL and 300XL are both Pentium II based desktops. Therefore the software verification and validation in this report is valid interchangeably between both platforms. As new computing platforms, statistical packages, or revisions to existing packages are reevaluated using these new tools, this report is to be revised to address their verification and validation.

  8. Verification of classified fissile material using unclassified attributes

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Fearey, B.L.; Puckett, J.M.; Tape, J.W.

    1998-01-01

    This paper reports on the most recent efforts of US technical experts to explore verification by IAEA of unclassified attributes of classified excess fissile material. Two propositions are discussed: (1) that multiple unclassified attributes could be declared by the host nation and then verified (and reverified) by the IAEA in order to provide confidence in that declaration of a classified (or unclassified) inventory while protecting classified or sensitive information; and (2) that attributes could be measured, remeasured, or monitored to provide continuity of knowledge in a nonintrusive and unclassified manner. They believe attributes should relate to characteristics of excess weapons materials and should be verifiable and authenticatable with methods usable by IAEA inspectors. Further, attributes (along with the methods to measure them) must not reveal any classified information. The approach that the authors have taken is as follows: (1) assume certain attributes of classified excess material, (2) identify passive signatures, (3) determine range of applicable measurement physics, (4) develop a set of criteria to assess and select measurement technologies, (5) select existing instrumentation for proof-of-principle measurements and demonstration, and (6) develop and design information barriers to protect classified information. While the attribute verification concepts and measurements discussed in this paper appear promising, neither the attribute verification approach nor the measurement technologies have been fully developed, tested, and evaluated

  9. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  10. The SeaHorn Verification Framework

    Science.gov (United States)

    Gurfinkel, Arie; Kahsai, Temesghen; Komuravelli, Anvesh; Navas, Jorge A.

    2015-01-01

    In this paper, we present SeaHorn, a software verification framework. The key distinguishing feature of SeaHorn is its modular design that separates the concerns of the syntax of the programming language, its operational semantics, and the verification semantics. SeaHorn encompasses several novelties: it (a) encodes verification conditions using an efficient yet precise inter-procedural technique, (b) provides flexibility in the verification semantics to allow different levels of precision, (c) leverages the state-of-the-art in software model checking and abstract interpretation for verification, and (d) uses Horn-clauses as an intermediate language to represent verification conditions which simplifies interfacing with multiple verification tools based on Horn-clauses. SeaHorn provides users with a powerful verification tool and researchers with an extensible and customizable framework for experimenting with new software verification techniques. The effectiveness and scalability of SeaHorn are demonstrated by an extensive experimental evaluation using benchmarks from SV-COMP 2015 and real avionics code.

  11. Reconceptualizing Media Literacy in the Social Studies: A Pragmatist Critique of the NCSS Position Statement on Media Literacy

    Science.gov (United States)

    Mason, Lance; Metzger, Scott Alan

    2012-01-01

    The National Council for the Social Studies Position Statement on Media Literacy argues that media literacy can facilitate participatory democracy if students' interest in media is harnessed. The statement conceives of media technology as neutral and under-conceptualizes socializing aspects of media technologies that foster atomized individualism.…

  12. Generic impact statement for commercial radioactive waste management

    International Nuclear Information System (INIS)

    Unruh, C.M.

    1976-01-01

    ERDA is preparing a generic environmental impact statement on the treatment and disposal of waste resulting from commercial reactors and post fission operations in the light water reactor (LWR) fuel cycle. Expert contributions will be provided by many of the ERDA national laboratories and contractors. The waste management aspects of the statement will be based on available technology as presented in the recently issued ''Alternatives for Managing Waste from Reactors and Post Fission Operations in the LWR Fuel Cycle,'' ERDA-76-43 Document. This 1500 page, five volume Technical Alternative Document (TAD) describes the status of technology (to September, 1975) for handling post fission radioactive waste generated by the production of electricity by nuclear power light water reactor-generator systems. The statement will be generic in nature discussing typical or hypothetical facilities in typical or hypothetical environments. It is not intended to replace environmental statements required in support of specific projects nor for Nuclear Regulatory Commission licensing procedures. A major purpose of the generic statement is to inform the public and to solicit comments on the ERDA program for: (1) the final disposition of commercial radioactive waste, (2) waste treatment, (3) waste interim storage, and (4) transportation of waste. The statement will discuss the ERDA contingency program to provide retrievable storage of such waste if they should be transferred to Federal custody prior to the availability of the geologic isolation facilities for terminal disposal. The generic statement will not address radioactive waste resulting from U.S. Defense Programs, the mining or milling of uranium, the management of waste from the breeder reactor program, waste from other nations, nor will it include an evaluation of the impact of waste resulting from power sources other than light water reactors

  13. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 14 September 1998

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1998-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 14 September 1998. The following aspects from the Agency's activity are presented: nuclear safety, technical co-operation programme, safeguards and verification, fissile material treaty, nuclear material released from the military sector, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), Agency's inspections in Iraq in relation to its clandestine nuclear programme, and Agency's safeguards in the Middle East region

  14. Report on the Trilateral Initiative. IAEA verification of weapon-origin material in the Russian Federation and the United States

    International Nuclear Information System (INIS)

    Shea, Thomas E.

    2001-01-01

    Just over five years ago, the Trilateral Initiative was launched to investigate the technical, legal and financial issues associated with IAEA verification of weapon-origin fissile material in the Russian Federation and the United States. Since then, the Joint Working Group has developed concepts and equipment suitable for such a verification mission, anticipating that the States would submit classified forms of fissile material to IAEA verification under new agreements developed for this purpose. This article summarizes the accomplishments to date and identifies the future steps foreseen under the Trilateral Initiative. As there is no legal commitment on the Parties to this Initiative as yet, the issues considered are still changing. Since it was launched, the Initiative has been given a sense of importance and weight, raising the expectations of the international community. The Final Document of the 2000 Conference on the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), for example, under the review of Article VI of the Treaty, includes the statement to 'complete and implement the Trilateral Initiative'. It was launched following independent statements by the President of the United States beginning in 1993, and by the President of the Russian Federation in 1996. It is an Initiative between the IAEA, the Russian Federation and the United States that is in the context of Article VI of the NPT. The intention is to examine the technical, legal and financial issues associated with IAEA verification of weapon origin and other fissile material released from defense programmes in those two countries

  15. A verification environment for bigraphs

    DEFF Research Database (Denmark)

    Perrone, Gian David; Debois, Søren; Hildebrandt, Thomas

    2013-01-01

    We present the BigMC tool for bigraphical reactive systems that may be instantiated as a verification tool for any formalism or domain-specific modelling language encoded as a bigraphical reactive system. We introduce the syntax and use of BigMC, and exemplify its use with two small examples......: a textbook “philosophers” example, and an example motivated by a ubiquitous computing application. We give a tractable heuristic with which to approximate interference between reaction rules, and prove this analysis to be safe. We provide a mechanism for state reachability checking of bigraphical reactive...

  16. Sustaining a verification regime in a nuclear weapon-free world. VERTIC research report no. 4

    International Nuclear Information System (INIS)

    Moyland, S. van

    1999-01-01

    Sustaining high levels of commitment to and enthusiasm for the verification regime in a nuclear weapon-free world (NWFW) would be a considerable challenge, but the price of failure would be high. No verification system for a complete ban on a whole of weapon of mass destruction (WMD) has been in existence long enough to provide a precedent or the requisite experience. Nevertheless, lessons from the International Atomic Energy Agency's (IAEA) nuclear safeguards system are instructive. A potential problem over the long haul is the gradual erosion of the deterrent effect of verification that may result from the continual overlooking of minor instances of non-compliance. Flaws in the verification system must be identified and dealt with early lest they also corrode the system. To achieve this the verification organisation's inspectors and analytical staff will need sustained support, encouragement, resources and training. In drawing attention to weaknesses, they must be supported by management and at the political level. The leaking of sensitive information, either industrial or military, by staff of the verification regime is a potential problem. 'Managed access' techniques should be constantly examined and improved. The verification organisation and states parties will need to sustain close co-operation with the nuclear and related industries. Frequent review mechanisms must be established. States must invest time and effort to make them effective. Another potential problem is the withering of resources for sustained verification. Verification organisations tend to be pressured by states to cut or last least cap costs, even if the verification workload increases. The verification system must be effective as knowledge and experience allows. The organisation will need continuously to update its scientific methods and technology. This requires in-house resources plus external research and development (R and D). Universities, laboratories and industry need incentives to

  17. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  18. Inspection and verification of waste packages for near surface disposal

    International Nuclear Information System (INIS)

    2000-01-01

    Extensive experience has been gained with various disposal options for low and intermediate level waste at or near surface disposal facilities. Near surface disposal is based on proven and well demonstrated technologies. To ensure the safety of near surface disposal facilities when available technologies are applied, it is necessary to control and assure the quality of the repository system's performance, which includes waste packages, engineered features and natural barriers, as well as siting, design, construction, operation, closure and institutional controls. Recognizing the importance of repository performance, the IAEA is producing a set of technical publications on quality assurance and quality control (QA/QC) for waste disposal to provide Member States with technical guidance and current information. These publications cover issues on the application of QA/QC programmes to waste disposal, long term record management, and specific QA/QC aspects of waste packaging, repository design and R and D. Waste package QA/QC is especially important because the package is the primary barrier to radionuclide release from a disposal facility. Waste packaging also involves interface issues between the waste generator and the disposal facility operator. Waste should be packaged by generators to meet waste acceptance requirements set for a repository or disposal system. However, it is essential that the disposal facility operator ensure that waste packages conform with disposal facility acceptance requirements. Demonstration of conformance with disposal facility acceptance requirements can be achieved through the systematic inspection and verification of waste packages at both the waste generator's site and at the disposal facility, based on a waste package QA/QC programme established by the waste generator and approved by the disposal operator. However, strategies, approaches and the scope of inspection and verification will be somewhat different from country to country

  19. Annual report and accounting statements 2007: ELETROBRAS; Relatorio anual e demonstracoes contabeis 2007: ELETROBRAS

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    This document reports the actives of the ELETROBRAS during the year 2007 related to: electricity market, international activities, strategic planning, financial indicators, business analysis, relationship with investors, energy marketing, operational research, technological development, financial statements, social responsibility and environment

  20. 78 FR 36829 - Proposed Information Collection (Veterans Mortgage Life Insurance Statement) Activity: Comment...

    Science.gov (United States)

    2013-06-19

    ... AFFAIRS Proposed Information Collection (Veterans Mortgage Life Insurance Statement) Activity: Comment... solicits comments for information needed to decline Veterans Mortgage Life Insurance. DATES: Written... techniques or the use of other forms of information technology. Title: Veterans Mortgage Life Insurance...

  1. 75 FR 68040 - Proposed Information Collection (Veterans Mortgage Life Insurance Statement) Activity: Comment...

    Science.gov (United States)

    2010-11-04

    ... Collection (Veterans Mortgage Life Insurance Statement) Activity: Comment Request AGENCY: Veterans Benefits... to decline Veterans Mortgage Life Insurance. DATES: Written comments and recommendations on the... techniques or the use of other forms of information technology. Title: Veterans Mortgage Life Insurance...

  2. Uranium: resolution and statement of the May 1985 Assembly of the Uniting Church in Australia

    International Nuclear Information System (INIS)

    Spencer, A.; Suter, K.; Walker, C.

    1985-12-01

    The issue of uranium mining is an important and also contentious one within Australia. This document contains an introduction to the Assembly Statement on Uranium, nuclear technology for war and peace and a case against uranium mining

  3. Childhood obesity case statement.

    Science.gov (United States)

    Esposito, Paul W; Caskey, Paul; Heaton, Lisa E; Otsuka, Norman

    2013-04-01

    The goal of this publication is to raise awareness of the impact of childhood obesity on the musculoskeletal health of children and its potential long-term implications. Relevant articles dealing with musculoskeletal disorders either caused by or worsened by childhood obesity were reviewed through a Pub Med search. Efforts to recognize and combat the childhood obesity epidemic were also identified through Internet search engines. This case statement was then reviewed by the members of the pediatric specialty group of the US Bone and Joint Initiative, which represents an extensive number of organizations dealing with musculoskeletal health. Multiple musculoskeletal disorders are clearly caused by or worsened by childhood obesity. The review of the literature clearly demonstrates the increased frequency and severity of many childhood musculoskeletal disorders. Concerns about the long-term implications of these childhood onset disorders such as pain and degenerative changes into adulthood are clearly recognized by all the member organizations of the US Bone and Joint Initiative. It is imperative to recognize the long-term implications of musculoskeletal disorders caused by or worsened by childhood obesity. It is also important to recognize that the ability to exercise comfortably is a key factor to developing a healthy lifestyle and maintaining a healthy body weight. Efforts to develop reasonable and acceptable programs to increase physical activity by all facets of society should be supported. Further research into the long-term implications of childhood musculoskeletal disorders related to childhood obesity is necessary. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. 3 CFR - Presidential Signing Statements

    Science.gov (United States)

    2010-01-01

    ... basis of policy disagreements. At the same time, such signing statements serve a legitimate function in... interpretations of the Constitution that are well-founded. 3. To promote transparency and accountability, I will...

  5. Basic statements of relativity theory

    Directory of Open Access Journals (Sweden)

    Wolfgang Muschik

    2010-04-01

    Full Text Available Some basic statements of relativity theory, starting out with geometry and observers up to Einstein's field equations, are collected in a systematical order without any proof, to serve as a short survey of tools and results.

  6. Environmental Impact Statement Filing Guidance

    Science.gov (United States)

    Describes how to submit an environmental impact statement through the e-NEPA electronic submission system. Describes how EPA submits a notice of availability in to the Federal Register and how the comment time period if set forth.

  7. Writing Your UCAS Personal Statement.

    OpenAIRE

    Parkinson, Tess

    2010-01-01

    The personal statement on the UCAS form is your best opportunity to "sell" yourself to the universities of your choice. Here, Tess Parkinson, a psychology admissions tutor, gives inside advice on how to approach what may seem a daunting task.

  8. GASB Statement No. 3 Guides Deposits, Investments.

    Science.gov (United States)

    Barker, Linda A.

    1986-01-01

    Discusses an April 1986 Governmental Accounting Standards Board statement concerning disclosures of repurchase and reverse repurchase agreements. The statement tries to help financial statement users assess the risks a goverment entity takes when investing public funds. It is effective for financial statement periods ending after December 15,…

  9. It's Time to Implement GASB Statement 54

    Science.gov (United States)

    Heinfeld, Gary; Nuehring, Bert

    2012-01-01

    In February 2009, the Governmental Accounting Standards Board (GASB) issued Statement No. 54, "Find Balance Reporting and Governmental Fund Type Definitions." This statement changes how a fund balance is classified on the face of the government fund financial statements and refines the definitions for government fund types. The statement's…

  10. 29 CFR 99.310 - Financial statements.

    Science.gov (United States)

    2010-07-01

    ....310 Financial statements. (a) Financial statements. The auditee shall prepare financial statements that reflect its financial position, results of operations or changes in net assets, and, where... 29 Labor 1 2010-07-01 2010-07-01 true Financial statements. 99.310 Section 99.310 Labor Office of...

  11. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  12. Video-based fingerprint verification.

    Science.gov (United States)

    Qin, Wei; Yin, Yilong; Liu, Lili

    2013-09-04

    Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, "inside similarity" and "outside similarity" are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low.

  13. RISKIND verification and benchmark comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  14. RISKIND verification and benchmark comparisons

    International Nuclear Information System (INIS)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models

  15. Runtime Verification with State Estimation

    Science.gov (United States)

    Stoller, Scott D.; Bartocci, Ezio; Seyster, Justin; Grosu, Radu; Havelund, Klaus; Smolka, Scott A.; Zadok, Erez

    2011-01-01

    We introduce the concept of Runtime Verification with State Estimation and show how this concept can be applied to estimate theprobability that a temporal property is satisfied by a run of a program when monitoring overhead is reduced by sampling. In such situations, there may be gaps in the observed program executions, thus making accurate estimation challenging. To deal with the effects of sampling on runtime verification, we view event sequences as observation sequences of a Hidden Markov Model (HMM), use an HMM model of the monitored program to "fill in" sampling-induced gaps in observation sequences, and extend the classic forward algorithm for HMM state estimation (which determines the probability of a state sequence, given an observation sequence) to compute the probability that the property is satisfied by an execution of the program. To validate our approach, we present a case study based on the mission software for a Mars rover. The results of our case study demonstrate high prediction accuracy for the probabilities computed by our algorithm. They also show that our technique is much more accurate than simply evaluating the temporal property on the given observation sequences, ignoring the gaps.

  16. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  17. 9 CFR 417.8 - Agency verification.

    Science.gov (United States)

    2010-01-01

    ... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part and all other applicable regulations. Such verification may include: (a) Reviewing the HACCP plan; (b...

  18. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  19. 18 CFR 158.5 - Verification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Verification. 158.5 Section 158.5 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT....5 Verification. The facts stated in the memorandum must be sworn to by persons having knowledge...

  20. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    2000-01-01

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  1. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  2. 21 CFR 123.8 - Verification.

    Science.gov (United States)

    2010-04-01

    ..., including signing and dating, by an individual who has been trained in accordance with § 123.10, of the... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR HUMAN CONSUMPTION FISH AND FISHERY PRODUCTS General Provisions § 123.8 Verification. (a) Overall verification. Every...

  3. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  4. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  5. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  6. Z-2 Architecture Description and Requirements Verification Results

    Science.gov (United States)

    Graziosi, Dave; Jones, Bobby; Ferl, Jinny; Scarborough, Steve; Hewes, Linda; Ross, Amy; Rhodes, Richard

    2016-01-01

    The Z-2 Prototype Planetary Extravehicular Space Suit Assembly is a continuation of NASA's Z series of spacesuits. The Z-2 is another step in NASA's technology development roadmap leading to human exploration of the Martian surface. The suit was designed for maximum mobility at 8.3 psid, reduced mass, and to have high fidelity life support interfaces. As Z-2 will be man-tested at full vacuum in NASA JSC's Chamber B, it was manufactured as Class II, making it the most flight-like planetary walking suit produced to date. The Z-2 suit architecture is an evolution of previous EVA suits, namely the ISS EMU, Mark III, Rear Entry I-Suit and Z-1 spacesuits. The suit is a hybrid hard and soft multi-bearing, rear entry spacesuit. The hard upper torso (HUT) is an all-composite structure and includes a 2-bearing rolling convolute shoulder with Vernier sizing mechanism, removable suit port interface plate (SIP), elliptical hemispherical helmet and self-don/doff shoulder harness. The hatch is a hybrid aluminum and composite construction with Apollo style gas connectors, custom water pass-thru, removable hatch cage and interfaces to primary and auxiliary life support feed water bags. The suit includes Z-1 style lower arms with cam brackets for Vernier sizing and government furnished equipment (GFE) Phase VI gloves. The lower torso includes a telescopic waist sizing system, waist bearing, rolling convolute waist joint, hard brief, 2 bearing soft hip thigh, Z-1 style legs with ISS EMU style cam brackets for sizing, and conformal walking boots with ankle bearings. The Z-2 Requirements Verification Plan includes the verification of more than 200 individual requirements. The verification methods include test, analysis, inspection, demonstration or a combination of methods. Examples of unmanned requirements include suit leakage, proof pressure testing, operational life, mass, isometric man-loads, sizing adjustment ranges, internal and external interfaces such as in-suit drink bag

  7. FY 1998 report on the verification survey of geothermal exploration technology, etc. 2/2. Survey of deep geothermal resource; 1998 nendo chinetsu tansa gijutsu nado kensho chosa hokokusho. 2/2. Shinbu chinetsu shigen chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-01

    For the purpose of commercializing deep geothermal resource, a deep exploration well of 4000m class was drilled in the existing geothermal development area to survey the situation of deep geothermal resource existence and the availability. Concretely, the deep geothermal exploration well was drilled for study in the Kakkonda area, Shizukuishi town, Iwate prefecture, to clarify the situation of deep geothermal resource existence and the whole image of geothermal system. Consideration was made of the deep geothermal exploration method, systematization of deep high temperature drilling technology, and availability of deep geothermal resource. The results of the survey were summed up as follows: 1) general remarks; 2) deep exploration well drilling work; 3) details of the study. This report contained 3). In 3), the items were as follows: heightening of accuracy of the deep geothermal resource exploration method, making of a geothermal model in the Kakkonda area, study of deep drilling technology, study of deep fluid utilization technology, and making of a guide for deep geothermal resource exploration/development in the Kakkonda area. As to the technology of high temperature deep geothermal well drilling, studies were made of the borehole cooling method, mud water cooling method, survey of deterioration of casing with age, etc. (NEDO)

  8. CEA - 2012 Annual Report, 2012 Financial Statements

    International Nuclear Information System (INIS)

    2013-01-01

    In its first part, this report proposes an overview of activities within the CEA. They concern the CEA's programs on low on carbon energies and associated fundamental researches, on defence and global security and associated fundamental researches, on information technologies and associated fundamental researches, on health technologies and associated fundamental researches, and on very large research infrastructures and associated fundamental researches. The second part addresses the scientific assessment, activities related to teaching and training, to innovation towards enterprises, and to support to valorization. It also indicates prices awarded to the CEA. The third part addresses CEA management and institutional relationships, human resources, international relationships, activities related to communication and information diffusion, and risk management. The fourth part describes the CEA organization, its governance and its various bodies. The second volume contains the financial statements for 2012

  9. IAEA verification experiment at the Portsmouth Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Subudhi, M.; Calvert, O.L.; Bonner, T.N.; Cherry, R.C.; Whiting, N.E.

    1998-01-01

    In April 1996, the United States (US) added the Portsmouth Gaseous Diffusion Plant to the list of facilities eligible for the application of International Atomic Energy Agency (IAEA) safeguards. At that time, the US proposed that the IAEA carry out a Verification Experiment at the plant with respect to the downblending of about 13 metric tons of highly enriched uranium (HEU) in the form of UF 6 . This material is part of the 226 metric tons of fissile material that President Clinton has declared to be excess to US national-security needs and which will be permanently withdrawn from the US nuclear stockpile. In September 1997, the IAEA agreed to carry out this experiment, and during the first three weeks of December 1997, the IAEA verified the design information concerning the downblending process. The plant has been subject to short-notice random inspections since December 17, 1997. This paper provides an overview of the Verification Experiment, the monitoring technologies used in the verification approach, and some of the experience gained to date

  10. The verification of neutron activation analysis support system (cooperative research)

    International Nuclear Information System (INIS)

    Sasajima, Fumio; Ichimura, Shigeju; Ohtomo, Akitoshi; Takayanagi, Masaji

    2000-12-01

    Neutron activation analysis support system is the system in which even the user who has not much experience in the neutron activation analysis can conveniently and accurately carry out the multi-element analysis of the sample. In this verification test, subjects such functions, usability, precision and accuracy of the analysis and etc. of the neutron activation analysis support system were confirmed. As a method of the verification test, it was carried out using irradiation device, measuring device, automatic sample changer and analyzer equipped in the JRR-3M PN-3 facility, and analysis software KAYZERO/SOLCOI based on the k 0 method. With these equipments, calibration of the germanium detector, measurement of the parameter of the irradiation field and analysis of three kinds of environmental standard sample were carried out. The k 0 method adopted in this system is primarily utilized in Europe recently, and it is the analysis method, which can conveniently and accurately carried out the multi-element analysis of the sample without requiring individual comparison standard sample. By this system, total 28 elements were determined quantitatively, and 16 elements with the value guaranteed as analytical data of the NIST (National Institute of Standards and Technology) environment standard sample were analyzed in the accuracy within 15%. This report describes content and verification result of neutron activation support system. (author)

  11. IPPF statement on infertility.

    Science.gov (United States)

    1984-12-01

    The policy statement on infertility issued by the International Medical Advisory Panel of the International Planned Parenthood Federation (IPPF) and adopted by the Central Council of the IPPF in November, 1984, is provided. The IPPF recognizes that subinfertility and infertility is a part of family planning and provides suggestions for how Family Planning Associations (FPAs) can provide supportive assistance in this area of concern. Depending on the facilities and resources available at specific clinics, FPS can provide preventive, counseling, diagnostic, treatment, and referral services. FPAs can play a major role in prevention. Many conditions which cause infertility are preventable, and these include sexually transmitted diseases, infections stemming from abortion and childbirth, and possibly tuberculosis. IUDs increase the risk of pelvic inflammatory disease and may increase the risk of infertility; however, a direct relationship between IUDs and infertility has not been established. Injectable contraceptives may delay the return of fertility but do not lead to permanent infertility. Barrier methods protect againsr sexually transmitted diseases, and oral contraceptives may provide protection from pelvic inflammatory disease. FPAs should be familiar with the major causes of infertility in their region and adopt an advocacy role by promoting community programs to control sexually transmitted diseases which may play a role in infertility, to improve obstetric care, to increase access to reproductive health services, and to provide reproductive educational services for adolescents. FPAs can work in cooporation with other agencies concerned with infertility prevention and management. FPAs can play a direct role by educating their clients about infertility prevention. Most FPAs do have have the facilities and personnel to provide diagnostic and treatment services, but they can provide referral services. They should establish a link with centers which are fully

  12. Report on results for fiscal 1997 on development of superconducting electric power application technology. Pt. 2. R and D of superconducting wire, R and D of superconducting generator, studies on total system, R and D of refrigeration system, and verification test; 1997 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. Chodendo senzai no kenkyu kaihatsu, chodendo hatsudenki no kenkyu kaihatsu, total system no kenkyu, reito system no kenkyu kaihatsu, jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-09-01

    This report refers, continuously to the Part 1, to the in-situ verification test of the slow-response type model machine rotor and to the review of the conceptual design of the pilot machine. On the basis of the R and D results of various element technology/partial models obtained before the previous fiscal year, the design, manufacturing and factory test had been conducted for a 70,000kW class slow-response type model machine rotor. This year, an in-situ verification test was performed to complete the test of all planned test items. Using the technological results obtained in the design, manufacturing and test of the 70,000kW class model machine, the conceptual design is being reviewed of the 200,000kW class pilot machine. In the aspect of the functional design, accurate grasping of the thermal load is essential for the purpose of attaining a large capacity for a superconducting generator, as a part of which a thermal load analytical method was planned to be established for a torque tube heat exchanger. The reasonableness of the analysis was verified through a comparison with the factory test result of the 70,000kW class slow-response type rotor, indicating good agreement between the calculation result and the actual measurement, and enabling the result to be obtained that explains dependency of the thermal load on the number of revolution. (NEDO)

  13. Smartphone User Identity Verification Using Gait Characteristics

    Directory of Open Access Journals (Sweden)

    Robertas Damaševičius

    2016-09-01

    Full Text Available Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers. The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. Then, a probability distribution function (PDF of derived features is calculated, which is compared against known user PDF. The Jaccard distance is used to evaluate distance between two distributions, and the decision is taken based on thresholding. The results for subject recognition are at an acceptable level: we have achieved a grand mean Equal Error Rate (ERR for subject identification of 5.7% (using the USC-HAD dataset. Our findings represent a step towards improving the performance of gait-based user identity verification technologies.

  14. Surveillance and Measurement System (SAMS). Innovative Technology Summary Report

    International Nuclear Information System (INIS)

    2001-01-01

    The United States Department of Energy (DOE) continually seeks safer and more cost-effective technologies for the decontamination and decommissioning (D and D) of nuclear facilities. The Deactivation and Decommissioning Focus Area (DDFA) of the DOE's Office of Science and Technology sponsors large-scale demonstration and deployment projects (LSDDPs) to identify and demonstrate technologies that will be safer and more cost-effective. At these LSDDPs, developers and vendors of improved or innovative technologies showcase products that are potentially beneficial to the DOE's projects as well as others in the D and D community. Benefits sought include decreased health and safety risks to personnel and the environment, increased productivity, and decreased cost of operation. The Idaho National Engineering and Environmental Laboratory (INEEL) LSDDP generated a list of need statements defining specific needs or problems where improved technologies could be incorporated into ongoing D and D tasks. Advances in characterization technologies are continuously being sought to decrease the cost of sampling and increase the speed of obtaining results. Currently it can take as long as 90 days to receive isotopic analysis of radioactive samples from laboratories on soil, liquid, and paint samples. The cost to analyze these types of samples for radionuclides is about $150 per sample. This demonstration investigated the feasibility of using the Surveillance and Measurement System (SAMS) (innovative technology) to make in situ isotopic radiation measurements in paint and soil. Sample collection and on-site laboratory analysis (baseline technology) is currently being used on D and D sampling activities. Benefits expected from using the innovative technology include: Significant decrease in time to receive results on radiological samples; Decrease in cost associated with sample collection, preparation, analysis, and disposal; Equivalent data quality to laboratory analysis; and Fewer

  15. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  16. MFTF sensor verification computer program

    International Nuclear Information System (INIS)

    Chow, H.K.

    1984-01-01

    The design, requirements document and implementation of the MFE Sensor Verification System were accomplished by the Measurement Engineering Section (MES), a group which provides instrumentation for the MFTF magnet diagnostics. The sensors, installed on and around the magnets and solenoids, housed in a vacuum chamber, will supply information about the temperature, strain, pressure, liquid helium level and magnet voltage to the facility operator for evaluation. As the sensors are installed, records must be maintained as to their initial resistance values. Also, as the work progresses, monthly checks will be made to insure continued sensor health. Finally, after the MFTF-B demonstration, yearly checks will be performed as well as checks of sensors as problem develops. The software to acquire and store the data was written by Harry Chow, Computations Department. The acquired data will be transferred to the MFE data base computer system

  17. Numerical Verification Of Equilibrium Chemistry

    International Nuclear Information System (INIS)

    Piro, Markus; Lewis, Brent; Thompson, William T.; Simunovic, Srdjan; Besmann, Theodore M.

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  18. Coherent lidar design and performance verification

    Science.gov (United States)

    Frehlich, Rod

    1993-01-01

    The verification of LAWS beam alignment in space can be achieved by a measurement of heterodyne efficiency using the surface return. The crucial element is a direct detection signal that can be identified for each surface return. This should be satisfied for LAWS but will not be satisfied for descoped LAWS. The performance of algorithms for velocity estimation can be described with two basic parameters: the number of coherently detected photo-electrons per estimate and the number of independent signal samples per estimate. The average error of spectral domain velocity estimation algorithms are bounded by a new periodogram Cramer-Rao Bound. Comparison of the periodogram CRB with the exact CRB indicates a factor of two improvement in velocity accuracy is possible using non-spectral domain estimators. This improvement has been demonstrated with a maximum-likelihood estimator. The comparison of velocity estimation algorithms for 2 and 10 micron coherent lidar was performed by assuming all the system design parameters are fixed and the signal statistics are dominated by a 1 m/s rms wind fluctuation over the range gate. The beam alignment requirements for 2 micron are much more severe than for a 10 micron lidar. The effects of the random backscattered field on estimating the alignment error is a major problem for space based lidar operation, especially if the heterodyne efficiency cannot be estimated. For LAWS, the biggest science payoff would result from a short transmitted pulse, on the order of 0.5 microseconds instead of 3 microseconds. The numerically errors for simulation of laser propagation in the atmosphere have been determined as a joint project with the University of California, San Diego. Useful scaling laws were obtained for Kolmogorov atmospheric refractive turbulence and an atmospheric refractive turbulence characterized with an inner scale. This permits verification of the simulation procedure which is essential for the evaluation of the effects of

  19. Coherent lidar design and performance verification

    Science.gov (United States)

    Frehlich, Rod

    1993-11-01

    The verification of LAWS beam alignment in space can be achieved by a measurement of heterodyne efficiency using the surface return. The crucial element is a direct detection signal that can be identified for each surface return. This should be satisfied for LAWS but will not be satisfied for descoped LAWS. The performance of algorithms for velocity estimation can be described with two basic parameters: the number of coherently detected photo-electrons per estimate and the number of independent signal samples per estimate. The average error of spectral domain velocity estimation algorithms are bounded by a new periodogram Cramer-Rao Bound. Comparison of the periodogram CRB with the exact CRB indicates a factor of two improvement in velocity accuracy is possible using non-spectral domain estimators. This improvement has been demonstrated with a maximum-likelihood estimator. The comparison of velocity estimation algorithms for 2 and 10 micron coherent lidar was performed by assuming all the system design parameters are fixed and the signal statistics are dominated by a 1 m/s rms wind fluctuation over the range gate. The beam alignment requirements for 2 micron are much more severe than for a 10 micron lidar. The effects of the random backscattered field on estimating the alignment error is a major problem for space based lidar operation, especially if the heterodyne efficiency cannot be estimated. For LAWS, the biggest science payoff would result from a short transmitted pulse, on the order of 0.5 microseconds instead of 3 microseconds. The numerically errors for simulation of laser propagation in the atmosphere have been determined as a joint project with the University of California, San Diego. Useful scaling laws were obtained for Kolmogorov atmospheric refractive turbulence and an atmospheric refractive turbulence characterized with an inner scale. This permits verification of the simulation procedure which is essential for the evaluation of the effects of

  20. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  1. Design verification and cold-flow modeling test report

    Energy Technology Data Exchange (ETDEWEB)

    1993-07-01

    This report presents a compilation of the following three test reports prepared by TRW for Alaska Industrial Development and Export Authority (AIDEA) as part of the Healy Clean Coal Project, Phase 1 Design of the TRW Combustor and Auxiliary Systems, which is co-sponsored by the Department of Energy under the Clean Coal Technology 3 Program: (1) Design Verification Test Report, dated April 1993, (2) Combustor Cold Flow Model Report, dated August 28, 1992, (3) Coal Feed System Cold Flow Model Report, October 28, 1992. In this compilation, these three reports are included in one volume consisting of three parts, and TRW proprietary information has been excluded.

  2. Excerpts from the introductory statement by IAEA Director General. IAEA Board of Governors, Vienna, 8 December 1997

    International Nuclear Information System (INIS)

    ElBaradei, M.

    1997-01-01

    The document contains excerpts from the Introductory Statement made by the Director General of the IAEA at the IAEA Board of Governors on 8 December 1997. The following aspects from the Agency's activity are presented: nuclear energy, Agency's inspections in Iraq in relation to its clandestine nuclear programme, Agency's involvement in safeguards verification in the Democratic People's Republic of Korea (DPRK), and conclusion of safeguards agreements and additional protocols

  3. Development of Ion-Plasma Technology of Deposition of the Nanostructure Bactericidal Coatings on Orthopaedic Implantats and Fixative Devices. Production of Pilot Samples for Verification of their Use in Clinic

    Directory of Open Access Journals (Sweden)

    V.A. Belous

    2013-11-01

    Full Text Available Technology for creating coatings based on titanium oxide, which have pronounced antibacterial properties manifested upon X-ray and UV irradiation has been developed. Biological research showed that the obtained coatings are biocompatible and do not exert cytotoxic effect on cultured fibroblasts, cellular composition of subcutaneous fat and restructure of bone tissue. It is found that nanostructured coatings with anatase structure and thickness of ≥9 microns, implanted with molybdenum ions, have an optimum combination of properties. The department for the deposition of antibacterial coatings on orthopedic implants is created.

  4. Verification of Timed-Arc Petri Nets

    DEFF Research Database (Denmark)

    Jacobsen, Lasse; Jacobsen, Morten; Møller, Mikael Harkjær

    2011-01-01

    of interesting theoretical properties distinguishing them from other time extensions of Petri nets. We shall give an overview of the recent theory developed in the verification of TAPN extended with features like read/transport arcs, timed inhibitor arcs and age invariants. We will examine in detail...... the boundaries of automatic verification and the connections between TAPN and the model of timed automata. Finally, we will mention the tool TAPAAL that supports modelling, simulation and verification of TAPN and discuss a small case study of alternating bit protocol....

  5. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  6. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare...... these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey...

  7. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  8. Constraint specialisation in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2017-01-01

    We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query–answer transformed version of a given set of clauses and a goal. The constraints from the model are then used to compute...... underlying the clauses. Experimental results on verification problems show that this is an effective transformation, both in our own verification tools (based on a convex polyhedra analyser) and as a pre-processor to other Horn clause verification tools....

  9. Design for Verification: Enabling Verification of High Dependability Software-Intensive Systems

    Science.gov (United States)

    Mehlitz, Peter C.; Penix, John; Markosian, Lawrence Z.; Koga, Dennis (Technical Monitor)

    2003-01-01

    Strategies to achieve confidence that high-dependability applications are correctly implemented include testing and automated verification. Testing deals mainly with a limited number of expected execution paths. Verification usually attempts to deal with a larger number of possible execution paths. While the impact of architecture design on testing is well known, its impact on most verification methods is not as well understood. The Design for Verification approach considers verification from the application development perspective, in which system architecture is designed explicitly according to the application's key properties. The D4V-hypothesis is that the same general architecture and design principles that lead to good modularity, extensibility and complexity/functionality ratio can be adapted to overcome some of the constraints on verification tools, such as the production of hand-crafted models and the limits on dynamic and static analysis caused by state space explosion.

  10. International Energy Agency Ocean Energy Systems Task 10 Wave Energy Converter Modeling Verification and Validation

    DEFF Research Database (Denmark)

    Wendt, Fabian F.; Yu, Yi-Hsiang; Nielsen, Kim

    2017-01-01

    This is the first joint reference paper for the Ocean Energy Systems (OES) Task 10 Wave Energy Converter modeling verification and validation group. The group is established under the OES Energy Technology Network program under the International Energy Agency. OES was founded in 2001 and Task 10 ...

  11. Report on the results of the Sunshine Project - Verification survey for geothermal exploration technology, etc. Summary. Survey of deep geothermal resource; Chinetsu tansa gijutsu tou kensho chosa. Shinbu chinetsu shigen chosa sokatsu seika hokokusho (Yoyaku)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-03-01

    As to the development of deep geothermal resource which is expected to contribute to increasing the capacity of future power generation in Japan, investigational study was made from FY 1992 to FY 2000, and the results were summed up. The investigational study was conducted for the hydrothermal convection type deep geothermal resource with a thermal conducting heating mechanism, of which Kakkonda is typical, including the drilling of deep exploration well using the existing technology. As a result, new information/knowledge were acquired about the thermal structure, reservoir structure and hydrothermal supply structure of the depths, and a deep geothermal model was made. Based on the model, a detailed simulation was made possible, and a whole image of the hydrothermal convection type deep geothermal resource with the thermal conducting heating mechanism was made clear. In the surface survey, observation of microearthquakes, high-accuracy MT method, etc. were carried out, and a grasp of the shape of a new granite body from the surface was made possible. Concerning the drilling technology, the geologic stratum with a temperature over 500 degrees C was successfully drilled down to a depth of 3,729m by prolonging the life of bit at the time of drilling by introducing the top drive system, the closed mud cooling device, etc. (NEDO)

  12. Introductory statement to the Board of Governors, 5 March 2007, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    The agenda for the meeting includes nuclear technology, safety and verification - all three of the Agency's areas of activity. In his introductory statement to the Board of Governors, 05 March 2007, the Director General of the IAEA, discussed the status and trends concerning nuclear power which will have an increasing role as part of the global energy mix and that the growth in demand will mainly be from developing countries. He presented the 'Nuclear technology Review 2007' and an information document entitled 'Considerations to Launch a Nuclear power Programme'. To assist with subsequent steps in nuclear power planning the IAEA has established an inter-departmental nuclear power support programme. The IAEA has also produced an information document summarizing key considerations from all perspectives like safety, security, infrastructure development, technical cooperation, legal considerations and others. The Agency's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO) is moving to phase 2. The IAEA is also developing common user requirements for small and medium size reactors. The 'Nuclear Safety Review for the Year 2006' provides an overview of current and emerging nuclear safety trends and issues. The newly established 'Integrated Regulatory Review Service (IRRS)' is intended to help Member States enhance their legislative and regulatory infrastructures, and to harmonize regulatory approaches in all areas of safety. Two workshop on the shipment of radioactive material are scheduled for latin America and Asia. Concerning the issue of nuclear verification the status of safeguards agreements and additional protocols was discussed. The return of IAEA personnel to the Democratic People's Republic of Korea is envisioned to conduct all necessary monitoring and verification as agreed by the IAEA and the DPRK. The report on the implementation of the NPT safeguards agreement and relevant provisions of UN Security Council resolution 1737 in the

  13. The PASCAL-HDM Verification System

    Science.gov (United States)

    1983-01-01

    The PASCAL-HDM verification system is described. This system supports the mechanical generation of verification conditions from PASCAL programs and HDM-SPECIAL specifications using the Floyd-Hoare axiomatic method. Tools are provided to parse programs and specifications, check their static semantics, generate verification conditions from Hoare rules, and translate the verification conditions appropriately for proof using the Shostak Theorem Prover, are explained. The differences between standard PASCAL and the language handled by this system are explained. This consists mostly of restrictions to the standard language definition, the only extensions or modifications being the addition of specifications to the code and the change requiring the references to a function of no arguments to have empty parentheses.

  14. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  15. Procedure Verification and Validation Toolset Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed research is aimed at investigating a procedure verification and validation toolset, which will allow the engineers who are responsible for developing...

  16. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  17. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  18. FLEXible Damage Detection and Verification System

    Data.gov (United States)

    National Aeronautics and Space Administration — This project expands on the previously demonstrated Flat Surface Damage Detection System (FSDDS) capabilities.  The Flexible Damage Detection and Verification System...

  19. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    based model checking style of verification. The next paper by D'Souza & Thiagarajan presents an automata-theoretic approach to analysing timing properties of systems. The last paper by Mohalik and Ramanujam presents the assumption.

  20. Standard Verification System Lite (SVS Lite)

    Data.gov (United States)

    Social Security Administration — SVS Lite is a mainframe program used exclusively by the Office of Child Support Enforcement (OCSE) to perform batch SSN verifications. This process is exactly the...

  1. Static and Dynamic Verification of Critical Software for Space Applications

    Science.gov (United States)

    Moreira, F.; Maia, R.; Costa, D.; Duro, N.; Rodríguez-Dapena, P.; Hjortnaes, K.

    Space technology is no longer used only for much specialised research activities or for sophisticated manned space missions. Modern society relies more and more on space technology and applications for every day activities. Worldwide telecommunications, Earth observation, navigation and remote sensing are only a few examples of space applications on which we rely daily. The European driven global navigation system Galileo and its associated applications, e.g. air traffic management, vessel and car navigation, will significantly expand the already stringent safety requirements for space based applications Apart from their usefulness and practical applications, every single piece of onboard software deployed into the space represents an enormous investment. With a long lifetime operation and being extremely difficult to maintain and upgrade, at least when comparing with "mainstream" software development, the importance of ensuring their correctness before deployment is immense. Verification &Validation techniques and technologies have a key role in ensuring that the onboard software is correct and error free, or at least free from errors that can potentially lead to catastrophic failures. Many RAMS techniques including both static criticality analysis and dynamic verification techniques have been used as a means to verify and validate critical software and to ensure its correctness. But, traditionally, these have been isolated applied. One of the main reasons is the immaturity of this field in what concerns to its application to the increasing software product(s) within space systems. This paper presents an innovative way of combining both static and dynamic techniques exploiting their synergy and complementarity for software fault removal. The methodology proposed is based on the combination of Software FMEA and FTA with Fault-injection techniques. The case study herein described is implemented with support from two tools: The SoftCare tool for the SFMEA and SFTA

  2. RTE - Consolidated financial statements 2016

    International Nuclear Information System (INIS)

    2017-01-01

    RTE's 2016 revenue stands at 4 446 million euro with a net income of 403 million euro. RTE continued its sustained investment programme with 1 519 million euro of investments aimed to reinforce electrical power supply security, develop cross-border capacities, accelerate digital transformation, and adapt the network to contribute to the success of energy transition. In 2016, favourable weather conditions were not sufficient to fully offset lower interconnection revenues resulting from narrowing electricity-price differentials with neighbouring countries and the strengthening of the tariff reduction policy for electricity-intensive customers. Effects of tariff reduction will be offset over the next financial years in accordance with the law on energy transition for green growth. In light of these factors, RTE's 2016 revenue of 4 446 million euro was down slightly compared to 2015 (-3%). 2016 net income of 403 million euro was up 6% compared to 2014 (379 million euro). 2015 net income (215 million euro) was exceptionally low due to the effect of the European Commission's decision dated 22 July 2015 regarding the tax treatment of provisions created between 1986 and 1997 for the renewal of the General Transmission Network ('RAG') facilities. 2016 net income was the result of good operating expense management and sustained revenue performance. 1 519 million euro of investments were made in 2016, 8% more than in 2015. As part of its industrial project launched in 2016, RTE strengthened its policy of adapting the network to the challenges of the energy transition and reoriented some investments in order to accelerate the implementation of digital technologies, with a view to ultimately having the top electrical and digital network in Europe. The level of investments in 2016 led to a slight increase in net debt (+3% for a net debt of 8 539 million euro at the end of 2016), which remains consistent with the maintenance of the company

  3. Library stock verification: a ritual and an occupational hazard

    OpenAIRE

    Sridhar, M. S.

    1991-01-01

    Explains the sensitive, controversial stock verification as one of the occupational hazards and a postmortem, emphasises need for clarity of objectives and procedures regarding stock verification and responsibilities of loss, points out that the cost of stock verification often far exceeds the benefits, highlights norms and procedures of stock verification for Government of India institutions, discusses some advantages and various methods and procedures of physical verification, put forth pre...

  4. Symposium on International Safeguards: Preparing for Future Verification Challenges

    International Nuclear Information System (INIS)

    2010-01-01

    The purpose of the symposium is to foster dialogue and information exchange involving Member States, the nuclear industry and members of the broader nuclear non-proliferation community to prepare for future verification challenges. Topics addressed during the 2010 symposium include the following: - Supporting the global nuclear non-proliferation regime: Building support for strengthening international safeguards; Enhancing confidence in compliance with safeguards obligations; Legal authority as a means to enhance effectiveness and efficiency; Verification roles in support of arms control and disarmament. - Building collaboration and partnerships with other international forums: Other verification and non-proliferation regimes; Synergies between safety, security and safeguards regimes. - Improving cooperation between IAEA and States for safeguards implementation: Strengthening State systems for meeting safeguards obligations; Enhancing safeguards effectiveness and efficiency through greater cooperation; Lessons learned: recommendations for enhancing integrated safeguards implementation. - Addressing safeguards challenges in an increasingly interconnected world: Non-State actors and covert trade networks; Globalization of nuclear information and technology. - Preparing for the global nuclear expansion and increasing safeguards workload: Furthering implementation of the State-level concept and integrated safeguards; Information-driven safeguards; Remote data-driven safeguards inspections; Safeguards in States without comprehensive safeguards agreements. - Safeguarding advanced nuclear facilities and innovative fuel cycles: Proliferation resistance; Safeguards by design; Safeguards approaches for advanced facilities. - Advanced technologies and methodologies: For verifying nuclear material and activities; For detecting undeclared nuclear material and activities; For information collection, analysis and integration. - Enhancing the development and use of safeguards

  5. 78 FR 23574 - Public Workshop on Marine Technology and Standards

    Science.gov (United States)

    2013-04-19

    ... Material Bilgewater Monitoring Using Advanced Light Scattering Technology Vortex Induced Vibration Design... Verification of Energy Efficiency Design Index Testing and Approval of Ballast Water Treatment Systems... Technology and Standards AGENCY: Coast Guard, DHS. ACTION: Notice. SUMMARY: The American Society of...

  6. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  7. Optimal Information-Theoretic Wireless Location Verification

    OpenAIRE

    Yan, Shihao; Malaney, Robert; Nevat, Ido; Peters, Gareth W.

    2012-01-01

    We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we develop is based on an information-theoretic framework which uses the received signal strength (RSS) from a network of base-stations and the claimed position. Based on this information we derive the optimal decision regarding the verification of the user's location. Our algorithm is optimal in the sense of maximizing the mutual information...

  8. Location Verification Systems Under Spatially Correlated Shadowing

    OpenAIRE

    Yan, Shihao; Nevat, Ido; Peters, Gareth W.; Malaney, Robert

    2014-01-01

    The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work we formally analyze, for the first time, the performance of a wireless Location Verification System (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramatic performance improvement of a Received Signal Strength (RSS)-based LVS. We also analyze the per...

  9. Scalable hardware verification with symbolic simulation

    CERN Document Server

    Bertacco, Valeria

    2006-01-01

    An innovative presentation of the theory of disjoint support decomposition, presenting novel results and algorithms, plus original and up-to-date techniques in formal verificationProvides an overview of current verification techniques, and unveils the inner workings of symbolic simulationFocuses on new techniques that narrow the performance gap between the complexity of digital systems and the limited ability to verify themAddresses key topics in need of future research.

  10. Inventory verification measurements using neutron multiplicity counting

    International Nuclear Information System (INIS)

    Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

    1998-01-01

    This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification

  11. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  12. Towards automatic verification of ladder logic programs

    OpenAIRE

    Zoubek , Bohumir; Roussel , Jean-Marc; Kwiatkowska , Martha

    2003-01-01

    International audience; Control system programs are usually validated by testing prior to their deployment. Unfortunately, testing is not exhaustive and therefore it is possible that a program which passed all the required tests still contains errors. In this paper we apply techniques of automatic verification to a control program written in ladder logic. A model is constructed mechanically from the ladder logic program and subjected to automatic verification against requirements that include...

  13. Verification and validation for waste disposal models

    International Nuclear Information System (INIS)

    1987-07-01

    A set of evaluation criteria has been developed to assess the suitability of current verification and validation techniques for waste disposal methods. A survey of current practices and techniques was undertaken and evaluated using these criteria with the items most relevant to waste disposal models being identified. Recommendations regarding the most suitable verification and validation practices for nuclear waste disposal modelling software have been made

  14. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  15. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  16. Report on results for fiscal 1997 on development of superconducting electric power application technology. Pt. 1. R and D of superconducting wire, R and D of superconducting generator, studies on total system, R and D of refrigeration system, and verification test; 1997 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. 1. Chodendo senzai no kenkyu kaihatsu, chodendo hatsudenki no kenkyu kaihatsu, total system no kenkyu, reito system no kenkyu kaihatsu, jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-09-01

    This report explains the outline as Part 1. In fiscal 1997, the 10th year of the project, a multi cylindrical rotary model for which an in-situ verification test was finished was brought back to the plant and dismantled for examination, while the in-situ verification test of a slow-response type model machine rotor was conducted in combination with a refrigeration system. In addition, in the research of AC wire materials and oxide based materials, studies were made with a purpose of high characterization and long wire materialization. In the metallic materials, a 10kANbTi conductor was developed while, in oxide-based materials, research was done on performance improvement and wire materialization based on various synthesizing methods. The manufacturing, factory test and in-situ text were conducted for a 70,000kW model machine with the purpose of R and D of a 200,000kW class pilot machine. Examination was made on the test method of the 70,000kW class model machine, operation technology of a superconducting generation system, and the effect of introducing the superconducting generator into a power system. In the conventional refrigeration system, a single unit test was carried out for the liquefaction, liquid storing capacity, etc., of the system. The 70,000kW class model machine was put through a test for confirming the general operation including the refrigeration system. (NEDO)

  17. Achievement report on developing superconductor power applied technologies in fiscal 1999 (1). Research and development of superconductor wire materials, research and development of superconductor power generators, research of total systems, research and development of freezing systems, and verification tests; 1999 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. 1. Chodendo senzai no kenkyu kaihatsu / chodendo hatsudenki no kenkyu kaihatsu / total system no kenkyu / reito system no kenkyu kaihatsu / jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    With an objective to achieve higher efficiency, higher density, and higher stability in power systems, research and development has been performed on superconductor power applied technologies. This paper summarizes the achievements thereof in fiscal 1999. In research and development of the superconductor wire materials, decrease in loss and increase in capacity of the conductors were progressed for the Nb{sub 3}Sn wire material, whereas its mechanical properties and stability were evaluated. In research and development of the superconductor generators, an ultra high speed responding generator was verified of its healthiness in a sudden short circuit test. A linkage test with an operating 77-kV system was performed, wherein verification was given that the superconductor generator can be operated stably against various disturbances. In research and development of the freezing systems, an improved system was structured, which achieved operation of 11,390 hours in a single system as a result of the high reliability of the oil-free structure. In the verification tests, the ultra high speed responding model generator was connect to the freezing system to give such tests as load test, onerous test, actuation test by using the M-G system, and 77-kV system linkage test. The functions, reliability, and durability of the system were verified, and different data were acquired. (NEDO)

  18. FY 1998 report on the verification survey of geothermal exploration technology, etc. 1/2. Survey of deep geothermal resource; 1998 nendo chinetsu tansa gijutsu nado kensho chosa hokokusho. 1/2. Shinbu chinetsu shigen chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-01

    For the purpose of commercializing deep geothermal resource, a deep exploration well of 4000m class was drilled in the existing geothermal development area to survey the situation of deep geothermal resource existence and the availability. Concretely, the deep geothermal exploration well was drilled for study in the Kakkonda area, Shizukuishi town, Iwate prefecture, to clarify the situation of deep geothermal resource existence and the whole image of geothermal system. Consideration was made of the deep geothermal exploration method, systematization of deep high temperature drilling technology, and availability of deep geothermal resource. The results of the survey were summed up as follows: 1) general remarks; 2) deep exploration well drilling work; 3) details of the study. 1) and 2) were included in this report, and 3) in the next report. In 1), the items were as follows: the study plan/gist of study execution, the details and results of the deep geothermal resource survey, the outline of the deep exploration well drilling work, and the outline of the results of the FY 1998 study. In 2), the drilling work plan/the actual results of the drilling work were summed up. As to the results of the study, summarized were the acquisition of survey data on deep exploration well, heightening of accuracy of the deep geothermal resource exploration method, etc. (NEDO)

  19. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  20. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1999-01-01

    In the post-Cold War period, interest in having the International Atomic Energy Agency (IAEA) use its expertise in support of the arms control and disarmament process has grown. Various pledges by the U.S. and Russian presidents to place former defense materials under some type of international monitoring raises the prospect of using IAEA safeguards concepts and approaches for monitoring these materials, which may include both classified and unclassified materials. Clearly, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA monitoring is the conflict between traditional IAEA materials accounting procedures and various national and international constraints, including U.S. classification laws, and the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Possible 'verification' approaches to classified former defense materials could be based on item accountancy, 'attributes measurements', and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical feasibility or for their possible acceptability in an inspection regime. Substantial work remains in these areas. This paper examines some of the challenges presented by international inspections of classified materials. (author)

  1. Tomotherapy: IMRT and tomographic verification

    International Nuclear Information System (INIS)

    Mackie, T.R.

    2000-01-01

    include MLC's and many clinics use them to replace 90% or more of the field-shaping requirements of conventional radiotherapy. Now, several academic centers are treating patients with IMRT using conventional MLC's to modulate the field. IMRT using conventional MLC's have the advantage that the patient is stationary during the treatment and the MLC's can be used in conventional practice. Nevertheless, tomotherapy using the Peacock system delivers the most conformal dose distributions of any commercial system to date. The biggest limitation with the both the NOMOS Peacock tomotherapy system and conventional MLC's for IMRT delivery is the lack of treatment verification. In conventional few-field radiotherapy one relied on portal images to determine if the patient was setup correctly and the beams were correctly positioned. With IMRT the image contrast is superimposed on the beam intensity variation. Conventional practice allowed for monitor unit calculation checks and point dosimeters placed on the patient's surface to verify that the treatment was properly delivered. With IMRT it is impossible to perform hand calculations of monitor units and dosimeters placed on the patient's surface are prone to error due to high gradients in the beam intensity. NOMOS has developed a verification phantom that allows multiple sheets of film to be placed in a light-tight box that is irradiated with the same beam pattern that is used to treat the patient. The optical density of the films are adjusted, normalized, and calibrated and then quantitatively compared with the dose calculated for the phantom delivery. However, this process is too laborious to be used for patient-specific QA. If IMRT becomes ubiquitous and it can be shown that IMRT is useful on most treatment sites then there is a need to design treatment units dedicated to IMRT delivery and verification. Helical tomotherapy is such a redesign. Helical tomotherapy is the delivery of a rotational fan beam while the patient is

  2. Dosimetric verification of IMRT plans

    International Nuclear Information System (INIS)

    Bulski, W.; Cheimicski, K.; Rostkowska, J.

    2012-01-01

    Intensity modulated radiotherapy (IMRT) is a complex procedure requiring proper dosimetric verification. IMRT dose distributions are characterized by steep dose gradients which enable to spare organs at risk and allow for an escalation of the dose to the tumor. They require large number of radiation beams (sometimes over 10). The fluence measurements for individual beams are not sufficient for evaluation of the total dose distribution and to assure patient safety. The methods used at the Centre of Oncology in Warsaw are presented. In order to measure dose distributions in various cross-sections the film dosimeters were used (radiographic Kodak EDR2 films and radiochromic Gafchromic EBT films). The film characteristics were carefully examined. Several types of tissue equivalent phantoms were developed. A methodology of comparing measured dose distributions against the distributions calculated by treatment planning systems (TPS) was developed and tested. The tolerance level for this comparison was set at 3% difference in dose and 3 mm in distance to agreement. The so called gamma formalism was used. The results of these comparisons for a group of over 600 patients are presented. Agreement was found in 87 % of cases. This film dosimetry methodology was used as a benchmark to test and validate the performance of commercially available 2D and 3D matrices of detectors (ionization chambers or diodes). The results of these validations are also presented. (authors)

  3. A service-oriented architecture for integrating the modeling and formal verification of genetic regulatory networks

    Science.gov (United States)

    2009-01-01

    Background The study of biological networks has led to the development of increasingly large and detailed models. Computer tools are essential for the simulation of the dynamical behavior of the networks from the model. However, as the size of the models grows, it becomes infeasible to manually verify the predictions against experimental data or identify interesting features in a large number of simulation traces. Formal verification based on temporal logic and model checking provides promising methods to automate and scale the analysis of the models. However, a framework that tightly integrates modeling and simulation tools with model checkers is currently missing, on both the conceptual and the implementational level. Results We have developed a generic and modular web service, based on a service-oriented architecture, for integrating the modeling and formal verification of genetic regulatory networks. The architecture has been implemented in the context of the qualitative modeling and simulation tool GNA and the model checkers NUSMV and CADP. GNA has been extended with a verification module for the specification and checking of biological properties. The verification module also allows the display and visual inspection of the verification results. Conclusions The practical use of the proposed web service is illustrated by means of a scenario involving the analysis of a qualitative model of the carbon starvation response in E. coli. The service-oriented architecture allows modelers to define the model and proceed with the specification and formal verification of the biological properties by means of a unified graphical user interface. This guarantees a transparent access to formal verification technology for modelers of genetic regulatory networks. PMID:20042075

  4. Citizens' actions and environmental impact statements

    International Nuclear Information System (INIS)

    Waelde, T.

    1975-01-01

    Above all, two kinds of citizens' participation in environmental decisions are to be considered: on the one hand the suit for damages and compensation for the purpose of internalization of external effects, and on the other hand the actions with the aim to influence character and content of public final decision cases. This is where cooperation and contributions towards state activities with more concern for the environment come into it. This sphere is investigated. Combined are the possibility of judicially arranged citizens' participation and a modern instrument of public decision: environmental impact statements. At the moment these appear to become exclusively an instrument for internal administration management. However, it is possible - this can be confirmed in comparative law - to couple this for the purpose of administration created instrument of technology assessment with citizens' actions. Therefore, the article aims to point to a solution how modern administration management through judicial mediation can orientate itself according to citizens' interests. (orig./LN) [de

  5. Accounting Principles and Financial Statements.

    Science.gov (United States)

    Robinson, Daniel D.

    1973-01-01

    This document presents the background and analysis of the American Institute of Certified Public Accountants (AICPA) guide to auditing colleges and universities. Highlights include the approval of the market value option, the treatment of endowment gains, debt services as transfers, the decisions on pledges, the use of financial statements, the…

  6. 77 FR 35643 - Verification of Statements of Account Submitted by Cable Operators and Satellite Carriers

    Science.gov (United States)

    2012-06-14

    .... SUPPLEMENTARY INFORMATION: I. Background Every five years Congress considers legislation to reauthorize the... Television Claimants (local commercial television programming); Music Claimants (musical works included in... designee must bring those issues to the auditor's attention during the consultation. The Office invites...

  7. 77 FR 60333 - Verification of Statements of Account Submitted by Cable Operators and Satellite Carriers

    Science.gov (United States)

    2012-10-03

    ... provided. If electronic submission of comments is not feasible, please contact the Copyright Office at (202... Cable & Telecommunications Association (``NCTA''),\\1\\ the Joint Sports Claimants, and the Program... Sports Claimants and the Program Suppliers represent copyright owners who are the beneficiaries of the...

  8. 77 FR 55783 - Verification of Statements of Account Submitted by Cable Operators and Satellite Carriers

    Science.gov (United States)

    2012-09-11

    ... names and organizations if provided. If electronic submission of comments is not feasible, please... & Telecommunications Association (``NCTA''),\\1\\ the Joint Sports Claimants, and the Program Suppliers.\\2\\ Specifically... order to determine whether there is any common ground among the NCTA, the Joint Sports Claimants, and...

  9. 78 FR 27137 - Verification of Statements of Account Submitted by Cable Operators and Satellite Carriers

    Science.gov (United States)

    2013-05-09

    ... under 17 U.S.C. 112(e) and 114(f), respectively, or manufacture, import, and distribute digital audio... already past.'' National Mining Ass'n v. Dep't of Labor, 292 F.3d 849, 859 (D.C. Cir. 2002). The fact that... Petrochemical & Refiners Ass'n v. EPA, 630 F.3d. 145, 161 (D.C. Cir. 2010). The regulation states that the...

  10. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  11. Verifying disarmament: scientific, technological and political challenges

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph R [Los Alamos National Laboratory

    2011-01-25

    There is growing interest in, and hopes for, nuclear disarmament in governments and nongovernmental organizations (NGOs) around the world. If a nuclear-weapon-free world is to be achievable, verification and compliance will be critical. VerifYing disarmament would have unprecedented scientific, technological and political challenges. Verification would have to address warheads, components, materials, testing, facilities, delivery capabilities, virtual capabilities from existing or shutdown nuclear weapon and existing nuclear energy programs and material and weapon production and related capabilities. Moreover, it would likely have far more stringent requirements. The verification of dismantlement or elimination of nuclear warheads and components is widely recognized as the most pressing problem. There has been considerable research and development done in the United States and elsewhere on warhead and dismantlement transparency and verification since the early 1990s. However, we do not today know how to verifY low numbers or zero. We need to develop the needed verification tools and systems approaches that would allow us to meet this complex set of challenges. There is a real opportunity to explore verification options and, given any realistic time frame for disarmament, there is considerable scope to invest resources at the national and international levels to undertake research, development and demonstrations in an effort to address the anticipated and perhaps unanticipated verification challenges of disarmament now andfor the next decades. Cooperative approaches have the greatest possibility for success.

  12. A Methodology for Evaluating Artifacts Produced by a Formal Verification Process

    Science.gov (United States)

    Siminiceanu, Radu I.; Miner, Paul S.; Person, Suzette

    2011-01-01

    The goal of this study is to produce a methodology for evaluating the claims and arguments employed in, and the evidence produced by formal verification activities. To illustrate the process, we conduct a full assessment of a representative case study for the Enabling Technology Development and Demonstration (ETDD) program. We assess the model checking and satisfiabilty solving techniques as applied to a suite of abstract models of fault tolerant algorithms which were selected to be deployed in Orion, namely the TTEthernet startup services specified and verified in the Symbolic Analysis Laboratory (SAL) by TTTech. To this end, we introduce the Modeling and Verification Evaluation Score (MVES), a metric that is intended to estimate the amount of trust that can be placed on the evidence that is obtained. The results of the evaluation process and the MVES can then be used by non-experts and evaluators in assessing the credibility of the verification results.

  13. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each agency...

  14. 16 CFR 455.4 - Contrary statements.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Contrary statements. 455.4 Section 455.4 Commercial Practices FEDERAL TRADE COMMISSION TRADE REGULATION RULES USED MOTOR VEHICLE TRADE REGULATION RULE § 455.4 Contrary statements. You may not make any statements, oral or written, or take other actions...

  15. Biological Awareness: Statements for Self-Discovery.

    Science.gov (United States)

    Edington, D.W.; Cunningham, Lee

    This guide to biological awareness through guided self-discovery is based on 51 single focus statements concerning the human body. For each statement there are explanations of the underlying physiological principles and suggested activities and discussion ideas to encourage understanding of the statement in terms of the human body's functions,…

  16. 12 CFR 611.515 - Information statement.

    Science.gov (United States)

    2010-01-01

    ... audited balance sheet and income statement and notes thereto of the bank or the association, as applicable... assets, a balance sheet and income statement of the bank and the association showing its financial condition before the transfer of authority and a pro forma balance sheet and income statement for the bank...

  17. Android-Based Verification System for Banknotes

    Directory of Open Access Journals (Sweden)

    Ubaid Ur Rahman

    2017-11-01

    Full Text Available With the advancement in imaging technologies for scanning and printing, production of counterfeit banknotes has become cheaper, easier, and more common. The proliferation of counterfeit banknotes causes loss to banks, traders, and individuals involved in financial transactions. Hence, it is inevitably needed that efficient and reliable techniques for detection of counterfeit banknotes should be developed. With the availability of powerful smartphones, it has become possible to perform complex computations and image processing related tasks on these phones. In addition to this, smartphone users have increased greatly and numbers continue to increase. This is a great motivating factor for researchers and developers to propose innovative mobile-based solutions. In this study, a novel technique for verification of Pakistani banknotes is developed, targeting smartphones with android platform. The proposed technique is based on statistical features, and surface roughness of a banknote, representing different properties of the banknote, such as paper material, printing ink, paper quality, and surface roughness. The selection of these features is motivated by the X-ray Diffraction (XRD and Scanning Electron Microscopy (SEM analysis of genuine and counterfeit banknotes. In this regard, two important areas of the banknote, i.e., serial number and flag portions were considered since these portions showed the maximum difference between genuine and counterfeit banknote. The analysis confirmed that genuine and counterfeit banknotes are very different in terms of the printing process, the ingredients used in preparation of banknotes, and the quality of the paper. After extracting the discriminative set of features, support vector machine is used for classification. The experimental results confirm the high accuracy of the proposed technique.

  18. Photon technology. Hard photon technology; Photon technology. Hard photon gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    Research results of hard photon technology have been summarized as a part of novel technology development highly utilizing the quantum nature of photon. Hard photon technology refers to photon beam technologies which use photon in the 0.1 to 200 nm wavelength region. Hard photon has not been used in industry due to the lack of suitable photon sources and optical devices. However, hard photon in this wavelength region is expected to bring about innovations in such areas as ultrafine processing and material synthesis due to its atom selective reaction, inner shell excitation reaction, and spatially high resolution. Then, technological themes and possibility have been surveyed. Although there are principle proposes and their verification of individual technologies for the technologies of hard photon generation, regulation and utilization, they are still far from the practical applications. For the photon source technology, the laser diode pumped driver laser technology, laser plasma photon source technology, synchrotron radiation photon source technology, and vacuum ultraviolet photon source technology are presented. For the optical device technology, the multi-layer film technology for beam mirrors and the non-spherical lens processing technology are introduced. Also are described the reduction lithography technology, hard photon excitation process, and methods of analysis and measurement. 430 refs., 165 figs., 23 tabs.

  19. Peer review statement

    Science.gov (United States)

    2012-11-01

    All papers published in this volume of Journal of Physics: Conference Series have been peer reviewed through processes administered by the editors of the 26th IAHR Symposium on Hydraulic Machinery and Systems proceedings. Reviews were conducted by expert referees from the International Technical Committee to the professional and scientific standards expected of a proceedings journal published by IOP Publishing. The members of the Scientific Committee who selected and reviewed the papers included in the Proceedings of the 26th IAHR Symposium on Hydraulic Machinery and Systems are: Yulin WU Tsinghua University China François AVELLAN EPFL-LMH Switzerland (principal) Xingqi LUO Xi'an University of Sci & Tech China Martin BÖHLE Kaiserslautern University Germany Gerard BOIS Arts et Métiers ParisTech France Luca D'AGOSTINO University of Pisa Italy Eduard EGUSQUIZA Polytechnical University Catalonia Spain Richard FISHER Voith Hydro Inc USA Regiane FORTES-PATELLA Institute Polytechnique de Grenoble France Aleksandar GAJIC University of Belgrade Serbia Wei YANG China Agriculture University China YinLu YOUNG University of Michigan USA Adrian LUNGU Dunarea de Jos University of Galati Romania Arpad FAY University of Miskolcz Hungary José GONZÁLEZ Universidad de Oviedo Spain Baoshan ZHU Tsinghua University China Hongxun CHEN Shanghai University China Chisachi KATO University of Tokyo Japan Zhenyue MA Dalian University of Sci & Tech China Honggang FAN Tsinghua University China François GUIBAULT Ecole Polytechnique de Montreal Canada Pengcheng GUO Xian University of Technology China Leqing WANG Zhejiang University China Toshiaki IKOHAGI Tohoku University Japan Jiandong YANG Wuhan University China Jianzhong ZHOU Huazhong University of Sci & Tech China Jinwei LI NULL China Rennian LI Lanzhou University of Sci & Tech China Houlin LIU NULL China Juan LIU Tsinghua University China Shuhong LIU Tsinghua University China Xianwu LUO Tsinghua University China Michihiro NISHI Tsinghua

  20. Evaluation of an electrocardiograph-based PICC tip verification system.

    Science.gov (United States)

    Oliver, Gemma; Jones, Matt

    Performing a chest x-ray after insertion of a peripherally inserted central catheter (PICC) is recognised as the gold standard for checking that the tip of the catheter is correctly positioned in the lower third of the superior vena cava at the right atrial junction; however, numerous problems are associated with this practice. A recent technological advancement has been developed that utilises changes in a patient's electrocardiograph (ECG) recorded from the tip of the PICC as a more reliable method. This evaluation discusses how a vascular access team in a large acute NHS Trust safely and successfully incorporated the use of ECG guidance technology for verification of PICC tip placement into their practice.

  1. Portsmouth Gaseous Diffusion Plant expansion, Piketon, Ohio. Volume 1. Draft environmental statement

    International Nuclear Information System (INIS)

    1976-06-01

    Subject to authorizing legislation and funding, ERDA will proceed with steps for additional uranium enrichment capacity at the Portsmouth Gaseous Diffusion Plant near Piketon, Ohio. This environmental statement was prepared by ERDA to cover this action. The statement was prepared in accordance with the National Environmental Policy Act of 1969, and ERDA's implementing regulations, 10 CFR Chapter III, Part 711. The statement describes the reasonably foreseeable environmental, social, economic and technological costs and benefits of the construction and operation of the expanded enrichment plant and its reasonably available alternatives and their anticipated effects

  2. Portsmouth Gaseous Diffusion Plant expansion, Piketon, Ohio. Volume 1. Draft environmental statement

    Energy Technology Data Exchange (ETDEWEB)

    1976-06-01

    Subject to authorizing legislation and funding, ERDA will proceed with steps for additional uranium enrichment capacity at the Portsmouth Gaseous Diffusion Plant near Piketon, Ohio. This environmental statement was prepared by ERDA to cover this action. The statement was prepared in accordance with the National Environmental Policy Act of 1969, and ERDA's implementing regulations, 10 CFR Chapter III, Part 711. The statement describes the reasonably foreseeable environmental, social, economic and technological costs and benefits of the construction and operation of the expanded enrichment plant and its reasonably available alternatives and their anticipated effects.

  3. VERIFICATION OF PARALLEL AUTOMATA-BASED PROGRAMS

    Directory of Open Access Journals (Sweden)

    M. A. Lukin

    2014-01-01

    Full Text Available The paper deals with an interactive method of automatic verification for parallel automata-based programs. The hierarchical state machines can be implemented in different threads and can interact with each other. Verification is done by means of Spin tool and includes automatic Promela model construction, conversion of LTL-formula to Spin format and counterexamples in terms of automata. Interactive verification gives the possibility to decrease verification time and increase the maximum size of verifiable programs. Considered method supports verification of the parallel system for hierarchical automata that interact with each other through messages and shared variables. The feature of automaton model is that each state machine is considered as a new data type and can have an arbitrary bounded number of instances. Each state machine in the system can run a different state machine in a new thread or have nested state machine. This method was implemented in the developed Stater tool. Stater shows correct operation for all test cases.

  4. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  5. Numerical Weather Predictions Evaluation Using Spatial Verification Methods

    Science.gov (United States)

    Tegoulias, I.; Pytharoulis, I.; Kotsopoulos, S.; Kartsios, S.; Bampzelis, D.; Karacostas, T.

    2014-12-01

    During the last years high-resolution numerical weather prediction simulations have been used to examine meteorological events with increased convective activity. Traditional verification methods do not provide the desired level of information to evaluate those high-resolution simulations. To assess those limitations new spatial verification methods have been proposed. In the present study an attempt is made to estimate the ability of the WRF model (WRF -ARW ver3.5.1) to reproduce selected days with high convective activity during the year 2010 using those feature-based verification methods. Three model domains, covering Europe, the Mediterranean Sea and northern Africa (d01), the wider area of Greece (d02) and central Greece - Thessaly region (d03) are used at horizontal grid-spacings of 15km, 5km and 1km respectively. By alternating microphysics (Ferrier, WSM6, Goddard), boundary layer (YSU, MYJ) and cumulus convection (Kain-­-Fritsch, BMJ) schemes, a set of twelve model setups is obtained. The results of those simulations are evaluated against data obtained using a C-Band (5cm) radar located at the centre of the innermost domain. Spatial characteristics are well captured but with a variable time lag between simulation results and radar data. Acknowledgements: This research is co­financed by the European Union (European Regional Development Fund) and Greek national funds, through the action "COOPERATION 2011: Partnerships of Production and Research Institutions in Focused Research and Technology Sectors" (contract number 11SYN_8_1088 - DAPHNE) in the framework of the operational programme "Competitiveness and Entrepreneurship" and Regions in Transition (OPC II, NSRF 2007-­-2013).

  6. 37 CFR 201.28 - Statements of Account for digital audio recording devices or media.

    Science.gov (United States)

    2010-07-01

    ... following information for each unique combination of product category, technology, series or model number... accepted auditing standards (GAAS), means the auditing standards promulgated by the American Institute of... quarterly period covered by the statement. (9) Technology of a device or medium is a digital audio recording...

  7. Monitoring/Verification using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Stephan Weeks; Kevin Kyle

    2008-03-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the use of explosives or chemical and biological weapons in terrorist activities. Two peroxide-based liquid explosives, triacetone triperoxide (TATP) and hexamethylene triperoxide diamine (HMTD), are synthesized from common chemicals such as hydrogen peroxide, acetone, sulfuric acid, ammonia, and citric acid (Figure 1). Recipes can be readily found on the Internet by anyone seeking to generate sufficient quantities of these highly explosive chemicals to cause considerable collateral damage. Detection of TATP and HMTD by advanced sensing systems can provide the early warning necessary to prevent terror plots from coming to fruition. DMS is currently one of the foremost emerging technologies for the separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. DMS separates and identifies ions at ambient pressures by utilizing the non-linear dependence of an ion's mobility on the radio frequency (rf) electric field strength. GC is widely considered to be one of the leading analytical methods for the separation of chemical species in complex mixtures. Advances in the technique have led to the development of low-thermal-mass fast GC columns. These columns are

  8. Online 3D EPID-based dose verification: Proof of concept

    International Nuclear Information System (INIS)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; Herk, Marcel van

    2016-01-01

    , including dose verification, took 266 ± 11 ms on a dual octocore Intel Xeon E5-2630 CPU running at 2.40 GHz. The introduced delivery errors were detected after 5–10 s irradiation time. Conclusions: A prototype online 3D dose verification tool using portal imaging has been developed and successfully tested for two different kinds of gross delivery errors. Thus, online 3D dose verification has been technologically achieved.

  9. Quantum Fully Homomorphic Encryption with Verification

    DEFF Research Database (Denmark)

    Alagic, Gorjan; Dulek, Yfke; Schaffner, Christian

    2017-01-01

    Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation. Given the numerous applications of classical FHE (zero-knowledge proofs, secure two-party computation, obfuscation, etc.......) it is reasonable to hope that quantum FHE (or QFHE) will lead to many new results in the quantum setting. However, a crucial ingredient in almost all applications of FHE is circuit verification. Classically, verification is performed by checking a transcript of the homomorphic computation. Quantumly, this strategy...... is impossible due to no-cloning. This leads to an important open question: can quantum computations be delegated and verified in a non-interactive manner? In this work, we answer this question in the affirmative, by constructing a scheme for QFHE with verification (vQFHE). Our scheme provides authenticated...

  10. Constraint Specialisation in Horn Clause Verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2015-01-01

    -down and propagate answer constraints bottom-up. Our approach does not unfold the clauses at all; we use the constraints from the model to compute a specialised version of each clause in the program. The approach is independent of the abstract domain and the constraints theory underlying the clauses. Experimental......We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query-answer transformation of a given set of clauses and a goal. The effect is to propagate the constraints from the goal top...... results on verification problems show that this is an effective transformation, both in our own verification tools (convex polyhedra analyser) and as a pre-processor to other Horn clause verification tools....

  11. Heavy water physical verification in power plants

    International Nuclear Information System (INIS)

    Morsy, S.; Schuricht, V.; Beetle, T.; Szabo, E.

    1986-01-01

    This paper is a report on the Agency experience in verifying heavy water inventories in power plants. The safeguards objectives and goals for such activities are defined in the paper. The heavy water is stratified according to the flow within the power plant, including upgraders. A safeguards scheme based on a combination of records auditing, comparing records and reports, and physical verification has been developed. This scheme has elevated the status of heavy water safeguards to a level comparable to nuclear material safeguards in bulk facilities. It leads to attribute and variable verification of the heavy water inventory in the different system components and in the store. The verification methods include volume and weight determination, sampling and analysis, non-destructive assay (NDA), and criticality check. The analysis of the different measurement methods and their limits of accuracy are discussed in the paper

  12. 340 and 310 drawing field verification

    International Nuclear Information System (INIS)

    Langdon, J.

    1996-01-01

    The purpose of the drawing field verification work plan is to provide reliable drawings for the 310 Treated Effluent Disposal Facility (TEDF) and 340 Waste Handling Facility (340 Facility). The initial scope of this work plan is to provide field verified and updated versions of all the 340 Facility essential drawings. This plan can also be used for field verification of any other drawings that the facility management directs to be so updated. Any drawings revised by this work plan will be issued in an AutoCAD format

  13. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  14. Challenges in High-Assurance Runtime Verification

    Science.gov (United States)

    Goodloe, Alwyn E.

    2016-01-01

    Safety-critical systems are growing more complex and becoming increasingly autonomous. Runtime Verification (RV) has the potential to provide protections when a system cannot be assured by conventional means, but only if the RV itself can be trusted. In this paper, we proffer a number of challenges to realizing high-assurance RV and illustrate how we have addressed them in our research. We argue that high-assurance RV provides a rich target for automated verification tools in hope of fostering closer collaboration among the communities.

  15. Time Optimal Reachability Analysis Using Swarm Verification

    DEFF Research Database (Denmark)

    Zhang, Zhengkui; Nielsen, Brian; Larsen, Kim Guldstrand

    2016-01-01

    and planning problems, response time optimization etc. We propose swarm verification to accelerate time optimal reachability using the real-time model-checker Uppaal. In swarm verification, a large number of model checker instances execute in parallel on a computer cluster using different, typically randomized...... search strategies. We develop four swarm algorithms and evaluate them with four models in terms scalability, and time- and memory consumption. Three of these cooperate by exchanging costs of intermediate solutions to prune the search using a branch-and-bound approach. Our results show that swarm...

  16. Experimental preparation and verification of quantum money

    Science.gov (United States)

    Guan, Jian-Yu; Arrazola, Juan Miguel; Amiri, Ryan; Zhang, Weijun; Li, Hao; You, Lixing; Wang, Zhen; Zhang, Qiang; Pan, Jian-Wei

    2018-03-01

    A quantum money scheme enables a trusted bank to provide untrusted users with verifiable quantum banknotes that cannot be forged. In this work, we report a proof-of-principle experimental demonstration of the preparation and verification of unforgeable quantum banknotes. We employ a security analysis that takes experimental imperfections fully into account. We measure a total of 3.6 ×106 states in one verification round, limiting the forging probability to 10-7 based on the security analysis. Our results demonstrate the feasibility of preparing and verifying quantum banknotes using currently available experimental techniques.

  17. Signature verification with writing posture analysis

    Science.gov (United States)

    Cheng, Hsu-Yung; Yu, Chih-Chang

    2013-07-01

    A video-based handwritten signature verification framework is proposed in this paper. Using a camera as the sensor has the advantage that the entire writing processes can be captured along with the signatures. The main contribution of this work is that writing postures are analyzed to achieve the verification purpose because the writing postures cannot be easily imitated or forged. The proposed system is able to achieve low false rejection rates while maintaining low false acceptance rates for database containing both unskilled and skilled imitation signatures.

  18. Verification and quality control of routine hematology analyzers

    NARCIS (Netherlands)

    Vis, J Y; Huisman, A

    2016-01-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and

  19. Effect of verification cores on tip capacity of drilled shafts.

    Science.gov (United States)

    2009-02-01

    This research addressed two key issues: : 1) Will verification cores holes fill during concrete backfilling? If so, what are the mechanical properties of the : filling material? In dry conditions, verification core holes always completely fill with c...

  20. Compositional Verification of Multi-Station Interlocking Systems

    DEFF Research Database (Denmark)

    Macedo, Hugo Daniel dos Santos; Fantechi, Alessandro; Haxthausen, Anne Elisabeth

    2016-01-01

    Because interlocking systems are highly safety-critical complex systems, their automated safety verification is an active research topic investigated by several groups, employing verification techniques to produce important cost and time savings in their certification. However, such systems also...

  1. X-ray volume imaging in bladder radiotherapy verification

    International Nuclear Information System (INIS)

    Henry, Ann M.; Stratford, Julia; McCarthy, Claire; Davies, Julie; Sykes, Jonathan R.; Amer, Ali; Marchant, Tom; Cowan, Richard; Wylie, James; Logue, John; Livsey, Jacqueline; Khoo, Vincent S.; Moore, Chris; Price, Pat

    2006-01-01

    Purpose: To assess the clinical utility of X-ray volume imaging (XVI) for verification of bladder radiotherapy and to quantify geometric error in bladder radiotherapy delivery. Methods and Materials: Twenty subjects undergoing conformal bladder radiotherapy were recruited. X-ray volume images and electronic portal images (EPIs) were acquired for the first 5 fractions and then once weekly. X-ray volume images were co-registered with the planning computed tomography scan and clinical target volume coverage assessed in three dimensions (3D). Interfraction bladder volume change was described by quantifying changes in bladder volume with time. Bony setup errors were compared from both XVI and EPI. Results: The bladder boundary was clearly visible on coronal XVI views in nearly all images, allowing accurate 3D treatment verification. In 93.5% of imaged fractions, the clinical target volume was within the planning target volume. Most subjects displayed consistent bladder volumes, but 25% displayed changes that could be predicted from the first three XVIs. Bony setup errors were similar whether calculated from XVI or EPI. Conclusions: Coronal XVI can be used to verify 3D bladder radiotherapy delivery. Image-guided interventions to reduce geographic miss and normal tissue toxicity are feasible with this technology

  2. FY 2000 report on the results of the development of the stand-by consumption power reduction technology. Verification experiment on the technology to reduce stand-by power of household electric appliances; 2000 nendo taikiji shohi denryoku sakugen gijutsu kaihatsu seika hokokusho. Kaden seihin taikiji denryoku sakugen gijutsu no jissho jikken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    Study was made of the energy conservation by reducing stand-by consumption power of household electric appliances. In the study, remote control, household electric appliance, and outlet box were developed, and a system was developed in which each of the three was connected by network and the commercial power source supply is cut off at the time of the stand-by state of household electric appliances. The outlet box collectively manages timer information and reservation information. User sends out control command toward the outlet box using the two-way remote control, and controls all the household electric appliances connected via network. The screen data of household electric appliances are sent to the two-way remote control via the outlet box and presented to user. When the time comes for automatic execution such as video recording during absence, the outlet box carries commercial power source to household electric appliances. Using these appliances, verification experiment was carried out in the model house which was built with the ordinary house as model. A reduction in stand-by consumption power, approximately 218kWh/year(center dot)household, was verified. (NEDO)

  3. Simulation-based MDP verification for leading-edge masks

    Science.gov (United States)

    Su, Bo; Syrel, Oleg; Pomerantsev, Michael; Hagiwara, Kazuyuki; Pearman, Ryan; Pang, Leo; Fujimara, Aki

    2017-07-01

    For IC design starts below the 20nm technology node, the assist features on photomasks shrink well below 60nm and the printed patterns of those features on masks written by VSB eBeam writers start to show a large deviation from the mask designs. Traditional geometry-based fracturing starts to show large errors for those small features. As a result, other mask data preparation (MDP) methods have become available and adopted, such as rule-based Mask Process Correction (MPC), model-based MPC and eventually model-based MDP. The new MDP methods may place shot edges slightly differently from target to compensate for mask process effects, so that the final patterns on a mask are much closer to the design (which can be viewed as the ideal mask), especially for those assist features. Such an alteration generally produces better masks that are closer to the intended mask design. Traditional XOR-based MDP verification cannot detect problems caused by eBeam effects. Much like model-based OPC verification which became a necessity for OPC a decade ago, we see the same trend in MDP today. Simulation-based MDP verification solution requires a GPU-accelerated computational geometry engine with simulation capabilities. To have a meaningful simulation-based mask check, a good mask process model is needed. The TrueModel® system is a field tested physical mask model developed by D2S. The GPU-accelerated D2S Computational Design Platform (CDP) is used to run simulation-based mask check, as well as model-based MDP. In addition to simulation-based checks such as mask EPE or dose margin, geometry-based rules are also available to detect quality issues such as slivers or CD splits. Dose margin related hotspots can also be detected by setting a correct detection threshold. In this paper, we will demonstrate GPU-acceleration for geometry processing, and give examples of mask check results and performance data. GPU-acceleration is necessary to make simulation-based mask MDP verification

  4. Automated Measurement and Verification and Innovative Occupancy Detection Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bruce, Nordman [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Piette, Mary Ann [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Rich [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Page, Janie [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Granderson, Jessica [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2017-06-27

    In support of DOE’s sensors and controls research, the goal of this project is to move toward integrated building to grid systems by building on previous work to develop and demonstrate a set of load characterization measurement and evaluation tools that are envisioned to be part of a suite of applications for transactive efficient buildings, built upon data-driven load characterization and prediction models. This will include the ability to include occupancy data in the models, plus data collection and archival methods to include different types of occupancy data with existing networks and a taxonomy for naming these data within a Volttron agent platform.

  5. MSFC Turbine Performance Optimization (TPO) Technology Verification Status

    Science.gov (United States)

    Griffin, Lisa W.; Dorney, Daniel J.; Snellgrove, Lauren M.; Zoladz, Thomas F.; Stroud, Richard T.; Turner, James E. (Technical Monitor)

    2002-01-01

    Capability to optimize for turbine performance and accurately predict unsteady loads will allow for increased reliability, Isp, and thrust-to-weight. The development of a fast, accurate, validated aerodynamic design, analysis, and optimization system is required.

  6. Engine Family Groups for Verification of Clean Diesel Technology

    Science.gov (United States)

    These documents show engine family boxes that represent groupings of engine families with similar characterists (i.e., the emissions standards that the engines were built to) for current and past model years.

  7. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  8. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  9. Verification and validation of software

    International Nuclear Information System (INIS)

    Machiels, A.J.; Bhjatt, S.; May, R.S.; Woolley, J.A.

    1995-01-01

    Several U.S. nuclear utilities have embarked upon extensive programs to replace and upgrade their analog instrumentation and control (I ampersand C) systems with digital technology. These new digital systems cover a wide range of applications, from safety-critical protection systems to nonsafety control systems, and their implementations range from customized, turnkey computer systems to utility-integrated configurations of programmable logic controllers. In all cases, the utility must address the issue of quality of the digital system and its software

  10. Statement given to Ms Claudine Haignere, deputy Minister of Research and New Technologies: making an inventory of parameters able to build up an analytical framework common to all issues related to energy

    International Nuclear Information System (INIS)

    Caseau, P.

    2003-01-01

    Written by a group of experts, this document aims at proposing an analytical framework which could be applicable to all studies or decisions on energy, for example when launching or monitoring a program. In order to justify their approach, the authors outline the main drawbacks and weaknesses of all the reports they themselves previously wrote on energy. The proposed methodology comprises seven points. The first three are rather general: the choice of a spatial framework and its justification, the choice of a time framework and its justification, the choice between a Merit Order approach of competing technologies and a more conventional approach based on needs and resources. The next three points are related to the three most important transitions: the 'Peak Oil', a struggle against the greenhouse effect leading to an international organisation, and the progressive separation between fixed and mobile uses. The last point aims at taking the whole life cycle of a technology into account: its development, its penetration, its maturity, and its decline

  11. FEATURES OF CONSOLIDATED FINANCIAL STATEMENTS: FOREIGN EXPERIENCE

    Directory of Open Access Journals (Sweden)

    S. V. KUCHER

    2016-12-01

    Full Text Available The article researches the features of preparation and submission of the consolidated financial statements of the world countries of different systems of accounting standardization in order to identify the areas of accounting improvement for the process of consolidation of financial reporting indicators. The main problems of consolidated financial statements preparation by business entities in Ukraine are determined. The author determines the theoretical and practical problems of consolidation of financial statements of organizational and methodical character. The comparative analysis of the features of standardization process of financial statements consolidation in the world countries is carried out. The main differences in the requirements for the formation of consolidated financial statements indicators of such countries as the French Republic, the Federal Republic of Germany, the Republic of Belarus and the People’s Republic of China are outlined. The main directions of scientific researches on the improvement of accounting and analytical support for the preparation of consolidated financial statements are formed.

  12. Standardized Definitions for Code Verification Test Problems

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-14

    This document contains standardized definitions for several commonly used code verification test problems. These definitions are intended to contain sufficient information to set up the test problem in a computational physics code. These definitions are intended to be used in conjunction with exact solutions to these problems generated using Exact- Pack, www.github.com/lanl/exactpack.

  13. 14 CFR 460.17 - Verification program.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Verification program. 460.17 Section 460.17 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... program. An operator must successfully verify the integrated performance of a vehicle's hardware and any...

  14. Verification Techniques for Graph Rewriting (Tutorial)

    NARCIS (Netherlands)

    Rensink, Arend; Abdulla, Parosh Aziz; Gadducci, Fabio; König, Barbara; Vafeiadis, Viktor

    This tutorial paints a high-level picture of the concepts involved in verification of graph transformation systems. We distinguish three fundamentally different application scenarios for graph rewriting: (1) as grammars (in which case we are interested in the language, or set, of terminal graphs for

  15. Summary 2: Graph Grammar Verification through Abstraction

    NARCIS (Netherlands)

    Baldan, P.; Koenig, B.; Rensink, A.; Rensink, Arend; König, B.; Montanari, U.; Gardner, P.

    2005-01-01

    Until now there have been few contributions concerning the verification of graph grammars, specifically of infinite-state graph grammars. This paper compares two existing approaches, based on abstractions of graph transformation systems. While in the unfolding approach graph grammars are

  16. Mesoscale model forecast verification during monsoon 2008

    Indian Academy of Sciences (India)

    There have been very few mesoscale modelling studies of the Indian monsoon, with focus on the verification and intercomparison of the operational real time forecasts. With the exception of Das et al (2008), most of the studies in the literature are either the case studies of tropical cyclones and thunderstorms or the sensitivity ...

  17. Learner Verification: A Publisher's Case Study.

    Science.gov (United States)

    Wilson, George

    Learner verification, a process by which publishers monitor the effectiveness of their products and strive to improve their services to schools, is a practice that most companies take seriously. The quality of educational materials may be ensured in many ways: by analysis of sales, through firsthand investigation, and by employing a system of…

  18. Model Checking - Automated Verification of Computational Systems

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 7. Model Checking - Automated Verification of Computational Systems. Madhavan Mukund. General Article Volume 14 Issue 7 July 2009 pp 667-681. Fulltext. Click here to view fulltext PDF. Permanent link:

  19. 18 CFR 286.107 - Verification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Verification. 286.107 Section 286.107 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT... must be sworn to by persons having knowledge thereof, which latter fact must affirmatively appear in...

  20. 18 CFR 349.5 - Verification.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Verification. 349.5 Section 349.5 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT... having knowledge thereof, which latter fact must affirmatively appear in the affidavit. Except under...