WorldWideScience

Sample records for tfe verification program

  1. TFE Verification Program

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE (thermionic fuel element) suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern.

  2. TFE Verification Program. Semiannual report for the period ending March 31, 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE (thermionic fuel element) suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern.

  3. TFE Verification Program semiannual report for the period ending March 31, 1990

    Energy Technology Data Exchange (ETDEWEB)

    1990-07-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern. 6 refs., 67 figs., 37 tabs.

  4. Program Verification and System Dependability

    Science.gov (United States)

    Jackson, Michael

    Formal verification of program correctness is a long-standing ambition, recently given added prominence by a “Grand Challenge” project. Major emphases have been on the improvement of languages for program specification and program development, and on the construction of verification tools. The emphasis on tools commands general assent, but while some researchers focus on narrow verification aimed only at program correctness, others want to pursue wide verification aimed at the larger goal of system dependability. This paper presents an approach to system dependability based on problem frames and suggests how this approach can be supported by formal software tools. Dependability is to be understood and evaluated in the physical and human problem world of a system. The complexity and non-formal nature of the problem world demand the development and evolution of normal designs and normal design practices for specialised classes of systems and subsystems. The problem frames discipline of systems analysis and development that can support normal design practices is explained and illustrated. The role of formal reasoning in achieving dependability is discussed and some conceptual, linguistic and software tools are suggested.

  5. On the organisation of program verification competitions

    NARCIS (Netherlands)

    Huisman, Marieke; Klebanov, Vladimir; Monahan, Rosemary; Klebanov, Vladimir; Beckert, Bernhard; Biere, Armin; Sutcliffe, Geoff

    In this paper, we discuss the challenges that have to be addressed when organising program verification competitions. Our focus is on competitions for verification systems where the participants both formalise an informally stated requirement and (typically) provide some guidance for the tool to

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  7. 14 CFR 460.17 - Verification program.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Verification program. 460.17 Section 460.17 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... program. An operator must successfully verify the integrated performance of a vehicle's hardware and any...

  8. Program verification using symbolic game semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    2014-01-01

    We introduce a new symbolic representation of algorithmic game semantics, and show how it can be applied for efficient verification of open (incomplete) programs. The focus is on an Algol-like programming language which contains the core ingredients of imperative and functional languages...... of game semantics to that of corresponding symbolic representations. In this way programs with infinite data types, such as integers, can be expressed as finite-state symbolic-automata although the standard automata representation is infinite-state, i.e. the standard regular-language representation has...... infinite summations. Moreover, in this way significant reductions of the state space of game semantics models are obtained. This enables efficient verification of programs by our prototype tool based on symbolic game models, which is illustrated with several examples....

  9. Verification of business rules programs

    CERN Document Server

    Silva, Bruno Berstel-Da

    2013-01-01

    Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs.  This book is on business rules programs, that is, rule programs as handled in business rules management systems. Its

  10. Verification of Java Card programs

    OpenAIRE

    Stenzel, Kurt

    2005-01-01

    Smart cards are used in security critical applications where money or private data is involved. Examples are the German Geldkarte or new passports with biometrical data. Design or programming errors can have severe consequences. Formal methods are the best means to avoid errors. Java Card is a restricted version of Java to program smart cards. This work presents a logical calculus to formally prove the correctness and security of Java Card programs. The calculus is implemented in the KIV syst...

  11. Verification of automata-based programs (supervised by Anatoly Shalyto)

    OpenAIRE

    Evgeny, Kurbatsky

    2008-01-01

    This paper describes a verification method of automata based programs [1] based on symbolic model checking algorithms [2]. Author makes an attempt to develop verification method that can automate process of verification and can be useful for peoples unacquainted with model checking algorithms or tools.

  12. Finite Countermodel Based Verification for Program Transformation (A Case Study

    Directory of Open Access Journals (Sweden)

    Alexei P. Lisitsa

    2015-12-01

    Full Text Available Both automatic program verification and program transformation are based on program analysis. In the past decade a number of approaches using various automatic general-purpose program transformation techniques (partial deduction, specialization, supercompilation for verification of unreachability properties of computing systems were introduced and demonstrated. On the other hand, the semantics based unfold-fold program transformation methods pose themselves diverse kinds of reachability tasks and try to solve them, aiming at improving the semantics tree of the program being transformed. That means some general-purpose verification methods may be used for strengthening program transformation techniques. This paper considers the question how finite countermodels for safety verification method might be used in Turchin's supercompilation method. We extract a number of supercompilation sub-algorithms trying to solve reachability problems and demonstrate use of an external countermodel finder for solving some of the problems.

  13. Improving a Modular Verification Technique for Aspect Oriented Programming

    NARCIS (Netherlands)

    Laarman, Alfons; Huijs, C.

    2006-01-01

    As aspect oriented software becomes more popular, there will be more demand for a method of verifying the correctness of the programs. This paper tries to address the verification issue by improving a modular verification technique proposed by Krisnamuhrti et al. The technique has the problem that

  14. Orbit attitude processor. STS-1 bench program verification test plan

    Science.gov (United States)

    Mcclain, C. R.

    1980-01-01

    A plan for the static verification of the STS-1 ATT PROC ORBIT software requirements is presented. The orbit version of the SAPIENS bench program is used to generate the verification data. A brief discussion of the simulation software and flight software modules is presented along with a description of the test cases.

  15. 75 FR 60169 - Proposed Information Collection (Vetbiz Vendor Information Pages Verification Program) Activity...

    Science.gov (United States)

    2010-09-29

    ... AFFAIRS Proposed Information Collection (Vetbiz Vendor Information Pages Verification Program) Activity... use of other forms of information technology. Title: Vetbiz Vendor Information Pages Verification... collection. Abstract: Vetbiz Vendor Information Pages Verification Program is used to assist federal agencies...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM; BAGHOUSE FILTRATION PRODUCTS

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  17. Field verification program for small wind turbines

    Energy Technology Data Exchange (ETDEWEB)

    Windward Engineering, LLC

    2003-11-30

    In 1999 Windward Engineering (Windward) was awarded a Cooperative Agreement under the Field Verification Program with the Department of Energy (DOE) to install two Whisper H40 wind turbines, one at the NREL National Wind Technology Center (NWTC) and one at a test site near Spanish Fork, Utah. After installation, the turbine at the NWTC was to be operated, maintained, and monitored by NREL while the turbine in Spanish Fork was to be administered by Windward. Under this award DOE and Windward defined the primary objectives of the project as follows: (1) Determine and demonstrate the reliability and energy production of a furling wind turbine at a site where furling will be a very frequent event and extreme gusts can be expected during the duration of the tests. (2) Make engineering measurements and conduct limited computer modeling of the furling behavior to improve the industry understanding of the mechanics and nature of furling. We believe the project has achieved these objectives. The turbine has operated for approximately three and a half years. We have collected detailed engineering data approximately 75 percent of that time. Some of these data were used in an ADAMS model validation that highlighted the accuracies and inaccuracies of the computer modeling for a passively furling wind turbine. We also presented three papers at the American Wind Energy Association (AWEA) Windpower conferences in 2001, 2002, and 2003. These papers addressed the following three topics: (a) general overview of the project [1], (b) furling operation during extreme wind events [2], and (c) extrapolation of extreme (design) loads [3]. We believe these papers have given new insight into the mechanics and nature of furling and have set the stage for future research. In this final report we will highlight some of the more interesting aspects of the project as well as summarize the data for the entire project. We will also present information on the installation of the turbines as well as

  18. On Construction and Verification of PLC-Programs

    Directory of Open Access Journals (Sweden)

    E. V. Kuzmin

    2012-01-01

    Full Text Available We review some methods and approaches to programming discrete problems for Programmable Logic Controllers on the example of constructing PLC-programs for controling a code lock. For these approaches we evaluate the usability of the model checking method for the analysis of program correctness with respect to the automatic verification tool Cadence SMV. Some possible PLC-program vulnerabilities arising at a number approaches to programming of PLC are revealed.

  19. Solid waste operations complex engineering verification program plan

    Energy Technology Data Exchange (ETDEWEB)

    Bergeson, C.L.

    1994-09-28

    This plan supersedes, but does not replace, the previous Waste Receiving and Processing/Solid Waste Engineering Development Program Plan. In doing this, it does not repeat the basic definitions of the various types or classes of development activities nor provide the rigorous written description of each facility and assign the equipment to development classes. The methodology described in the previous document is still valid and was used to determine the types of verification efforts required. This Engineering Verification Program Plan will be updated on a yearly basis. This EVPP provides programmatic definition of all engineering verification activities for the following SWOC projects: (1) Project W-026 - Waste Receiving and Processing Facility Module 1; (2) Project W-100 - Waste Receiving and Processing Facility Module 2A; (3) Project W-112 - Phase V Storage Facility; and (4) Project W-113 - Solid Waste Retrieval. No engineering verification activities are defined for Project W-112 as no verification work was identified. The Acceptance Test Procedures/Operational Test Procedures will be part of each project`s Title III operation test efforts. The ATPs/OTPs are not covered by this EVPP.

  20. A Method for Automatic Runtime Verification of Automata-Based Programs

    OpenAIRE

    Oleg, Stepanov; Anatoly, Shalyto

    2008-01-01

    Currently Model Checking is the only practically used method for verification of automata-based programs. However, current implementations of this method only allow verification of simple automata systems. We suggest using a different approach, runtime verification, for verification of automata systems. We discuss advantages and disadvantages of this approach, propose a method for automatic verification of automata-based programs which uses this approach and conduct experimental performance s...

  1. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo......, that suffer from the state-explosion problem or that otherwise depend on parameters to the program itself. We experimentally evaluated our approach against state-of-the-art tools for MPI to conclude that our approach offers a scalable solution....... translated into a representation read by VCC, a software verifier for C. We successfully verified several MPI programs in a running time that is independent of the number of processes or other input parameters. This contrasts with alternative techniques, notably model checking and runtime verification...

  2. Dynamic Frames Based Verification Method for Concurrent Java Programs

    NARCIS (Netherlands)

    Mostowski, Wojciech

    2016-01-01

    In this paper we discuss a verification method for concurrent Java programs based on the concept of dynamic frames. We build on our earlier work that proposes a new, symbolic permission system for concurrent reasoning and we provide the following new contributions. First, we describe our approach

  3. Probabilistic Programming: A True Verification Challenge

    NARCIS (Netherlands)

    Katoen, Joost P.; Finkbeiner, Bernd; Pu, Geguang; Zhang, Lijun

    2015-01-01

    Probabilistic programs [6] are sequential programs, written in languages like C, Java, Scala, or ML, with two added constructs: (1) the ability to draw values at random from probability distributions, and (2) the ability to condition values of variables in a program through observations. For a

  4. Formal verification of complex properties on PLC programs

    CERN Document Server

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.

  5. A Formal Verification Methodology for DDD Mode Pacemaker Control Programs

    Directory of Open Access Journals (Sweden)

    Sana Shuja

    2015-01-01

    Full Text Available Pacemakers are safety-critical devices whose faulty behaviors can cause harm or even death. Often these faulty behaviors are caused due to bugs in programs used for digital control of pacemakers. We present a formal verification methodology that can be used to check the correctness of object code programs that implement the safety-critical control functions of DDD mode pacemakers. Our methodology is based on the theory of Well-Founded Equivalence Bisimulation (WEB refinement, where both formal specifications and implementation are treated as transition systems. We develop a simple and general formal specification for DDD mode pacemakers. We also develop correctness proof obligations that can be applied to validate object code programs used for pacemaker control. Using our methodology, we were able to verify a control program with millions of transitions against the simple specification with only 10 transitions. Our method also found several bugs during the verification process.

  6. Specification and verification of GPGPU programs.

    OpenAIRE

    Blom, Stefan; Huisman, Marieke; Mihelcic, M.

    2014-01-01

    Abstract Graphics Processing Units (GPUs) are increasingly used for general-purpose applications because of their low price, energy efficiency and enormous computing power. Considering the importance of GPU applications, it is vital that the behaviour of GPU programs can be specified and proven correct formally. This paper presents a logic to verify GPU kernels written in OpenCL, a platform-independent low-level programming language. The logic can be used to prove both data-race-freedom and f...

  7. Deductive Verification of Parallel Programs Using Why3

    Directory of Open Access Journals (Sweden)

    César Santos

    2015-08-01

    Full Text Available The Message Passing Interface specification (MPI defines a portable message-passing API used to program parallel computers. MPI programs manifest a number of challenges on what concerns correctness: sent and expected values in communications may not match, resulting in incorrect computations possibly leading to crashes; and programs may deadlock resulting in wasted resources. Existing tools are not completely satisfactory: model-checking does not scale with the number of processes; testing techniques wastes resources and are highly dependent on the quality of the test set. As an alternative, we present a prototype for a type-based approach to programming and verifying MPI like programs against protocols. Protocols are written in a dependent type language designed so as to capture the most common primitives in MPI, incorporating, in addition, a form of primitive recursion and collective choice. Protocols are then translated into Why3, a deductive software verification tool. Source code, in turn, is written in WhyML, the language of the Why3 platform, and checked against the protocol. Programs that pass verification are guaranteed to be communication safe and free from deadlocks. We verified several parallel programs from textbooks using our approach, and report on the outcome.

  8. Transforming PLC Programs into Formal Models for Verification Purposes

    CERN Document Server

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  9. Practical Formal Verification of MPI and Thread Programs

    Science.gov (United States)

    Gopalakrishnan, Ganesh; Kirby, Robert M.

    Large-scale simulation codes in science and engineering are written using the Message Passing Interface (MPI). Shared memory threads are widely used directly, or to implement higher level programming abstractions. Traditional debugging methods for MPI or thread programs are incapable of providing useful formal guarantees about coverage. They get bogged down in the sheer number of interleavings (schedules), often missing shallow bugs. In this tutorial we will introduce two practical formal verification tools: ISP (for MPI C programs) and Inspect (for Pthread C programs). Unlike other formal verification tools, ISP and Inspect run directly on user source codes (much like a debugger). They pursue only the relevant set of process interleavings, using our own customized Dynamic Partial Order Reduction algorithms. For a given test harness, DPOR allows these tools to guarantee the absence of deadlocks, instrumented MPI object leaks and communication races (using ISP), and shared memory races (using Inspect). ISP and Inspect have been used to verify large pieces of code: in excess of 10,000 lines of MPI/C for ISP in under 5 seconds, and about 5,000 lines of Pthread/C code in a few hours (and much faster with the use of a cluster or by exploiting special cases such as symmetry) for Inspect. We will also demonstrate the Microsoft Visual Studio and Eclipse Parallel Tools Platform integrations of ISP (these will be available on the LiveCD).

  10. RBM10-TFE3 Renal Cell Carcinoma: A Potential Diagnostic Pitfall Due to Cryptic Intrachromosomal Xp11.2 Inversion Resulting in False-negative TFE3 FISH.

    Science.gov (United States)

    Argani, Pedram; Zhang, Lei; Reuter, Victor E; Tickoo, Satish K; Antonescu, Cristina R

    2017-05-01

    Xp11 translocation renal cell carcinoma (RCC) are defined by chromosome translocations involving the Xp11 breakpoint which results in one of a variety of TFE3 gene fusions. TFE3 break-apart florescence in situ hybridization (FISH) assays are generally preferred to TFE3 immunohistochemistry (IHC) as a means of confirming the diagnosis in archival material, as FISH is less sensitive to the variable fixation which can result in false positive or false negative IHC. Prompted by a case report in the cytogenetics literature, we identify 3 cases of Xp11 translocation RCC characterized by a subtle chromosomal inversion involving the short arm of the X chromosome, resulting in an RBM10-TFE3 gene fusion. TFE3 rearrangement was not detected by conventional TFE3 break-apart FISH, but was suggested by strong diffuse TFE3 immunoreactivity in a clean background. We then developed novel fosmid probes to detect the RBM10-TFE3 gene fusion in archival material. These cases validate RBM10-TFE3 as a recurrent gene fusion in Xp11 translocation RCC, illustrate a source of false-negative TFE3 break-apart FISH, and highlight the complementary role of TFE3 IHC and TFE3 FISH.

  11. DOE-EPRI distributed wind Turbine Verification Program (TVP III)

    Energy Technology Data Exchange (ETDEWEB)

    McGowin, C.; DeMeo, E. [Electric Power Research Institute, Palo Alto, CA (United States); Calvert, S. [Dept. of Energy, Washington, DC (United States)] [and others

    1997-12-31

    In 1992, the Electric Power Research Institute (EPRI) and the U.S. Department of Energy (DOE) initiated the Utility Wind Turbine Verification Program (TVP). The goal of the program is to evaluate prototype advanced wind turbines at several sites developed by U.S. electric utility companies. Two six MW wind projects have been installed under the TVP program by Central and South West Services in Fort Davis, Texas and Green Mountain Power Corporation in Searsburg, Vermont. In early 1997, DOE and EPRI selected five more utility projects to evaluate distributed wind generation using smaller {open_quotes}clusters{close_quotes} of wind turbines connected directly to the electricity distribution system. This paper presents an overview of the objectives, scope, and status of the EPRI-DOE TVP program and the existing and planned TVP projects.

  12. Fundamentals of Successful Monitoring, Reporting, and Verification under a Cap and Trade Program

    Science.gov (United States)

    Learn about the monitoring, reporting, and verification (MRV) elements as they apply to the Acid Rain Program and the Nox Budget Trading Program, and how they can be potentially used in other programs.

  13. 75 FR 76080 - Agency Information Collection (VetBiz Vendor Information Pages Verification Program) Activity...

    Science.gov (United States)

    2010-12-07

    ... AFFAIRS Agency Information Collection (VetBiz Vendor Information Pages Verification Program) Activity... Information Pages Verification Program, VA Form 0877. OMB Control Number: 2900-0675. Type of Review: Extension...), Department of Veterans Affairs, will submit the collection of information abstracted below to the Office of...

  14. 76 FR 41186 - Salmonella Verification Sampling Program: Response to Comments on New Agency Policies and...

    Science.gov (United States)

    2011-07-13

    ...; ] DEPARTMENT OF AGRICULTURE Food Safety and Inspection Service Salmonella Verification Sampling Program: Response to Comments on New Agency Policies and Clarification of Timeline for the Salmonella Initiative... changes in the FSIS Salmonella Verification Program and outlined a new voluntary Salmonella Initiative...

  15. Cost-Effective CNC Part Program Verification Development for Laboratory Instruction.

    Science.gov (United States)

    Chen, Joseph C.; Chang, Ted C.

    2000-01-01

    Describes a computer numerical control program verification system that checks a part program before its execution. The system includes character recognition, word recognition, a fuzzy-nets system, and a tool path viewer. (SK)

  16. Verification and Planning Based on Coinductive Logic Programming

    Science.gov (United States)

    Bansal, Ajay; Min, Richard; Simon, Luke; Mallya, Ajay; Gupta, Gopal

    2008-01-01

    Coinduction is a powerful technique for reasoning about unfounded sets, unbounded structures, infinite automata, and interactive computations [6]. Where induction corresponds to least fixed point's semantics, coinduction corresponds to greatest fixed point semantics. Recently coinduction has been incorporated into logic programming and an elegant operational semantics developed for it [11, 12]. This operational semantics is the greatest fix point counterpart of SLD resolution (SLD resolution imparts operational semantics to least fix point based computations) and is termed co- SLD resolution. In co-SLD resolution, a predicate goal p( t) succeeds if it unifies with one of its ancestor calls. In addition, rational infinite terms are allowed as arguments of predicates. Infinite terms are represented as solutions to unification equations and the occurs check is omitted during the unification process. Coinductive Logic Programming (Co-LP) and Co-SLD resolution can be used to elegantly perform model checking and planning. A combined SLD and Co-SLD resolution based LP system forms the common basis for planning, scheduling, verification, model checking, and constraint solving [9, 4]. This is achieved by amalgamating SLD resolution, co-SLD resolution, and constraint logic programming [13] in a single logic programming system. Given that parallelism in logic programs can be implicitly exploited [8], complex, compute-intensive applications (planning, scheduling, model checking, etc.) can be executed in parallel on multi-core machines. Parallel execution can result in speed-ups as well as in larger instances of the problems being solved. In the remainder we elaborate on (i) how planning can be elegantly and efficiently performed under real-time constraints, (ii) how real-time systems can be elegantly and efficiently model- checked, as well as (iii) how hybrid systems can be verified in a combined system with both co-SLD and SLD resolution. Implementations of co-SLD resolution

  17. Adding Change Impact Analysis to the Formal Verification of C Programs

    Science.gov (United States)

    Autexier, Serge; Lüth, Christoph

    Handling changes to programs and specifications efficiently is a particular challenge in formal software verification. Change impact analysis is an approach to this challenge where the effects of changes made to a document (such as a program or specification) are described in terms of rules on a semantic representation of the document. This allows to describe and delimit the effects of syntactic changes semantically. This paper presents an application of generic change impact analysis to formal software verification, using the GMoC and SAMS tools. We adapt the GMoC tool for generic change impact analysis to the SAMS verification framework for the formal verification of C programs, and show how a few simple rules are sufficient to capture the essence of change management.

  18. Empirical Tests and Preliminary Results with the Krakatoa Tool for Full Static Program Verification

    Directory of Open Access Journals (Sweden)

    Ramírez-de León Edgar Darío

    2014-10-01

    Full Text Available XJML (Ramírez et al., 2012 is a modular external platform for Verification and Validation of Java classes using the Java Modeling Language (JML through contracts written in XML. One problem faced in the XJML development was how to integrate Full Static Program Verification (FSPV. This paper presents the experiments and results that allowed us to define what tool to embed in XJML to execute FSPV.

  19. On-product metrology results from MEBES 4-TFE System

    Science.gov (United States)

    Braun, Christopher P.; Peiffer, Frederick R.

    1996-12-01

    At Lucent Technologies, lithography tool performance metric measurements are required on every plate. The QA cell patterning is designed to monitor the lithography tool, and the data is captured within the Mask Information Management System. It allows the manufacturer to use actual production data to determine machine performance trends, and it yields an extremely large sample of plates for SPC purposes. Closure, X vs. Y uniformity, butting, and registration data is reported in this way. The usage of on-product data for machine metrology is demonstrated, and actual production performance of the MEBES 4 TFE is shown.

  20. Cleared for Launch - Lessons Learned from the OSIRIS-REx System Requirements Verification Program

    Science.gov (United States)

    Stevens, Craig; Adams, Angela; Williams, Bradley; Goodloe, Colby

    2017-01-01

    Requirements verification of a large flight system is a challenge. It is especially challenging for engineers taking on their first role in space systems engineering. This paper describes our approach to verification of the Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer (OSIRIS-REx) system requirements. It also captures lessons learned along the way from developing systems engineers embroiled in this process. We begin with an overview of the mission and science objectives as well as the project requirements verification program strategy. A description of the requirements flow down is presented including our implementation for managing the thousands of program and element level requirements and associated verification data. We discuss both successes and methods to improve the managing of this data across multiple organizational interfaces. Our approach to verifying system requirements at multiple levels of assembly is presented using examples from our work at instrument, spacecraft, and ground segment levels. We include a discussion of system end-to-end testing limitations and their impacts to the verification program. Finally, we describe lessons learned that are applicable to all emerging space systems engineers using our unique perspectives across multiple organizations of a large NASA program.

  1. Performance modeling of an integral, self-regulating cesium reservoir for the ATI-TFE

    Science.gov (United States)

    Thayer, Kevin L.; Ramalingam, Mysore L.; Young, Timothy J.

    1993-01-01

    This work covers the performance modeling of an integral metal-matrix cesium-graphite reservoir for operation in the Advanced Thermionic Initiative-Thermionic Fuel Element (ATI-TFE) converter configuration. The objectives of this task were to incorporate an intercalated cesium-graphite reservoir for the 3C24Cs→2C36Cs+Cs(g) two phase equilibrium reaction into the emitter lead region of the ATI-TFE. A semi two-dimensional, cylindrical TFE computer model was used to obtain thermal and electrical converter output characteristics for various reservoir locations. The results of this study are distributions for the interelectrode voltage, output current density, and output power density as a function of axial position along the TFE emitter. This analysis was accomplished by identifying an optimum cesium pressure for three representative pins in the ATI ``driverless'' reactor core and determining the corresponding position of the graphite reservoir in the ATI-TFE lead region. The position for placement of the graphite reservoir was determined by performing a first-order heat transfer analysis of the TFE lead region to determine its temperature distribution. The results of this analysis indicate that for the graphite reservoirs investigated the 3C24Cs→2C36Cs+Cs(g) equilibrium reaction reservoir is ideal for placement in the TFE emitter lead region. This reservoir can be directly coupled to the emitter, through conduction, to provide the desired cesium pressure for optimum performance. The cesium pressure corresponding to the optimum converter output performance was found to be 2.18 torr for the ATI core least power TFE, 2.92 torr for the average power TFE, and 4.93 torr for the maximum power TFE.

  2. Specification and Verification of GPGPU programs using Permission-based Separation logic

    OpenAIRE

    Huisman, Marieke; Mihelcic, M.

    2013-01-01

    Graphics Processing Units (GPUs) are increasingly used for general-purpose applications because of their low price, energy efficiency and enormous computing power. Considering the importance of GPU applications, it is vital that the behaviour of GPU programs can be specified and proven correct formally. This paper presents our ideas how to verify GPU programs written in OpenCL, a platform-independent low-level programming language. Our verification approach is modular, based on permission-bas...

  3. On Verification of PLC-Programs Written in the LD-Language

    Directory of Open Access Journals (Sweden)

    E. V. Kuzmin

    2012-01-01

    Full Text Available We discuss some questions connected with the construction of a technology of analysing correctness of Programmable Logic Controller programs. We consider an example of modeling and automated verification of PLC-programs written in the Ladder Diagram language (including timed function blocks of the IEC 61131-3 standard. We use the Cadence SMV for symbolic model checking. Program properties are written in the linear-time temporal logic LTL.

  4. Formal verification and testing: An integrated approach to validating Ada programs

    Science.gov (United States)

    Cohen, Norman H.

    1986-01-01

    An integrated set of tools called a validation environment is proposed to support the validation of Ada programs by a combination of methods. A Modular Ada Validation Environment (MAVEN) is described which proposes a context in which formal verification can fit into the industrial development of Ada software.

  5. 75 FR 77959 - VetBiz Vendor Information Pages Verification Program; Correction

    Science.gov (United States)

    2010-12-14

    ... AFFAIRS VetBiz Vendor Information Pages Verification Program; Correction AGENCY: Center for Veterans... Affairs (VA) published a collection of information notice in the Federal Register on December 7, 2010..., ``Center for Veterans Enterprise''. FOR FURTHER INFORMATION CONTACT: Denise McLamb, Enterprise Records...

  6. 78 FR 45729 - Foreign Supplier Verification Programs for Importers of Food for Humans and Animals

    Science.gov (United States)

    2013-07-29

    ... (HACCP) and preventive controls programs), we believe that it provides the most effective way to... fishery products (which are already subject to verification under FDA's HACCP regulations), food for... industry. FDA's regulations on the processing of juice and seafood products under HACCP systems, as well as...

  7. Characterizing irrigation water requirements for rice production from the Arkansas Rice Research Verification Program

    Science.gov (United States)

    This study investigated rice irrigation water use in the University of Arkansas Rice Research Verification Program between the years of 2003 and 2011. Irrigation water use averaged 747 mm (29.4 inches) over the nine years. A significant 40% water savings was reported for rice grown under a zero gr...

  8. The Evolution of Improved Baghouse Filter Media as Observed in the Environmental Technology Verification Program

    Science.gov (United States)

    The U.S. EPA implemented the Environmental Technology Verification (ETV) program in 1995 to generate independent and credible data on the performance of innovative technologies that have the potential to improve protection of public health and the environment. Results are publicl...

  9. Automata-Based Verification of Temporal Properties on Running Programs

    Science.gov (United States)

    Giannakopoulou, Dimitra; Havelund, Klaus; Lan, Sonie (Technical Monitor)

    2001-01-01

    This paper presents an approach to checking a running program against its Linear Temporal Logic (LTL) specifications. LTL is a widely used logic for expressing properties of programs viewed as sets of executions. Our approach consists of translating LTL formulae to finite-state automata, which are used as observers of the program behavior. The translation algorithm we propose modifies standard LTL to Buchi automata conversion techniques to generate automata that check finite program traces. The algorithm has been implemented in a tool, which has been integrated with the generic JPaX framework for runtime analysis of Java programs.

  10. Experiments in Program Verification using Event-B

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Leuschel, Michael

    2012-01-01

    The Event-B method can be used to model all sorts of discrete event systems, among them sequential programs. In this article we describe our experiences with using Event-B by way of two examples. We present a simple model of a factorial program, explaining the method, and a more intricate model...

  11. Program Correctness, Verification and Testing for Exascale (Corvette)

    Energy Technology Data Exchange (ETDEWEB)

    Sen, Koushik [UC Berkeley; Iancu, Costin [Lawrence Berkeley National Laboratory; Demmel, James W [UC Berkeley

    2018-01-26

    The goal of this project is to provide tools to assess the correctness of parallel programs written using hybrid parallelism. There is a dire lack of both theoretical and engineering know-how in the area of finding bugs in hybrid or large scale parallel programs, which our research aims to change. In the project we have demonstrated novel approaches in several areas: 1. Low overhead automated and precise detection of concurrency bugs at scale. 2. Using low overhead bug detection tools to guide speculative program transformations for performance. 3. Techniques to reduce the concurrency required to reproduce a bug using partial program restart/replay. 4. Techniques to provide reproducible execution of floating point programs. 5. Techniques for tuning the floating point precision used in codes.

  12. North Korea's nuclear weapons program:verification priorities and new challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Duk-ho (Korean Consulate General in New York)

    2003-12-01

    A comprehensive settlement of the North Korean nuclear issue may involve military, economic, political, and diplomatic components, many of which will require verification to ensure reciprocal implementation. This paper sets out potential verification methodologies that might address a wide range of objectives. The inspection requirements set by the International Atomic Energy Agency form the foundation, first as defined at the time of the Agreed Framework in 1994, and now as modified by the events since revelation of the North Korean uranium enrichment program in October 2002. In addition, refreezing the reprocessing facility and 5 MWe reactor, taking possession of possible weapons components and destroying weaponization capabilities add many new verification tasks. The paper also considers several measures for the short-term freezing of the North's nuclear weapon program during the process of negotiations, should that process be protracted. New inspection technologies and monitoring tools are applicable to North Korean facilities and may offer improved approaches over those envisioned just a few years ago. These are noted, and potential bilateral and regional verification regimes are examined.

  13. Automatic Probabilistic Program Verification through Random Variable Abstraction

    Directory of Open Access Journals (Sweden)

    Damián Barsotti

    2010-06-01

    Full Text Available The weakest pre-expectation calculus has been proved to be a mature theory to analyze quantitative properties of probabilistic and nondeterministic programs. We present an automatic method for proving quantitative linear properties on any denumerable state space using iterative backwards fixed point calculation in the general framework of abstract interpretation. In order to accomplish this task we present the technique of random variable abstraction (RVA and we also postulate a sufficient condition to achieve exact fixed point computation in the abstract domain. The feasibility of our approach is shown with two examples, one obtaining the expected running time of a probabilistic program, and the other the expected gain of a gambling strategy. Our method works on general guarded probabilistic and nondeterministic transition systems instead of plain pGCL programs, allowing us to easily model a wide range of systems including distributed ones and unstructured programs. We present the operational and weakest precondition semantics for this programs and prove its equivalence.

  14. Malignant TFE3-rearranged perivascular epithelioid cell neoplasm (PEComa) presenting as a subcutaneous mass.

    Science.gov (United States)

    Shon, W; Kim, J; Sukov, W; Reith, J

    2016-03-01

    Perivascular epithelioid cell neoplasms (PEComas) are a group of mesenchymal tumours with concurrent melanocytic and myogenic differentiation. Although many cases are sporadic, PEComas can be associated with tuberous sclerosis. A distinct subset of deep-seated PEComas has been shown to carry TFE3 fusions. To our knowledge, this is the first reported case of primary subcutaneous malignant PEComa with molecular confirmation of TFE3 gene rearrangement. © 2015 British Association of Dermatologists.

  15. WNetKAT: A Weighted SDN Programming and Verification Language

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand; Schmid, Stefan; Xue, Bingtian

    2017-01-01

    Programmability and verifiability lie at the heart of the software-defined networking paradigm. While OpenFlow and its match-action concept provide primitive operations to manipulate hardware configurations, over the last years, several more expressive network programming languages have been deve...

  16. Certainty in Stockpile Computing: Recommending a Verification and Validation Program for Scientific Software

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J.R.

    1998-11-01

    As computing assumes a more central role in managing the nuclear stockpile, the consequences of an erroneous computer simulation could be severe. Computational failures are common in other endeavors and have caused project failures, significant economic loss, and loss of life. This report examines the causes of software failure and proposes steps to mitigate them. A formal verification and validation program for scientific software is recommended and described.

  17. Analysis-Based Verification: A Programmer-Oriented Approach to the Assurance of Mechanical Program Properties

    Science.gov (United States)

    2010-05-27

    verifying analyses and allow users to understand how the tool reached its conclusions. Bandera [30] is a system that extracts models from Java source for...verification by a model checker and maps verifier outputs back to the original source code. Bandera represents, simi- lar to drop-sea, an effort to...establish an effective architecture for assurance but is focused on model checking rather than program analysis. Similar to our work, Bandera , and other

  18. Field Verification Program for Small Wind Turbines: Quarterly Report for January-March 2001; 1st Quarter, Issue No.4

    Energy Technology Data Exchange (ETDEWEB)

    Forsyth, T.; Cardinal, J.

    2001-10-30

    This newsletter provides a brief overview of the Field Verification Program for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  19. Field Verification Program for Small Wind Turbines: Quarterly Report for October-December 2000; 4th Quarter, Iss. No.3

    Energy Technology Data Exchange (ETDEWEB)

    Cardinal, J.

    2001-07-03

    This newsletter provides a brief overview of the Field Verification Program for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  20. Field Verification Program for Small Wind Turbines, Quarterly Report: 3rd Quarter, Issue No.2, July-September 2000

    Energy Technology Data Exchange (ETDEWEB)

    Cardinal. J.; Tu, P.

    2001-05-16

    This newsletter provides a brief overview of the Field Verification Program for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  1. How Nasa's Independent Verification and Validation (IVandV) Program Builds Reliability into a Space Mission Software System (SMSS)

    Science.gov (United States)

    Fisher, Marcus S.; Northey, Jeffrey; Stanton, William

    2014-01-01

    The purpose of this presentation is to outline how the NASA Independent Verification and Validation (IVV) Program helps to build reliability into the Space Mission Software Systems (SMSSs) that its customers develop.

  2. Construction and Verification of PLC LD-programs by LTL-specification

    Directory of Open Access Journals (Sweden)

    E. V. Kuzmin

    2013-01-01

    Full Text Available An approach to construction and verification of PLC LD-programs for discrete problems is proposed. For the specification of the program behavior, we use the linear-time temporal logic LTL. Programming is carried out in the LD-language (Ladder Diagram according to an LTL-specification. The correctness analysis of an LTL-specification is carried out by the symbolic model checking tool Cadence SMV. A new approach to programming and verification of PLC LD-programs is shown by an example. For a discrete problem, we give a LD-program, its LTL-specification and an SMV-model. The purpose of the article is to describe an approach to programming PLC, which would provide a possibility of LD-program correctness analysis by the model checking method. Under the proposed approach, the change of the value of each program variable is described by a pair of LTL-formulas. The first LTL-formula describes situations which increase the value of the corresponding variable, the second LTL-formula specifies conditions leading to a decrease of the variable value. The LTL-formulas (used for speci- fication of the corresponding variable behavior are constructive in the sense that they construct the PLC-program (LD-program, which satisfies temporal properties expressed by these formulas. Thus, the programming of PLC is reduced to the construction of LTLspecification of the behavior of each program variable. In addition, an SMV-model of a PLC LD-program is constructed according to LTL-specification. Then, the SMV-model is analysed by the symbolic model checking tool Cadence SMV.

  3. Bringing Automated Formal Verification to PLC Program Development

    CERN Document Server

    Fernández Adiego, Borja; Blanco Viñuela, Enrique

    Automation is the field of engineering that deals with the development of control systems for operating systems such as industrial processes, railways, machinery or aircraft without human intervention. In most of the cases, a failure in these control systems can cause a disaster in terms of economic losses, environmental damages or human losses. For that reason, providing safe, reliable and robust control systems is a first priority goal for control engineers. Ideally, control engineers should be able to guarantee that both software and hardware fulfill the design requirements. This is an enormous challenge in which industry and academia have been working and making progresses in the last decades. This thesis focuses on one particular type of control systems that operates industrial processes, the PLC (Programmable Logic Controller) - based control systems. Moreover it targets one of the main challenges for these systems, guaranteeing that PLC programs are compliant with their specifications. Traditionally ...

  4. 78 FR 69602 - Foreign Supplier Verification Programs for Importers of Food for Humans and Animals; Extension of...

    Science.gov (United States)

    2013-11-20

    ... Programs for Importers of Food for Humans and Animals'' proposed rule to allow interested persons an... Programs for Importers of Food for Humans and Animals; Extension of Comment Periods AGENCY: Food and Drug... entitled ``Foreign Supplier Verification Programs for Importers of Food for Humans and Animals'' that...

  5. Combining integrated genomics and functional genomics to dissect the biology of a cancer-associated, aberrant transcription factor, the ASPSCR1–TFE3 fusion oncoprotein‡

    OpenAIRE

    Kobos, Rachel; Nagai, Makoto; Tsuda, Masumi; Merl, Man Yee; Saito, Tsuyoshi; Laé, Marick; Mo, Qianxing; Olshen, Adam; Lianoglou, Steven; Leslie, Christina; Ostrovnaya, Irina; Antczak, Christophe; Djaballah, Hakim; Ladanyi, Marc

    2013-01-01

    Oncogenic rearrangements of the TFE3 transcription factor gene are found in two distinct human cancers. These include ASPSCR1–TFE3 in all cases of alveolar soft part sarcoma (ASPS) and ASPSCR1–TFE3, PRCC-TFE3, SFPQ-TFE3 and others in a subset of paediatric and adult RCCs. Here we examined the functional properties of the ASPSCR1–TFE3 fusion oncoprotein, defined its target promoters on a genome-wide basis and performed a high-throughput RNA interference screen to identify which of its transcri...

  6. Establishing an optimized patient-specific verification program for volumetric modulated arc therapy

    Energy Technology Data Exchange (ETDEWEB)

    Serna, Alfredo, E-mail: alfredo.serna@carm.es [Department of Medical Physics, Hospital Universitario Santa Lucía, Cartagena (Spain); Mata, Fernando; Puchades, Vicente [Department of Medical Physics, Hospital Universitario Santa Lucía, Cartagena (Spain)

    2013-10-01

    Quality assurance (QA) of volumetric modulated arc therapy (VMAT) increases the workload significantly. We compared the results from 4 verification methods to establish an efficient VMAT QA. Planning for VMAT treatments was carried out for 40 consecutive patients. Pretreatment verifications were carried out with ion chamber array Physikalish-Technische Werkstätten (PTW729), electronic portal dosimetry (EPID), ion chamber measurements, and independent dose calculation with Diamond program. 2D analyses were made using the gamma analysis (3 mm distance to agreement and 3% dose difference relative to maximum, 10% dose threshold). Average point dose difference calculated by Eclipse relative to ion chamber measurements and Diamond were 0.1%±0.9% and 0.6%±2.2%, respectively. Average pass rate for PTW729 was 99.2%±1.9% and 98.3%±1.3% for EPID. The total required time (linac occupancy time given in parentheses) for each QA method was: PTW729 43.5 minutes (26.5 minutes), EPID 14.5 minutes (2.5 minutes), ion chamber 34.5 minutes (26.5 minutes), and Diamond 12.0 minutes (0 minute). The results were consistent and allowed us to establish an optimized protocol, considering safety and accuracy as well as workload, consisting of 2 verification methods: EPID 2D analysis and independent dose calculation.

  7. Modelling and Formal Verification of Timing Aspects in Large PLC Programs

    CERN Document Server

    Fernandez Adiego, B; Blanco Vinuela, E; Tournier, J-C; Gonzalez Suarez, V M; Blech, J O

    2014-01-01

    One of the main obstacle that prevents model checking from being widely used in industrial control systems is the complexity of building formal models out of PLC programs, especially when timing aspects need to be integrated. This paper brings an answer to this obstacle by proposing a methodology to model and verify timing aspects of PLC programs. Two approaches are proposed to allow the users to balance the trade-off between the complexity of the model, i.e. its number of states, and the set of specifications possible to be verified. A tool supporting the methodology which allows to produce models for different model checkers directly from PLC programs has been developed. Verification of timing aspects for real-life PLC programs are presented in this paper using NuSMV.

  8. Identification of Molecular Tumor Markers in Renal Cell Carcinomas with TFE3 Protein Expression by RNA Sequencing

    Directory of Open Access Journals (Sweden)

    Dorothee Pflueger

    2013-11-01

    Full Text Available TFE3 translocation renal cell carcinoma (tRCC is defined by chromosomal translocations involving the TFE3 transcription factor at chromosome Xp11.2. Genetically proven TFE3 tRCCs have a broad histologic spectrum with overlapping features to other renal tumor subtypes. In this study,we aimed for characterizing RCC with TFE3 protein expression. Using next-generation whole transcriptome sequencing (RNA-Seq as a discovery tool, we analyzed fusion transcripts, gene expression profile, and somatic mutations in frozen tissue of one TFE3 tRCC. By applying a computational analysis developed to call chimeric RNA molecules from paired-end RNA-Seq data, we confirmed the known TFE3 translocation. Its fusion partner SFPQ has already been described as fusion partner in tRCCs. In addition, an RNAread-through chimera between TMED6 and COG8 as well as MET and KDR (VEGFR2 point mutations were identified. An EGFR mutation, but no chromosomal rearrangements, was identified in a control group of five clear cell RCCs (ccRCCs. The TFE3 tRCC could be clearly distinguished from the ccRCCs by RNA-Seq gene expression measurements using a previously reported tRCC gene signature. In validation experiments using reverse transcription-PCR, TMED6-COG8 chimera expression was significantly higher in nine TFE3 translocated and six TFE3-expressing/non-translocated RCCs than in 24 ccRCCs (P<.001 and 22 papillaryRCCs (P<.05-.07. Immunohistochemical analysis of selected genes from the tRCC gene signature showed significantly higher eukaryotic translation elongation factor 1 alpha 2 (EEF1A2 and Contactin 3 (CNTN3 expression in 16 TFE3 translocated and six TFE3-expressing/non-translocated RCCs than in over 200 ccRCCs (P < .0001, both.

  9. SU-E-T-455: Impact of Different Independent Dose Verification Software Programs for Secondary Check

    Energy Technology Data Exchange (ETDEWEB)

    Itano, M; Yamazaki, T; Kosaka, M; Kobayashi, N [Inagi Municipal Hospital, Inagi, Tokyo (Japan); Yamashita, M [Kobe City Medical Center General Hospital, Kobe, Hyogo (Japan); Ishibashi, S; Higuchi, Y [Sasebo City General Hospital, Sasebo, Nagasaki (Japan); Tachibana, H [National Cancer Center Hospital East, Kashiwa, Chiba (Japan)

    2015-06-15

    Purpose: There have been many reports for different dose calculation algorithms for treatment planning system (TPS). Independent dose verification program (IndpPro) is essential to verify clinical plans from the TPS. However, the accuracy of different independent dose verification programs was not evident. We conducted a multi-institutional study to reveal the impact of different IndpPros using different TPSs. Methods: Three institutes participated in this study. They used two different IndpPros (RADCALC and Simple MU Analysis (SMU), which implemented the Clarkson algorithm. RADCALC needed the input of radiological path length (RPL) computed by the TPSs (Eclipse or Pinnacle3). SMU used CT images to compute the RPL independently from TPS). An ion-chamber measurement in water-equivalent phantom was performed to evaluate the accuracy of two IndpPros and the TPS in each institute. Next, the accuracy of dose calculation using the two IndpPros compared to TPS was assessed in clinical plan. Results: The accuracy of IndpPros and the TPSs in the homogenous phantom was +/−1% variation to the measurement. 1543 treatment fields were collected from the patients treated in the institutes. The RADCALC showed better accuracy (0.9 ± 2.2 %) than the SMU (1.7 ± 2.1 %). However, the accuracy was dependent on the TPS (Eclipse: 0.5%, Pinnacle3: 1.0%). The accuracy of RADCALC with Eclipse was similar to that of SMU in one of the institute. Conclusion: Depending on independent dose verification program, the accuracy shows systematic dose accuracy variation even though the measurement comparison showed a similar variation. The variation was affected by radiological path length calculation. IndpPro with Pinnacle3 has different variation because Pinnacle3 computed the RPL using physical density. Eclipse and SMU uses electron density, though.

  10. Translation of PLC Programs to x86 for Simulation and Verification

    CERN Document Server

    Sallai, Gyula

    2017-01-01

    PLC programs are written in special languages, variants of the languages defined in the IEC 61131 standard. These programs cannot be directly executed on personal computers (on x86 architecture). To perform simulation of the PLC program or diagnostics during development, either a real PLC or a PLC simulator has to be used. However, these solutions are often inflexible and they do not provide appropriate performance. By generating x86-representations (semantically equivalent programs which can be executed on PCs, e.g. written in C, C++ or Java) of the PLC programs, some of these challenges could be met. PLCverif is a PLC program verification tool developed at CERN which includes a parser for Siemens PLC programs. In this work, we describe a code generator based on this parser of PLCverif. This work explores the possibilities and challenges of generating programs in widely-used general purpose languages from PLC programs, and provides a proof-of-concept code generation implementation. The presented solution dem...

  11. Automated Generation of Formal Models from ST Control Programs for Verification Purposes

    CERN Document Server

    Fernandez Adiego, B; Tournier, J-C; Blanco Vinuela, E; Blech, J-O; Gonzalez Suarez, V

    2014-01-01

    In large industrial control systems such as the ones installed at CERN, one of the main issues is the ability to verify the correct behaviour of the Programmable Logic Controller (PLC) programs. While manual and automated testing can achieve good results, some obvious problems remain unsolved such as the difficulty to check safety or liveness properties. This paper proposes a general methodology and a tool to verify PLC programs by automatically generating formal models for different model checkers out of ST code. The proposed methodology defines an automata-based formalism used as intermediate model (IM) to transform PLC programs written in ST language into different formal models for verification purposes. A tool based on Xtext has been implemented that automatically generates models for the NuSMV and UPPAAL model checkers and the BIP framework.

  12. Clinicopathological Characteristics of Ovarian Sclerosing Stromal Tumor with an Emphasis on TFE3 Overexpression.

    Science.gov (United States)

    Park, Cheol Keun; Kim, Hyun-Soo

    2017-10-01

    A sclerosing stromal tumor is a very rare benign sex cord-stromal tumor of the ovary. Because its clinical presentation and imaging findings are similar to those of borderline or malignant epithelial tumors and other sex cord-stromal tumors, accurate preoperative clinical diagnosis can be difficult. The aim of this study was to analyze the clinicopathological characteristics of SSTs and examine the immunohistochemical expression TFE3, which has not been studied in SSTs. Our study cohort consisted of 9 patients diagnosed as having SST; the median age was 36 years. Radiologically, SSTs presented as multiseptated cystic masses, mixed echoic masses, pseudolobular masses, solid pelvic masses, or uterine subserosal nodules. In 4 of the 9 cases, the preoperative clinical impression was a borderline or malignant ovarian tumor. SSTs displayed the following histopathological features: 1) relatively well-circumscribed cellular nodules that were randomly distributed in the fibrous or edematous stroma; 2) a characteristic alternating pattern of hypercellular and hypocellular areas; 3) a hemangiopericytoma-like vascular growth pattern in the cellular nodules; 4) bland-looking spindle-shaped cells and round or polygonal cells densely clustered around blood vessels; and 5) red blood cell-containing intracytoplasmic vacuole-like spaces in the tumor cell cytoplasm, possibly indicating epithelioid hemangioendothelioma. Immunohistochemically, the tumor cells exhibited diffuse and moderate-to-strong TFE3 expression in 7 of the 9 SSTs. TFE3 was strongly expressed in the nuclei of round or polygonal cells and lutein cells. In contrast, neither luteinized thecomas nor fibromas appreciably expressed TFE3. In summary, our study describes characteristic histopathological features that may be useful for differentiating SSTs from other sex-cord stromal tumors and demonstrates for the first time that SSTs show strong TFE3 expression. Further investigations are necessary to clarify the role of

  13. Measurement and verification of low income energy efficiency programs in Brazil: Methodological challenges

    Energy Technology Data Exchange (ETDEWEB)

    Martino Jannuzzi, Gilberto De; Rodrigues da Silva, Ana Lucia; Melo, Conrado Augustus de; Paccola, Jose Angelo; Dourado Maia Gomes, Rodolfo (State Univ. of Campinas, International Energy Initiative (Brazil))

    2009-07-01

    Electric utilities in Brazil are investing about 80 million dollars annually in low-income energy efficiency programs, about half of their total compulsory investments in end-use efficiency programs under current regulation. Since 2007 the regulator has enforced the need to provide evaluation plans for the programs delivered. This paper presents the measurement and verification (MandV) methodology that has been developed to accommodate the characteristics of lighting and refrigerator programs that have been introduced in the Brazilian urban and peri-urban slums. A combination of household surveys, end-use measurements and metering at the transformers and grid levels were performed before and after the program implementation. The methodology has to accommodate the dynamics, housing, electrical wiring and connections of the population as well as their ability to pay for the electricity and program participation. Results obtained in slums in Rio de Janeiro are presented. Impacts of the programs were evaluated in energy terms to households and utilities. Feedback from the evaluations performed also permitted the improvement in the design of new programs for low-income households.

  14. Field Verification Program for Small Wind Turbines, Quartelry Report: 2nd Quarter, Issue No.1, October 2000

    Energy Technology Data Exchange (ETDEWEB)

    Tu, P.; Forsyth, T.

    2000-11-02

    The Field Verification Program for Small Wind Turbines quarterly report provides industry members with a description of the program, its mission, and purpose. It also provides a vehicle for participants to report performance data, activities, and issues during quarterly test periods.

  15. ASPL-TFE3 Oncoprotein Regulates Cell Cycle Progression and Induces Cellular Senescence by Up-Regulating p21

    Directory of Open Access Journals (Sweden)

    Naoko Ishiguro

    2016-10-01

    Full Text Available Alveolar soft part sarcoma is an extremely rare soft tissue sarcoma with poor prognosis. It is characterized by the unbalanced recurrent chromosomal translocation der(17t(X;17(p11;q25, resulting in the generation of an ASPL-TFE3 fusion gene. ASPL-TFE3 oncoprotein functions as an aberrant transcriptional factor and is considered to play a crucial role in the tumorigenesis of alveolar soft part sarcoma. However, the underlying molecular mechanisms are poorly understood. In this study, we identified p21 (p21WAF1/CIP1 as a direct transcriptional target of ASPL-TFE3. Ectopic ASPL-TFE3 expression in 293 cells resulted in cell cycle arrest and significant increases in protein and mRNA levels of p21. ASPL-TFE3 activated p21 expression in a p53-independent manner through direct transcriptional interactions with the p21 promoter region. When ASPL-TFE3 was expressed in human bone marrow–derived mesenchymal stem cells in a tetracycline-inducible manner, we observed the up-regulation of p21 expression and the induction of senescence-associated β-galactosidase activity. Suppression of p21 significantly decreased the induction of ASPL-TFE3-mediated cellular senescence. Furthermore, ASPL-TFE3 expression in mesenchymal stem cells resulted in a significant up-regulation of proinflammatory cytokines associated with senescence-associated secretory phenotype (SASP. These results show that ASPL-TFE3 regulates cell cycle progression and induces cellular senescence by up-regulating p21 expression. In addition, our data suggest a potential mechanism by which ASPL-TFE3-induced senescence may play a role in tumorigenesis by inducing SASP, which could promote the protumorigenic microenvironment.

  16. 7 CFR 272.11 - Systematic Alien Verification for Entitlements (SAVE) Program.

    Science.gov (United States)

    2010-01-01

    ... access to the Alien Status Verification Index (ASVI), a description of the access method and procedures... benefits to which participating households were not entitled. (d) Method of verification. The State agency... 7 Agriculture 4 2010-01-01 2010-01-01 false Systematic Alien Verification for Entitlements (SAVE...

  17. Compliance and Verification of Standards and Labeling Programs in China: Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    Saheb, Yamina; Zhou, Nan; Fridley, David; Pierrot, Andre

    2010-08-01

    After implementing several energy efficiency standards and labels (30 products covered by MEPS, 50 products covered by voluntary labels and 19 products by mandatory labels), the China National Institute of Standardization (CNIS) is now implementing verification and compliance mechanism to ensure that the energy information of labeled products comply with the requirements of their labels. CNIS is doing so by organizing check testing on a random basis for room air-conditioners, refrigerators, motors, heaters, computer displays, ovens, and self -ballasted lamps. The purpose of the check testing is to understand the implementation of the Chinese labeling scheme and help local authorities establishing effective compliance mechanisms. In addition, to ensure robustness and consistency of testing results, CNIS has coordinated a round robin testing for room air conditioners. Eight laboratories (Chinese (6), Australian (1) and Japanese (1)) have been involved in the round robin testing and tests were performed on four sets of samples selected from manufacturer's production line. This paper describes the methodology used in undertaking both check and round robin testing, provides analysis of testing results and reports on the findings. The analysis of both check and round robin testing demonstrated the benefits of a regularized verification and monitoring system for both laboratories and products such as (i) identifying the possible deviations between laboratories to correct them, (ii) improving the quality of testing facilities, (iii) ensuring the accuracy and reliability of energy label information in order to strength the social credibility of the labeling program and the enforcement mechanism in place.

  18. Compliance and Verification of Standards and Labelling Programs in China: Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    Saheb, Yamina; Zhou, Nan; Fridley, David; Pierrot, Andr& #233

    2010-06-11

    After implementing several energy efficiency standards and labels (30 products covered by MEPS, 50 products covered by voluntary labels and 19 products by mandatory labels), the China National Institute of Standardization (CNIS) is now implementing verification and compliance mechanism to ensure that the energy information of labeled products comply with the requirements of their labels. CNIS is doing so by organizing check testing on a random basis for room air-conditioners, refrigerators, motors, heaters, computer displays, ovens, and self -ballasted lamps. The purpose of the check testing is to understand the implementation of the Chinese labeling scheme and help local authorities establishing effective compliance mechanisms. In addition, to ensure robustness and consistency of testing results, CNIS has coordinated a round robin testing for room air conditioners. Eight laboratories (Chinese (6), Australian (1) and Japanese (1)) have been involved in the round robin testing and tests were performed on four sets of samples selected from manufacturer?s production line. This paper describes the methodology used in undertaking both check and round robin testing, provides analysis of testing results and reports on the findings. The analysis of both check and round robin testing demonstrated the benefits of a regularized verification and monitoring system for both laboratories and products such as (i) identifying the possible deviations between laboratories to correct them, (ii) improving the quality of testing facilities, (iii) ensuring the accuracy and reliability of energy label information in order to strength the social credibility of the labeling program and the enforcement mechanism in place.

  19. Free and Reduced-Price Meal Application and Income Verification Practices in School Nutrition Programs in the United States

    Science.gov (United States)

    Kwon, Junehee; Lee, Yee Ming; Park, Eunhye; Wang, Yujia; Rushing, Keith

    2017-01-01

    Purpose/Objectives: This study assessed current practices and attitudes of school nutrition program (SNP) management staff regarding free and reduced-price (F-RP) meal application and verification in SNPs. Methods: Stratified, randomly selected 1,500 SNP management staff in 14 states received a link to an online questionnaire and/or a printed…

  20. Development of verification program for safety evaluation of KNGR on-site and off-site power system design

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kem Joong; Ryu, Eun Sook; Choi, Jang Hong; Lee, Byung Il; Han, Hyun Kyu; Oh, Seong Kyun; Kim, Han Kee; Park, Chul Woo; Kim, Min Jeong [Chungnam National Univ., Taejon (Korea, Republic of)

    2001-04-15

    In order to verify the adequacy of the design and analysis of the on-site and off-site power system, we developed the regulatory analysis program. We established the methodology for electric power system and constructed the algorithm of steady-state load flow analysis, fault analysis, transient stability analysis. The developed program to be an advantage of GUI and C++ programming technique. The design of input made easy to access the common use PSS/E format and that of output made users to work with Excel spreadsheet. The performance of program was verified to compare with PSS/E results. The case studies as follows. The verification of load flow analysis of KNGR on-site power system. The evaluation of load flow and transient stability analysis of off-site power system of KNGR. The verification of load flow and transient stability analysis. The frequency drop analysis of loss of generation.

  1. TFEB and TFE3: Linking Lysosomes to Cellular Adaptation to Stress.

    Science.gov (United States)

    Raben, Nina; Puertollano, Rosa

    2016-10-06

    In recent years, our vision of lysosomes has drastically changed. Formerly considered to be mere degradative compartments, they are now recognized as key players in many cellular processes. The ability of lysosomes to respond to different stimuli revealed a complex and coordinated regulation of lysosomal gene expression. This review discusses the participation of the transcription factors TFEB and TFE3 in the regulation of lysosomal function and biogenesis, as well as the role of the lysosomal pathway in cellular adaptation to a variety of stress conditions, including nutrient deprivation, mitochondrial dysfunction, protein misfolding, and pathogen infection. We also describe how cancer cells make use of TFEB and TFE3 to promote their own survival and highlight the potential of these transcription factors as therapeutic targets for the treatment of neurological and lysosomal diseases.

  2. TFE3 Alleviates Hepatic Steatosis through Autophagy-Induced Lipophagy and PGC1α-Mediated Fatty Acid β-Oxidation

    Directory of Open Access Journals (Sweden)

    Jie Xiong

    2016-03-01

    Full Text Available Autophagy flux deficiency is closely related to the development of hepatic steatosis. Transcription factor E3 (TFE3 is reported to be a crucial gene that regulates autophagy flux and lysosome function. Therefore, we investigated the role of TFE3 in a cell model of hepatic steatosis. We constructed L02 hepatocyte lines that stably over-expressed or knocked down the expression of TFE3. Subsequently, the effects of TFE3 on hepatocellular lipid metabolism were determined by autophagy flux assay, lipid oil red O (ORO staining, immunofluorescence staining, and mitochondrial β-oxidation assessment. Finally, we analyzed whether peroxisome proliferative activated receptor gamma coactivator 1α (PGC1α was the potential target gene of TFE3 in the regulation of hepatic steatosis using a chromatin immunoprecipitation (CHIP assay and a luciferase reporter system. We found that overexpression of TFE3 markedly alleviated hepatocellular steatosis. On the contrary, downregulation of TFE3 resulted in an aggravated steatosis. The mechanistic studies revealed that the TFE3-manipulated regulatory effects on hepatocellular steatosis are dependent on autophagy-induced lipophagy and PGC1α-mediated fatty acid β-oxidation because blocking these pathways with an Atg5 small interfering RNA (siRNA or PGC1α siRNA dramatically blunted the TFE3-mediated regulation of steatosis. In conclusion, TFE3 gene provides a novel insight into the treatment of hepatic steatosis and other metabolic disease.

  3. Development, Verification and Validation of Parallel, Scalable Volume of Fluid CFD Program for Propulsion Applications

    Science.gov (United States)

    West, Jeff; Yang, H. Q.

    2014-01-01

    There are many instances involving liquid/gas interfaces and their dynamics in the design of liquid engine powered rockets such as the Space Launch System (SLS). Some examples of these applications are: Propellant tank draining and slosh, subcritical condition injector analysis for gas generators, preburners and thrust chambers, water deluge mitigation for launch induced environments and even solid rocket motor liquid slag dynamics. Commercially available CFD programs simulating gas/liquid interfaces using the Volume of Fluid approach are currently limited in their parallel scalability. In 2010 for instance, an internal NASA/MSFC review of three commercial tools revealed that parallel scalability was seriously compromised at 8 cpus and no additional speedup was possible after 32 cpus. Other non-interface CFD applications at the time were demonstrating useful parallel scalability up to 4,096 processors or more. Based on this review, NASA/MSFC initiated an effort to implement a Volume of Fluid implementation within the unstructured mesh, pressure-based algorithm CFD program, Loci-STREAM. After verification was achieved by comparing results to the commercial CFD program CFD-Ace+, and validation by direct comparison with data, Loci-STREAM-VoF is now the production CFD tool for propellant slosh force and slosh damping rate simulations at NASA/MSFC. On these applications, good parallel scalability has been demonstrated for problems sizes of tens of millions of cells and thousands of cpu cores. Ongoing efforts are focused on the application of Loci-STREAM-VoF to predict the transient flow patterns of water on the SLS Mobile Launch Platform in order to support the phasing of water for launch environment mitigation so that vehicle determinantal effects are not realized.

  4. Energy Star Lighting Verification Program (Program for the Evaluation and Analysis of Residential Lighting)

    Energy Technology Data Exchange (ETDEWEB)

    Conan O' Rourke; Yutao Zhou

    2006-03-01

    The Program for the Evaluation and Analysis of Residential Lighting (PEARL) is a watchdog program. It was created in response to complaints received by utility program managers about the performance of certain Energy Star lighting products being promoted within their service territories and the lack of a self-policing mechanism within the lighting industry that would ensure the reliability of these products and their compliance with ENERGY STAR specifications. To remedy these problems, PEARL purchases and tests products that are available to the consumers in the marketplace. The Lighting Research Center (LRC) tests the selected products against the corresponding Energy Star specifications. This report includes the experimental procedure and data results of Cycle Three of PEARL program during the period of October 2002 to April 2003, along with the description of apparatus used, equipment calibration process, experimental methodology, and research findings from the testing. The products tested are 20 models of screw-based compact fluorescent lamps (CFL) of various types and various wattages made or marketed by 12 different manufacturers, and ten models of residential lighting fixtures from eight different manufacturers.

  5. Energy Star Lighting Verification Program (Program for the Evaluation and Analysis of Residential Lighting)

    Energy Technology Data Exchange (ETDEWEB)

    Conan O' Rourke; Yutao Zhou

    2006-03-01

    The Program for the Evaluation and Analysis of Residential Lighting (PEARL) is a watchdog program. It was created in response to complaints received by utility program managers about the performance of certain Energy Star lighting products being promoted within their service territories and the lack of a self-policing mechanism within the lighting industry that would ensure the reliability of these products and their compliance with ENERGY STAR specifications. To remedy these problems, PEARL purchases and tests products that are available to the consumers in the marketplace. The Lighting Research Center (LRC) tests the selected products against the corresponding Energy Star specifications. This report includes the experimental procedure and data results of Cycle Four and Cycle Five of PEARL program during the period of October 2003 to April 2004, along with the description of apparatus used, equipment calibration process, experimental methodology, and research findings from the testing. The parameter tested for Cycle Four is lumen maintenance at 40% rated life, and parameters tested for Cycle Five are all parameters required in Energy Star specifications except lumen maintenance at 40% rated life.

  6. Energy Star Lighting Verification Program (Program for the Evaluation and Analysis of Residential Lighting)

    Energy Technology Data Exchange (ETDEWEB)

    Conan O' Rourke; Yutao Zhou

    2006-03-01

    The Program for the Evaluation and Analysis of Residential Lighting (PEARL) is a watchdog program. It was created in response to complaints received by utility program managers about the performance of certain Energy Star lighting products being promoted within their service territories and the lack of a self-policing mechanism within the lighting industry that would ensure the reliability of these products and their compliance with ENERGY STAR specifications. To remedy these problems, PEARL purchases and tests products that are available to the consumers in the marketplace. The Lighting Research Center (LRC) tests the selected products against the corresponding Energy Star specifications. This report includes the experimental procedure and data results of Cycle Three and Cycle Four of PEARL program during the period of April 2003 to October 2003, along with the description of apparatus used, equipment calibration process, experimental methodology, and research findings from the testing. The parameter tested for Cycle three is lumen maintenance at 40% rated life, and parameters tested for Cycle Four are all parameters required in Energy Star specifications except lumen maintenance at 40% rated life.

  7. Baghouse filtration products verification

    Energy Technology Data Exchange (ETDEWEB)

    Mycock, J.C.; Turner, J.H.; VanOsdell, D.W.; Farmer, J.R.; Brna, T.G.

    1998-11-01

    The paper introduces EPA`s Air Pollution Control Technology Verification (APCT) program and then focuses on the immediate objective of the program: laboratory performance verification of cleanable filter media intended for the control of fine particulate emissions. Data collected during the laboratory verification testing, which simulates operation in full-scale fabric filters, will be used to show expected performance for collection of particles {le} 2.5 micrometers in diameter.

  8. Verification of Numerical Programs: From Real Numbers to Floating Point Numbers

    Science.gov (United States)

    Goodloe, Alwyn E.; Munoz, Cesar; Kirchner, Florent; Correnson, Loiec

    2013-01-01

    Numerical algorithms lie at the heart of many safety-critical aerospace systems. The complexity and hybrid nature of these systems often requires the use of interactive theorem provers to verify that these algorithms are logically correct. Usually, proofs involving numerical computations are conducted in the infinitely precise realm of the field of real numbers. However, numerical computations in these algorithms are often implemented using floating point numbers. The use of a finite representation of real numbers introduces uncertainties as to whether the properties veri ed in the theoretical setting hold in practice. This short paper describes work in progress aimed at addressing these concerns. Given a formally proven algorithm, written in the Program Verification System (PVS), the Frama-C suite of tools is used to identify sufficient conditions and verify that under such conditions the rounding errors arising in a C implementation of the algorithm do not affect its correctness. The technique is illustrated using an algorithm for detecting loss of separation among aircraft.

  9. Review of Evaluation, Measurement and Verification Approaches Used to Estimate the Load Impacts and Effectiveness of Energy Efficiency Programs

    Energy Technology Data Exchange (ETDEWEB)

    Messenger, Mike; Bharvirkar, Ranjit; Golemboski, Bill; Goldman, Charles A.; Schiller, Steven R.

    2010-04-14

    Public and private funding for end-use energy efficiency actions is expected to increase significantly in the United States over the next decade. For example, Barbose et al (2009) estimate that spending on ratepayer-funded energy efficiency programs in the U.S. could increase from $3.1 billion in 2008 to $7.5 and 12.4 billion by 2020 under their medium and high scenarios. This increase in spending could yield annual electric energy savings ranging from 0.58% - 0.93% of total U.S. retail sales in 2020, up from 0.34% of retail sales in 2008. Interest in and support for energy efficiency has broadened among national and state policymakers. Prominent examples include {approx}$18 billion in new funding for energy efficiency programs (e.g., State Energy Program, Weatherization, and Energy Efficiency and Conservation Block Grants) in the 2009 American Recovery and Reinvestment Act (ARRA). Increased funding for energy efficiency should result in more benefits as well as more scrutiny of these results. As energy efficiency becomes a more prominent component of the U.S. national energy strategy and policies, assessing the effectiveness and energy saving impacts of energy efficiency programs is likely to become increasingly important for policymakers and private and public funders of efficiency actions. Thus, it is critical that evaluation, measurement, and verification (EM&V) is carried out effectively and efficiently, which implies that: (1) Effective program evaluation, measurement, and verification (EM&V) methodologies and tools are available to key stakeholders (e.g., regulatory agencies, program administrators, consumers, and evaluation consultants); and (2) Capacity (people and infrastructure resources) is available to conduct EM&V activities and report results in ways that support program improvement and provide data that reliably compares achieved results against goals and similar programs in other jurisdictions (benchmarking). The National Action Plan for Energy

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP), FINAL TECHNOLOGY APPLICATIONS GROUP TAGNITE--TESTING AND QUALITY ASSURANCE PLAN (T/QAP)

    Science.gov (United States)

    The overall objective of the Environmental Testing and Verification Coatings and Coating Equipment Program is to verify pollution prevention and performance characteristics of coating technologies and make the results of the testing available to prospective coating technology use...

  11. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  12. Verification Process of Behavioral Consistency between Design and Implementation programs of pSET using HW-CBMC

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Ah; Lee, Jong Hoon; Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of)

    2011-05-15

    Controllers in safety critical systems such as nuclear power plants often use Function Block Diagrams (FBDs) to design embedded software. The design is implemented using programming languages such as C to compile it into particular target hardware. The implementation must have the same behavior with the design and the behavior should be verified explicitly. For example, the pSET (POSAFE-Q Software Engineering Tool) is a loader software to program POSAFE-Q PLC (Programmable Logic Controller) and is developed as a part of the KNICS (Korea Nuclear Instrumentation and Control System R and D Center) project. It uses FBDs to design software of PLC, and generates ANSI-C code to compile it into specific machine code. To verify the equivalence between the FBDs and ANSI-C code, mathematical proof of code generator or a verification tools such as RETRANS can help guarantee the equivalence. Mathematical proof, however, has a weakness that requires high expenditure and repetitive fulfillment whenever the translator is modified. On the other hand, RETRANS reconstructs the generated source code without consideration of the generator. It has also a weakness that the reconstruction of generated code needs additional analysis This paper introduces verification process of behavioral consistency between design and its implementation of the pSET using the HW-CBMC. The HW-CBMC is a formal verification tool, verifying equivalence between hardware and software description. It requires two inputs for checking equivalence, Verilog for hard-ware and ANSI-C for software. In this approach, FBDs are translated into semantically equivalent Verilog pro-gram, and the HW-CBMC verifies equivalence between the Verilog program and the ANSI-C program which is generated from the FBDs

  13. Verification of data files of TREF-computer program; TREF-ohjelmiston ohjaustiedostojen soveltuvuustutkimus

    Energy Technology Data Exchange (ETDEWEB)

    Ruottu, S.; Halme, A.; Ruottu, A. [Einco Oy, Karhula (Finland)

    1996-12-01

    Originally the aim of Y43 project was to verify TREF data files for several different processes. However, it appeared that deficient or missing coordination between experimental and theoretical works made meaningful verifications impossible in some cases. Therefore verification calculations were focused on catalytic cracking reactor which was developed by Neste. The studied reactor consisted of prefluidisation and reaction zones. Verification calculations concentrated mainly on physical phenomena like vaporization near oil injection zone. The main steps of the cracking process can be described as follows oil (liquid) -> oil (gas) -> oil (catal) -> product (catal) + char (catal) -> product (gas). Catalytic nature of cracking reaction was accounted by defining the cracking pseudoreaction into catalyst phase. This simplified reaction model was valid only for vaporization zone. Applied fluid dynamic theory was based on the results of EINCO`s earlier LIEKKI-projects. (author)

  14. Test tasks for verification of program codes for calculation of neutron-physical characteristics of the BN series reactors

    Science.gov (United States)

    Tikhomirov, Georgy; Ternovikh, Mikhail; Smirnov, Anton; Saldikov, Ivan; Bahdanovich, Rynat; Gerasimov, Alexander

    2017-09-01

    System of test tasks is presented with the fast reactor BN-1200 with nitride fuel as prototype. The system of test tasks includes three test based on different geometric models. Model of fuel element in homogeneous and in heterogeneous form, model of fuel assembly in height-heterogeneous and full heterogeneous form, and modeling of the active core of BN-1200 reactor. Cross-verification of program codes was performed. Transition from simple geometry to more complex one allows to identify the causes of discrepancies in the results during the early stage of cross-verification of codes. This system of tests can be applied for certification of engineering programs based on the method of Monte Carlo to the calculation of full-scale models of the reactor core of the BN series. The developed tasks take into account the basic layout and structural features of the reactor BN-1200. They are intended for study of neutron-physical characteristics, estimation of influence of heterogeneous structure and influence of diffusion approximation. The development of system of test tasks allowed to perform independent testing of programs for calculation of neutron-physical characteristics: engineering programs JARFR and TRIGEX, and codes MCU, TDMCC, and MMK based on the method of Monte Carlo.

  15. Transformation capacities of the papillary renal cell carcinoma-associated PRCCTFE3 and TFE3PRCC fusion genes

    NARCIS (Netherlands)

    Weterman, M. A.; van Groningen, J. J.; den Hartog, A.; Geurts van Kessel, A.

    2001-01-01

    A recurrent chromosomal abnormality associated with a subset of papillary renal cell carcinomas is t(X;1)(p11;q21). This translocation leads to the formation of two fusion genes, TFE3PRCC and the reciprocal product PRCCTFE3. Both fusion genes are expressed in t(X;1)-positive renal cell carcinomas

  16. Transit Reliability Information Program : Reliability Verification Demonstration Plan for Rapid Rail Vehicles

    Science.gov (United States)

    1981-08-01

    The Transit Reliability Information Program (TRIP) is a government-initiated program to assist the transit industry in satisfying its need for transit reliability information. TRIP provides this assistance through the operation of a national Data Ban...

  17. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Opportunities JACS CME CME State Requirements Contact Accreditation, Verification, and Validation Accreditation, Verification, and Validation Programs Accreditation, Verification, and ...

  18. Performance characteristics of an independent dose verification program for helical tomotherapy

    Directory of Open Access Journals (Sweden)

    Isaac C. F. Chang

    2017-01-01

    Full Text Available Helical tomotherapy with its advanced method of intensity-modulated radiation therapy delivery has been used clinically for over 20 years. The standard delivery quality assurance procedure to measure the accuracy of delivered radiation dose from each treatment plan to a phantom is time-consuming. RadCalc®, a radiotherapy dose verification software, has released specifically for beta testing a module for tomotherapy plan dose calculations. RadCalc®'s accuracy for tomotherapy dose calculations was evaluated through examination of point doses in ten lung and ten prostate clinical plans. Doses calculated by the TomoHDA™ tomotherapy treatment planning system were used as the baseline. For lung cases, RadCalc® overestimated point doses in the lung by an average of 13%. Doses within the spinal cord and esophagus were overestimated by 10%. Prostate plans showed better agreement, with overestimations of 6% in the prostate, bladder, and rectum. The systematic overestimation likely resulted from limitations of the pencil beam dose calculation algorithm implemented by RadCalc®. Limitations were more severe in areas of greater inhomogeneity and less prominent in regions of homogeneity with densities closer to 1 g/cm3. Recommendations for RadCalc® dose calculation algorithms and anatomical representation were provided based on the results of the study.

  19. Renal cell carcinoma associated with Xp11.2 translocation/TFE gene fusion: imaging findings in 21 patients

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Xiao; Zhou, Hao; Duan, Na; Liu, Yongkang; Wang, Zhongqiu [Affiliated Hospital of Nanjing University of Chinese Medicine, Department of Radiology, Nanjing (China); Zhu, Qingqiang [Medical School of Yangzhou University, Department of Medical Imaging, Subei People' s Hospital, Yangzhou (China); Li, Baoxin [Gulou Hospital, Department of Radiology, Nanjing (China); Cui, Wenjing [Affiliated Hospital of Nanjing University of Chinese Medicine, Department of Radiology, Nanjing (China); Nanjing University Medical School, Department of Radiology, Jinling Hospital, Nanjing (China); Kundra, Vikas [The University of Texas, M.D. Anderson Cancer Center, Department of Radiology, Houston, TX (United States)

    2017-02-15

    To characterize imaging features of renal cell carcinoma (RCC) associated with Xp11.2 translocation/TFE gene fusion. Twenty-one patients with Xp11.2/TFE RCC were retrospectively evaluated. Tumour location, size, density, cystic or solid appearance, calcification, capsule sign, enhancement pattern and metastases were assessed. Fourteen women and seven men were identified with 12 being 25 years old or younger. Tumours were solitary and cystic-solid (76.2 %) masses with a capsule (76.2 %); 90.5 % were located in the medulla. Calcifications and lymph node metastases were each observed in 24 %. On unenhanced CT, tumour attenuation was greater than in normal renal parenchyma (85.7 %). Tumour enhancement was less than in normal renal cortex on all enhanced phases, greater than in normal renal medulla on cortical and medullary phases, but less than in normal renal medulla on delayed phase. On MR, the tumours were isointense on T1WI, heterogeneously hypointense on T2WI and slightly hyperintense on diffusion-weighted imaging. Xp11.2/TFE RCC usually occurs in young women. It is a cystic-solid, hyperdense mass with a capsule. It arises from the renal medulla with enhancement less than in the cortex but greater than in the medulla in all phases except the delayed phase, when it is lower than in the medulla. (orig.)

  20. Automated generation of program translation and verification tools using annotated grammars

    NARCIS (Netherlands)

    D. Ordonez Camacho (Diego); K. Mens; M.G.J. van den Brand (Mark); J.J. Vinju (Jurgen)

    2010-01-01

    htmlabstractAutomatically generating program translators from source and target language specifications is a non-trivial problem. In this paper we focus on the problem of automating the process of building translators between operations languages, a family of DSLs used to program satellite

  1. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  2. State-of-the-art report for the testing and formal verification methods for FBD program

    Energy Technology Data Exchange (ETDEWEB)

    Jee, Eun Kyoung [KAIST, Daejeon (Korea, Republic of); Lee, Jang Soo; Lee, Young Jun [KAERI, Daejeon (Korea, Republic of); Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of)

    2011-10-15

    The importance of PLC testing has increased in the nuclear I and C domain. While regulation authorities require both functional and structural testing for safety system software, FBD testing relies only on functional testing and there has been little research on structural testing techniques for FBD programs. We aim to analyze current techniques related to FBD testing and develop a structural testing technique appropriate to FBD programs. We developed structural test coverage criteria applicable to FBD programs, focusing on data paths from input edges to output edges of FBD programs. A data path condition (DPC), under which input data can flow into the output edge, is defined for each data path. We defined basic coverage, input condition coverage and complex condition coverage criteria based on the formal definition of DPC. We also developed a measurement procedure for FBD testing adequacy and a supporting tool prototype

  3. Program Verification with Monadic Second-Order Logic & Languages for Web Service Development

    DEFF Research Database (Denmark)

    Møller, Anders

    , such as maintaining session state and dynamically producing HTML or XML documents. By introducing explicit language-based mechanisms for those issues, we liberate the Web service programmer from the tedious and error-prone alternatives. Specialized program analyses aid the programmer by verifying at compile time......, and syntax-level macros for making additional language extensions. In its newest version, the programming language is designed as an extension of Java. To describe classes of XML documents, we introduce a novel XML schema language aiming to both simplify and generalize existing proposals. All parts...

  4. 76 FR 50129 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing...

    Science.gov (United States)

    2011-08-12

    ..., disproportionately high and adverse human health or environmental effects of their programs, policies, and activities... rule will not have disproportionately high and adverse human health or environmental effects on... October 11, 2011. List of Subjects in 40 CFR Part 75 Environmental protection, Acid rain, Administrative...

  5. SPACE-R Thermionic Space Nuclear Power System: Design and Technology Demonstration Program. Semiannual technical progress report for period ending March 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This Semiannual Technical Progress Report summarizes the technical progress and accomplishments for the Thermionic Space Nuclear Power System (TI-SNPS) Design and Technology Demonstration Program of the Prime Contractor, Space Power Incorporated (SPI), its subcontractors and supporting National Laboratories during the first half of the Government Fiscal Year (GFY) 1993. SPI`s subcontractors and supporting National Laboratories include: Babcock & Wilcox for the reactor core and externals; Space Systems/Loral for the spacecraft integration; Thermocore for the radiator heat pipes and the heat exchanger; INERTEK of CIS for the TFE, core elements and nuclear tests; Argonne National Laboratories for nuclear safety, physics and control verification; and Oak Ridge National laboratories for materials testing. Parametric trade studies are near completion. However, technical input from INERTEK has yet to be provided to determine some of the baseline design configurations. The INERTEK subcontract is expected to be initiated soon. The Point Design task has been initiated. The thermionic fuel element (TFE) is undergoing several design iterations. The reactor core vessel analysis and design has also been started.

  6. Health checkup and telemedical intervention program for preventive medicine in developing countries: verification study.

    Science.gov (United States)

    Nohara, Yasunobu; Kai, Eiko; Ghosh, Partha Pratim; Islam, Rafiqul; Ahmed, Ashir; Kuroda, Masahiro; Inoue, Sozo; Hiramatsu, Tatsuo; Kimura, Michio; Shimizu, Shuji; Kobayashi, Kunihisa; Baba, Yukino; Kashima, Hisashi; Tsuda, Koji; Sugiyama, Masashi; Blondel, Mathieu; Ueda, Naonori; Kitsuregawa, Masaru; Nakashima, Naoki

    2015-01-28

    The prevalence of non-communicable diseases is increasing throughout the world, including developing countries. The intent was to conduct a study of a preventive medical service in a developing country, combining eHealth checkups and teleconsultation as well as assess stratification rules and the short-term effects of intervention. We developed an eHealth system that comprises a set of sensor devices in an attaché case, a data transmission system linked to a mobile network, and a data management application. We provided eHealth checkups for the populations of five villages and the employees of five factories/offices in Bangladesh. Individual health condition was automatically categorized into four grades based on international diagnostic standards: green (healthy), yellow (caution), orange (affected), and red (emergent). We provided teleconsultation for orange- and red-grade subjects and we provided teleprescription for these subjects as required. The first checkup was provided to 16,741 subjects. After one year, 2361 subjects participated in the second checkup and the systolic blood pressure of these subjects was significantly decreased from an average of 121 mmHg to an average of 116 mmHg (Plearning technique (random forest method) using the medical interview, subject profiles, and checkup results as predictor to avoid costly measurements of blood sugar, to ensure sustainability of the program in developing countries. The results of this study demonstrate the benefits of an eHealth checkup and teleconsultation program as an effective health care system in developing countries.

  7. Space Shuttle Crawler Transporter Vibration Analysis in Support of Rollout Fatigue Load Spectra Verification Program

    Science.gov (United States)

    Margasahayam, Ravi N.; Meyer, Karl A.; Nerolich, Shaun M.; Burton, Roy C.; Gosselin, Armand M.

    2004-01-01

    The Crawler Transporter (CT), designed and built for the Apollo Program in the 1960's and surpassing its initial operational life, has become an integral part of the Space Shuttle Program (SSP). The CT transports the Space Shuttle Vehicle (SSV) stack, atop the Mobile Launch Platform (MLP), from the Vehicle Assembly Building (VAB) to the launch pad. This support structure provides hydraulic jacking, leveling and load equalization for the 12 million pound stack on its 3.5-5.0 mile rollout to the launch pad. Major elements of the SSV, consisting of the orbiter, solid rocket boosters (SRB) and external tank (ET) have required fatigue analyses as part of the mission life certification. Compared to rollout vibration, the SSV sees relatively high vibration loads during launch, ascent, descent and landing phases of the mission. Although preliminary measured SRB vibration levels during rollout were of low amplitude and frequency, the duration of the rollout phase is typically high, from 5-6 hours. As part of an expanded mission life assessment, additional certification effort was initiated to define fatigue load spectra for rollout. This study addresses the CT vibration analyses in support of the rollout fatigue study. Structural models developed for modal and vibration analyses were used to identify unique CT, CT/MLP and CT/MLP/SRB vibration characteristics for comparison to instrumented rollout tests. Whereas the main structural and vibration characteristics of the SSV are well defined, minimum analytical and vibration test data on the Crawler Transporter were available. Unique vibration characteristics of the CT are attributable to the drive mechanism, hydraulic jacking system, structural framing and the CT-to-MLP support pad restraints. Initial tests performed on the CT/MLP/SRB configuration showed reasonable correlation with predicted mode shapes and frequencies.

  8. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  9. Xp11 neoplasm with melanocytic differentiation of the prostate harbouring the novel NONO-TFE3 gene fusion: report of a unique case expanding the gene fusion spectrum.

    Science.gov (United States)

    Wang, Xiao-Tong; Xia, Qiu-Yuan; Ni, Hao; Wang, Zi-Yu; Ye, Sheng-Bing; Li, Rui; Wang, Xuan; Lv, Jing-Huan; Shi, Shan-Shan; Ma, Heng-Hui; Lu, Zhen-Feng; Shen, Qin; Zhou, Xiao-Jun; Rao, Qiu

    2016-09-01

    Recently, an increasing number of TFE3 rearrangement-associated tumours have been reported, such as TFE3 rearrangement-associated perivascular epithelioid cell tumours (PEComas), melanotic Xp11 translocation renal cancers and melanotic Xp11 neoplasms. We have suggested that these tumours belong to a single clinicopathological spectrum. 'Xp11 neoplasm with melanocytic differentiation' or 'melanotic Xp11 neoplasm' have been proposed to designate this unique neoplasm. Herein, we describe the first case of an Xp11 neoplasm with melanocytic differentiation to be described in the prostate, bearing the novel NONO-TFE3 gene fusion. This study both adds to the spectrum regarding melanotic Xp11 neoplasms and expands its gene fusion spectrum. Moreover, we discuss the relationship of these rare tumours to neoplasms such as conventional PEComas, alveolar soft part sarcomas, malignant melanomas, clear cell sarcomas and Xp11 translocation renal cancers. © 2016 John Wiley & Sons Ltd.

  10. 38 CFR 74.1 - What definitions are important for VetBiz Vendor Information Pages (VIP) Verification Program?

    Science.gov (United States)

    2010-07-01

    ... precedent, conditions subsequent, executory agreements, voting trusts, restrictions on or assignments of voting rights, or other arrangements causing or potentially causing ownership benefits to go to another... accessed at no charge via the Internet at http://www.VetBiz.gov. Verification eligibility period is a 12...

  11. 38 CFR 74.12 - What must a concern submit to apply for VetBiz VIP Verification Program?

    Science.gov (United States)

    2010-07-01

    ... personal and business tax returns, payroll records and personal history statements. An applicant must also retain in the application file IRS Form 4506, Request for Copy or Transcript of Tax Form. These materials shall be filed together to maximize efficiency of verification examination visits. Together with the...

  12. Immunocytochemistry for SOX-11 and TFE3 as diagnostic markers for solid pseudopapillary neoplasms of the pancreas in FNA biopsies.

    Science.gov (United States)

    Foo, Wen-Chi; Harrison, Grant; Zhang, Xuefeng

    2017-11-01

    Solid pseudopapillary neoplasms (SPNs) of the pancreas are rare malignant tumors that can be sampled via endoscopic ultrasound-guided fine-needle aspiration (EUS-FNA). Although diagnosing SPNs can be straightforward in cases with a classic morphology and a typical immunoprofile, challenges can occur with morphologic variants or limited specimens. Recently, 2 immunohistochemical stains, SRY-related high-mobility group box 11 (SOX-11) and transcription factor E3 (TFE3), have been demonstrated to be highly sensitive and specific for SPNs in pancreatic resection specimens. The current study evaluates the diagnostic utility of these stains with EUS-FNA. Thirteen EUS-FNA specimens from SPNs with sufficient material for immunocytochemistry were identified from 2000 to 2016. These cases were compared with 13 EUS-FNA specimens of non-SPN pancreatic neoplasms. Immunocytochemistry for SOX-11, TFE3, and β-catenin was performed on all cell blocks and then was scored independently by 2 pathologists in a masked manner. Nuclear reactivity for SOX-11 was detected in 13 of 13 SPNs and in 0 of 13 non-SPNs; this resulted in sensitivity and specificity values of 100%, a positive predictive value (PPV) of 1, and a negative predictive value (NPV) of 1. Nuclear reactivity for TFE3 was detected in 9 of 13 SPNs and in 0 of 13 non-SPNs; this resulted in a sensitivity of 69.2%, a specificity of 100%, a PPV of 1, and an NPV of 0.765. Nuclear reactivity for β-catenin was detected in 13 of 13 SPNs and in 1 of 13 non-SPNs; this resulted in a sensitivity of 100%, a specificity of 92.3%, a PPV of 0.929, and an NPV of 1. SOX-11 is a sensitive and specific immunocytochemical stain for SPNs in EUS-FNA specimens, and it may be useful as a diagnostic marker for distinguishing SPNs from its cytologic mimics. Cancer Cytopathol 2017;125:831-7. © 2017 American Cancer Society. © 2017 American Cancer Society.

  13. Renal Cell Carcinoma Associated with Xp11.2 Translocation/TFE3 Gene Fusion: A Rare Case Report with Review of the Literature

    Directory of Open Access Journals (Sweden)

    Puneet Ahluwalia

    2013-01-01

    Full Text Available Introduction. The recently recognized renal cell carcinomas associated with Xp11.2 translocations are rare tumors predominantly reported in children. Chromosome Xp11.2 translocation results in gene fusion related to transcription factor E3 (TFE3 that plays an important role in proliferation and survival. Case Report. Herein, we present two cases of a TFE3 translocation-associated RCC in young female adults, one detected incidentally and the other one presenting with gross hematuria. Tumor is characterized by immunohistochemistry and a literature review with optimal treatment regimen is presented. Discussion. Xp11.2 translocation RCCs in adult patients are associated with advanced stages, large tumors, and extracapsular disease and usually have an aggressive clinical course. Conclusion. In TFE3 RCC, the genetic background may not only contribute to tumorigenesis, but also determine the response to chemotherapy and targeted therapy. Therefore it is necessary to diagnose this tumor entity accurately. Because of the small number of TFE3 gene fusion-related renal tumors described in the literature, the exact biologic behavior and impact of current treatment modalities remain to be uncertain.

  14. Formal verification of mathematical software

    Science.gov (United States)

    Sutherland, D.

    1984-01-01

    Methods are investigated for formally specifying and verifying the correctness of mathematical software (software which uses floating point numbers and arithmetic). Previous work in the field was reviewed. A new model of floating point arithmetic called the asymptotic paradigm was developed and formalized. Two different conceptual approaches to program verification, the classical Verification Condition approach and the more recently developed Programming Logic approach, were adapted to use the asymptotic paradigm. These approaches were then used to verify several programs; the programs chosen were simplified versions of actual mathematical software.

  15. Environmental Technology Verification Report -- Baghouse filtration products, GE Energy QG061 filtration media ( tested May 2007)

    Science.gov (United States)

    EPA has created the Environmental Technology Verification Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The Air Pollution Control Technology Verification Center, a cente...

  16. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    VERIFICATION GAMES : CROWD-SOURCED FORMAL VERIFICATION UNIVERSITY OF WASHINGTON MARCH 2016 FINAL TECHNICAL REPORT...DATES COVERED (From - To) JUN 2012 – SEP 2015 4. TITLE AND SUBTITLE VERIFICATION GAMES : CROWD-SOURCED FORMAL VERIFICATION 5a. CONTRACT NUMBER FA8750...clarification memorandum dated 16 Jan 09. 13. SUPPLEMENTARY NOTES 14. ABSTRACT Over the more than three years of the project Verification Games : Crowd-sourced

  17. Optimized periodic verification testing blended risk and performance-based MOV inservice test program an application of ASME code case OMN-1

    Energy Technology Data Exchange (ETDEWEB)

    Sellers, C.; Fleming, K.; Bidwell, D.; Forbes, P. [and others

    1996-12-01

    This paper presents an application of ASME Code Case OMN-1 to the GL 89-10 Program at the South Texas Project Electric Generating Station (STPEGS). Code Case OMN-1 provides guidance for a performance-based MOV inservice test program that can be used for periodic verification testing and allows consideration of risk insights. Blended probabilistic and deterministic evaluation techniques were used to establish inservice test strategies including both test methods and test frequency. Described in the paper are the methods and criteria for establishing MOV safety significance based on the STPEGS probabilistic safety assessment, deterministic considerations of MOV performance characteristics and performance margins, the expert panel evaluation process, and the development of inservice test strategies. Test strategies include a mix of dynamic and static testing as well as MOV exercising.

  18. PROCEED and Crowd-sourced Formal Verification

    Science.gov (United States)

    2011-11-07

    VA November 7, 2011 PROCEED and Crowd-sourced Formal Verification Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting...TITLE AND SUBTITLE PROCEED and Crowd-sourced Formal Verification 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d... Formal Verification (CSFV) Approved for Public Release, Distribution Unlimited. The Problem Application specific functions Are there fundamental

  19. Independent verification of the units of monitor for program diamond rapidarc treatments; Verificacion independiente de las unidades de monitor para tratamientos de rapidac con el programa Diamon. Consideraciones paracticas

    Energy Technology Data Exchange (ETDEWEB)

    Lliso Valverde, F.; Carmona Mesenguer, V.; Gimeno Olmos, J.; Garcia Martinez, T.; Pujades Claumarchiran, M. C.; Palomo Llinares, R.; Ballester Pallares, F.; Perez-Calatayud, J.

    2013-07-01

    The Diamond program is a useful tool that allows you to have a secondary verification of the calculations of the SP in complex treatments. the purpose of this paper is to describe the findings and practical aspects of our experience with the use of Diamond treatment with Rapid Arc (RA). (Author)

  20. Temsirolimus in the treatment of renal cell carcinoma associated with Xp11.2 translocation/TFE gene fusion proteins: a case report and review of literature

    Directory of Open Access Journals (Sweden)

    James Brown

    2009-12-01

    Full Text Available Xp11.2 translocation renal cell carcinomas (TRCCs are a rare family of tumors newly recognized by the World Health Organization (WHO in 2004. These tumors result in the fusion of partner genes to the TFE3 gene located on Xp11.2. They are most common in the pediatric population, but have been recently implicated in adult renal cell carcinoma (RCC presenting at an early age. TFE3-mediated direct transcriptional upregulation of the Met tyrosine kinase receptor triggers dramatic activation of downstream signaling pathways including the protein kinase B (Akt/phosphatidylinositol-3 kinase (PI3K and mammalian target of rapamycin (mTOR pathways. Temsirolimus is an inhibitor of mammalian target of rapamycin (mTOR kinase, a component of intracellular signaling pathways involved in the growth and proliferation of malignant cells. Here we present a case of a 22-year old female who has been treated with temsirolimus for her Xp11.2/TFE3 gene fusion RCC.

  1. Ultrasonographic Findings of Renal Cell Carcinomas Associated with Xp11.2 Translocation/TFE3 Gene Fusion

    Directory of Open Access Journals (Sweden)

    Wenwu Ling

    2017-01-01

    Full Text Available Objective. This study was to investigate the features of renal carcinomas associated with Xp11.2 translocations/TFE3 gene fusions (Xp11.2-RCC on conventional ultrasound (US and contrast-enhanced ultrasound (CEUS. Methods. US and CEUS features of twenty-two cases with histopathologically proven Xp11.2-RCC were retrospectively reviewed. Results. 22 patients (11 males, 11 females were included in this study, with a mean age of 28.3 ± 20.4 years. Eight tumors (36.3%, 8/22 were in left kidney, and 14 tumors (63.7%, 14/22 were in right kidney. All tumors (100%, 22/22 were mixed echogenicity type. 13 tumors (59.1%, 13/22 presented small dotted calcifications. The boundary of 14 tumors (63.6%, 14/22 was sharp and the other 8 tumors’ (36.4%, 8/22 boundary was blurry. By CEUS, in early phase, the solid element of all tumors showed obvious enhancement. In delayed phase, 13 tumors showed hypoenhancement, seven tumors showed isoenhancement, and 2 tumors showed hyperenhancement. There were irregular nonenhancement areas in all tumors inside. Conclusions. By US and CEUS, when children and adolescents were found to have hyperechoic mixed tumor in kidney with sharp margin and calcification, and the tumors showed obvious enhancement and hypoenhancement with irregular nonenhancement areas in the tumor in early phase and delayed phase, respectively, Xp11.2-RCC should be suspected.

  2. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  3. Complete Functional Verification

    OpenAIRE

    Bormann, Joerg (Dr.)

    2017-01-01

    The dissertation describes a practically proven, particularly efficient approach for the verification of digital circuit designs. The approach outperforms simulation based verification wrt. final circuit quality as well as wrt. required verification effort. In the dissertation, the paradigm of transaction based verification is ported from simulation to formal verification. One consequence is a particular format of formal properties, called operation properties. Circuit descriptions are verifi...

  4. The SeaHorn Verification Framework

    Science.gov (United States)

    Gurfinkel, Arie; Kahsai, Temesghen; Komuravelli, Anvesh; Navas, Jorge A.

    2015-01-01

    In this paper, we present SeaHorn, a software verification framework. The key distinguishing feature of SeaHorn is its modular design that separates the concerns of the syntax of the programming language, its operational semantics, and the verification semantics. SeaHorn encompasses several novelties: it (a) encodes verification conditions using an efficient yet precise inter-procedural technique, (b) provides flexibility in the verification semantics to allow different levels of precision, (c) leverages the state-of-the-art in software model checking and abstract interpretation for verification, and (d) uses Horn-clauses as an intermediate language to represent verification conditions which simplifies interfacing with multiple verification tools based on Horn-clauses. SeaHorn provides users with a powerful verification tool and researchers with an extensible and customizable framework for experimenting with new software verification techniques. The effectiveness and scalability of SeaHorn are demonstrated by an extensive experimental evaluation using benchmarks from SV-COMP 2015 and real avionics code.

  5. Standard Verification System Lite (SVS Lite)

    Data.gov (United States)

    Social Security Administration — SVS Lite is a mainframe program used exclusively by the Office of Child Support Enforcement (OCSE) to perform batch SSN verifications. This process is exactly the...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOLOG, INC., MICRO-FLO BLADDER PUMP MODEL 57400

    Science.gov (United States)

    The U.S. Environmental Protection Agency has created the Environmental Technology Verification Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the ETV Program...

  7. Kleene Algebra and Bytecode Verification

    Science.gov (United States)

    2016-04-27

    Bytecode 2005 Preliminary Version Kleene Algebra and Bytecode Verification Lucja Kot 1 Dexter Kozen 2 Department of Computer Science Cornell...first-order methods that inductively annotate program points with abstract values. In [6] we introduced a second-order approach based on Kleene algebra ...form a left-handed Kleene algebra . The dataflow labeling is not achieved by inductively labeling the program with abstract values, but rather by

  8. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  9. A rare case of TFE-related pigmented renal tumor with overlapping features between melanotic Xp11 translocation renal cancer and Xp11 renal cell carcinoma with melanotic features.

    Science.gov (United States)

    Cardili, Leonardo; Wrublevsky Pereira, Gregório; Viana, Cristiano Ribeiro

    2017-04-01

    In recent years, an increasing number of TFE3 rearrangement-associated tumors with melanotic features have been reported as primary neoplasm in different anatomical sites, including the kidney. Melanotic Xp11 translocation renal cancer (MXTRC) and Xp11 renal cell carcinoma with melanotic features (XRCCM) have been proposed to be main categories for pigmented lesions in the microophthalmia-associated transcription factor (MiTF/TFE3) family of renal tumors that may show variable degrees of melanocytic differentiation. Herein we report a rare case of TFE3-related pigmented renal tumor showing unusual immunoexpression of cytokeratins (AE1/AE3) and renal cell carcinoma markers (RCC, CD10). Cathepsin-K and Vimentin were diffusely positive whereas melanocytic markers (HMB-45 and Melan-A) displayed weak and patchy expression. We found no labelling for PAX-8, muscle markers (desmin, smooth muscle actin, muscle-specific actin and caldesmon) and S-100. TFE3 fusion was confirmed by break-apart fluorescence in situ hybridization (FISH). This case corroborates previous evidence for overlap in the TFE3-associated cancer family and illustrates that it may not be possible to set a clear cutoff between epithelial (XRCCM) and mesenchymal (MXTRC) subgroups. © 2017 Japanese Society of Pathology and John Wiley & Sons Australia, Ltd.

  10. Effectiveness of a pressurized stormwater filtration system in Green Bay, Wisconsin: a study for the environmental technology verification program of the U.S. Environmental Protection Agency

    Science.gov (United States)

    Horwatich, J.A.; Corsi, Steven R.; Bannerman, Roger T.

    2004-01-01

    A pressurized stormwater filtration system was installed in 1998 as a stormwater-treatment practice to treat runoff from a hospital rooftop and parking lot in Green Bay, Wisconsin. This type of filtration system has been installed in Florida citrus groves and sewage treatment plants around the United States; however, this installation is the first of its kind to be used to treat urban runoff and the first to be tested in Wisconsin. The U.S. Geological Survey (USGS) monitored the system between November 2000 and September 2002 to evaluate it as part of the U.S. Environmental Protection Agency's Environmental Technology Verification Program. Fifteen runoff events were monitored for flow and water quality at the inlet and outlet of the system, and comparison of the event mean concentrations and constituent loads was used to evaluate its effectiveness. Loads were decreased in all particulate-associated constituents monitored, including suspended solids (83 percent), suspended sediment (81 percent), total Kjeldahl nitrogen (26 percent), total phosphorus (54 percent), and total recoverable zinc (62 percent). Total dissolved solids, dissolved phosphorus, and nitrate plus nitrite loads remained similar or increased through the system. The increase in some constituents was most likely due to a ground-water contribution between runoff events. Sand/silt split analysis resulted in the median silt content of 78 percent at the inlet, 87 percent at the outlet, and 3 percent at the flow splitter.

  11. Verification of ceramic structures

    NARCIS (Netherlands)

    Behar-Lafenetre, S.; Cornillon, L.; Rancurel, M.; Graaf, D. de; Hartmann, P.; Coe, G.; Laine, B.

    2012-01-01

    In the framework of the "Mechanical Design and Verification Methodologies for Ceramic Structures" contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and

  12. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  13. Preparation of a program for the independent verification of the brachytherapy planning systems calculations; Confeccion de un programa para la verificacion independiente de los calculos de los sistemas de planificacion en braquiterapia

    Energy Technology Data Exchange (ETDEWEB)

    V Carmona, V.; Perez-Calatayud, J.; Lliso, F.; Richart Sancho, J.; Ballester, F.; Pujades-Claumarchirant, M.C.; Munoz, M.

    2010-07-01

    In this work a program is presented that independently checks for each patient the treatment planning system calculations in low dose rate, high dose rate and pulsed dose rate brachytherapy. The treatment planning system output text files are automatically loaded in this program in order to get the source coordinates, the desired calculation point coordinates and the dwell times when it is the case. The source strength and the reference dates are introduced by the user. The program allows implementing the recommendations about independent verification of the clinical brachytherapy dosimetry in a simple and accurate way, in few minutes. (Author).

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  15. Overview of Code Verification

    Science.gov (United States)

    1983-01-01

    The verified code for the SIFT Executive is not the code that executes on the SIFT system as delivered. The running versions of the SIFT Executive contain optimizations and special code relating to the messy interface to the hardware broadcast interface and to packing of data to conserve space in the store of the BDX930 processors. The running code was in fact developed prior to and without consideration of any mechanical verification. This was regarded as necessary experimentation with the SIFT hardware and special purpose Pascal compiler. The Pascal code sections cover: the selection of a schedule from the global executive broadcast, scheduling, dispatching, three way voting, and error reporting actions of the SIFT Executive. Not included in these sections of Pascal code are: the global executive, five way voting, clock synchronization, interactive consistency, low level broadcasting, and program loading, initialization, and schedule construction.

  16. Report of the subpanel on methods of verification

    Science.gov (United States)

    1982-01-01

    A program to improve the state of understanding and of the meaning of verification and the application of verification procedures to a variety of sensor systems is recommended. The program would involve an experimental hands-on data demonstration and evaluation of those procedures in a controlled test bed experiment.

  17. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  18. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT--BAGHOUSE FILTRATION PRODUCTS, DONALDSON COMPANY, INC., 6282 FILTRATION MEDIA

    Science.gov (United States)

    The Environmental Technology Verification (ETV) Program, established by the U.S. EPA, is designed to accelerate the developmentand commercialization of new or improved technologies through third-party verification and reporting of performance. The Air Pollution Control Technology...

  20. Environmental Technology Verification: Baghouse Filtration Products--Donaldson Co., Inc., Tetratec #6255-3 Filtration Media

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS--DONALDSON COMPANY, INC., TETRATEC #6255 FILTRATION MEDIA

    Science.gov (United States)

    The Environmental Technology Verification (ETV) Program, established by the U.S. EPA, is designed to accelerate the development and commercialization of new or improved technologies through third-party verification and reporting of performance. The Air Pollution Control Technolog...

  2. Environmental Technology Verification: Baghouse Filtration Products--TDC Filter Manufacturing, Inc., SB025 Filtration Media

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  3. Environmental Technology Verification: Baghouse Filtration Products--Sinoma Science & Technology Co. Ltd FT-806 Filtration Media

    Science.gov (United States)

    EPA created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. It seeks to achieve this goal by providing high-quality, peer r...

  4. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  5. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Accreditation Program Stereotactic Breast Biopsy Accreditation Program Cancer Programs Staff Information Children's Surgery Children's Surgery Children's Surgery Children's Surgery Verification ...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS—SOUTHERN FILTER MEDIA, LLC, PE-16/M-SPES FILTER SAMPLE

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The program tested the performance of baghouse filtrati...

  7. Replication and Abstraction: Symmetry in Automated Formal Verification

    Directory of Open Access Journals (Sweden)

    Thomas Wahl

    2010-04-01

    Full Text Available This article surveys fundamental and applied aspects of symmetry in system models, and of symmetry reduction methods used to counter state explosion in model checking, an automated formal verification technique. While covering the research field broadly, we particularly emphasize recent progress in applying the technique to realistic systems, including tools that promise to elevate the scope of symmetry reduction to large-scale program verification. The article targets researchers and engineers interested in formal verification of concurrent systems.

  8. Verification and validation plan for the SFR system analysis module

    Energy Technology Data Exchange (ETDEWEB)

    Hu, R. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2014-12-18

    This report documents the Verification and Validation (V&V) Plan for software verification and validation of the SFR System Analysis Module (SAM), developed at Argonne National Laboratory for sodium fast reactor whole-plant transient analysis. SAM is developed under the DOE NEAMS program and is part of the Reactor Product Line toolkit. The SAM code, the phenomena and computational models of interest, the software quality assurance, and the verification and validation requirements and plans are discussed in this report.

  9. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  10. Verification is experimentation!

    NARCIS (Netherlands)

    Brinksma, Hendrik

    2001-01-01

    The formal verification of concurrent systems is usually seen as an example par excellence of the application of mathematical methods to computer science. Although the practical application of such verification methods will always be limited by the underlying forms of combinatorial explosion, recent

  11. Verification Is Experimentation!

    NARCIS (Netherlands)

    Brinksma, Hendrik

    2000-01-01

    the formal verification of concurrent systems is usually seen as an example par excellence of the application of mathematical methods to computer science. although the practical application of such verification methods will always be limited by the underlying forms of combinatorial explosion, recent

  12. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available the performance of innovative environmental technologies can be verified by qualified third parties called "Verification Bodies". The "Statement of Verification" delivered at the end of the ETV process can be used as evidence that the claims made about...

  13. 24 CFR 960.259 - Family information and verification.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Family information and verification... information and verification. (a) Family obligation to supply information. (1) The family must supply any information that the PHA or HUD determines is necessary in administration of the public housing program...

  14. 25 CFR 39.405 - How will verifications be conducted?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How will verifications be conducted? 39.405 Section 39... EQUALIZATION PROGRAM Accountability § 39.405 How will verifications be conducted? The eligibility of every student shall be verified. The ELO will take a random sampling of five days with a minimum of one day per...

  15. Procedure-Modular Verification of Control Flow Safety Properties

    NARCIS (Netherlands)

    Soleimanifard, Siavash; Gurov, Dilian; Huisman, Marieke

    2010-01-01

    This paper describes a novel technique for fully automated procedure-modular verification of Java programs equipped with method-local and global assertions that specify safety properties of sequences of method invocations. Modularity of verification is achieved by relativizing the correctness of

  16. Student-Teacher Linkage Verification: Model Process and Recommendations

    Science.gov (United States)

    Watson, Jeffery; Graham, Matthew; Thorn, Christopher A.

    2012-01-01

    As momentum grows for tracking the role of individual educators in student performance, school districts across the country are implementing projects that involve linking teachers to their students. Programs that link teachers to student outcomes require a verification process for student-teacher linkages. Linkage verification improves accuracy by…

  17. Quantitative reactive modeling and verification.

    Science.gov (United States)

    Henzinger, Thomas A

    Formal verification aims to improve the quality of software by detecting errors before they do harm. At the basis of formal verification is the logical notion of correctness, which purports to capture whether or not a program behaves as desired. We suggest that the boolean partition of software into correct and incorrect programs falls short of the practical need to assess the behavior of software in a more nuanced fashion against multiple criteria. We therefore propose to introduce quantitative fitness measures for programs, specifically for measuring the function, performance, and robustness of reactive programs such as concurrent processes. This article describes the goals of the ERC Advanced Investigator Project QUAREM. The project aims to build and evaluate a theory of quantitative fitness measures for reactive models. Such a theory must strive to obtain quantitative generalizations of the paradigms that have been success stories in qualitative reactive modeling, such as compositionality, property-preserving abstraction and abstraction refinement, model checking, and synthesis. The theory will be evaluated not only in the context of software and hardware engineering, but also in the context of systems biology. In particular, we will use the quantitative reactive models and fitness measures developed in this project for testing hypotheses about the mechanisms behind data from biological experiments.

  18. Monitoring and verification R&D

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  19. Guidelines for Formal Verification Systems

    Science.gov (United States)

    1989-04-01

    This document explains the requirements for formal verification systems that are candidates for the NCSC’s Endorsed Tools List (ETL). This document...is primarily intended for developers of verification systems to use in the development of production-quality formal verification systems. It explains...the requirements and the process used to evaluate formal verification systems submitted to the NCSC for endorsement.

  20. Voltage verification unit

    Science.gov (United States)

    Martin, Edward J [Virginia Beach, VA

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  1. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  2. Task-specific style verification

    Science.gov (United States)

    Pataki, Norbert; Cséri, Tamás; Szügyi, Zalán

    2012-09-01

    Programming antipatterns are commonly used patterns that make the code unnecessary complex and unmaintainable. However, beginner programmers such as students, often use them. Usage of antipatterns should be eliminated from source code. Many antipatterns can be detected at compilation-time with an appropriate parser tool. In this paper we argue for a new lint-like tool that does detect typical programming antipatterns, and it is extensible to task-specific verifications. This tool mainly developed to evaluate students' programs, however it can be used in industrial projects as well. Our approach based on pattern matching on abstract syntax tree provided by Clang parser. We present our description language that specifies the antipatterns.

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION OF BAGHOUSE FILTRATION PRODUCTS

    Science.gov (United States)

    The Environmental Technology Verification Program (ETV) was started by EPA in 1995 to generate independent credible data on the performance of innovative technologies that have potential to improve protection of public health and the environment. ETV does not approve or certify p...

  4. A Verification Framework for Agent Communication

    NARCIS (Netherlands)

    Eijk, R.M. van; Boer, F.S. de; Hoek, W. van der; Meyer, J-J.Ch.

    2003-01-01

    In this paper, we introduce a verification method for the correctness of multiagent systems as described in the framework of acpl (Agent Communication Programming Language). The computational model of acpl consists of an integration of the two different paradigms of ccp (Concurrent Constraint

  5. Current status of verification practices in clinical biochemistry in Spain.

    Science.gov (United States)

    Gómez-Rioja, Rubén; Alvarez, Virtudes; Ventura, Montserrat; Alsina, M Jesús; Barba, Núria; Cortés, Mariano; Llopis, María Antonia; Martínez, Cecilia; Ibarz, Mercè

    2013-09-01

    Verification uses logical algorithms to detect potential errors before laboratory results are released to the clinician. Even though verification is one of the main processes in all laboratories, there is a lack of standardization mainly in the algorithms used and the criteria and verification limits applied. A survey in clinical laboratories in Spain was conducted in order to assess the verification process, particularly the use of autoverification. Questionnaires were sent to the laboratories involved in the External Quality Assurance Program organized by the Spanish Society of Clinical Biochemistry and Molecular Pathology. Seven common biochemical parameters were included (glucose, cholesterol, triglycerides, creatinine, potassium, calcium, and alanine aminotransferase). Completed questionnaires were received from 85 laboratories. Nearly all the laboratories reported using the following seven verification criteria: internal quality control, instrument warnings, sample deterioration, reference limits, clinical data, concordance between parameters, and verification of results. The use of all verification criteria varied according to the type of verification (automatic, technical, or medical). Verification limits for these parameters are similar to biological reference ranges. Delta Check was used in 24% of laboratories. Most laboratories (64%) reported using autoverification systems. Autoverification use was related to laboratory size, ownership, and type of laboratory information system, but amount of use (percentage of test autoverified) was not related to laboratory size. A total of 36% of Spanish laboratories do not use autoverification, despite the general implementation of laboratory information systems, most of them, with autoverification ability. Criteria and rules for seven routine biochemical tests were obtained.

  6. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Life Support Verification, Review, and Consultation Program for Hospitals Trauma Systems Consultation Program Trauma Education Achieving Zero Preventable Deaths Conference Publications and Posters ...

  7. Development and verification of MOD-2 and MOD-0A simulation models. [Program listings of MOD2SIM and MOD0ASIM

    Energy Technology Data Exchange (ETDEWEB)

    Miller, A.H.; Formica, W.J.

    1984-08-01

    This report presents a method for generating annual energy production estimates: computer models that simulate the operation and power output of the MOD-2 and MOD-0A wind turbines. These simulation models were initially conceived to identify the effects of wind variability over space and time scales and thus to pinpoint whether wind speed and direction forecasting techniques were adequate for wind turbine operations. However the verification of the models, performed using data from actual wind turbine sites, shows that they can be applied as tools in assessing the feasibility of wind energy in a particular situation.

  8. Structural verification of an aged composite reflector

    Science.gov (United States)

    Lou, Michael C.; Tsuha, Walter S.

    1991-01-01

    A structural verification program applied to qualifying two heritage composite antenna reflectors for flight on the TOPEX satellite is outlined. The verification requirements and an integrated analyses/test approach employed to meet these requirements are described. Structural analysis results and qualification vibration test data are presented and discussed. It was determined that degradation of the composite and bonding materials caused by long-term exposure to an uncontrolled environment had not severely impaired the integrity of the reflector structures. The reflectors were assessed to be structurally adequate for the intended TOPEX application.

  9. Environmental Technology Verification Report: Taconic Energy, Inc. TEA Fuel Additive

    Science.gov (United States)

    The Greenhouse Gas Technology Center (GHG Center) is one of six verification organizations operating under EPA’s ETV program. One sector of significant interest to GHG Center stakeholders is transportation - particularly technologies that result in fuel economy improvements. Taco...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) OF PAINT OVERSPRAY ARRESTORS

    Science.gov (United States)

    The paper discusses the environmental technology verification (ETV) of paint overspray arrestors undertaken as part of a program to accelerate the development and commercialization of improved environmental technologies through third-party verififcation and reporting of performan...

  11. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  12. Environmental Technology Verification: Baghouse filtration products--W.L. Gore & Associates L3650 filtration media (tested November--December 2009)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  13. Environmental Technology Verification Report: Baghouse Filtration Products, Donaldson Company, Inc. Tetratex® 6277 Filtration Media (Tested March 2011)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  14. Environmental Technology Verification Report: Baghouse Filtration Products, Donaldson Company, Inc. Tetratex® 6262 Filtration Media (Tested March 2011)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  15. Environmental Technology Verification Report: Baghouse Filtration Products, Donaldson Company, Inc. Tetratex® 6282 Filtration Media (Tested March - April 2011)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  16. RISKIND verification and benchmark comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  17. Software Verification of Orion Cockpit Displays

    Science.gov (United States)

    Biswas, M. A. Rafe; Garcia, Samuel; Prado, Matthew; Hossain, Sadad; Souris, Matthew; Morin, Lee

    2017-01-01

    NASA's latest spacecraft Orion is in the development process of taking humans deeper into space. Orion is equipped with three main displays to monitor and control the spacecraft. To ensure the software behind the glass displays operates without faults, rigorous testing is needed. To conduct such testing, the Rapid Prototyping Lab at NASA's Johnson Space Center along with the University of Texas at Tyler employed a software verification tool, EggPlant Functional by TestPlant. It is an image based test automation tool that allows users to create scripts to verify the functionality within a program. A set of edge key framework and Common EggPlant Functions were developed to enable creation of scripts in an efficient fashion. This framework standardized the way to code and to simulate user inputs in the verification process. Moreover, the Common EggPlant Functions can be used repeatedly in verification of different displays.

  18. High-level Synthesis Integrated Verification

    Directory of Open Access Journals (Sweden)

    M. Dossis

    2015-10-01

    Full Text Available It is widely known in the engineering community that more than 60% of the IC design project time is spent on verification. For the very complex contemporary chips, this may prove prohibitive for the IC to arrive at the correct time in the market and therefore, valuable sales share may be lost by the developing industry. This problem is deteriorated by the fact that most of conventional verification flows are highly repetitive and a great proportion of the project time is spent on last-moment simulations. In this paper we present an integrated approach to rapid, high-level verification, exploiting the advantages of a formal High-level Synthesis tool, developed by the author. Verification in this work is supported at 3 levels: high-level program code, RTL simulation and rapid, generated C testbench execution. This paper is supported by strong experimental work with 3-4 popular design synthesis and verification that proves the principles of our methodology.

  19. Runtime Verification of C Memory Safety

    Science.gov (United States)

    Roşu, Grigore; Schulte, Wolfram; Şerbănuţă, Traian Florin

    C is the most widely used imperative system’s implementation language. While C provides types and high-level abstractions, its design goal has been to provide highest performance which often requires low-level access to memory. As a consequence C supports arbitrary pointer arithmetic, casting, and explicit allocation and deallocation. These operations are difficult to use, resulting in programs that often have software bugs like buffer overflows and dangling pointers that cause security vulnerabilities. We say a C program is memory safe, if at runtime it never goes wrong with such a memory access error. Based on standards for writing “good” C code, this paper proposes strong memory safety as the least restrictive formal definition of memory safety amenable for runtime verification. We show that although verification of memory safety is in general undecidable, even when restricted to closed, terminating programs, runtime verification of strong memory safety is a decision procedure for this class of programs. We verify strong memory safety of a program by executing the program using a symbolic, deterministic definition of the dynamic semantics. A prototype implementation of these ideas shows the feasibility of this approach.

  20. Nuclear disarmament verification

    Energy Technology Data Exchange (ETDEWEB)

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  1. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  2. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  3. Automated Formal Verification for PLC Control Systems

    CERN Multimedia

    Fernández Adiego, Borja

    2014-01-01

    Programmable Logic Controllers (PLCs) are widely used devices used in industrial control systems. Ensuring that the PLC software is compliant with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of the safety-critical software. However, these techniques are still not widely applied in industry due to the complexity of building formal models, which represent the system and the formalization of requirement specifications. We propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (e.g. CTL, LTL) on PLC programs. This methodology is based on an Intermediate Model (IM), meant to transform PLC programs written in any of the languages described in the IEC 61131-3 standard (ST, IL, etc.) to different modeling languages of verification tools. This approach has been applied to CERN PLC programs validating the methodology.

  4. Turbulence Modeling Verification and Validation

    Science.gov (United States)

    Rumsey, Christopher L.

    2014-01-01

    steps in the process. Verification insures that the CFD code is solving the equations as intended (no errors in the implementation). This is typically done either through the method of manufactured solutions (MMS) or through careful step-by-step comparisons with other verified codes. After the verification step is concluded, validation is performed to document the ability of the turbulence model to represent different types of flow physics. Validation can involve a large number of test case comparisons with experiments, theory, or DNS. Organized workshops have proved to be valuable resources for the turbulence modeling community in its pursuit of turbulence modeling verification and validation. Workshop contributors using different CFD codes run the same cases, often according to strict guidelines, and compare results. Through these comparisons, it is often possible to (1) identify codes that have likely implementation errors, and (2) gain insight into the capabilities and shortcomings of different turbulence models to predict the flow physics associated with particular types of flows. These are valuable lessons because they help bring consistency to CFD codes by encouraging the correction of faulty programming and facilitating the adoption of better models. They also sometimes point to specific areas needed for improvement in the models. In this paper, several recent workshops are summarized primarily from the point of view of turbulence modeling verification and validation. Furthermore, the NASA Langley Turbulence Modeling Resource website is described. The purpose of this site is to provide a central location where RANS turbulence models are documented, and test cases, grids, and data are provided. The goal of this paper is to provide an abbreviated survey of turbulence modeling verification and validation efforts, summarize some of the outcomes, and give some ideas for future endeavors in this area.

  5. Writer identification and verification

    NARCIS (Netherlands)

    Schomaker, Lambert; Ratha, N; Govindaraju, V

    2008-01-01

    Writer identification and verification have gained increased interest recently, especially in the fields of forensic document examination and biometrics. Writer identification assigns a handwriting to one writer out of a set of writers. It determines whether or not a given handwritten text has in

  6. 7 CFR 245.6a - Verification requirements.

    Science.gov (United States)

    2010-01-01

    ... SCHOOLS § 245.6a Verification requirements. (a) Definitions—(1) Eligible programs. For the purposes of... program funded under the program of block grants to States for temporary assistance for needy families... definition of Documentation in § 245.2 and, if applicable, the household meets the income eligibility...

  7. Verification of Software Product Lines with Delta-Oriented Slicing

    Science.gov (United States)

    Bruns, Daniel; Klebanov, Vladimir; Schaefer, Ina

    Software product line (SPL) engineering is a well-known approach to develop industry-size adaptable software systems. SPL are often used in domains where high-quality software is desirable; the overwhelming product diversity, however, remains a challenge for assuring correctness. In this paper, we present delta-oriented slicing, an approach to reduce the deductive verification effort across an SPL where individual products are Java programs and their relations are described by deltas. On the specification side, we extend the delta language to deal with formal specifications. On the verification side, we combine proof slicing and similarity-guided proof reuse to ease the verification process.

  8. Analysis and Transformation Tools for Constrained Horn Clause Verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2014-01-01

    Several techniques and tools have been developed for verification of properties expressed as Horn clauses with constraints over a background theory (CHC). Current CHC verification tools implement intricate algorithms and are often limited to certain subclasses of CHC problems. Our aim in this work...... is to investigate the use of a combination of off-the-shelf techniques from the literature in analysis and transformation of Constraint Logic Programs (CLPs) to solve challenging CHC verification problems. We find that many problems can be solved using a combination of tools based on well-known techniques from...... abstract interpretation, semantics-preserving transformations, program specialisation and query-answer transformations. This gives insights into the design of automatic, more general CHC verification tools based on a library of components....

  9. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Overview of Cancer Programs Cancer Programs News American Joint Committee on Cancer Cancer Advocacy Efforts Cancer Liaison ... Validation Programs Accredited Education Institutes CME Accreditation CME Joint Providership Program Verification of Knowledge and Skills Resources ...

  10. Metaheuristic and Machine Learning Models for TFE-731-2, PW4056, and JT8D-9 Cruise Thrust

    Science.gov (United States)

    Baklacioglu, Tolga

    2017-08-01

    The requirement for an accurate engine thrust model has a major antecedence in airline fuel saving programs, assessment of environmental effects of fuel consumption, emissions reduction studies, and air traffic management applications. In this study, utilizing engine manufacturers' real data, a metaheuristic model based on genetic algorithms (GAs) and a machine learning model based on neural networks (NNs) trained with Levenberg-Marquardt (LM), delta-bar-delta (DBD), and conjugate gradient (CG) algorithms were accomplished to incorporate the effect of both flight altitude and Mach number in the estimation of thrust. For the GA model, the analysis of population size impact on the model's accuracy and effect of number of data on model coefficients were also performed. For the NN model, design of optimum topology was searched for one- and two-hidden-layer networks. Predicted thrust values presented a close agreement with real thrust data for both models, among which LM trained NNs gave the best accuracies.

  11. Formal Verification of Distributed Algorithms (Dagstuhl Seminar 13141)

    OpenAIRE

    Charron-Bost, Bernadette; Merz, Stephan; Rybalchenko, Andrey; Widder, Josef

    2013-01-01

    The Dagstuhl Seminar 13141 "Formal Verification of Distributed Algorithms" brought together researchers from the areas of distributed algorithms, model checking, and semi-automated proofs with the goal to establish a common base for approaching the many open problems in verification of distributed algorithms. In order to tighten the gap between the involved communities, who have been quite separated in the past, the program contained tutorials on the basics of the concerned fields. In addi...

  12. Deductive Verification of a Hypervisor Model

    OpenAIRE

    Rusu, Vlad; Grimaud, Gilles; Hauspie, Michaël; Serman, François

    2017-01-01

    (27 pages); We propose a deductive-verification approach for proving partial-correctness and invariance properties on arbitrary transition systems, and demonstrate it on a security hypervisor model for machine code. Regarding partial correctness, we generalise the recently-introduced formalism of Reachability Logic, currently used as a language-parametric program logic, to arbitrary transition systems. We propose a sound and relatively-complete proof system for the resulting logic. The soundn...

  13. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  14. GRAVITY Science Verification

    Science.gov (United States)

    Mérand, A.; Berger, J.-P.; de Wit, W.-J.; Eisenhauer, F.; Haubois, X.; Paumard, T.; Schoeller, M.; Wittkowski, M.; Woillez, J.; Wolff, B.

    2017-12-01

    In the time between successfully commissioning an instrument and before offering it in the Call for Proposals for the first time, ESO gives the community at large an opportunity to apply for short Science Verification (SV) programmes. In 2016, ESO offered SV time for the second-generation Very Large Telescope Interferometer instrument GRAVITY. In this article we describe the selection process, outline the range of science cases covered by the approved SV programmes, and highlight some of the early scientific results.

  15. C formal verification with unix communication and concurrency

    Science.gov (United States)

    Hoover, Doug N.

    1990-01-01

    The results of a NASA SBIR project are presented in which CSP-Ariel, a verification system for C programs which use Unix system calls for concurrent programming, interprocess communication, and file input and output, was developed. This project builds on ORA's Ariel C verification system by using the system of Hoare's book, Communicating Sequential Processes, to model concurrency and communication. The system runs in ORA's Clio theorem proving environment. The use of CSP to model Unix concurrency and sketch the CSP semantics of a simple concurrent program is outlined. Plans for further development of CSP-Ariel are discussed. This paper is presented in viewgraph form.

  16. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  17. Analyzing personalized policies for online biometric verification.

    Directory of Open Access Journals (Sweden)

    Apaar Sadhwani

    Full Text Available Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR subject to constraints on the false accept rate (FAR and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses 12 biometrics for each resident, which represents a five (four, respectively log reduction in FRR relative to fingerprint (iris, respectively policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR and acquires an average of 1.3 fingerprints per resident.

  18. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  19. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... CME Accreditation CME Joint Providership Program Verification of Knowledge and Skills ... Practice Management Workshops Patients and Family Patient Education Patient Education ...

  20. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  1. Using Graph Transformations and Graph Abstractions for Software Verification

    NARCIS (Netherlands)

    Zambon, Eduardo; Ehrig, Hartmut; Rensink, Arend; Rozenberg, Grzegorz; Schurr, Andy

    In this abstract we present an overview of our intended approach for the verification of software written in imperative programming languages. This approach is based on model checking of graph transition systems (GTS), where each program state is modeled as a graph and the exploration engine is

  2. High-resolution three-dimensional diffusion-weighted imaging of middle ear cholesteatoma at 3.0 T MRI: usefulness of 3D turbo field-echo with diffusion-sensitized driven-equilibrium preparation (TFE-DSDE) compared to single-shot echo-planar imaging.

    Science.gov (United States)

    Yamashita, Koji; Yoshiura, Takashi; Hiwatashi, Akio; Obara, Makoto; Togao, Osamu; Matsumoto, Nozomu; Kikuchi, Kazufumi; Honda, Hiroshi

    2013-09-01

    To prospectively evaluate the usefulness of a newly developed high-resolution three-dimensional diffusion-weighted imaging method, turbo field-echo with diffusion-sensitized driven-equilibrium (TFE-DSDE) in diagnosing middle-ear cholesteatoma by comparing it to conventional single-shot echo-planar diffusion-weighted imaging (SS-EP DWI). Institutional review board approval and informed consent from all participants were obtained. We studied 30 patients with preoperatively suspected acquired cholesteatoma. Each patient underwent an MR examination including both SS-EP DWI and DSDE-TFE using a 3.0 T MR scanner. Images of the 30 patients (60 temporal bones including 30 with and 30 without cholesteatoma) were reviewed by two independent neuroradiologists. The confidence level for the presence of cholesteatoma was graded on a scale of 0-2 (0=definite absence, 1=equivocal, 2=definite presence). Interobserver agreement as well as sensitivity, specificity, and accuracy for detection were assessed for the two reviewers. Excellent interobserver agreement was shown for TFE-DSDE (κ=0.821) whereas fair agreement was obtained for SS-EP DWI (κ=0.416). TFE-DSDE was associated with significantly higher sensitivity (83.3%) and accuracy (90.0%) compared to SS-EP DWI (sensitivity=35.0%, accuracy=66.7%; p<0.05). No significant difference was found in specificity (96.7% for TFE-DSDE, 98.3% for SS-EP DWI) CONCLUSION: With increased spatial resolution and reduced susceptibility artifacts, TFE-DSDE improves the accuracy in diagnosing acquired middle ear cholesteatomas compared to SS-EP DWI. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  3. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  4. Formal Verification, Engineering and Business Value

    Directory of Open Access Journals (Sweden)

    Ralf Huuck

    2012-12-01

    Full Text Available How to apply automated verification technology such as model checking and static program analysis to millions of lines of embedded C/C++ code? How to package this technology in a way that it can be used by software developers and engineers, who might have no background in formal verification? And how to convince business managers to actually pay for such a software? This work addresses a number of those questions. Based on our own experience on developing and distributing the Goanna source code analyzer for detecting software bugs and security vulnerabilities in C/C++ code, we explain the underlying technology of model checking, static analysis and SMT solving, steps involved in creating industrial-proof tools.

  5. Packaged low-level waste verification system

    Energy Technology Data Exchange (ETDEWEB)

    Tuite, K.; Winberg, M.R.; McIsaac, C.V. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1995-12-31

    The Department of Energy through the National Low-Level Waste Management Program and WMG Inc. have entered into a joint development effort to design, build, and demonstrate the Packaged Low-Level Waste Verification System. Currently, states and low-level radioactive waste disposal site operators have no method to independently verify the radionuclide content of packaged low-level waste that arrives at disposal sites for disposition. At this time, the disposal site relies on the low-level waste generator shipping manifests and accompanying records to ensure that low-level waste received meets the site`s waste acceptance criteria. The subject invention provides the equipment, software, and methods to enable the independent verification of low-level waste shipping records to ensure that the site`s waste acceptance criteria are being met. The objective of the prototype system is to demonstrate a mobile system capable of independently verifying the content of packaged low-level waste.

  6. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  7. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Trauma Quality Programs National Trauma Data Bank Trauma Quality Improvement Program Mentoring for Excellence in Trauma Surgery Advanced Trauma Life Support Verification, Review, and Consultation Program for Hospitals ...

  8. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Data Bank Trauma Quality Improvement Program Mentoring for Excellence in Trauma Surgery Advanced Trauma Life Support Verification, ... Patients Medical Professionals Skills Programs Find a Treatment Center Patient Safety Resources About the Patient Education Program ...

  9. Experimental verification of the program of improvement of physical training of officers-instructors at higher educational establishment of the Ministry of Internal Affairs of Ukraine

    Directory of Open Access Journals (Sweden)

    S. M. Bezpaliy

    2013-01-01

    Full Text Available Grounded, developed and tested efficiency of the program of officers-teachers’ improvement in physical training. Borne change in organization of physical training, correlation of volumes of general and special physical training is changed, entered readings with a prophylactic and training orientation. The level of physical preparedness of teaching staff of higher institutes is investigational. In research took part 62 officers-teacher under the age of 40 years. The level of physical preparedness was determined on results at run on 100 meters, undercuttings on a cross-beam and runs on 1000 meters. It is set that employments on the experimental program were instrumental in more expressed growth of level of physical preparedness of teachers. A difference between the indexes of officers of experimental and control groups in speed qualities makes 0,12 seconds, in power qualities - 1,8 times, in endurance - 40,5 seconds.

  10. Field Verification Program (Aquatic Disposal). Use of Bioenergetics to Investigate the Impact of Dredged Material on Benthic Species: A Laboratory Study with Polychaetes and Black Rock Harbor Material.

    Science.gov (United States)

    1985-09-01

    Vol 179. McKinney, C.L., Jr. 1982. "Interrelationships Between Energy Metabolism, Growth Dynamics, and Reproduction During the Life Cycle of Mysidopsis...ANIMAL’S LIFE STAGE: JUVENILE SIZE: 1.40 +/- 0.33 MG DRY WI CONTROLS: 100 PERCENT REF FOOD: PRAWN FLA.E SUSPENSION ANIMAL SOURCE: SOUTH REFERENCE, LONG...dredged material. Evaluations were to be based on technology existing within the two agencies or developed during the six-year life of the program. 3. The

  11. International Comparison of Product Certification and Verification Methods for Appliances

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Nan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Romankiewicz, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zheng, Nina [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  12. International comparison of product certification and verification methods for appliances

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Nan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Romankiewicz, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zheng, Nina [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  13. Behavioral biometrics for verification and recognition of malicious software agents

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  14. Verification of product design using regulation knowledge base and Web services

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ik June [KAERI, Daejeon (Korea, Republic of); Lee, Jae Chul; Mun Du Hwan [Kyungpook National University, Daegu (Korea, Republic of); Kim, Byung Chul [Dong-A University, Busan (Korea, Republic of); Hwang, Jin Sang [PartDB Co., Ltd., Daejeom (Korea, Republic of); Lim, Chae Ho [Korea Institute of Industrial Technology, Incheon (Korea, Republic of)

    2015-11-15

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  15. 24 CFR 5.233 - Mandated use of HUD's Enterprise Income Verification (EIV) System.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Mandated use of HUD's Enterprise... and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for... § 5.233 Mandated use of HUD's Enterprise Income Verification (EIV) System. (a) Programs subject to...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT; ULTRASONIC AQUEOUS CLEANING SYSTEMS, SMART SONIC CORPORATION, SMART SONIC

    Science.gov (United States)

    This report is a product of the U.S. EPA's Environmental Technoloy Verification (ETV) Program and is focused on the Smart Sonics Ultrasonic Aqueous Cleaning Systems. The verification is based on three main objectives. (1) The Smart Sonic Aqueous Cleaning Systems, Model 2000 and...

  17. Computer Science and Technology: Validation, Verification, and Testing for the Individual Programmer.

    Science.gov (United States)

    Branstad, Martha A.; And Others

    Guidelines are given for program testing and verification to ensure quality software for the programmer working alone in a computing environment with limited resources. The emphasis is on verification as an integral part of the software development. Guidance includes developing and planning testing as well as the application of other verification…

  18. Trajectory Based Behavior Analysis for User Verification

    Science.gov (United States)

    Pao, Hsing-Kuo; Lin, Hong-Yi; Chen, Kuan-Ta; Fadlil, Junaidillah

    Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden patterns embedded in the trajectories produced by account users. We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior in the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The method can also be applied for the task of recognition, predicting the trajectory type without pre-defined identity. Given a trajectory input, the results show that the proposed method can accurately verify the user identity, or suggest whom owns the trajectory if the input identity is not provided.

  19. Removing Unnecessary Variables from Horn Clause Verification Conditions

    Directory of Open Access Journals (Sweden)

    Emanuele De Angelis

    2016-07-01

    Full Text Available Verification conditions (VCs are logical formulas whose satisfiability guarantees program correctness. We consider VCs in the form of constrained Horn clauses (CHC which are automatically generated from the encoding of (an interpreter of the operational semantics of the programming language. VCs are derived through program specialization based on the unfold/fold transformation rules and, as it often happens when specializing interpreters, they contain unnecessary variables, that is, variables which are not required for the correctness proofs of the programs under verification. In this paper we adapt to the CHC setting some of the techniques that were developed for removing unnecessary variables from logic programs, and we show that, in some cases, the application of these techniques increases the effectiveness of Horn clause solvers when proving program correctness.

  20. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  1. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  2. Parking Space Verification

    DEFF Research Database (Denmark)

    Høg Peter Jensen, Troels; Thomsen Schmidt, Helge; Dyremose Bodin, Niels

    2018-01-01

    With the number of privately owned cars increasing, the issue of locating an available parking space becomes apparant. This paper deals with the verification of vacant parking spaces, by using a vision based system looking over parking areas. In particular the paper proposes a binary classifier...... system, based on a Convolutional Neural Network, that is capable of determining if a parking space is occupied or not. A benchmark database consisting of images captured from different parking areas, under different weather and illumination conditions, has been used to train and test the system....... The system shows promising performance on the database with an accuracy of 99.71% overall and is robust to the variations in parking areas and weather conditions....

  3. INNOVATIVE TECHNOLOGY VERIFICATION REPORT XRF ...

    Science.gov (United States)

    The Niton XLt 700 Series (XLt) XRF Services x-ray fluorescence (XRF) analyzer was demonstrated under the U.S. Environmental Protection Agency (EPA) Superfund Innovative Technology Evaluation (SITE) Program. The field portion of the demonstration was conducted in January 2005 at the Kennedy Athletic, Recreational and Social Park (KARS) at Kennedy Space Center on Merritt Island, Florida. The demonstration was designed to collect reliable performance and cost data for the XLt analyzer and seven other commercially available XRF instruments for measuring trace elements in soil and sediment. The performance and cost data were evaluated to document the relative performance of each XRF instrument. This innovative technology verification report describes the objectives and the results of that evaluation and serves to verify the performance and cost of the XLt analyzer. Separate reports have been prepared for the other XRF instruments that were evaluated as part of the demonstration. The objectives of the evaluation included determining each XRF instrument’s accuracy, precision, sample throughput, and tendency for matrix effects. To fulfill these objectives, the field demonstration incorporated the analysis of 326 prepared samples of soil and sediment that contained 13 target elements. The prepared samples included blends of environmental samples from nine different sample collection sites as well as spiked samples with certified element concentrations. Accuracy

  4. Reconfigurable system design and verification

    CERN Document Server

    Hsiung, Pao-Ann; Huang, Chun-Hsian

    2009-01-01

    Reconfigurable systems have pervaded nearly all fields of computation and will continue to do so for the foreseeable future. Reconfigurable System Design and Verification provides a compendium of design and verification techniques for reconfigurable systems, allowing you to quickly search for a technique and determine if it is appropriate to the task at hand. It bridges the gap between the need for reconfigurable computing education and the burgeoning development of numerous different techniques in the design and verification of reconfigurable systems in various application domains. The text e

  5. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    methods in the verification task. Today formal verification is finding increasing acceptance ... approaches that are major research issues in formal verification research today. There are four articles in this issue, which show up the different flavours in the approach to formal methods in verification. The first paper by Supratik ...

  6. Verification methodology manual for SystemVerilog

    CERN Document Server

    Bergeron, Janick; Hunter, Alan

    2006-01-01

    SystemVerilog is a unified language that serves both design and verification engineers by including RTL design constructs, assertions and a rich set of verification constructs. This book is based upon best verification practices by ARM, Synopsys and their customers. It is useful for those involved in the design or verification of a complex chip.

  7. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Eui Sub; Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of); Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  8. Infrared scanner concept verification test report

    Science.gov (United States)

    Bachtel, F. D.

    1980-01-01

    The test results from a concept verification test conducted to assess the use of an infrared scanner as a remote temperature sensing device for the space shuttle program are presented. The temperature and geometric resolution limits, atmospheric attenuation effects including conditions with fog and rain, and the problem of surface emissivity variations are included. It is concluded that the basic concept of using an infrared scanner to determine near freezing surface temperatures is feasible. The major problem identified is concerned with infrared reflections which result in significant errors if not controlled. Action taken to manage these errors result in design and operational constraints to control the viewing angle and surface emissivity.

  9. Predicting SMT Solver Performance for Software Verification

    Directory of Open Access Journals (Sweden)

    Andrew Healy

    2017-01-01

    Full Text Available The Why3 IDE and verification system facilitates the use of a wide range of Satisfiability Modulo Theories (SMT solvers through a driver-based architecture. We present Where4: a portfolio-based approach to discharge Why3 proof obligations. We use data analysis and machine learning techniques on static metrics derived from program source code. Our approach benefits software engineers by providing a single utility to delegate proof obligations to the solvers most likely to return a useful result. It does this in a time-efficient way using existing Why3 and solver installations - without requiring low-level knowledge about SMT solver operation from the user.

  10. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    to the high complexity of both the dynamical system and the specification. Therefore, there is a need for methods capable of verifying complex specifications of complex systems. The verification of high dimensional continuous dynamical systems is the key to verifying general systems. In this thesis......, an abstraction approach is taken to the verification problem. A method is developed for abstracting continuous dynamical systems by timed automata. This method is based on subdividing the state space into cells by use of subdivisioning functions that are decreasing along the vector field. To allow....... It is shown that dual decomposition can be applied on the problem of generating barrier certificates, resulting in a compositional formulation of the safety verification problem. This makes the barrier certificate method applicable to the verification of high dimensional systems, but at the cost...

  11. Towards formal verification of ToolBus scripts

    NARCIS (Netherlands)

    Fokkink, W.; Klint, P.; Lisser, B.; Usenko, Y.S.

    2008-01-01

    ToolBus allows one to connect tools via a software bus. Programming is done using the scripting language Tscript, which is based on the process algebra ACP. Tscript was originally designed to enable formal verification, but this option has so far not been explored in any detail. We present a method

  12. Model Validation and Verification of Data Mining from the ...

    African Journals Online (AJOL)

    Michael Horsfall

    In this paper, we seek to present a hybrid method for Model Validation and Verification of Data Mining .... obtained, program design and development procedures .... instrument. Cronbach's alpha was used to calculate the questionnaire's reliability and validity. For analyzing the present research's information, both descriptive ...

  13. Using Graph Transformations and Graph Abstractions for Software Verification

    NARCIS (Netherlands)

    Corradini, Andrea; Zambon, Eduardo; Rensink, Arend

    In this paper we describe our intended approach for the verification of software written in imperative programming languages. We base our approach on model checking of graph transition systems, where each state is a graph and the transitions are specified by graph transformation rules. We believe

  14. Procedure-modular specification and verification of temporal safety properties

    NARCIS (Netherlands)

    Soleimanifard, Siavash; Gurov, Dilian; Huisman, Marieke

    This paper describes ProMoVer, a tool for fully automated procedure-modular verification of Java programs equipped with method-local and global assertions that specify safety properties of sequences of method invocations. Modularity at the procedure-level is a natural instantiation of the modular

  15. Automatic Verification of Railway Interlocking Systems: A Case Study

    DEFF Research Database (Denmark)

    Petersen, Jakob Lyng

    1998-01-01

    This paper presents experiences in applying formal verification to a large industrial piece of software. The are of application is railway interlocking systems. We try to prove requirements of the program controlling the Swedish railway Station Alingsås by using the decision procedure which...

  16. ProMoVer: Modular Verification of Temporal Safety Properties.

    NARCIS (Netherlands)

    Soleimanifard, Siavash; Gurov, Dilian; Huisman, Marieke; Barthe, Gilles; Pardo, Alberto; Schneider, Gerardo

    2011-01-01

    This paper describes ProMoVer, a tool for fully automated procedure–modular verification of Java programs equipped with method–local and global assertions that specify safety properties of sequences of method invocations. Modularity at the procedure–level is a natural instantiation of the modular

  17. Clinical Skills Verification, Formative Feedback, and Psychiatry Residency Trainees

    Science.gov (United States)

    Dalack, Gregory W.; Jibson, Michael D.

    2012-01-01

    Objective: The authors describe the implementation of Clinical Skills Verification (CSV) in their program as an in-training assessment intended primarily to provide formative feedback to trainees, strengthen the supervisory experience, identify the need for remediation of interviewing skills, and secondarily to demonstrating resident competence…

  18. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  19. FEFTRA {sup TM} verification. Update 2013

    Energy Technology Data Exchange (ETDEWEB)

    Loefman, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Meszaros, F. [The Relief Lab., Harskut, (Hungary)

    2013-12-15

    FEFTRA is a finite element program package developed at VTT for the analyses of groundwater flow in Posiva's site evaluation programme that seeks a final repository for spent nuclear fuel in Finland. The code is capable of modelling steady-state or transient groundwater flow, solute transport and heat transfer as coupled or separate phenomena. Being a typical research tool used only by its developers, the FEFTRA code lacked long of a competent testing system and precise documentation of the verification of the code. In 2006 a project was launched, in which the objective was to reorganise all the material related to the existing verification cases and place them into the FEFTRA program path under the version-control system. The work also included development of a new testing system, which automatically calculates the selected cases, checks the new results against the old approved results and constructs a summary of the test run. All the existing cases were gathered together, checked and added into the new testing system. The documentation of each case was rewritten with the LATEX document preparation system and added into the testing system in a way that the whole test documentation (this report) could easily be generated in a postscript or pdf-format. The current report is the updated version of the verification report published in 2007. At the moment the report includes mainly the cases related to the testing of the primary result quantities (i.e. hydraulic head, pressure, salinity concentration, temperature). The selected cases, however, represent typical hydrological applications, in which the program package has been and will be employed in the Posiva's site evaluation programme, i.e. the simulations of groundwater flow, solute transport and heat transfer as separate or coupled phenomena. The comparison of the FEFTRA results to the analytical, semianalytical and/or other numerical solutions proves the capability of FEFTRA to simulate such problems

  20. ALMA Science Verification

    Science.gov (United States)

    Hills, R.

    2011-01-01

    As many of you are aware, ALMA has reached a very exciting point in the construction phase. After a year of testing the basic functionality of antennas and small arrays at the Chajnantor site at 5000m, we are now able to run full observations of scientific targets using at least 8 antennas and 4 receiver bands. We recently had a series of reviews of all aspects of the ALMA Project, resulting in a consensus that we will be ready to issue a Call for Proposals for Early Science projects at the end of the first quarter of 2011, with an expectation of starting these Early Science observations toward the end of 2011. ALMA Science Verification is the process by which we will demonstrate that the data that will be produced by ALMA during Early Science is valid. This is done by running full "end to end" tests of ALMA as a telescope. We will observe objects for which similar data are already available for other telescopes. This allows us to make direct quantitative comparisons of all aspects of the data cubes, in order to determine whether the ALMA instrumentation or software is introducing any artifacts.

  1. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Stereotactic Breast Biopsy Accreditation Program Cancer Programs Staff Information Children's Surgery Children's Surgery Children's Surgery Children's Surgery Verification ACS NSQIP Pediatric Fees and Invoices Quality and ...

  2. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... for Excellence in Trauma Surgery Advanced Trauma Life Support Verification, Review, and Consultation Program for Hospitals Trauma Systems Consultation Program Trauma Education Achieving Zero Preventable Deaths ...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - INSPEC FIBRES 5512BRF FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  4. Regional Field Verification -- Operational Results from Four Small Wind Turbines in the Pacific Northwest: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Sinclair, K.; Raker, J.

    2006-08-01

    This paper describes four small wind turbines installed in the Pacific Northwest under DOE/NREL's Regional Field Verification Program between 2003 and 2004 and summarizes operational data from each site.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - STANDARD FILTER CORPORATION PE16ZU FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS--DONALDSON COMPANY, INC. 6277 FILTRATION MEDIA

    Science.gov (United States)

    The U.S. Environmental Protection Agency has created the Environmental Technology Verification Program to facilitate the deployment of innovative or improved environmental technologies through high quality, peer reviewed data on technology performance to those involved in the des...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC, MECHANICAL BLADDER PUMP MODEL MP470

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: ECR TECHNOLOGIES, INC., EARTHLINKED GROUND-SOURCE HEAT PUMP WATER HEATING SYSTEM

    Science.gov (United States)

    EPA has created the Environmental Technology Verification program to provide high quality, peer reviewed data on technology performance. This data is expected to accelerate the acceptance and use of improved environmental protection technologies. The Greenhouse Gas Technology C...

  9. M&V Guidelines: Measurement and Verification for Performance-Based Contracts Version 4.0

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-11-02

    Document outlines the Federal Energy Management Program's standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  10. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  11. Program on the TOPAZ-2 system preparation for flight tests

    Science.gov (United States)

    Nikitin, V. P.; Ogloblin, B. G.; Lutov, Ye. I.; Luppov, A. N.; Shalaev, A. I.; Ponomarev-Stepnoi, N. N.; Usov, V. A.

    1993-01-01

    The TOPAZ-2 nuclear power system (NPS) preparation for flight tests has been carried out according to the ``Integrated Experimental Development Program'' (IEDP). This program involves independent ground tests of the system assemblies and reactor assembly units as well as comprehensive tests of components of prototype systems with simulation of transportation conditions, pre-launch procedures, orbit injection and space environment. Besides that, IEDP included investigation and experimental development work directed toward a series of individual system characteristics: neutron-physical, radiation resistance of materials and TFE's, hermeticity, etc.

  12. Visualization of Instrumental Verification Information Details (VIVID) : code development, description, and usage.

    Energy Technology Data Exchange (ETDEWEB)

    Roy, Christopher John; Bainbridge, Bruce L.; Potter, Donald L.; Blottner, Frederick G.; Black, Amalia Rebecca

    2005-03-01

    The formulation, implementation and usage of a numerical solution verification code is described. This code uses the Richardson extrapolation procedure to estimate the order of accuracy and error of a computational program solution. It evaluates multiple solutions performed in numerical grid convergence studies to verify a numerical algorithm implementation. Analyses are performed on both structured and unstructured grid codes. Finite volume and finite element discretization programs are examined. Two and three-dimensional solutions are evaluated. Steady state and transient solution analysis capabilities are present in the verification code. Multiple input data bases are accepted. Benchmark options are included to allow for minimal solution validation capability as well as verification.

  13. Verification and validation of control system software

    Energy Technology Data Exchange (ETDEWEB)

    Munro, J.K. Jr.; Kisner, R.A. (Oak Ridge National Lab., TN (USA)); Bhadtt, S.C. (Electric Power Research Inst., Palo Alto, CA (USA))

    1991-01-01

    The following guidelines are proposed for verification and validation (V V) of nuclear power plant control system software: (a) use risk management to decide what and how much V V is needed; (b) classify each software application using a scheme that reflects what type and how much V V is needed; (c) maintain a set of reference documents with current information about each application; (d) use Program Inspection as the initial basic verification method; and (e) establish a deficiencies log for each software application. The following additional practices are strongly recommended: (a) use a computer-based configuration management system to track all aspects of development and maintenance; (b) establish reference baselines of the software, associated reference documents, and development tools at regular intervals during development; (c) use object-oriented design and programming to promote greater software reliability and reuse; (d) provide a copy of the software development environment as part of the package of deliverables; and (e) initiate an effort to use formal methods for preparation of Technical Specifications. The paper provides background information and reasons for the guidelines and recommendations. 3 figs., 3 tabs.

  14. Verification using Satisfiability Checking, Predicate Abstraction, and Craig Interpolation

    Science.gov (United States)

    2008-09-01

    Verification. Springer, 2004. 5 [37] Thomas Ball, Rupak Majumdar, Todd Millstein, and Sriram K. Rajamani. Automatic predicate abstraction of C programs...Fischer, Ranjit Jhala, and Rupak Majumdar. Joining dataflow with predicates. In ESEC/SIGSOFT FSE, pages 227–236, 2005. 7 [79] M. K. Ganai, P. Ashar, A...Sutre. Lazy abstraction. In Principles of Programming Languages, pages 58–70, 2002. 5.1, 5.4.2 [89] Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar

  15. Review of Quantitative Monitoring Methodologies for Emissions Verification and Accounting for Carbon Dioxide Capture and Storage for California’s Greenhouse Gas Cap-and-Trade and Low-Carbon Fuel Standard Programs

    Energy Technology Data Exchange (ETDEWEB)

    Oldenburg, Curtis M. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Earth Sciences Division; Birkholzer, Jens T. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Earth Sciences Division

    2014-12-23

    The Cap-and-Trade and Low Carbon Fuel Standard (LCFS) programs being administered by the California Air Resources Board (CARB) include Carbon Dioxide Capture and Storage (CCS) as a potential means to reduce greenhouse gas (GHG) emissions. However, there is currently no universal standard approach that quantifies GHG emissions reductions for CCS and that is suitable for the quantitative needs of the Cap-and-Trade and LCFS programs. CCS involves emissions related to the capture (e.g., arising from increased energy needed to separate carbon dioxide (CO2) from a flue gas and compress it for transport), transport (e.g., by pipeline), and storage of CO2 (e.g., due to leakage to the atmosphere from geologic CO2 storage sites). In this project, we reviewed and compared monitoring, verification, and accounting (MVA) protocols for CCS from around the world by focusing on protocols specific to the geologic storage part of CCS. In addition to presenting the review of these protocols, we highlight in this report those storage-related MVA protocols that we believe are particularly appropriate for CCS in California. We find that none of the existing protocols is completely appropriate for California, but various elements of all of them could be adopted and/or augmented to develop a rigorous, defensible, and practical surface leakage MVA protocol for California. The key features of a suitable surface leakage MVA plan for California are that it: (1) informs and validates the leakage risk assessment, (2) specifies use of the most effective monitoring strategies while still being flexible enough to accommodate special or site-specific conditions, (3) quantifies stored CO2, and (4) offers defensible estimates of uncertainty in monitored properties. California’s surface leakage MVA protocol needs to be applicable to the main CO2 storage opportunities (in California and in other states with entities participating in California

  16. DOD's advanced thermionics program an overview

    Energy Technology Data Exchange (ETDEWEB)

    Drake, T.R.

    1998-07-01

    The Defense Special Weapons Agency (DSWA) manages a congressionally mandated program in advanced thermionics research. Guided by congressional language to advance the state-of-the-art in the US and support the Integrated Solar Upper Stage (ISUS) program, DSWA efforts concentrate on four areas: an electrically testable design of a high-performance, in-core thermionic fuel element (TFE), the ISUS program, a microminiature thermionic converter and several modeling efforts. The DSWA domestic program is augmented by several small contracts with Russian institutes, awarded under the former TOPAZ International Program that the Ballistic Missile Defense Organization transferred to DSWA. The design effort at General Atomics will result in an electrically testable, multi-cell TFE for in-core conversion, involving system design and advanced collector and emitter technologies. For the ISUS program, DSWA funded a portion of the engine ground demonstration, including development of the power management system and the planar diodes. Current efforts supporting ISUS include continued diode testing and developing an advanced planar diode. The MTC program seeks to design a mass producable, close-spaced thermionic converter using integrated circuit technologies. Modeling and analysis at DSWA involves development of the Reactor System Mass with Thermionics estimation model (RSMASS-T), developing a new thermionic theory, and reviewing applications for the MTC technology. The Russian deliverables include several reports and associated hardware that describe many of its state-of-the-art thermionic technologies and processes.

  17. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  18. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  19. Algebraic verification of a distributed summation algorithm

    OpenAIRE

    Groote, Jan Friso; Springintveld, J.G.

    1996-01-01

    textabstractIn this note we present an algebraic verification of Segall's Propagation of Information with Feedback (PIF) algorithm. This algorithm serves as a nice benchmark for verification exercises (see [2, 13, 8]). The verification is based on the methodology presented in [7] and demonstrates its applicability to distributed algorithms.

  20. SPR Hydrostatic Column Model Verification and Validation.

    Energy Technology Data Exchange (ETDEWEB)

    Bettin, Giorgia [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lord, David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rudeen, David Keith [Gram, Inc. Albuquerque, NM (United States)

    2015-10-01

    A Hydrostatic Column Model (HCM) was developed to help differentiate between normal "tight" well behavior and small-leak behavior under nitrogen for testing the pressure integrity of crude oil storage wells at the U.S. Strategic Petroleum Reserve. This effort was motivated by steady, yet distinct, pressure behavior of a series of Big Hill caverns that have been placed under nitrogen for extended period of time. This report describes the HCM model, its functional requirements, the model structure and the verification and validation process. Different modes of operation are also described, which illustrate how the software can be used to model extended nitrogen monitoring and Mechanical Integrity Tests by predicting wellhead pressures along with nitrogen interface movements. Model verification has shown that the program runs correctly and it is implemented as intended. The cavern BH101 long term nitrogen test was used to validate the model which showed very good agreement with measured data. This supports the claim that the model is, in fact, capturing the relevant physical phenomena and can be used to make accurate predictions of both wellhead pressure and interface movements.

  1. 49 CFR 40.135 - What does the MRO tell the employee at the beginning of the verification interview?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false What does the MRO tell the employee at the beginning of the verification interview? 40.135 Section 40.135 Transportation Office of the Secretary of Transportation PROCEDURES FOR TRANSPORTATION WORKPLACE DRUG AND ALCOHOL TESTING PROGRAMS Medical Review Officers and the Verification Process § 40.135...

  2. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  3. Ultrasonic verification of composite structures

    NARCIS (Netherlands)

    Pelt, Maurice; de Boer, Robert Jan; Schoemaker, Christiaan; Sprik, Rudolf

    2014-01-01

    Ultrasonic Verification is a new method for the monitoring large surface areas of CFRP by ultrasound with few sensors. The echo response of a transmitted pulse through the structure is compared with the response of an earlier obtained reference signal to calculate a fidelity parameter.

  4. A verification environment for bigraphs

    DEFF Research Database (Denmark)

    Perrone, Gian David; Debois, Søren; Hildebrandt, Thomas

    2013-01-01

    We present the BigMC tool for bigraphical reactive systems that may be instantiated as a verification tool for any formalism or domain-specific modelling language encoded as a bigraphical reactive system. We introduce the syntax and use of BigMC, and exemplify its use with two small examples: a t...

  5. Private Verification for FPGA Bitstreams

    Science.gov (United States)

    2017-03-20

    security risks. Keywords: Trust, Privacy, Hardware Trojan, Hardware Security, ASIC, FPGA, Bitstream Introduction Many effective verification...devices but also to integrate PV-Bit, other Graf Research tools, and other commercial EDA tools into our overarching forward design trust flow philosophy

  6. Improved method for coliform verification.

    OpenAIRE

    Diehl, J D

    1991-01-01

    Modification of a method for coliform verification presented in Standard Methods for the Examination of Water and Wastewater is described. Modification of the method, which is based on beta-galactosidase production, involves incorporation of a lactose operon inducer in medium upon which presumptive coliform isolates are cultured prior to beta-galactosidase assay.

  7. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present...

  8. Verification of EPA's " Preliminary remediation goals for radionuclides" (PRG) electronic calculator

    Energy Technology Data Exchange (ETDEWEB)

    Stagich, B. H. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2017-03-29

    The U.S. Environmental Protection Agency (EPA) requested an external, independent verification study of their “Preliminary Remediation Goals for Radionuclides” (PRG) electronic calculator. The calculator provides information on establishing PRGs for radionuclides at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites with radioactive contamination (Verification Study Charge, Background). These risk-based PRGs set concentration limits using carcinogenic toxicity values under specific exposure conditions (PRG User’s Guide, Section 1). The purpose of this verification study is to ascertain that the computer codes has no inherit numerical problems with obtaining solutions as well as to ensure that the equations are programmed correctly.

  9. Block 2 SRM conceptual design studies. Volume 1, Book 2: Preliminary development and verification plan

    Science.gov (United States)

    1986-01-01

    Activities that will be conducted in support of the development and verification of the Block 2 Solid Rocket Motor (SRM) are described. Development includes design, fabrication, processing, and testing activities in which the results are fed back into the project. Verification includes analytical and test activities which demonstrate SRM component/subassembly/assembly capability to perform its intended function. The management organization responsible for formulating and implementing the verification program is introduced. It also identifies the controls which will monitor and track the verification program. Integral with the design and certification of the SRM are other pieces of equipment used in transportation, handling, and testing which influence the reliability and maintainability of the SRM configuration. The certification of this equipment is also discussed.

  10. MOV reliability evaluation and periodic verification scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Bunte, B.D.

    1996-12-01

    The purpose of this paper is to establish a periodic verification testing schedule based on the expected long term reliability of gate or globe motor operated valves (MOVs). The methodology in this position paper determines the nominal (best estimate) design margin for any MOV based on the best available information pertaining to the MOVs design requirements, design parameters, existing hardware design, and present setup. The uncertainty in this margin is then determined using statistical means. By comparing the nominal margin to the uncertainty, the reliability of the MOV is estimated. The methodology is appropriate for evaluating the reliability of MOVs in the GL 89-10 program. It may be used following periodic testing to evaluate and trend MOV performance and reliability. It may also be used to evaluate the impact of proposed modifications and maintenance activities such as packing adjustments. In addition, it may be used to assess the impact of new information of a generic nature which impacts safety related MOVs.

  11. RELAP-7 Software Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Curtis L. [Idaho National Lab. (INL), Idaho Falls, ID (United States). Risk, Reliability, and Regulatory Support; Choi, Yong-Joon [Idaho National Lab. (INL), Idaho Falls, ID (United States). Risk, Reliability, and Regulatory Support; Zou, Ling [Idaho National Lab. (INL), Idaho Falls, ID (United States). Risk, Reliability, and Regulatory Support

    2014-09-25

    This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7. The RELAP-7 (Reactor Excursion and Leak Analysis Program) code is a nuclear reactor system safety analysis code being developed at Idaho National Laboratory (INL). The code is based on the INL’s modern scientific software development framework – MOOSE (Multi-Physics Object-Oriented Simulation Environment). The overall design goal of RELAP-7 is to take advantage of the previous thirty years of advancements in computer architecture, software design, numerical integration methods, and physical models. The end result will be a reactor systems analysis capability that retains and improves upon RELAP5’s capability and extends the analysis capability for all reactor system simulation scenarios.

  12. NEUTRON ALGORITHM VERIFICATION TESTING

    Energy Technology Data Exchange (ETDEWEB)

    COWGILL,M.; MOSBY,W.; ARGONNE NATIONAL LABORATORY-WEST

    2000-07-19

    Active well coincidence counter assays have been performed on uranium metal highly enriched in {sup 235}U. The data obtained in the present program, together with highly enriched uranium (HEU) metal data obtained in other programs, have been analyzed using two approaches, the standard approach and an alternative approach developed at BNL. Analysis of the data with the standard approach revealed that the form of the relationship between the measured reals and the {sup 235}U mass varied, being sometimes linear and sometimes a second-order polynomial. In contrast, application of the BNL algorithm, which takes into consideration the totals, consistently yielded linear relationships between the totals-corrected reals and the {sup 235}U mass. The constants in these linear relationships varied with geometric configuration and level of enrichment. This indicates that, when the BNL algorithm is used, calibration curves can be established with fewer data points and with more certainty than if a standard algorithm is used. However, this potential advantage has only been established for assays of HEU metal. In addition, the method is sensitive to the stability of natural background in the measurement facility.

  13. Compositional Verification with Abstraction, Learning, and SAT Solving

    Science.gov (United States)

    2015-05-01

    Compositional Verification with Abstraction, Learning , and SAT Solving Anvesh Komuravelli CMU-CS-15-102 May 2015 School of Computer Science Computer...grant number F8721-05-C-0003, and the Portuguese Science Technology Foundation. The views and conclusions contained in this document are those of the...with Abstraction, Learning , and SAT Solving 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  14. Probabilistic Verification of Multi-Robot Missions in Uncertain Environments

    Science.gov (United States)

    2015-11-01

    sensory histories when verifying a robot mission. The third contribution is experimental validation results presented to show the effectiveness of...usability-tested [10] graphical programming frontend, as shown in Figure 1. Figure 1. MissionLab/VIPARS System Architecture . The VIPARS (Verification in...position. The sensory data is gen list, but the correspondence between a sen member, which originates from s(t), and th p(t) that generated the member can

  15. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  16. AUTOMATED, HIGHLY ACCURATE VERIFICATION OF RELAP5-3D

    Energy Technology Data Exchange (ETDEWEB)

    George L Mesina; David Aumiller; Francis Buschman

    2014-07-01

    Computer programs that analyze light water reactor safety solve complex systems of governing, closure and special process equations to model the underlying physics. In addition, these programs incorporate many other features and are quite large. RELAP5-3D[1] has over 300,000 lines of coding for physics, input, output, data management, user-interaction, and post-processing. For software quality assurance, the code must be verified and validated before being released to users. Verification ensures that a program is built right by checking that it meets its design specifications. Recently, there has been an increased importance on the development of automated verification processes that compare coding against its documented algorithms and equations and compares its calculations against analytical solutions and the method of manufactured solutions[2]. For the first time, the ability exists to ensure that the data transfer operations associated with timestep advancement/repeating and writing/reading a solution to a file have no unintended consequences. To ensure that the code performs as intended over its extensive list of applications, an automated and highly accurate verification method has been modified and applied to RELAP5-3D. Furthermore, mathematical analysis of the adequacy of the checks used in the comparisons is provided.

  17. Formal verification of AI software

    Science.gov (United States)

    Rushby, John; Whitehurst, R. Alan

    1989-01-01

    The application of formal verification techniques to Artificial Intelligence (AI) software, particularly expert systems, is investigated. Constraint satisfaction and model inversion are identified as two formal specification paradigms for different classes of expert systems. A formal definition of consistency is developed, and the notion of approximate semantics is introduced. Examples are given of how these ideas can be applied in both declarative and imperative forms.

  18. Probabilistic Requirements (Partial) Verification Methods Best Practices Improvement. Variables Acceptance Sampling Calculators: Derivations and Verification of Plans. Volume 1

    Science.gov (United States)

    Johnson, Kenneth L.; White, K, Preston, Jr.

    2012-01-01

    The NASA Engineering and Safety Center was requested to improve on the Best Practices document produced for the NESC assessment, Verification of Probabilistic Requirements for the Constellation Program, by giving a recommended procedure for using acceptance sampling by variables techniques. This recommended procedure would be used as an alternative to the potentially resource-intensive acceptance sampling by attributes method given in the document. This document contains the outcome of the assessment.

  19. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... in Trauma Surgery Advanced Trauma Life Support Verification, Review, and Consultation Program for Hospitals Trauma Systems Consultation ... to SRGS Issues Contact and FAQs ACS Case Reviews in Surgery ACS Case Reviews in Surgery ACS ...

  20. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... for Excellence in Trauma Surgery Advanced Trauma Life Support Verification, Review, and Consultation Program for Hospitals Trauma ... Skills for Exposure in Trauma Advanced Trauma Life Support Advanced Trauma Operative Management Basic Endovascular Skills for ...

  1. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... CME Accreditation CME Joint Providership Program Verification of Knowledge and Skills Resources Educational Resources Educational Resources E- ... Disaster Management and Emergency Preparedness Rural Trauma Team Development Course Trauma Evaluation and Management Trauma CME Nora ...

  2. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Mentoring for Excellence in Trauma Surgery Advanced Trauma Life Support Verification, Review, and Consultation Program for Hospitals ... Surgical Skills for Exposure in Trauma Advanced Trauma Life Support Advanced Trauma Operative Management Basic Endovascular Skills ...

  3. Gender verification in competitive sports.

    Science.gov (United States)

    Simpson, J L; Ljungqvist, A; de la Chapelle, A; Ferguson-Smith, M A; Genel, M; Carlson, A S; Ehrhardt, A A; Ferris, E

    1993-11-01

    The possibility that men might masquerade as women and be unfair competitors in women's sports is accepted as outrageous by athletes and the public alike. Since the 1930s, media reports have fuelled claims that individuals who once competed as female athletes subsequently appeared to be men. In most of these cases there was probably ambiguity of the external genitalia, possibly as a result of male pseudohermaphroditism. Nonetheless, beginning at the Rome Olympic Games in 1960, the International Amateur Athletics Federation (IAAF) began establishing rules of eligibility for women athletes. Initially, physical examination was used as a method for gender verification, but this plan was widely resented. Thus, sex chromatin testing (buccal smear) was introduced at the Mexico City Olympic Games in 1968. The principle was that genetic females (46,XX) show a single X-chromatic mass, whereas males (46,XY) do not. Unfortunately, sex chromatin analysis fell out of common diagnostic use by geneticists shortly after the International Olympic Committee (IOC) began its implementation for gender verification. The lack of laboratories routinely performing the test aggravated the problem of errors in interpretation by inexperienced workers, yielding false-positive and false-negative results. However, an even greater problem is that there exist phenotypic females with male sex chromatin patterns (e.g. androgen insensitivity, XY gonadal dysgenesis). These individuals have no athletic advantage as a result of their congenital abnormality and reasonably should not be excluded from competition. That is, only the chromosomal (genetic) sex is analysed by sex chromatin testing, not the anatomical or psychosocial status. For all the above reasons sex chromatin testing unfairly excludes many athletes. Although the IOC offered follow-up physical examinations that could have restored eligibility for those 'failing' sex chromatin tests, most affected athletes seemed to prefer to 'retire'. All

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - ALBANY INTERNATIONAL CORP. INDUSTRIAL PROCESS TECHNOLOGIES PRIMATEX PLUS I FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - W.L. GORE & ASSOCIATES, INC. L4347 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  6. Derivation of sorting programs

    Science.gov (United States)

    Varghese, Joseph; Loganantharaj, Rasiah

    1990-01-01

    Program synthesis for critical applications has become a viable alternative to program verification. Nested resolution and its extension are used to synthesize a set of sorting programs from their first order logic specifications. A set of sorting programs, such as, naive sort, merge sort, and insertion sort, were successfully synthesized starting from the same set of specifications.

  7. Formal Verification of Mathematical Software. Volume 2

    Science.gov (United States)

    1990-05-01

    copy RAfJC-TR-90-53, Vol I (of twol Final Techrical Report ?"ay 1990 AD-A223 633 FORMAL VERIFICATION OF MATHEMATICAL SOFTWARE DTIC ELECTE Odyssey...copies of this report unless contractual obligations or notices on a specific document require that it be returned. FORMAL VERIFICATION OF...1 May 1986 Contract Expiration Date: 31 July 1989 Short Title of Work: Formal Verification of SDI Mathematical Software Period of Work Covered: May 86

  8. Automatic Verification of Autonomous Robot Missions

    Science.gov (United States)

    2014-01-01

    for a mission related to the search for a biohazard. Keywords: mobile robots, formal verification , performance guarantees, automatic translation 1...tested. 2 Related Work Formal verification of systems is critical when failure creates a high cost, such as life or death scenarios. A variety of...robot. 3.3 PARS Process algebras are specification languages that allow for formal verification of concurrent systems. Process Algebra for Robot

  9. Verification-based Software-fault Detection

    OpenAIRE

    Gladisch, Christoph David

    2011-01-01

    Software is used in many safety- and security-critical systems. Software development is, however, an error-prone task. In this dissertation new techniques for the detection of software faults (or software "bugs") are described which are based on a formal deductive verification technology. The described techniques take advantage of information obtained during verification and combine verification technology with deductive fault detection and test generation in a very unified way.

  10. Lunar in-core thermionic nuclear reactor power system conceptual design

    Science.gov (United States)

    Mason, Lee S.; Schmitz, Paul C.; Gallup, Donald R.

    1991-01-01

    This paper presents a conceptual design of a lunar in-core thermionic reactor power system. The concept consists of a thermionic reactor located in a lunar excavation with surface mounted waste heat radiators. The system was integrated with a proposed lunar base concept representative of recent NASA Space Exploration Initiative studies. The reference mission is a permanently-inhabited lunar base requiring a 550 kWe, 7 year life central power station. Performance parameters and assumptions were based on the Thermionic Fuel Element (TFE) Verification Program. Five design cases were analyzed ranging from conservative to advanced. The cases were selected to provide sensitivity effects on the achievement of TFE program goals.

  11. Automated finite element grid break-up method, a verification of the six node averaging approach

    Science.gov (United States)

    Barten, H. J.

    1975-01-01

    The verification of the nodal averaging method for generating automated finite triangular element grids was demonstrated. This was accomplished with a six node averaging program (SNAP) which was placed on an IBM 2250 vector graphics scope terminal. The advantage of this method is that it is unnecessary to program time consuming geometric division and transition algorithms.

  12. A new numerical approach to solve Thomas-Fermi model of an atom using bio-inspired heuristics integrated with sequential quadratic programming.

    Science.gov (United States)

    Raja, Muhammad Asif Zahoor; Zameer, Aneela; Khan, Aziz Ullah; Wazwaz, Abdul Majid

    2016-01-01

    In this study, a novel bio-inspired computing approach is developed to analyze the dynamics of nonlinear singular Thomas-Fermi equation (TFE) arising in potential and charge density models of an atom by exploiting the strength of finite difference scheme (FDS) for discretization and optimization through genetic algorithms (GAs) hybrid with sequential quadratic programming. The FDS procedures are used to transform the TFE differential equations into a system of nonlinear equations. A fitness function is constructed based on the residual error of constituent equations in the mean square sense and is formulated as the minimization problem. Optimization of parameters for the system is carried out with GAs, used as a tool for viable global search integrated with SQP algorithm for rapid refinement of the results. The design scheme is applied to solve TFE for five different scenarios by taking various step sizes and different input intervals. Comparison of the proposed results with the state of the art numerical and analytical solutions reveals that the worth of our scheme in terms of accuracy and convergence. The reliability and effectiveness of the proposed scheme are validated through consistently getting optimal values of statistical performance indices calculated for a sufficiently large number of independent runs to establish its significance.

  13. Reactive system verification case study: Fault-tolerant transputer communication

    Science.gov (United States)

    Crane, D. Francis; Hamory, Philip J.

    1993-01-01

    A reactive program is one which engages in an ongoing interaction with its environment. A system which is controlled by an embedded reactive program is called a reactive system. Examples of reactive systems are aircraft flight management systems, bank automatic teller machine (ATM) networks, airline reservation systems, and computer operating systems. Reactive systems are often naturally modeled (for logical design purposes) as a composition of autonomous processes which progress concurrently and which communicate to share information and/or to coordinate activities. Formal (i.e., mathematical) frameworks for system verification are tools used to increase the users' confidence that a system design satisfies its specification. A framework for reactive system verification includes formal languages for system modeling and for behavior specification and decision procedures and/or proof-systems for verifying that the system model satisfies the system specifications. Using the Ostroff framework for reactive system verification, an approach to achieving fault-tolerant communication between transputers was shown to be effective. The key components of the design, the decoupler processes, may be viewed as discrete-event-controllers introduced to constrain system behavior such that system specifications are satisfied. The Ostroff framework was also effective. The expressiveness of the modeling language permitted construction of a faithful model of the transputer network. The relevant specifications were readily expressed in the specification language. The set of decision procedures provided was adequate to verify the specifications of interest. The need for improved support for system behavior visualization is emphasized.

  14. Automated Verification of Specifications with Typestates and Access Permissions

    Science.gov (United States)

    Siminiceanu, Radu I.; Catano, Nestor

    2011-01-01

    We propose an approach to formally verify Plural specifications based on access permissions and typestates, by model-checking automatically generated abstract state-machines. Our exhaustive approach captures all the possible behaviors of abstract concurrent programs implementing the specification. We describe the formal methodology employed by our technique and provide an example as proof of concept for the state-machine construction rules. The implementation of a fully automated algorithm to generate and verify models, currently underway, provides model checking support for the Plural tool, which currently supports only program verification via data flow analysis (DFA).

  15. Hubble Space Telescope-Space Shuttle interface dynamic verification test

    Science.gov (United States)

    Blair, Mark A.; Vadlamudi, Nagarjuna

    1989-01-01

    A test program has been developed for the interface between the Space Shuttle Orbiter and the Hubble Space Telescope which couples a standard modal test for a simple suspended structure with a novel, 'interface verification' test. While the free-free modal test is used to verify the high loads generating structural modes due to the interaction of internal components of the structure with the rest of the structure, the interface verification test verifies the character of the high-loading generating modes in which the structure reacts against the booster interface. The novel method excites the structure at a single payload-booster interface DOF, while all other interfaces are left free to move.

  16. Formal Verification at System Level

    Science.gov (United States)

    Mazzini, S.; Puri, S.; Mari, F.; Melatti, I.; Tronci, E.

    2009-05-01

    System Level Analysis calls for a language comprehensible to experts with different background and yet precise enough to support meaningful analyses. SysML is emerging as an effective balance between such conflicting goals. In this paper we outline some the results obtained as for SysML based system level functional formal verification by an ESA/ESTEC study, with a collaboration among INTECS and La Sapienza University of Roma. The study focuses on SysML based system level functional requirements techniques.

  17. Empirical verification of evolutionary theories of aging.

    Science.gov (United States)

    Kyryakov, Pavlo; Gomez-Perez, Alejandra; Glebov, Anastasia; Asbah, Nimara; Bruno, Luigi; Meunier, Carolynne; Iouk, Tatiana; Titorenko, Vladimir I

    2016-10-25

    We recently selected 3 long-lived mutant strains of Saccharomyces cerevisiae by a lasting exposure to exogenous lithocholic acid. Each mutant strain can maintain the extended chronological lifespan after numerous passages in medium without lithocholic acid. In this study, we used these long-lived yeast mutants for empirical verification of evolutionary theories of aging. We provide evidence that the dominant polygenic trait extending longevity of each of these mutants 1) does not affect such key features of early-life fitness as the exponential growth rate, efficacy of post-exponential growth and fecundity; and 2) enhances such features of early-life fitness as susceptibility to chronic exogenous stresses, and the resistance to apoptotic and liponecrotic forms of programmed cell death. These findings validate evolutionary theories of programmed aging. We also demonstrate that under laboratory conditions that imitate the process of natural selection within an ecosystem, each of these long-lived mutant strains is forced out of the ecosystem by the parental wild-type strain exhibiting shorter lifespan. We therefore concluded that yeast cells have evolved some mechanisms for limiting their lifespan upon reaching a certain chronological age. These mechanisms drive the evolution of yeast longevity towards maintaining a finite yeast chronological lifespan within ecosystems.

  18. Fracture mechanics life analytical methods verification testing

    Science.gov (United States)

    Favenesi, J. A.; Clemons, T. G.; Riddell, W. T.; Ingraffea, A. R.; Wawrzynek, P. A.

    1994-01-01

    The objective was to evaluate NASCRAC (trademark) version 2.0, a second generation fracture analysis code, for verification and validity. NASCRAC was evaluated using a combination of comparisons to the literature, closed-form solutions, numerical analyses, and tests. Several limitations and minor errors were detected. Additionally, a number of major flaws were discovered. These major flaws were generally due to application of a specific method or theory, not due to programming logic. Results are presented for the following program capabilities: K versus a, J versus a, crack opening area, life calculation due to fatigue crack growth, tolerable crack size, proof test logic, tearing instability, creep crack growth, crack transitioning, crack retardation due to overloads, and elastic-plastic stress redistribution. It is concluded that the code is an acceptable fracture tool for K solutions of simplified geometries, for a limited number of J and crack opening area solutions, and for fatigue crack propagation with the Paris equation and constant amplitude loads when the Paris equation is applicable.

  19. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  20. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  1. 9 CFR 417.8 - Agency verification.

    Science.gov (United States)

    2010-01-01

    ... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part and all other applicable regulations. Such verification may include: (a) Reviewing the HACCP plan; (b...

  2. 78 FR 58492 - Generator Verification Reliability Standards

    Science.gov (United States)

    2013-09-24

    ... Synchronous Condenser Reactive Power Capability), MOD- 026-1 (Verification of Models and Data for Generator... (Verification and Data Reporting of Generator Real and Reactive Power Capability and Synchronous Condenser... Registry, NERC has registered 901 generator owners within the United States. Currently, synchronous...

  3. A correlation-based fingerprint verification system

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Veelenturf, L.P.J.; van der Zwaag, B.J.; Verwaaijen, G.T.B.

    In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the richer gray-scale information of the fingerprints. The correlation-based fingerprint verification system first selects appropriate templates

  4. A Model for Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2015-01-01

    Runtime verification concerns checking whether a system execution satisfies a given property. In this paper we propose a model for collaborative runtime verification where a network of local monitors collaborates in order to verify properties of the system. A local monitor has only a local view on

  5. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  6. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare these appro......The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare...... these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey...

  7. Towards an automated system for the verification and diagnosis of intelligent VLSI circuits

    Science.gov (United States)

    Velazco, Raoul; Ziade, Haissam

    The main features of a system designed to cope with both the verification and diagnosis of Very Large Scale Integration (VLSI) intelligent circuits are detailed. The system is composed of a validation program generator, the GAPT (French Acronym for automatic generation of test programs) software and a microprocessor dedicated verification system, the TEMAC functional tester. GAPT/TEMAC tools allow an easy implementation of a top down diagnosis procedure. Each diagnosis action is composed of symptom analysis, malfunction hypothesis statement, sequence generation, execution, and result evaluation. It was successfully used in various microprocessor qualification/validation experiments. The system capabilities and the diagnosis procedure are illustrated by an actual 68000 microprocessor diagnosis experiment.

  8. Source Code Verification for Embedded Systems using Prolog

    Directory of Open Access Journals (Sweden)

    Frank Flederer

    2017-01-01

    Full Text Available System relevant embedded software needs to be reliable and, therefore, well tested, especially for aerospace systems. A common technique to verify programs is the analysis of their abstract syntax tree (AST. Tree structures can be elegantly analyzed with the logic programming language Prolog. Moreover, Prolog offers further advantages for a thorough analysis: On the one hand, it natively provides versatile options to efficiently process tree or graph data structures. On the other hand, Prolog's non-determinism and backtracking eases tests of different variations of the program flow without big effort. A rule-based approach with Prolog allows to characterize the verification goals in a concise and declarative way. In this paper, we describe our approach to verify the source code of a flash file system with the help of Prolog. The flash file system is written in C++ and has been developed particularly for the use in satellites. We transform a given abstract syntax tree of C++ source code into Prolog facts and derive the call graph and the execution sequence (tree, which then are further tested against verification goals. The different program flow branching due to control structures is derived by backtracking as subtrees of the full execution sequence. Finally, these subtrees are verified in Prolog. We illustrate our approach with a case study, where we search for incorrect applications of semaphores in embedded software using the real-time operating system RODOS. We rely on computation tree logic (CTL and have designed an embedded domain specific language (DSL in Prolog to express the verification goals.

  9. 49 CFR 40.169 - Where is other information concerning the role of MROs and the verification process found in this...

    Science.gov (United States)

    2010-10-01

    ... PROGRAMS Medical Review Officers and the Verification Process § 40.169 Where is other information... 49 Transportation 1 2010-10-01 2010-10-01 false Where is other information concerning the role of MROs and the verification process found in this regulation? 40.169 Section 40.169 Transportation Office...

  10. Gender verification of female athletes.

    Science.gov (United States)

    Elsas, L J; Ljungqvist, A; Ferguson-Smith, M A; Simpson, J L; Genel, M; Carlson, A S; Ferris, E; de la Chapelle, A; Ehrhardt, A A

    2000-01-01

    The International Olympic Committee (IOC) officially mandated gender verification for female athletes beginning in 1968 and continuing through 1998. The rationale was to prevent masquerading males and women with "unfair, male-like" physical advantage from competing in female-only events. Visual observation and gynecological examination had been tried on a trial basis for two years at some competitions leading up to the 1968 Olympic Games, but these invasive and demeaning processes were jettisoned in favor of laboratory-based genetic tests. Sex chromatin and more recently DNA analyses for Y-specific male material were then required of all female athletes immediately preceding IOC-sanctioned sporting events, and many other international and national competitions following the IOC model. On-site gender verification has since been found to be highly discriminatory, and the cause of emotional trauma and social stigmatization for many females with problems of intersex who have been screened out from competition. Despite compelling evidence for the lack of scientific merit for chromosome-based screening for gender, as well as its functional and ethical inconsistencies, the IOC persisted in its policy for 30 years. The coauthors of this manuscript have worked with some success to rescind this policy through educating athletes and sports governors regarding the psychological and physical nature of sexual differentiation, and the inequities of genetic sex testing. In 1990, the International Amateur Athletics Federation (IAAF) called for abandonment of required genetic screening of women athletes, and by 1992 had adopted a fairer, medically justifiable model for preventing only male "impostors" in international track and field. At the recent recommendation of the IOC Athletes Commission, the Executive Board of the IOC has finally recognized the medical and functional inconsistencies and undue costs of chromosome-based methods. In 1999, the IOC ratified the abandonment of on

  11. Formal Verification of UML Profil

    DEFF Research Database (Denmark)

    Bhutto, Arifa; Hussain, Dil Muhammad Akbar

    2011-01-01

    The Unified Modeling Language (UML) is based on the Model Driven Development (MDD) approach which capturing the system functionality using the platform-independent model (PMI) and appropriate domain-specific languages. In UML base system notations, structural view is model by the class, components...... and object diagrams and behavioral view model by the activity, use case, state, and sequence diagram. However, UML does not provide the formal syntax, therefore its semantics is not formally definable, so for assure of correctness, we need to incorporate semantic reasoning through verification, specification......, refinement, and incorporate into the development process. Our motivation of research is to make an easy structural view and suggest formal technique/ method which can be best applied or used for the UML based development system. We investigate the tools and methods, which broadly used for the formal...

  12. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  13. Verification report for TBCODE, SIM2D and SIM3D (release 2.1)[Hydrogeology; Hydraulic conductivity fields

    Energy Technology Data Exchange (ETDEWEB)

    Morris, S

    1998-01-01

    This report is the Verification Report for the Turning Bands program 'TBCODE' for generating realizations of normally-distributed correlated multidimensional random fields. It also describes the verification of the subroutines 'SIM2D' and 'SIM3D', which form part of TBCODE, but which can be used separately with other programs to generate realizations of two- or three-dimensional correlated random fields. The report describes the suite of test cases used to verify the program. For each test case, a listing of the input data is given, and the output generated by the program is discussed. (author)

  14. Automated radiotherapy treatment plan integrity verification

    Energy Technology Data Exchange (ETDEWEB)

    Yang Deshan; Moore, Kevin L. [Department of Radiation Oncology, School of Medicine, Washington University in Saint Louis, St. Louis, Missouri 63110 (United States)

    2012-03-15

    Purpose: In our clinic, physicists spend from 15 to 60 min to verify the physical and dosimetric integrity of radiotherapy plans before presentation to radiation oncology physicians for approval. The purpose of this study was to design and implement a framework to automate as many elements of this quality control (QC) step as possible. Methods: A comprehensive computer application was developed to carry out a majority of these verification tasks in the Philips PINNACLE treatment planning system (TPS). This QC tool functions based on both PINNACLE scripting elements and PERL sub-routines. The core of this technique is the method of dynamic scripting, which involves a PERL programming module that is flexible and powerful for treatment plan data handling. Run-time plan data are collected, saved into temporary files, and analyzed against standard values and predefined logical rules. The results were summarized in a hypertext markup language (HTML) report that is displayed to the user. Results: This tool has been in clinical use for over a year. The occurrence frequency of technical problems, which would cause delays and suboptimal plans, has been reduced since clinical implementation. Conclusions: In addition to drastically reducing the set of human-driven logical comparisons, this QC tool also accomplished some tasks that are otherwise either quite laborious or impractical for humans to verify, e.g., identifying conflicts amongst IMRT optimization objectives.

  15. Privacy Preserving Iris Based Biometric Identity Verification

    Directory of Open Access Journals (Sweden)

    Przemyslaw Strzelczyk

    2011-08-01

    Full Text Available Iris biometrics is considered one of the most accurate and robust methods of identity verification. Individually unique iris features can be presented in a compact binary form easily compared with reference template to confirm identity. However, when templates or features are disclosed, iris biometrics is no longer suitable for verification. Therefore, there is a need to perform iris feature matching without revealing the features itself and reference template. The paper proposes an extension of the standard iris-based verification protocol that introduces features and a template locking mechanism, which guarantees that no sensitive information is exposed.Article in English

  16. MX Siting Investigation. Geotechnical Evaluation. Volume I. Arizona Verification Studies, FY 79, and Geotechnical Data, La Posa CDP, Arizona.

    Science.gov (United States)

    1979-11-15

    has been ejected onto the earth’s surface (e.g., lava , basalt, rhyolite, andesite; detrital material, volcanic tuff , pumice). FAULT - A plane or zone...terrain criterion has had the greatest impact on the loss of suitable area during the Verification program, especially in the Butler site. 2.2 BASIN...tains, including the entire Date Creek Basin, and west to the pass into Ranegras Plain. The Verification site includes that part of the CDP which

  17. Design verification and cold-flow modeling test report

    Energy Technology Data Exchange (ETDEWEB)

    1993-07-01

    This report presents a compilation of the following three test reports prepared by TRW for Alaska Industrial Development and Export Authority (AIDEA) as part of the Healy Clean Coal Project, Phase 1 Design of the TRW Combustor and Auxiliary Systems, which is co-sponsored by the Department of Energy under the Clean Coal Technology 3 Program: (1) Design Verification Test Report, dated April 1993, (2) Combustor Cold Flow Model Report, dated August 28, 1992, (3) Coal Feed System Cold Flow Model Report, October 28, 1992. In this compilation, these three reports are included in one volume consisting of three parts, and TRW proprietary information has been excluded.

  18. Verification and validation of decision support software: Expert Choice{trademark} and PCM{trademark}

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, Q.H.; Martin, J.D.

    1994-11-04

    This report documents the verification and validation of two decision support programs: EXPERT CHOICE{trademark} and PCM{trademark}. Both programs use the Analytic Hierarchy Process (AHP) -- or pairwise comparison technique -- developed by Dr. Thomas L. Saaty. In order to provide an independent method for the validating the two programs, the pairwise comparison algorithm was developed for a standard mathematical program. A standard data set -- selecting a car to purchase -- was used with each of the three programs for validation. The results show that both commercial programs performed correctly.

  19. Short communication: Parentage verification of South African ...

    African Journals Online (AJOL)

    Short communication: Parentage verification of South African Angora goats, using microsatellite markers. ... South African Journal of Animal Science. Journal Home ... Eighteen markers were tested in 192 South African Angora goats representing different family structures with known and unknown parent information.

  20. Automated continuous verification for numerical simulation

    Directory of Open Access Journals (Sweden)

    P. E. Farrell

    2011-05-01

    Full Text Available Verification is a process crucially important for the final users of a computational model: code is useless if its results cannot be relied upon. Typically, verification is seen as a discrete event, performed once and for all after development is complete. However, this does not reflect the reality that many geoscientific codes undergo continuous development of the mathematical model, discretisation and software implementation. Therefore, we advocate that in such cases verification must be continuous and happen in parallel with development: the desirability of their automation follows immediately. This paper discusses a framework for automated continuous verification of wide applicability to any kind of numerical simulation. It also documents a range of test cases to show the possibilities of the framework.

  1. Tackling Verification and Validation for Prognostics

    Data.gov (United States)

    National Aeronautics and Space Administration — Verification and validation (V&V) has been identified as a critical phase in fielding systems with Integrated Systems Health Management (ISHM) solutions to...

  2. Seismic design verification of LMFBR structures

    Energy Technology Data Exchange (ETDEWEB)

    1977-07-01

    The report provides an assessment of the seismic design verification procedures currently used for nuclear power plant structures, a comparison of dynamic test methods available, and conclusions and recommendations for future LMFB structures.

  3. Language dependence in multilingual speaker verification

    CSIR Research Space (South Africa)

    Kleynhans, NT

    2005-11-01

    Full Text Available An investigation into the performance of current speaker verification technology within a multilingual context is presented. Using the Oregon Graduate Institute (OGI) Multi-Language Telephone Speech Corpus (MLTS) database, the authors found...

  4. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  5. Polarimetric and Interferometric SAR Calibration Verification Methods

    Science.gov (United States)

    Kim, Y.; Zyl, J van

    2001-01-01

    It is necessary to calibrate SAR data in order to use the data for science applications. When both polarimetric and interferometric data are collected simultaneously, these SAR data can be used for cross-calibration and verification.

  6. Procedure Verification and Validation Toolset Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed research is aimed at investigating a procedure verification and validation toolset, which will allow the engineers who are responsible for developing...

  7. Model Checking, Abstraction, and Compositional Verification

    Science.gov (United States)

    1993-07-01

    a mathematical model of the design is proved to satisfy a precise specification. Model checking is one formal verification technique. It consists of...involving the sequencing of events in time. One of the main drawbacks of model checking is the state explosion problem. This problem occurs in systems...considers two methods for avoiding the state explosion problem in the context of model checking : compositional verification and abstraction

  8. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  9. Transmutation Fuel Performance Code Thermal Model Verification

    Energy Technology Data Exchange (ETDEWEB)

    Gregory K. Miller; Pavel G. Medvedev

    2007-09-01

    FRAPCON fuel performance code is being modified to be able to model performance of the nuclear fuels of interest to the Global Nuclear Energy Partnership (GNEP). The present report documents the effort for verification of the FRAPCON thermal model. It was found that, with minor modifications, FRAPCON thermal model temperature calculation agrees with that of the commercial software ABAQUS (Version 6.4-4). This report outlines the methodology of the verification, code input, and calculation results.

  10. Scalable hardware verification with symbolic simulation

    CERN Document Server

    Bertacco, Valeria

    2006-01-01

    An innovative presentation of the theory of disjoint support decomposition, presenting novel results and algorithms, plus original and up-to-date techniques in formal verificationProvides an overview of current verification techniques, and unveils the inner workings of symbolic simulationFocuses on new techniques that narrow the performance gap between the complexity of digital systems and the limited ability to verify themAddresses key topics in need of future research.

  11. Analysis, Test and Verification in The Presence of Variability (Dagstuhl Seminar 13091)

    DEFF Research Database (Denmark)

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 13091 “Analysis, Test and Verification in The Presence of Variability”. The seminar had the goal of consolidating and stimulating research on analysis of software models with variability, enabling the design of variability-awa...

  12. Environmental Technology Verification--Baghouse Filtration Products: GE Energy QG061 Filtration Media (Tested September 2008)

    Science.gov (United States)

    This report reviews the filtration and pressure drop performance of GE Energy's QG061 filtration media. Environmental Technology Verification (ETV) testing of this technology/product was conducted during a series of tests in September 2008. The objective of the ETV Program is to ...

  13. Clinical Skills Verification in General Psychiatry: Recommendations of the ABPN Task Force on Rater Training

    Science.gov (United States)

    Jibson, Michael D.; Broquet, Karen E.; Anzia, Joan Meyer; Beresin, Eugene V.; Hunt, Jeffrey I.; Kaye, David; Rao, Nyapati Raghu; Rostain, Anthony Leon; Sexson, Sandra B.; Summers, Richard F.

    2012-01-01

    Objective: The American Board of Psychiatry and Neurology (ABPN) announced in 2007 that general psychiatry training programs must conduct Clinical Skills Verification (CSV), consisting of observed clinical interviews and case presentations during residency, as one requirement to establish graduates' eligibility to sit for the written certification…

  14. FY 2000 report on the survey of the joint verification project on the environmental harmony type coal utilization system. Green Helmet Program on the verification project on the low grade coal combustion system (Zhejiang Huba Corporation of Jiangshan, Zheijiang Province, China); 2000 nendo kankyo chowagata sekitan riyo system kyodo jissho jigyo chosa hokokusho. Teihin'itan nensho system no jissho jigyo ni kakawaru green helmet jigyo (Chuka Jinmin Kyowakoku Zheijiang sho Jiangshan shi Zheijiang Huba Shudan Koji)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The verification project on the low grade coal combustion system which was implemented in China is to remove/reduce sulfur oxide in combustion gas by the circulating fluidized bed boiler combustion technology. To promote the spread of the results of the verification, conducted were the technical guidance given by engineers sent from Japan and the technical training for engineers received from China. After the completion of the verification project in March 2000, the continuous operation using the low grade coal with the lower value than the designed value had been conducted, but the concentration of the dust/soot in flue gas came not to satisfy the environmental standard. As a result of the survey, it was found that the performance of electrostatic precipitator improved by blowing vapor into the flue gas and adjusting the concentration of water content, and the operation at values below the environmental standard was made possible. As to the technical training for engineers from China, conducted were inspections of the internal circulating fluidized bed boiler equipment of Daishowa Paper Manufacturing Company in Fuji city, Shizuoka prefecture, and of the fluidized bed incineration equipment at refuse incineration facilities in Atsugi city, Kanagawa prefecture, technical guidance on the operation technology by using the model project equipment, technical exchanges of the periphery technology relating to the technology for the model project, etc. (NEDO)

  15. On the Feasibility of a Unified Modelling and Programming Paradigm

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    2016-01-01

    In this article, the feasibility of a unified modelling and programming paradigm is discussed from the perspective of large scale system development and verification in collaborative development environments. We motivate the necessity to utilise multiple formalisms for development and verification......, in particular for complex cyber-physical systems or systems of systems. Though modelling, programming, and verification will certainly become more closely integrated in the future, we do not expect a single formalism to become universally applicable and accepted by the development and verification communities....... The multi-formalism approach requires to translate verification artefacts (assertions, test cases, etc.) between different representations, in order to allow for the verification of emergent properties based on local verification results established with different methods and modelling techniques...

  16. Developing a Verification and Training Phantom for Gynecological Brachytherapy System

    Directory of Open Access Journals (Sweden)

    Mahbobeh Nazarnejad

    2012-03-01

    Full Text Available Introduction Dosimetric accuracy is a major issue in the quality assurance (QA program for treatment planning systems (TPS. An important contribution to this process has been a proper dosimetry method to guarantee the accuracy of delivered dose to the tumor. In brachytherapy (BT of gynecological (Gyn cancer it is usual to insert a combination of tandem and ovoid applicators with a complicated geometry which makes their dosimetry verification difficult and important. Therefore, evaluation and verification of dose distribution is necessary for accurate dose delivery to the patients. Materials and Methods The solid phantom was made from Perspex slabs as a tool for intracavitary brachytherapy dosimetric QA. Film dosimetry (EDR2 was done for a combination of ovoid and tandem applicators introduced by Flexitron brachytherapy system. Treatment planning was also done with Flexiplan 3D-TPS to irradiate films sandwiched between phantom slabs. Isodose curves obtained from treatment planning system and the films were compared with each other in 2D and 3D manners. Results The brachytherapy solid phantom was constructed with slabs. It was possible to insert tandems and ovoids loaded with radioactive source of Ir-192 subsequently. Relative error was 3-8.6% and average relative error was 5.08% in comparison with the films and TPS isodose curves. Conclusion Our results showed that the difference between TPS and the measurements is well within the acceptable boundaries and below the action level according to AAPM TG.45. Our findings showed that this phantom after minor corrections can be used as a method of choice for inter-comparison analysis of TPS and to fill the existing gap for accurate QA program in intracavitary brachytherapy. The constructed phantom also showed that it can be a valuable tool for verification of accurate dose delivery to the patients as well as training for brachytherapy residents and physics students.

  17. Visual inspection for CTBT verification

    Energy Technology Data Exchange (ETDEWEB)

    Hawkins, W.; Wohletz, K.

    1997-03-01

    On-site visual inspection will play an essential role in future Comprehensive Test Ban Treaty (CTBT) verification. Although seismic and remote sensing techniques are the best understood and most developed methods for detection of evasive testing of nuclear weapons, visual inspection can greatly augment the certainty and detail of understanding provided by these more traditional methods. Not only can visual inspection offer ``ground truth`` in cases of suspected nuclear testing, but it also can provide accurate source location and testing media properties necessary for detailed analysis of seismic records. For testing in violation of the CTBT, an offending party may attempt to conceal the test, which most likely will be achieved by underground burial. While such concealment may not prevent seismic detection, evidence of test deployment, location, and yield can be disguised. In this light, if a suspicious event is detected by seismic or other remote methods, visual inspection of the event area is necessary to document any evidence that might support a claim of nuclear testing and provide data needed to further interpret seismic records and guide further investigations. However, the methods for visual inspection are not widely known nor appreciated, and experience is presently limited. Visual inspection can be achieved by simple, non-intrusive means, primarily geological in nature, and it is the purpose of this report to describe the considerations, procedures, and equipment required to field such an inspection.

  18. From Livingstone to SMV: Formal Verification for Autonomous Spacecrafts

    Science.gov (United States)

    Pecheur, Charles; Simmons, Reid

    2000-01-01

    To fulfill the needs of its deep space exploration program, NASA is actively supporting research and development in autonomy software. However, the reliable and cost-effective development and validation of autonomy systems poses a tough challenge. Traditional scenario-based testing methods fall short because of the combinatorial explosion of possible situations to be analyzed, and formal verification techniques typically require a tedious, manual modelling by formal method experts. This paper presents the application of formal verification techniques in the development of autonomous controllers based on Livingstone, a model-based health-monitoring system that can detect and diagnose anomalies and suggest possible recovery actions. We present a translator that converts the models used by Livingstone into specifications that can be verified with the SMV model checker. The translation frees the Livingstone developer from the tedious conversion of his design to SMV, and isolates him from the technical details of the SMV program. We describe different aspects of the translation and briefly discuss its application to several NASA domains.

  19. The space shuttle launch vehicle aerodynamic verification challenges

    Science.gov (United States)

    Wallace, R. O.; Austin, L. D.; Hondros, J. G.; Surber, T. E.; Gaines, L. M.; Hamilton, J. T.

    1985-01-01

    The Space Shuttle aerodynamics and performance communities were challenged to verify the Space Shuttle vehicle (SSV) aerodynamics and system performance by flight measurements. Historically, launch vehicle flight test programs which faced these same challenges were unmanned instrumented flights of simple aerodynamically shaped vehicles. However, the manned SSV flight test program made these challenges more complex because of the unique aerodynamic configuration powered by the first man-rated solid rocket boosters (SRB). The analyses of flight data did not verify the aerodynamics or performance preflight predictions of the first flight of the Space Transportation System (STS-1). However, these analyses have defined the SSV aerodynamics and verified system performance. The aerodynamics community also was challenged to understand the discrepancy between the wind tunnel and flight defined aerodynamics. The preflight analysis challenges, the aerodynamic extraction challenges, and the postflight analyses challenges which led to the SSV system performance verification and which will lead to the verification of the operational ascent aerodynamics data base are presented.

  20. A Methodology for Evaluating Artifacts Produced by a Formal Verification Process

    Science.gov (United States)

    Siminiceanu, Radu I.; Miner, Paul S.; Person, Suzette

    2011-01-01

    The goal of this study is to produce a methodology for evaluating the claims and arguments employed in, and the evidence produced by formal verification activities. To illustrate the process, we conduct a full assessment of a representative case study for the Enabling Technology Development and Demonstration (ETDD) program. We assess the model checking and satisfiabilty solving techniques as applied to a suite of abstract models of fault tolerant algorithms which were selected to be deployed in Orion, namely the TTEthernet startup services specified and verified in the Symbolic Analysis Laboratory (SAL) by TTTech. To this end, we introduce the Modeling and Verification Evaluation Score (MVES), a metric that is intended to estimate the amount of trust that can be placed on the evidence that is obtained. The results of the evaluation process and the MVES can then be used by non-experts and evaluators in assessing the credibility of the verification results.

  1. Convex polyhedral abstractions, specialisation and property-based predicate splitting in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2014-01-01

    We present an approach to constrained Horn clause (CHC) verification combining three techniques: abstract interpretation over a domain of convex polyhedra, specialisation of the constraints in CHCs using abstract interpretation of query-answer transformed clauses, and refinement by splitting...... predicates. The purpose of the work is to investigate how analysis and transformation tools developed for constraint logic programs (CLP) can be applied to the Horn clause verification problem. Abstract interpretation over convex polyhedra is capable of deriving sophisticated invariants and when used...... in conjunction with specialisation for propagating constraints it can frequently solve challenging verification problems. This is a contribution in itself, but refinement is needed when it fails, and the question of how to refine convex polyhedral analyses has not been studied much. We present a refinement...

  2. An integrated user-oriented laboratory for verification of digital flight control systems: Features and capabilities

    Science.gov (United States)

    Defeo, P.; Doane, D.; Saito, J.

    1982-01-01

    A Digital Flight Control Systems Verification Laboratory (DFCSVL) has been established at NASA Ames Research Center. This report describes the major elements of the laboratory, the research activities that can be supported in the area of verification and validation of digital flight control systems (DFCS), and the operating scenarios within which these activities can be carried out. The DFCSVL consists of a palletized dual-dual flight-control system linked to a dedicated PDP-11/60 processor. Major software support programs are hosted in a remotely located UNIVAC 1100 accessible from the PDP-11/60 through a modem link. Important features of the DFCSVL include extensive hardware and software fault insertion capabilities, a real-time closed loop environment to exercise the DFCS, an integrated set of software verification tools, and a user-oriented interface to all the resources and capabilities.

  3. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...... the additional benefit of generating SSA as a side effect, which may be immediately useful for a subsequent dynamic compilation stage....

  4. DMPL: Programming and Verifying Distributed Mixed Synchrony and Mixed Critical Software

    Science.gov (United States)

    2016-06-16

    development center. References herein to any specific commercial product, process , or service by trade name, trade mark, manufacturer , or otherwise, does not... automated bounded model checking, and deductive verification with manually-supplied invariants. dmpl programming and verification are validated on several... Verification to occam-π. In Proceedings of the 33th Communicating Process Architectures Conference (CPA’11), Concurrent Systems Engineering Series

  5. Industrial hardware and software verification with ACL2.

    Science.gov (United States)

    Hunt, Warren A; Kaufmann, Matt; Moore, J Strother; Slobodova, Anna

    2017-10-13

    The ACL2 theorem prover has seen sustained industrial use since the mid-1990s. Companies that have used ACL2 regularly include AMD, Centaur Technology, IBM, Intel, Kestrel Institute, Motorola/Freescale, Oracle and Rockwell Collins. This paper introduces ACL2 and focuses on how and why ACL2 is used in industry. ACL2 is well-suited to its industrial application to numerous software and hardware systems, because it is an integrated programming/proof environment supporting a subset of the ANSI standard Common Lisp programming language. As a programming language ACL2 permits the coding of efficient and robust programs; as a prover ACL2 can be fully automatic but provides many features permitting domain-specific human-supplied guidance at various levels of abstraction. ACL2 specifications and models often serve as efficient execution engines for the modelled artefacts while permitting formal analysis and proof of properties. Crucially, ACL2 also provides support for the development and verification of other formal analysis tools. However, ACL2 did not find its way into industrial use merely because of its technical features. The core ACL2 user/development community has a shared vision of making mechanized verification routine when appropriate and has been committed to this vision for the quarter century since the Computational Logic, Inc., Verified Stack. The community has focused on demonstrating the viability of the tool by taking on industrial projects (often at the expense of not being able to publish much).This article is part of the themed issue 'Verified trustworthy software systems'. © 2017 The Author(s).

  6. Simulator Semantics for System Level Formal Verification

    Directory of Open Access Journals (Sweden)

    Toni Mancini

    2015-09-01

    Full Text Available Many simulation based Bounded Model Checking approaches to System Level Formal Verification (SLFV have been devised. Typically such approaches exploit the capability of simulators to save computation time by saving and restoring the state of the system under simulation. However, even though such approaches aim to (bounded formal verification, as a matter of fact, the simulator behaviour is not formally modelled and the proof of correctness of the proposed approaches basically relies on the intuitive notion of simulator behaviour. This gap makes it hard to check if the optimisations introduced to speed up the simulation do not actually omit checking relevant behaviours of the system under verification. The aim of this paper is to fill the above gap by presenting a formal semantics for simulators.

  7. PECULIARITIES OF MORPHOLOGICAL VERIFICATION IN BREAST CANCER

    Directory of Open Access Journals (Sweden)

    L.F. Zhandarova

    2008-06-01

    Full Text Available 80 case histories of patients with breast cancer were analyzed. During the preoperative examination with objective and instrumental examination methods used the malignant process was suspected but no morphological verification was received. Physical examination revealed 75% cases of cancer. Roentgenologic evidence of malignant tumor was found in 43.5% women. Ultrasound examination of mammary glands showed that 57.7% of patients had cancer symptoms. Despite the repeated puncture aspiration biopsy, preoperative morphological examination proved to be negative. The reasons of morphological verification failure are connected with technical difficulties and morphological features of tumor structure. Negative malignant process verification necessitated the diagnostic partial mastectomy. To achieve ablasticity ofexcisional biopsyit is necessary to keep 2 cm from the tumor. Staged morphological diagnosis verifies the diagnosis in all patients, allowing to choose the adequate extentof surgical procedures.

  8. Constraint Specialisation in Horn Clause Verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2015-01-01

    We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query-answer transformation of a given set of clauses and a goal. The effect is to propagate the constraints from the goal top-down and p......We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query-answer transformation of a given set of clauses and a goal. The effect is to propagate the constraints from the goal top...... results on verification problems show that this is an effective transformation, both in our own verification tools (convex polyhedra analyser) and as a pre-processor to other Horn clause verification tools....

  9. Constraint specialisation in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2017-01-01

    We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query–answer transformed version of a given set of clauses and a goal. The constraints from the model are then used to compute a speciali......We present a method for specialising the constraints in constrained Horn clauses with respect to a goal. We use abstract interpretation to compute a model of a query–answer transformed version of a given set of clauses and a goal. The constraints from the model are then used to compute...... underlying the clauses. Experimental results on verification problems show that this is an effective transformation, both in our own verification tools (based on a convex polyhedra analyser) and as a pre-processor to other Horn clause verification tools....

  10. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Andersen, J.H.; Kristensen, C.H.; Skou, A.

    1996-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  11. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Andersen, J.H.; Skou, A.

    1995-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  12. Verification and quality control of routine hematology analyzers

    NARCIS (Netherlands)

    Vis, J Y; Huisman, A|info:eu-repo/dai/nl/255170653

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and

  13. The formal verification of generic interpreters

    Science.gov (United States)

    Windley, P.; Levitt, K.; Cohen, G. C.

    1991-01-01

    The task assignment 3 of the design and validation of digital flight control systems suitable for fly-by-wire applications is studied. Task 3 is associated with formal verification of embedded systems. In particular, results are presented that provide a methodological approach to microprocessor verification. A hierarchical decomposition strategy for specifying microprocessors is also presented. A theory of generic interpreters is presented that can be used to model microprocessor behavior. The generic interpreter theory abstracts away the details of instruction functionality, leaving a general model of what an interpreter does.

  14. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  15. Time Optimal Reachability Analysis Using Swarm Verification

    DEFF Research Database (Denmark)

    Zhang, Zhengkui; Nielsen, Brian; Larsen, Kim Guldstrand

    2016-01-01

    and planning problems, response time optimization etc. We propose swarm verification to accelerate time optimal reachability using the real-time model-checker Uppaal. In swarm verification, a large number of model checker instances execute in parallel on a computer cluster using different, typically randomized...... search strategies. We develop four swarm algorithms and evaluate them with four models in terms scalability, and time- and memory consumption. Three of these cooperate by exchanging costs of intermediate solutions to prune the search using a branch-and-bound approach. Our results show that swarm...

  16. Towards Verification and Validation for Increased Autonomy

    Science.gov (United States)

    Giannakopoulou, Dimitra

    2017-01-01

    This presentation goes over the work we have performed over the last few years on verification and validation of the next generation onboard collision avoidance system, ACAS X, for commercial aircraft. It describes our work on probabilistic verification and synthesis of the model that ACAS X is based on, and goes on to the validation of that model with respect to actual simulation and flight data. The presentation then moves on to identify the characteristics of ACAS X that are related to autonomy and to discuss the challenges that autonomy pauses on VV. All work presented has already been published.

  17. Alignment Verification in the Early Stage of Service Design

    OpenAIRE

    Tapandjieva, Gorica; Filipponi, Matteo; Wegmann, Alain

    2017-01-01

    Verification is a costly task, sometimes burdensome and tedious, requiring strong formal background. To reduce the effort and cost invested in verification, we developed a model-driven approach for automatic verification of service properties, done in the early service design phase. Our approach is based on SEAM, a service modeling method, and it incorporates a verification system called Leon. With our approach service designers do not need substantial understanding of specific formal and ver...

  18. TLM.open: a SystemC/TLM Frontend for the CADP Verification Toolbox

    Directory of Open Access Journals (Sweden)

    Claude Helmstetter

    2014-04-01

    Full Text Available SystemC/TLM models, which are C++ programs, allow the simulation of embedded software before hardware low-level descriptions are available and are used as golden models for hardware verification. The verification of the SystemC/TLM models is an important issue since an error in the model can mislead the system designers or reveal an error in the specifications. An open-source simulator for SystemC/TLM is provided but there are no tools for formal verification.In order to apply model checking to a SystemC/TLM model, a semantics for standard C++ code and for specific SystemC/TLM features must be provided. The usual approach relies on the translation of the SystemC/TLM code into a formal language for which a model checker is available.We propose another approach that suppresses the error-prone translation effort. Given a SystemC/TLM program, the transitions are obtained by executing the original code using g++ and an extended SystemC library, and we ask the user to provide additional functions to store the current model state. These additional functions generally represent less than 20% of the size of the original model, and allow it to apply all CADP verification tools to the SystemC/TLM model itself.

  19. Statistical methods to correct for verification bias in diagnostic studies are inadequate when there are few false negatives: a simulation study

    Directory of Open Access Journals (Sweden)

    Vickers Andrew J

    2008-11-01

    Full Text Available Abstract Background A common feature of diagnostic research is that results for a diagnostic gold standard are available primarily for patients who are positive for the test under investigation. Data from such studies are subject to what has been termed "verification bias". We evaluated statistical methods for verification bias correction when there are few false negatives. Methods A simulation study was conducted of a screening study subject to verification bias. We compared estimates of the area-under-the-curve (AUC corrected for verification bias varying both the rate and mechanism of verification. Results In a single simulated data set, varying false negatives from 0 to 4 led to verification bias corrected AUCs ranging from 0.550 to 0.852. Excess variation associated with low numbers of false negatives was confirmed in simulation studies and by analyses of published studies that incorporated verification bias correction. The 2.5th – 97.5th centile range constituted as much as 60% of the possible range of AUCs for some simulations. Conclusion Screening programs are designed such that there are few false negatives. Standard statistical methods for verification bias correction are inadequate in this circumstance.

  20. Verification of RESRAD-RDD. (Version 2.01)

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Jing-Jy [Argonne National Lab. (ANL), Argonne, IL (United States); Flood, Paul E. [Argonne National Lab. (ANL), Argonne, IL (United States); LePoire, David [Argonne National Lab. (ANL), Argonne, IL (United States); Kamboj, Sunita [Argonne National Lab. (ANL), Argonne, IL (United States); Yu, Charley [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-09-01

    In this report, the results generated by RESRAD-RDD version 2.01 are compared with those produced by RESRAD-RDD version 1.7 for different scenarios with different sets of input parameters. RESRAD-RDD version 1.7 is spreadsheet-driven, performing calculations with Microsoft Excel spreadsheets. RESRAD-RDD version 2.01 revamped version 1.7 by using command-driven programs designed with Visual Basic.NET to direct calculations with data saved in Microsoft Access database, and re-facing the graphical user interface (GUI) to provide more flexibility and choices in guideline derivation. Because version 1.7 and version 2.01 perform the same calculations, the comparison of their results serves as verification of both versions. The verification covered calculation results for 11 radionuclides included in both versions: Am-241, Cf-252, Cm-244, Co-60, Cs-137, Ir-192, Po-210, Pu-238, Pu-239, Ra-226, and Sr-90. At first, all nuclidespecific data used in both versions were compared to ensure that they are identical. Then generic operational guidelines and measurement-based radiation doses or stay times associated with a specific operational guideline group were calculated with both versions using different sets of input parameters, and the results obtained with the same set of input parameters were compared. A total of 12 sets of input parameters were used for the verification, and the comparison was performed for each operational guideline group, from A to G, sequentially. The verification shows that RESRAD-RDD version 1.7 and RESRAD-RDD version 2.01 generate almost identical results; the slight differences could be attributed to differences in numerical precision with Microsoft Excel and Visual Basic.NET. RESRAD-RDD version 2.01 allows the selection of different units for use in reporting calculation results. The results of SI units were obtained and compared with the base results (in traditional units) used for comparison with version 1.7. The comparison shows that RESRAD

  1. 30 CFR 50.41 - Verification of reports.

    Science.gov (United States)

    2010-07-01

    ..., INJURIES, ILLNESSES, EMPLOYMENT, AND COAL PRODUCTION IN MINES Maintenance of Records; Verification of Information § 50.41 Verification of reports. Upon request by MSHA, an operator shall allow MSHA to inspect and... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Verification of reports. 50.41 Section 50.41...

  2. 19 CFR 351.307 - Verification of information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Verification of information. 351.307 Section 351... COUNTERVAILING DUTIES Information and Argument § 351.307 Verification of information. (a) Introduction. Prior to... verify relevant factual information. This section clarifies when verification will occur, the contents of...

  3. 7 CFR 1260.550 - Verification of information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Verification of information. 1260.550 Section 1260... Cattlemen's Beef Promotion and Research Board § 1260.550 Verification of information. The Secretary may require verification of the information to determine eligibility for certification to make nominations...

  4. The Construction of Verification Models for Embedded Systems

    NARCIS (Netherlands)

    Mader, Angelika H.; Wupper, H.; Boon, Mieke

    2007-01-01

    The usefulness of verification hinges on the quality of the verification model. Verification is useful if it increases our confidence that an artefact bahaves as expected. As modelling inherently contains non-formal elements, the qualityof models cannot be captured by purely formal means. Still, we

  5. 34 CFR 668.54 - Selection of applications for verification.

    Science.gov (United States)

    2010-07-01

    ... POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION STUDENT ASSISTANCE GENERAL PROVISIONS Verification of Student Aid Application Information § 668.54 Selection of applications for verification. (a) General... 34 Education 3 2010-07-01 2010-07-01 false Selection of applications for verification. 668.54...

  6. Automated Verification of Mesoscale Forecasts using Image Processing Techniques

    Science.gov (United States)

    2005-09-30

    human-machine interaction, and model and forecast verification with an emphasis on mesoscale ensembles and visualization of uncertainty . The... uncertainty . The verification effort?s long-term goal is to develop an automated, objective verification technique for assessment of very high-resolution...into the MVT framework. These include agglomerative cluster analysis (Marzban and Sandgathe, 2005) and variograms . WORK COMPLETED FY2003

  7. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  8. Multi-Modal Human Verification Using Face and Speech

    OpenAIRE

    Park, Changhan; Paik, Joonki

    2007-01-01

    In this chapter, we present a human verification method using combined face and speech information in order to improve the problem of single biometric verification. Single biometric verification has the fundamental problems of high FAR and FRR. So we present a

  9. 19 CFR 181.72 - Verification scope and method.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Verification scope and method. 181.72 Section 181... THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Origin Verifications and Determinations § 181.72 Verification scope and method. (a) General. Subject to paragraph (e) of this section, Customs...

  10. 40 CFR 1065.342 - Sample dryer verification.

    Science.gov (United States)

    2010-07-01

    ...-membrane dryer or thermal chiller. (d) Sample dryer verification procedure. Use the following method to... specifications plus 0.002 mol/mol. (e) Alternate sample dryer verification procedure. The following method may be... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Sample dryer verification. 1065.342...

  11. Parallel photomask pattern data conversion and verification system

    Science.gov (United States)

    Kanai, Yasunori; Shimada, Toshiji; Sekigawa, Kazunari; Nishi, Makoto; Ishihara, Yasufumi; Mori, Jun-ichi; Akutagawa, Satoshi; Takahashi, Kazuhiko; Miyauchi, Touru

    1996-07-01

    This system is designed to convert and to verify different types of LSI layout design data and EB writer data, such as GDS-II, MEBES, and JEOL, with the help of its original internal format. The internal format data can be processed not only by a single workstation sequentially but also by network-linked workstations or a single workstation having two or more processing units concurrently. This parallel processing mechanism enables the system to reduce total processing time when handling large volume of data. The resultant internal format data produced by the conversion processes including logical operations, magnifications, and re-sizing operations can be immediately verified by built-in DRC program that is driven by a series of user commands, which consequently yields highly reliable output EB writer data. The built-in pattern viewer can graphically visualize any combination of the layout design data, the EB writer data, and the results of each conversion and verification in the same display window to provide users with an intuitive and easy method for verification. The features of the system and the parallel processing performance are described in this paper.

  12. Space Shuttle Day-of-Launch Trajectory Design and Verification

    Science.gov (United States)

    Harrington, Brian E.

    2010-01-01

    A top priority of any launch vehicle is to insert as much mass into the desired orbit as possible. This requirement must be traded against vehicle capability in terms of dynamic control, thermal constraints, and structural margins. The vehicle is certified to a specific structural envelope which will yield certain performance characteristics of mass to orbit. Some envelopes cannot be certified generically and must be checked with each mission design. The most sensitive envelopes require an assessment on the day-of-launch. To further minimize vehicle loads while maximizing vehicle performance, a day-of-launch trajectory can be designed. This design is optimized according to that day s wind and atmospheric conditions, which will increase the probability of launch. The day-of-launch trajectory verification is critical to the vehicle's safety. The Day-Of-Launch I-Load Uplink (DOLILU) is the process by which the Space Shuttle Program redesigns the vehicle steering commands to fit that day's environmental conditions and then rigorously verifies the integrated vehicle trajectory's loads, controls, and performance. The Shuttle methodology is very similar to other United States unmanned launch vehicles. By extension, this method would be similar to the methods employed for any future NASA launch vehicles. This presentation will provide an overview of the Shuttle's day-of-launch trajectory optimization and verification as an example of a more generic application of dayof- launch design and validation.

  13. A Comparison of Modular Verification Techniques

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif; Staunstrup, Jørgen; Maretti, Niels

    1997-01-01

    This paper presents and compares three techniques for mechanized verification of state oriented design descriptions. One is a traditional forwardgeneration of a fixed point characterizing the reachable states. The two others can utilize a modular structure provided by the designer. Onerequires...

  14. Safe Neighborhood Computation for Hybrid System Verification

    Directory of Open Access Journals (Sweden)

    Yi Deng

    2015-01-01

    Full Text Available For the design and implementation of engineering systems, performing model-based analysis can disclose potential safety issues at an early stage. The analysis of hybrid system models is in general difficult due to the intrinsic complexity of hybrid dynamics. In this paper, a simulation-based approach to formal verification of hybrid systems is presented.

  15. Standardized Definitions for Code Verification Test Problems

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-14

    This document contains standardized definitions for several commonly used code verification test problems. These definitions are intended to contain sufficient information to set up the test problem in a computational physics code. These definitions are intended to be used in conjunction with exact solutions to these problems generated using Exact- Pack, www.github.com/lanl/exactpack.

  16. Patient position verification with oblique radiation beams

    NARCIS (Netherlands)

    Sijtsema, Nanna M.; van den Bergh, Alfons C. M.; Burlage, Fred R.; Bijl, Henk P.; Langendijk, Johannes A.; Meertens, Harm

    2007-01-01

    Purpose: In this study we investigated whether the position of head and neck cancer patients during radiotherapy could be determined from portal images of oblique radiation beams. Currently applied additional anterior posterior (AP) and lateral verification beams could then be abandoned. Method: The

  17. Mechanical verification of Lamport's Bakery algorithm

    NARCIS (Netherlands)

    Hesselink, Wim H.

    2013-01-01

    Proof assistants like PVS can be used fruitfully for the design and verification of concurrent algorithms. The technique is presented here by applying it to Lamport's Bakery algorithm. The proofs for safety properties such as mutual exclusion, first-come first-served, and absence of deadlock are

  18. Unification & sharing in timed automata verification

    DEFF Research Database (Denmark)

    David, Alexandre; Behrmann, Gerd; Larsen, Kim Guldstrand

    2003-01-01

    We present the design of the model-checking engine and internal data structures for the next generation of UPPAAL. The design is based on a pipeline architecture where each stage represents one independent operation in the verification algorithms. The architecture is based on essentially one shar...

  19. Gender, Legitimation, and Identity Verification in Groups

    Science.gov (United States)

    Burke, Peter J.; Stets, Jan E.; Cerven, Christine

    2007-01-01

    Drawing upon identity theory, expectation states theory, and legitimation theory, we examine how the task leader identity in task-oriented groups is more likely to be verified for persons with high status characteristics. We hypothesize that identity verification will be accomplished more readily for male group members and legitimated task leaders…

  20. Verification of Entrance Dose Measurements with ...

    African Journals Online (AJOL)

    Verification of Entrance Dose Measurements with Thermoluminescent Dosimeters in Conventional Radiotherapy Procedures Delivered with Co‑60 Teletherapy Machine. ... Subjects and Methods: Fifty‑seven patients with cancers of the breast, pelvis, head and neck were admitted for this study. TLD system at the Radiation ...

  1. Verification of method performance for clinical laboratories.

    Science.gov (United States)

    Nichols, James H

    2009-01-01

    Method verification, a one-time process to determine performance characteristics before a test system is utilized for patient testing, is often confused with method validation, establishing the performance of a new diagnostic tool such as an internally developed or modified method. A number of international quality standards (International Organization for Standardization (ISO) and Clinical Laboratory Standards Institute (CLSI)), accreditation agency guidelines (College of American Pathologists (CAP), Joint Commission, U.K. Clinical Pathology Accreditation (CPA)), and regional laws (Clinical Laboratory Improvement Amendments of 1988 (CLIA'88)) exist describing the requirements for method verification and validation. Consumers of marketed test kits should verify method accuracy, precision, analytic measurement range, and the appropriateness of reference intervals to the institution's patient population. More extensive validation may be required for new methods and those manufacturer methods that have been modified by the laboratory, including analytic sensitivity and specificity. This manuscript compares the various recommendations for method verification and discusses the CLSI evaluation protocols (EP) that are available to guide laboratories in performing method verification experiments.

  2. Specification, Verification and Optimisation of Business Processes

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas

    Model and Notation (BPMN). The automated analysis of business processes is done by means of quantitative probabilistic model checking which allows verification of validation and performance properties through use of an algorithm for the translation of business process models into a format amenable...

  3. Mesoscale model forecast verification during monsoon 2008

    Indian Academy of Sciences (India)

    Almost all the studies are based on either National Center for Environmental Prediction (NCEP), USA, final analysis fields (NCEP FNL) or the reanalysis data used as initial and lateral boundary conditions for driving the mesoscale model. Here we present a mesoscale model forecast verification and intercomparison study ...

  4. Abstraction Techniques for Parameterized Verification

    Science.gov (United States)

    2006-11-01

    Processes. Journal of the ACM, 39, 1992. [44] Steven German. Cache Coherence Examples, 2006. [45] Thomas Henzinger, Ranjit Jhala, and Rupak Majumdar...46] Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Kenneth L. McMillan. Abstractions from Proofs. In Proceedings of the 31st ACM Symposium on...Principles of Programming Languages (POPL), pages 232–244, 2004. [47] Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Gregoire Sutre. Soft

  5. On the role of code comparisons in verification and validation.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy; Pilch, Martin M.

    2003-08-01

    This report presents a perspective on the role of code comparison activities in verification and validation. We formally define the act of code comparison as the Code Comparison Principle (CCP) and investigate its application in both verification and validation. One of our primary conclusions is that the use of code comparisons for validation is improper and dangerous. We also conclude that while code comparisons may be argued to provide a beneficial component in code verification activities, there are higher quality code verification tasks that should take precedence. Finally, we provide a process for application of the CCP that we believe is minimal for achieving benefit in verification processes.

  6. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  7. Verification survey report of the south waste tank farm training/test tower and hazardous waste storage lockers at the West Valley demonstration project, West Valley, New York

    Energy Technology Data Exchange (ETDEWEB)

    Weaver, Phyllis C.

    2012-08-29

    A team from ORAU's Independent Environmental Assessment and Verification Program performed verification survey activities on the South Test Tower and four Hazardous Waste Storage Lockers. Scan data collected by ORAU determined that both the alpha and alpha-plus-beta activity was representative of radiological background conditions. The count rate distribution showed no outliers that would be indicative of alpha or alpha-plus-beta count rates in excess of background. It is the opinion of ORAU that independent verification data collected support the site?s conclusions that the South Tower and Lockers sufficiently meet the site criteria for release to recycle and reuse.

  8. DOE handbook: Integrated safety management systems (ISMS) verification team leader`s handbook

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-06-01

    facilities, non-nuclear, or non-Defense Programs facilities. DOE line managers are encouraged to tailor the procedures described in this handbook for ISMS verifications for low risk facilities.

  9. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...... in the literature, a treatment of simultaneous speaker and utterance verification with a modern, standard database is so far lacking. This is despite the burgeoning demand for voice biometrics in a plethora of practical security applications. With the goal of improving overall verification performance, this paper...... reports different strategies for simultaneous ASV and UV in the context of short-duration, text-dependent speaker verification. Experiments performed on the recently released RedDots corpus are reported for three different ASV systems and four different UV systems. Results show that the combination...

  10. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  11. Measurement techniques for the verification of excess weapons materials

    Energy Technology Data Exchange (ETDEWEB)

    Tape, J.W.; Eccleston, G.W.; Yates, M.A.

    1998-12-01

    The end of the superpower arms race has resulted in an unprecedented reduction in stockpiles of deployed nuclear weapons. Numerous proposals have been put forward and actions have been taken to ensure the irreversibility of nuclear arms reductions, including unilateral initiatives such as those made by President Clinton in September 1993 to place fissile materials no longer needed for a deterrent under international inspection, and bilateral and multilateral measures currently being negotiated. For the technologist, there is a unique opportunity to develop the technical means to monitor nuclear materials that have been declared excess to nuclear weapons programs, to provide confidence that reductions are taking place and that the released materials are not being used again for nuclear explosive programs. However, because of the sensitive nature of these materials, a fundamental conflict exists between the desire to know that the bulk materials or weapon components in fact represent evidence of warhead reductions, and treaty commitments and national laws that require the protection of weapons design information. This conflict presents a unique challenge to technologists. The flow of excess weapons materials, from deployed warheads through storage, disassembly, component storage, conversion to bulk forms, and disposition, will be described in general terms. Measurement approaches based on the detection of passive or induced radiation will be discussed along with the requirement to protect sensitive information from release to unauthorized parties. Possible uses of measurement methods to assist in the verification of arms reductions will be described. The concept of measuring attributes of items rather than quantitative mass-based inventory verification will be discussed along with associated information-barrier concepts required to protect sensitive information.

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT, PERFORMANCE OF INDUCTION MIXERS FOR DISINFECTION OF WET WEATHER FLOWS, US FILTER/STRANCO PRODUCTS WATER CHAMP R F SERIES CHEMICAL INDUCTION SYSTEM

    Science.gov (United States)

    The Wet-Weather Flow Technologies Pilot of the EPA's Technology Verification (ETV) Program under a partnership with NSF International has verified the performawnce of the USFilter/Stranco Products chemical induction mixer used for disinfection of wet-weather flows. The USFilter t...

  13. Probabilistic Requirements (Partial) Verification Methods Best Practices Improvement. Variables Acceptance Sampling Calculators: Empirical Testing. Volume 2

    Science.gov (United States)

    Johnson, Kenneth L.; White, K. Preston, Jr.

    2012-01-01

    The NASA Engineering and Safety Center was requested to improve on the Best Practices document produced for the NESC assessment, Verification of Probabilistic Requirements for the Constellation Program, by giving a recommended procedure for using acceptance sampling by variables techniques as an alternative to the potentially resource-intensive acceptance sampling by attributes method given in the document. In this paper, the results of empirical tests intended to assess the accuracy of acceptance sampling plan calculators implemented for six variable distributions are presented.

  14. Verification of Building Blocks for Asynchronous Circuits

    Directory of Open Access Journals (Sweden)

    Freek Verbeek

    2013-04-01

    Full Text Available Scalable formal verification constitutes an important challenge for the design of asynchronous circuits. Deadlock freedom is a property that is desired but hard to verify. It is an emergent property that has to be verified monolithically. We present our approach to using ACL2 to verify necessary and sufficient conditions over asynchronous delay-insensitive primitives. These conditions are used to derive SAT/SMT instances from circuits built out of these primitives. These SAT/SMT instances help in establishing absence of deadlocks. Our verification effort consists of building an executable checker in the ACL2 logic tailored for our purpose. We prove that this checker is correct. This approach enables us to prove ACL2 theorems involving defun-sk constructs and free variables fully automatically.

  15. Formal verification of human-automation interaction

    Science.gov (United States)

    Degani, Asaf; Heymann, Michael

    2002-01-01

    This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machine interaction and focuses on verifying the correctness of the interaction in complex and automated control systems. The paper describes a systematic methodology for evaluating whether the interface provides the necessary information about the machine to enable the operator to perform a specified task successfully and unambiguously. It also addresses the adequacy of information provided to the user via training material (e.g., user manual) about the machine's behavior. The essentials of the methodology, which can be automated and applied to the verification of large systems, are illustrated by several examples and through a case study of pilot interaction with an autopilot aboard a modern commercial aircraft. The expected application of this methodology is an augmentation and enhancement, by formal verification, of human-automation interfaces.

  16. Sensor-fusion-based biometric identity verification

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W. [Sandia National Labs., Albuquerque, NM (United States); Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L. [New Mexico State Univ., Las Cruces, NM (United States). Electronic Vision Research Lab.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person`s identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm.

  17. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  18. Spatial Verification Using Wavelet Transforms: A Review

    CERN Document Server

    Weniger, Michael; Friederichs, Petra

    2016-01-01

    Due to the emergence of new high resolution numerical weather prediction (NWP) models and the availability of new or more reliable remote sensing data, the importance of efficient spatial verification techniques is growing. Wavelet transforms offer an effective framework to decompose spatial data into separate (and possibly orthogonal) scales and directions. Most wavelet based spatial verification techniques have been developed or refined in the last decade and concentrate on assessing forecast performance (i.e. forecast skill or forecast error) on distinct physical scales. Particularly during the last five years, a significant growth in meteorological applications could be observed. However, a comparison with other scientific fields such as feature detection, image fusion, texture analysis, or facial and biometric recognition, shows that there is still a considerable, currently unused potential to derive useful diagnostic information. In order to tab the full potential of wavelet analysis, we revise the stat...

  19. Formal verification of industrial control systems

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Verification of critical software is a high priority but a challenging task for industrial control systems. For many kinds of problems, testing is not an efficient method. Formal methods, such as model checking appears to be an appropriate complementary method. However, it is not common to use model checking in industry yet, as this method needs typically formal methods expertise and huge computing power. In the EN-ICE-PLC section, we are working on a [methodology][1] and a tool ([PLCverif][2]) to overcome these challenges and to integrate formal verification in the development process of our PLC-based control systems. [1]: http://cern.ch/project-plc-formalmethods [2]: http://cern.ch/plcverif

  20. SEE Action Guide for States: Evaluation, Measurement, and Verification Frameworks$-$Guidance for Energy Efficiency Portfolios Funded by Utility Customers

    Energy Technology Data Exchange (ETDEWEB)

    Li, Michael [Dept. of Energy (DOE), Washington DC (United States); Dietsch, Niko [US Environmental Protection Agency (EPA), Cincinnati, OH (United States)

    2018-01-01

    This guide describes frameworks for evaluation, measurement, and verification (EM&V) of utility customer–funded energy efficiency programs. The authors reviewed multiple frameworks across the United States and gathered input from experts to prepare this guide. This guide provides the reader with both the contents of an EM&V framework, along with the processes used to develop and update these frameworks.

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES: MITSUI ENGINEERING & SHIPBUILDING DIESEL PARTICULATE FILTER

    Science.gov (United States)

    EPA‘s Environmental Technology Verification program is designed to further environmental protection by accelerating the acceptance and use of improved and cost effective technologies. This is done by providing high-quality, peer reviewed data on technology performance to those in...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--CAPSTONE 30KW MICROTURBINE SYSTEM

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system was evaluated based on the Capstone 30kW Microturbine developed by Cain Ind...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BAGHOUSE FILTRATION PRODUCTS, BWF AMERICA, INC., GRADE 700 MPS POLYESTER FELT FILTER SAMPLE

    Science.gov (United States)

    EPA's National Risk Management Research Laboratory, through its Environmental Technology Verification Program, evaluated the performance of a bag house filtration product for use controlling PM2.5. The product was BWF America, Inc., filter fabric Grade 700 Polyester Felt. All tes...

  5. Using timing information in speaker verification

    CSIR Research Space (South Africa)

    Van Heerden, CJ

    2005-11-01

    Full Text Available be- tween the two, since overlap between different speakers? models is inevitable. Models that are typically used include statistical mod- els when employing Hidden Markov Models (HMMs), template models when using dynamic time warping (DTW... and prevent unauthorized use of computer and communication systems [1]. Although speaker verification systems are not completely secure, they are a powerful deterrent to fraud in combination with other security measures such as pin numbers, SIM cards...

  6. Compendium of Arms Control Verification Proposals.

    Science.gov (United States)

    1982-03-01

    leurs forces militaires *en vue de dimintier les risques de d~iletichement d’uiie guerrc. Comme les bienfaits d’un tel accord Dour chaque pays...complicate verification. Bank Credit : To check on the possibility that clandestine military expenditures might be channeled through the banking system in...the guise of extensions of credit , it would be neces- sary to use similar methods to those employed concerning budget expenditures (i.e. trend analysis

  7. Verification of the databases EXFOR and ENDF

    Directory of Open Access Journals (Sweden)

    Berton Gottfried

    2017-01-01

    Full Text Available The objective of this work is for the verification of large experimental (EXFOR and evaluated nuclear reaction databases (JEFF, ENDF, JENDL, TENDL…. The work is applied to neutron reactions in EXFOR data, including threshold reactions, isomeric transitions, angular distributions and data in the resonance region of both isotopes and natural elements. Finally, a comparison of the resonance integrals compiled in EXFOR database with those derived from the evaluated libraries is also performed.

  8. Survey of Existing Tools for Formal Verification.

    Energy Technology Data Exchange (ETDEWEB)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  9. Secure Image Hash Comparison for Warhead Verification

    Energy Technology Data Exchange (ETDEWEB)

    Bruillard, Paul J.; Jarman, Kenneth D.; Robinson, Sean M.

    2014-06-06

    The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.

  10. Reproducible Research, Uncertainty Quantification, and Verification & Validation

    OpenAIRE

    Barba, Lorena A.

    2014-01-01

    Slides used with my presentation in the SIAM Uncertainty Quantification Conference 2014, Minisymposium on "The Reliability of Computational Research Findings: Reproducible Research, Uncertainty Quantification, and Verification & Validation." The talk used an audience response system to collect True/False or Yes/No opinions on 13 statements/questions: 1) Computer simulations create scientific knowledge.  2) Simulation is a method 3) A reproducible simulation does not need to be acc...

  11. Pedestrian flow simulation validation and verification techniques

    OpenAIRE

    Dridi, Mohamed H.

    2015-01-01

    For the verification and validation of microscopic simulation models of pedestrian flow, we have performed experiments for different kind of facilities and sites where most conflicts and congestion happens e.g. corridors, narrow passages, and crosswalks. The validity of the model should compare the experimental conditions and simulation results with video recording carried out in the same condition like in real life e.g. pedestrian flux and density distributions. The strategy in this techniqu...

  12. Formal verification of an avionics microprocessor

    Science.gov (United States)

    Srivas, Mandayam, K.; Miller, Steven P.

    1995-01-01

    Formal specification combined with mechanical verification is a promising approach for achieving the extremely high levels of assurance required of safety-critical digital systems. However, many questions remain regarding their use in practice: Can these techniques scale up to industrial systems, where are they likely to be useful, and how should industry go about incorporating them into practice? This report discusses a project undertaken to answer some of these questions, the formal verification of the AAMPS microprocessor. This project consisted of formally specifying in the PVS language a rockwell proprietary microprocessor at both the instruction-set and register-transfer levels and using the PVS theorem prover to show that the microcode correctly implemented the instruction-level specification for a representative subset of instructions. Notable aspects of this project include the use of a formal specification language by practicing hardware and software engineers, the integration of traditional inspections with formal specifications, and the use of a mechanical theorem prover to verify a portion of a commercial, pipelined microprocessor that was not explicitly designed for formal verification.

  13. Initial Verification and Validation Assessment for VERA

    Energy Technology Data Exchange (ETDEWEB)

    Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States); Athe, Paridhi [North Carolina State Univ., Raleigh, NC (United States); Jones, Christopher [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hetzler, Adam [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sieger, Matt [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-04-01

    The Virtual Environment for Reactor Applications (VERA) code suite is assessed in terms of capability and credibility against the Consortium for Advanced Simulation of Light Water Reactors (CASL) Verification and Validation Plan (presented herein) in the context of three selected challenge problems: CRUD-Induced Power Shift (CIPS), Departure from Nucleate Boiling (DNB), and Pellet-Clad Interaction (PCI). Capability refers to evidence of required functionality for capturing phenomena of interest while capability refers to the evidence that provides confidence in the calculated results. For this assessment, each challenge problem defines a set of phenomenological requirements against which the VERA software is assessed. This approach, in turn, enables the focused assessment of only those capabilities relevant to the challenge problem. The evaluation of VERA against the challenge problem requirements represents a capability assessment. The mechanism for assessment is the Sandia-developed Predictive Capability Maturity Model (PCMM) that, for this assessment, evaluates VERA on 8 major criteria: (1) Representation and Geometric Fidelity, (2) Physics and Material Model Fidelity, (3) Software Quality Assurance and Engineering, (4) Code Verification, (5) Solution Verification, (6) Separate Effects Model Validation, (7) Integral Effects Model Validation, and (8) Uncertainty Quantification. For each attribute, a maturity score from zero to three is assigned in the context of each challenge problem. The evaluation of these eight elements constitutes the credibility assessment for VERA.

  14. Tags and seals for arms control verification

    Energy Technology Data Exchange (ETDEWEB)

    DeVolpi, A.

    1990-09-18

    Tags and seals have long been recognized as important tools in arms control. The trend in control of armaments is to limit militarily significant equipment that is capable of being verified through direct and cooperative means, chiefly on-site inspection or monitoring. Although this paper will focus on the CFE treaty, the role of tags and seals for other treaties will also be addressed. Published technology and concepts will be reviewed, based on open sources. Arms control verification tags are defined as unique identifiers designed to be tamper-revealing; in that respect, seals are similar, being used as indicators of unauthorized access. Tamper-revealing tags might be considered as single-point markers, seals as two-point couplings, and nets as volume containment. The functions of an arms control tag can be considered to be two-fold: to provide field verification of the identity of a treaty-limited item (TLI), and to have a means of authentication of the tag and its tamper-revealing features. Authentication could take place in the field or be completed elsewhere. For CFE, the goal of tags and seals can be to reduce the overall cost of the entire verification system.

  15. VERIFICATION OF STATISTICAL CLOUDINESS ESTIMATIONS FOR EUROPE

    Directory of Open Access Journals (Sweden)

    Zoltán Imecs

    2012-03-01

    Full Text Available Verification of statistical cloudiness estimations for Europe. The climate forcing induced by cloud cover consists one of the main doubtful aspect of climate change predictions. In the case of cloudiness even the sign of the trends are not cohesive in a given region. In this sense further investigation regarding the behavior of cloudiness are indicated. In this study a statistical estimation of total cloudiness is elaborated using the method of instrumental variables. For this analyze surface-observed monthly mean cloudiness data was applied for the period of 1973-1996. In the second part of the study the verification of results is established using an independent satellite retrieved data series for the period of 2005-2011. Based on verification can be conclude that the applied statistical estimation is able to reproduce the measured values with an RMSE 7, 3%, the difference between the measured and predicted changes of cloudiness is 1.44%, found a stronger decrease of cloudiness in real data as the estimation had indicate. The main differences between the observed and predicted value is evident in the distribution of the frequencies showing a shifting towards the lower values in observed data but not recognized in the estimated values. In the geographical distribution of estimations errors sign a difference is detected between the water surfaces and continental regions.

  16. Verification in Referral-Based Crowdsourcing

    Science.gov (United States)

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  17. Verification of micro-beam irradiation

    Science.gov (United States)

    Li, Qiongge; Juang, Titania; Beth, Rachel; Chang, Sha; Oldham, Mark

    2015-01-01

    Micro-beam Radiation Therapy (MRT) is an experimental radiation therapy with provocative experimental data indicating potential for improved efficacy in some diseases. Here we demonstrated a comprehensive micro-beam verification method utilizing high resolution (50pm) PRESAGE/Micro-Optical-CT 3D Dosimetry. A small PRESAGE cylindrical dosimeter was irradiated by a novel compact Carbon-Nano-Tube (CNT) field emission based MRT system. The Percentage Depth Dose (PDD), Peak-to-Valley Dose Ratio (PVDR) and beam width (FWHM) data were obtained and analyzed from a three strips radiation experiment. A fast dose drop-off with depth, a preserved beam width with depth (an averaged FWHM across three beams remains constant (405.3um, sigma=13.2um) between depth of 3.0~14.0mm), and a high PVDR value (increases with depth from 6.3 at 3.0mm depth to 8.6 at 14.0mm depth) were discovered during this verification process. Some operating procedures such as precise dosimeter mounting, robust mechanical motions (especially rotation) and stray-light artifact management were optimized and developed to achieve a more accurate and dosimetric verification method.

  18. Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    2012-01-01

    Confidentiality is an important concern in today's information society: electronic payment and personal data should be protected appropriately. This holds in particular for multi-threaded applications, which are generally seen the future of high-performance computing. Multi-threading poses new

  19. Interprocedural Analysis and the Verification of Concurrent Programs

    Science.gov (United States)

    2009-01-01

    first k execution contexts. Using that table, it figures out a valuation of Vark +1G to continue the analysis of T s 1 , and stores the effect that T s1...reached when T s1 is started in state (1, g1, · · · , gk+1) because T s1 could not have touched Vark +1G before the increment that changed k to k + 1. The

  20. Structured Programming Series. Volume 15. Validation and Verification Study

    Science.gov (United States)

    1975-05-22

    inspection is the moderator. He need not be a technical expert, but he must manage the inspection team and provide leadership . He must use personal...data. The algorithm timer is rost often used by the designers of products. There are several other good descriptions of this technique referenced in...Moderator-The key person in jucc.ssful inspection. He need not be a technical expert, but he must manage the inspection team and offer leadership . He

  1. Formal Verification of Programming by Demonstration Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated tools are quickly making inroads into casual computing environments, solving progressively more complex tasks. However, these advancements still require...

  2. Confidentiality for Probabilistic Multi-Threaded Programs and Its Verification

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle Ida Antoinette; Huisman, Marieke

    Confidentiality is an important concern in today’s informa- tion society: electronic payment and personal data should be protected appropriately. This holds in particular for multi-threaded applications, which are generally seen the future of high-performance computing. Multi- threading poses new

  3. 2010 Second Refrigerator Recycling Program NV Energy - Southern Nevada: Program Year 2010

    Science.gov (United States)

    This measurement and verification report provides measured and verified energy impacts achieved by the Second Refrigerator Recycling Program that NV Energy offered to its customers in southern Nevada during 2010.

  4. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  5. Development of evaluation and performance verification technology for radiotherapy radiation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. Y.; Jang, S. Y.; Kim, B. H. and others

    2005-02-15

    No matter how much the importance is emphasized, the exact assessment of the absorbed doses administered to the patients to treat the various diseases such as lately soaring malignant tumors with the radiotherapy practices is the most important factor. In reality, several over-exposed patients from the radiotherapy practice become very serious social issues. Especially, the development of a technology to exactly assess the high doses and high energies (In general, dose administered to the patients with the radiotherapy practices are very huge doses, and they are about three times higher than the lethal doses) generated by the radiation generators and irradiation equipment is a competing issue to be promptly conducted. Over fifty medical centers in Korea operate the radiation generators and irradiation equipment for the radiotherapy practices. However, neither the legal and regulatory systems to implement a quality assurance program are sufficiently stipulated nor qualified personnel who could run a program to maintain the quality assurance and control of those generators and equipment for the radiotherapy practices in the medical facilities are sufficiently employed. To overcome the above deficiencies, a quality assurance program such as those developed in the technically advanced countries should be developed to exactly assess the doses administered to patients with the radiotherapy practices and develop the necessary procedures to maintain the continuing performance of the machine or equipment for the radiotherapy. The QA program and procedures should induce the fluent calibration of the machine or equipment with quality, and definitely establish the safety of patients in the radiotherapy practices. In this study, a methodology for the verification and evaluation of the radiotherapy doses is developed, and several accurate measurements, evaluations of the doses delivered to patients and verification of the performance of the therapy machine and equipment are

  6. Abstraction and Learning for Infinite-State Compositional Verification

    Directory of Open Access Journals (Sweden)

    Dimitra Giannakopoulou

    2013-09-01

    Full Text Available Despite many advances that enable the application of model checking techniques to the verification of large systems, the state-explosion problem remains the main challenge for scalability. Compositional verification addresses this challenge by decomposing the verification of a large system into the verification of its components. Recent techniques use learning-based approaches to automate compositional verification based on the assume-guarantee style reasoning. However, these techniques are only applicable to finite-state systems. In this work, we propose a new framework that interleaves abstraction and learning to perform automated compositional verification of infinite-state systems. We also discuss the role of learning and abstraction in the related context of interface generation for infinite-state components.

  7. Automatic Verification of Timing Constraints for Safety Critical Space Systems

    Science.gov (United States)

    Fernandez, Javier; Parra, Pablo; Sanchez Prieto, Sebastian; Polo, Oscar; Bernat, Guillem

    2015-09-01

    In this paper is presented an automatic process of verification. We focus in the verification of scheduling analysis parameter. This proposal is part of process based on Model Driven Engineering to automate a Verification and Validation process of the software on board of satellites. This process is implemented in a software control unit of the energy particle detector which is payload of Solar Orbiter mission. From the design model is generated a scheduling analysis model and its verification model. The verification as defined as constraints in way of Finite Timed Automatas. When the system is deployed on target the verification evidence is extracted as instrumented points. The constraints are fed with the evidence, if any of the constraints is not satisfied for the on target evidence the scheduling analysis is not valid.

  8. Verification and Validation Studies for the LAVA CFD Solver

    Science.gov (United States)

    Moini-Yekta, Shayan; Barad, Michael F; Sozer, Emre; Brehm, Christoph; Housman, Jeffrey A.; Kiris, Cetin C.

    2013-01-01

    The verification and validation of the Launch Ascent and Vehicle Aerodynamics (LAVA) computational fluid dynamics (CFD) solver is presented. A modern strategy for verification and validation is described incorporating verification tests, validation benchmarks, continuous integration and version control methods for automated testing in a collaborative development environment. The purpose of the approach is to integrate the verification and validation process into the development of the solver and improve productivity. This paper uses the Method of Manufactured Solutions (MMS) for the verification of 2D Euler equations, 3D Navier-Stokes equations as well as turbulence models. A method for systematic refinement of unstructured grids is also presented. Verification using inviscid vortex propagation and flow over a flat plate is highlighted. Simulation results using laminar and turbulent flow past a NACA 0012 airfoil and ONERA M6 wing are validated against experimental and numerical data.

  9. SU-E-T-49: A Multi-Institutional Study of Independent Dose Verification for IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Baba, H; Tachibana, H [The National Cancer Center Hospital East, Kashiwa, Chiba (Japan); Kamima, T; Takahashi, R [The Cancer Institute Hospital of JFCR, Koutou-ku, Tokyo (Japan); Kawai, D [Kanagawa Cancer Center, Yokohama, Kanagawa-prefecture (Japan); Sugawara, Y [The National Center for Global Health and Medicine, Shinjuku-ku, Tokyo (Japan); Yamamoto, T [Otemae Hospital, Chuou-ku, Osaka-city (Japan); Sato, A [Itabashi Central General Hospital, Itabashi-ku, Tokyo (Japan); Yamashita, M [Kobe City Medical Center General Hospital, Kobe, Hyogo (Japan)

    2015-06-15

    Purpose: AAPM TG114 does not cover the independent verification for IMRT. We conducted a study of independent dose verification for IMRT in seven institutes to show the feasibility. Methods: 384 IMRT plans in the sites of prostate and head and neck (HN) were collected from the institutes, where the planning was performed using Eclipse and Pinnacle3 with the two techniques of step and shoot (S&S) and sliding window (SW). All of the institutes used a same independent dose verification software program (Simple MU Analysis: SMU, Triangle Product, Ishikawa, JP), which is Clarkson-based and CT images were used to compute radiological path length. An ion-chamber measurement in a water-equivalent slab phantom was performed to compare the doses computed using the TPS and an independent dose verification program. Additionally, the agreement in dose computed in patient CT images between using the TPS and using the SMU was assessed. The dose of the composite beams in the plan was evaluated. Results: The agreement between the measurement and the SMU were −2.3±1.9 % and −5.6±3.6 % for prostate and HN sites, respectively. The agreement between the TPSs and the SMU were −2.1±1.9 % and −3.0±3.7 for prostate and HN sites, respectively. There was a negative systematic difference with similar standard deviation and the difference was larger in the HN site. The S&S technique showed a statistically significant difference between the SW. Because the Clarkson-based method in the independent program underestimated (cannot consider) the dose under the MLC. Conclusion: The accuracy would be improved when the Clarkson-based algorithm should be modified for IMRT and the tolerance level would be within 5%.

  10. Thoughts on Verification of Nuclear Disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Dunlop, W H

    2007-09-26

    It is my pleasure to be here to day to participate in this Conference. My thanks to the organizers for preparing such an interesting agenda on a very difficult topic. My effort in preparing my presentation was performed under the auspices of the U.S. Department of Energy by University of California, Lawrence Livermore National Laboratory under Contract W-7405-Eng-48. And as many of you know Lawrence Livermore National Laboratory is now, as of Oct 1st, under contract to the Lawrence Livermore National Security LLC. There has been a long history of how to view verification of arms control agreements. The basis for verification during the days of SALT was that verification would be based on each country's national technical means. For treaties dealing with strategic missiles this worked well as the individual items subject to verification were of such a size that they were visible by the National Technical Means available at the time. And it was felt that the counting of missiles and launchers could be verified by our National Technical Means. For nuclear testing treaties the use of seismic measurements developed into a capability that was reasonably robust for all but the smallest of nuclear tests. However, once we had the Threshold Test Ban Treaty, there was a significant problem in that the fidelity of the measurements were not sufficient to determine if a test was slightly above the 150 kt limit or slightly below the 150 kt limit. This led some in the US to believe that the Soviet Union was not living up to the TTBT agreement. An on-site verification protocol was negotiated in 1988 and 1989 that allowed the US to make hydrodynamic yield measurements on Soviet tests above 50 kt yield and regional seismic measurements on all tests above 35 kt of yield; and the Soviets to make the same type of measurements on US tests to ensure that they were not over 150 kt. These on-site measurements were considered reasonably intrusive. Again the measurement capability was

  11. Formal Verification of Security Properties in Trust Management Policy

    Science.gov (United States)

    2011-01-01

    Formal Verification of Security Properties in Trust Management Policy ∗ Jianwei Niu William H. Winsborough Mark Reith† University of Texas at San...3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Formal Verification of Security Properties in Trust Management Policy 5a...first step towards formal verification of security policy properties for RBAC. In Proceedings of Fourth International Conference on Quality Software

  12. String-Functional Semantics for Formal Verification of Synchronous Circuits

    Science.gov (United States)

    1988-06-01

    June 1i988 Report No. STAN-CS-88-1210 0 String -Functional Semantics for Formal Verification of Synchronous Circuits 00 by 0 Alexandre Bronstein and...rele~wef Ditribution Uzxliuxted Oa WUN4 P. String-Functional Semantics for Formal Verification of Synchronous Circuits Alexandre Bronstein & Carolyn...Arlington, VA 22209 1 T iTL.E (include Security Classification) String-Functional Semantics for Formal Verification of Synchronous Circuits 𔃼 PERSONA

  13. Testing Equation Method Modification for Demanding Energy Measurements Verification

    Directory of Open Access Journals (Sweden)

    Elena Kochneva

    2016-01-01

    Full Text Available The paper is devoted to the mathematical approaches of the measurements received from Automatic Meter Reading Systems verification. Reliability of metering data can be improved by application of the new issue named Energy Flow Problem. The paper considers demanding energy measurements verification method based on verification expressions groups analysis. Bad data detection and estimates accuracy calculation is presented using the Automatic Meter Reading system data from the Russian power system fragment.

  14. Machine Code Verification of a Tiny ARM Hypervisor

    OpenAIRE

    Dam, Mads; Guanciale, Roberto; Nemati, Hamed

    2013-01-01

    Hypervisors are low level execution platforms that provideisolated partitions on shared resources, allowing to design se-cure systems without using dedicated hardware devices. Akey requirement of this kind of solution is the formal verifi-cation of the software trusted computing base, preferably atthe binary level. We accomplish a detailed verification of anARMv7 tiny hypervisor, proving its correctness at the ma-chine code level. We present our verification strategy, whichmixes the usage of ...

  15. Verification-Based Interval-Passing Algorithm for Compressed Sensing

    OpenAIRE

    Wu, Xiaofu; Yang, Zhen

    2013-01-01

    We propose a verification-based Interval-Passing (IP) algorithm for iteratively reconstruction of nonnegative sparse signals using parity check matrices of low-density parity check (LDPC) codes as measurement matrices. The proposed algorithm can be considered as an improved IP algorithm by further incorporation of the mechanism of verification algorithm. It is proved that the proposed algorithm performs always better than either the IP algorithm or the verification algorithm. Simulation resul...

  16. An evaluation of the management system verification pilot at Hanford

    Energy Technology Data Exchange (ETDEWEB)

    BRIGGS, C.R.

    1998-11-12

    The Chemical Management System (CMS), currently under development at Hanford, was used as the ''test program'' for pilot testing the value added aspects of the Chemical Manufacturers Association's (CMA) Management Systems Verification (MSV) process. The MSV process, which was developed by CMA's member chemical companies specifically as a tool to assist in the continuous improvement of environment, safety and health (ESH) performance, represents a commercial sector ''best practice'' for evaluating ESH management systems. The primary purpose of Hanford's MSV Pilot was to evaluate the applicability and utility of the MSV process in the Department of Energy (DOE) environment. However, because the Integrated Safety Management System (ISMS) is the framework for ESH management at Hanford and at all DOE sites, the pilot specifically considered the MSV process in the context of a possible future adjunct to Integrated Safety Management System Verification (ISMSV) efforts at Hanford and elsewhere within the DOE complex. The pilot involved the conduct of two-hour interviews with four separate panels of individuals with functional responsibilities related to the CMS including the Department of Energy Richland Operations (DOE-RL), Fluor Daniel Hanford (FDH) and FDH's major subcontractors (MSCS). A semi-structured interview process was employed by the team of three ''verifiers'' who directed open-ended questions to the panels regarding the development, integration and effectiveness of management systems necessary to ensure the sustainability of the CMS effort. An ''MSV Pilot Effectiveness Survey'' also was completed by each panel participant immediately following the interview.

  17. The new geospatial tools: global transparency enhancing safeguards verification

    Energy Technology Data Exchange (ETDEWEB)

    Pabian, Frank Vincent [Los Alamos National Laboratory

    2010-09-16

    This paper focuses on the importance and potential role of the new, freely available, geospatial tools for enhancing IAEA safeguards and how, together with commercial satellite imagery, they can be used to promote 'all-source synergy'. As additional 'open sources', these new geospatial tools have heralded a new era of 'global transparency' and they can be used to substantially augment existing information-driven safeguards gathering techniques, procedures, and analyses in the remote detection of undeclared facilities, as well as support ongoing monitoring and verification of various treaty (e.g., NPT, FMCT) relevant activities and programs. As an illustration of how these new geospatial tools may be applied, an original exemplar case study provides how it is possible to derive value-added follow-up information on some recent public media reporting of a former clandestine underground plutonium production complex (now being converted to a 'Tourist Attraction' given the site's abandonment by China in the early 1980s). That open source media reporting, when combined with subsequent commentary found in various Internet-based Blogs and Wikis, led to independent verification of the reporting with additional ground truth via 'crowdsourcing' (tourist photos as found on 'social networking' venues like Google Earth's Panoramio layer and Twitter). Confirmation of the precise geospatial location of the site (along with a more complete facility characterization incorporating 3-D Modeling and visualization) was only made possible following the acquisition of higher resolution commercial satellite imagery that could be correlated with the reporting, ground photos, and an interior diagram, through original imagery analysis of the overhead imagery.

  18. In-Space Engine (ISE-100) Development - Design Verification Test

    Science.gov (United States)

    Trinh, Huu P.; Popp, Chris; Bullard, Brad

    2017-01-01

    In the past decade, NASA has formulated science mission concepts with an anticipation of landing spacecraft on the lunar surface, meteoroids, and other planets. Advancing thruster technology for spacecraft propulsion systems has been considered for maximizing science payload. Starting in 2010, development of In-Space Engine (designated as ISE-100) has been carried out. ISE-100 thruster is designed based on heritage Missile Defense Agency (MDA) technology aimed for a lightweight and efficient system in terms volume and packaging. It runs with a hypergolic bi-propellant system: MON-25 (nitrogen tetroxide, N2O4, with 25% of nitric oxide, NO) and MMH (monomethylhydrazine, CH6N2) for NASA spacecraft applications. The utilization of this propellant system will provide a propulsion system capable of operating at wide range of temperatures, from 50 C (122 F) down to -30 C (-22 F) to drastically reduce heater power. The thruster is designed to deliver 100 lb(sub f) of thrust with the capability of a pulse mode operation for a wide range of mission duty cycles (MDCs). Two thrusters were fabricated. As part of the engine development, this test campaign is dedicated for the design verification of the thruster. This presentation will report the efforts of the design verification hot-fire test program of the ISE-100 thruster in collaboration between NASA Marshall Space Flight Center (MSFC) and Aerojet Rocketdyne (AR) test teams. The hot-fire tests were conducted at Advance Mobile Propulsion Test (AMPT) facility in Durango, Colorado, from May 13 to June 10, 2016. This presentation will also provide a summary of key points from the test results.

  19. NASA's Evolutionary Xenon Thruster (NEXT) Component Verification Testing

    Science.gov (United States)

    Herman, Daniel A.; Pinero, Luis R.; Sovey, James S.

    2009-01-01

    Component testing is a critical facet of the comprehensive thruster life validation strategy devised by the NASA s Evolutionary Xenon Thruster (NEXT) program. Component testing to-date has consisted of long-duration high voltage propellant isolator and high-cycle heater life validation testing. The high voltage propellant isolator, a heritage design, will be operated under different environmental condition in the NEXT ion thruster requiring verification testing. The life test of two NEXT isolators was initiated with comparable voltage and pressure conditions with a higher temperature than measured for the NEXT prototype-model thruster. To date the NEXT isolators have accumulated 18,300 h of operation. Measurements indicate a negligible increase in leakage current over the testing duration to date. NEXT 1/2 in. heaters, whose manufacturing and control processes have heritage, were selected for verification testing based upon the change in physical dimensions resulting in a higher operating voltage as well as potential differences in thermal environment. The heater fabrication processes, developed for the International Space Station (ISS) plasma contactor hollow cathode assembly, were utilized with modification of heater dimensions to accommodate a larger cathode. Cyclic testing of five 1/22 in. diameter heaters was initiated to validate these modified fabrication processes while retaining high reliability heaters. To date two of the heaters have been cycled to 10,000 cycles and suspended to preserve hardware. Three of the heaters have been cycled to failure giving a B10 life of 12,615 cycles, approximately 6,000 more cycles than the established qualification B10 life of the ISS plasma contactor heaters.

  20. 77 FR 56824 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-09-14

    ... information contained in the USCIS database is referred to as the Verification Information System (VIS), which... records entitled ``Verification Information System Records Notice (DHS-2007-0010).'' Where there is a... Information: Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education and the...

  1. River Protection Project Integrated safety management system phase II verification report, volumes I and II - 8/19/99

    Energy Technology Data Exchange (ETDEWEB)

    SHOOP, D.S.

    1999-09-10

    The Department of Energy policy (DOE P 450.4) is that safety is integrated into all aspects of the management and operations of its facilities. In simple and straightforward terms, the Department will ''Do work safely.'' The purpose of this River Protection Project (RPP) Integrated Safety Management System (ISMS) Phase II Verification was to determine whether ISMS programs and processes are implemented within RFP to accomplish the goal of ''Do work safely.'' The goal of an implemented ISMS is to have a single integrated system that includes Environment, Safety, and Health (ES&H) requirements in the work planning and execution processes to ensure the protection of the worker, public, environment, and federal property over the RPP life cycle. The ISMS is comprised of the (1) described functions, components, processes, and interfaces (system map or blueprint) and (2) personnel who are executing those assigned roles and responsibilities to manage and control the ISMS. Therefore, this review evaluated both the ''paper'' and ''people'' aspects of the ISMS to ensure that the system is implemented within RPP. Richland Operations Office (RL) conducted an ISMS Phase I Verification of the TWRS from September 28-October 9, 1998. The resulting verification report recommended that TWRS-RL and the contractor proceed with Phase II of ISMS verification given that the concerns identified from the Phase I verification review are incorporated into the Phase II implementation plan.

  2. Technology diffusion of a different nature: Applications of nuclear safeguards technology to the chemical weapons verification regime

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.P. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Reisman, A. [Brookhaven National Lab., Upton, NY (United States); Turpen, E. [Aquila Technologies Group, Inc., Cambridge, MA (United States)

    1996-10-01

    The following discussion focuses on the issue of arms control implementation from the standpoint of technology and technical assistance. Not only are the procedures and techniques for safeguarding nuclear materials undergoing substantial changes, but the implementation of the Chemical Weapons Convention (CWC) and the Biological Weapons Convention (BWC) will give rise to technical difficulties unprecedented in the implementation of arms control verification. Although these regimes present new challenges, an analysis of the similarities between the nuclear and chemical weapons non-proliferation verification regimes illustrates the overlap in technological solutions. Just as cost-effective and efficient technologies can solve the problems faced by the nuclear safeguards community, these same technologies offer solutions for the CWC safeguards regime. With this in mind, experts at the Organization for the Prohibition of Chemical Weapons (OPCW), who are responsible for verification implementation, need to devise a CWC verification protocol that considers the technology already available. The functional similarity of IAEA and the OPCW, in conjunction with the technical necessities of both verification regimes, should receive attention with respect to the establishment of a technical assistance program. Lastly, the advanced status of the nuclear and chemical regime vis-a-vis the biological non-proliferation regime can inform our approach to implementation of confidence building measures for biological weapons.

  3. NEMVP: North American energy measurement and verification protocol

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  4. An Efficient Location Verification Scheme for Static Wireless Sensor Networks.

    Science.gov (United States)

    Kim, In-Hwan; Kim, Bo-Sung; Song, JooSeok

    2017-01-24

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors.

  5. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  6. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, A.; Larsen, K.G.; Møller, M.H.

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  7. Verification and Validation of Flight Critical Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Verification and Validation is a multi-disciplinary activity that encompasses elements of systems engineering, safety, software engineering and test. The elements...

  8. Theoretical analysis and experimental verification of parabolic trough solar collector with hot water generation system

    Directory of Open Access Journals (Sweden)

    Valan-Arasu Amirtham

    2007-01-01

    Full Text Available The modeling of a parabolic trough collector with hot water generation system with a well-mixed type storage tank using a computer simulation program is presented in this paper. This is followed by an experimental verification of the model and an analysis of the experimental results. The maximum difference between the predicted and the actual storage tank water temperature values is found as 9.59% only. This variation is due to the difference between the actual weather during the test period compared to hourly values and the convection losses from the collector receiver, which were not constant as accounted by the computer simulation program. .

  9. 76 FR 44088 - Agency Information Collection (Eligibility Verification Reports) Activity Under OMB Review

    Science.gov (United States)

    2011-07-22

    ... AFFAIRS Agency Information Collection (Eligibility Verification Reports) Activity Under OMB Review AGENCY... INFORMATION: Titles: Eligibility Verification Reports (EVR). a. Eligibility Verification Report Instructions... information abstracted below to the Office of Management and Budget (OMB) for review and comment. The PRA...

  10. International Energy Agency Ocean Energy Systems Task 10 Wave Energy Converter Modeling Verification and Validation

    DEFF Research Database (Denmark)

    Wendt, Fabian F.; Yu, Yi-Hsiang; Nielsen, Kim

    2017-01-01

    This is the first joint reference paper for the Ocean Energy Systems (OES) Task 10 Wave Energy Converter modeling verification and validation group. The group is established under the OES Energy Technology Network program under the International Energy Agency. OES was founded in 2001 and Task 10...... was proposed by Bob Thresher (National Renewable Energy Laboratory) in 2015 and approved by the OES Executive Committee EXCO in 2016. The kickoff workshop took place in September 2016, wherein the initial baseline task was defined. Experience from similar offshore wind validation/verification projects (OC3-OC5...... conducted within the International Energy Agency Wind Task 30) [1], [2] showed that a simple test case would help the initial cooperation to present results in a comparable way. A heaving sphere was chosen as the first test case. The team of project participants simulated different numerical experiments...

  11. A strategy for automatically generating programs in the lucid programming language

    Science.gov (United States)

    Johnson, Sally C.

    1987-01-01

    A strategy for automatically generating and verifying simple computer programs is described. The programs are specified by a precondition and a postcondition in predicate calculus. The programs generated are in the Lucid programming language, a high-level, data-flow language known for its attractive mathematical properties and ease of program verification. The Lucid programming is described, and the automatic program generation strategy is described and applied to several example problems.

  12. Symbolic Game Semantics for Model Checking Program Families

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    2016-01-01

    Program families can produce a (potentially huge) number of related programs from a common code base. Many such programs are safety critical. However, most verification techniques are designed to work on the level of single programs, and thus are too costly to apply to the entire program family. ...

  13. Formal Verification of Large Software Systems

    Science.gov (United States)

    Yin, Xiang; Knight, John

    2010-01-01

    We introduce a scalable proof structure to facilitate formal verification of large software systems. In our approach, we mechanically synthesize an abstract specification from the software implementation, match its static operational structure to that of the original specification, and organize the proof as the conjunction of a series of lemmas about the specification structure. By setting up a different lemma for each distinct element and proving each lemma independently, we obtain the important benefit that the proof scales easily for large systems. We present details of the approach and an illustration of its application on a challenge problem from the security domain

  14. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  15. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  16. MODELS CONCERNING PREVENTIVE VERIFICATION OF TECHNICAL EQUIPMENT

    Directory of Open Access Journals (Sweden)

    CÂRLAN M.

    2016-12-01

    Full Text Available The paper presents three operative models whose purpose is to improve the practice of preventive maintenance to a wide range of technical installations. Although the calculation criteria are different, the goal is the same: to determine the optimum time between two consecutive preventive interventions. The optimum criteria of these models are: - the maximum share of technical entity operating probabilities, in the case of the Ackoff - Sasieni [1] method; -the optimum time interval for preventive verification depending on the preventive-corrective maintenance costs imposed by the deciding factor, for the AsturioBaldin [2] model; - the minimum number of renewals – preventive and/or corrective maintenance operations [3

  17. Mesoscale model forecast verification during monsoon 2008

    Indian Academy of Sciences (India)

    Mesoscale model forecast verification during monsoon 2008. 419. Ta b le. 1 . S u mma ry o f th e m od els . T254. W. R. F. M. M5. Eta. H o rizon tal resolution. 0 .5. ◦. ×. 0 .5. ◦. Gau ssian grid. 27 k m. A rak aw. a-C g rid. 90/30/10 k m. A rak aw. a-B g rid. 3. 2 k m. A rak aw a. -E grid. V ertical lev els. 64. 38. 23. 38. T o p ograp h.

  18. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  19. Formal Specification and Verification of Distributed System.

    Science.gov (United States)

    1983-06-01

    a->b); A distributed design [HOA78] to generate prime numbers using the " sieve of Eratosthenes " method, is depicted in Figure 11. PNG consists of two... Sieve . 22 5.4.1.2 The Printer. 23 5.4.2 The Verification of PNG. 23 6. Conclusions and Comparisons to Other Approaches ..............25 6.1 The Temporal...types of processes: sieves and a printer. To simplify the description, assume there are infinite number of sieve processes, denoted by Sieve [l], Sieve

  20. Stamp Verification for Automated Document Authentication

    DEFF Research Database (Denmark)

    Micenková, Barbora; van Beusekom, Joost; Shafait, Faisal

    Stamps, along with signatures, can be considered as the most widely used extrinsic security feature in paper documents. In contrast to signatures, however, for stamps little work has been done to automatically verify their authenticity. In this paper, an approach for verification of color stamps...... is presented. We focus on photocopied stamps as non-genuine stamps. Our previously presented stamp detection method is improved and extended to verify that the stamp is genuine and not a copy. Using a variety of features, a classifier is trained that allows successful separation between genuine stamps...

  1. Technology verification phase. Dynamic isotope power system. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.G.

    1982-03-10

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance. (LCL)

  2. Program Model Checking as a New Trend

    Science.gov (United States)

    Havelund, Klaus; Visser, Willem; Clancy, Daniel (Technical Monitor)

    2002-01-01

    This paper introduces a special section of STTT (International Journal on Software Tools for Technology Transfer) containing a selection of papers that were presented at the 7th International SPIN workshop, Stanford, August 30 - September 1, 2000. The workshop was named SPIN Model Checking and Software Verification, with an emphasis on model checking of programs. The paper outlines the motivation for stressing software verification, rather than only design and model verification, by presenting the work done in the Automated Software Engineering group at NASA Ames Research Center within the last 5 years. This includes work in software model checking, testing like technologies and static analysis.

  3. Formal Verification of Security Properties of Privacy Enhanced Mail

    Science.gov (United States)

    1998-06-01

    AFRL-IF-RS-TR-1998-99 Final Technical Report June 1998 FORMAL VERIFICATION OF SECURITY PROPERTIES OF PRIVACY ENHANCED MAIL Syracuse University...AND DATES COVERED Final Jun 96 - Jul 97 4. TITLE AND SUBTITLE FORMAL VERIFICATION OF SECURITY PROPERTIES OF PRIVACY ENHANCED MAIL 6. AUTHOR

  4. 10 CFR 60.47 - Facility information and verification.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Facility information and verification. 60.47 Section 60.47... REPOSITORIES Licenses Us/iaea Safeguards Agreement § 60.47 Facility information and verification. (a) In... and each recipient of a construction authorization or a license shall submit facility information, as...

  5. 10 CFR 72.79 - Facility information and verification.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Facility information and verification. 72.79 Section 72.79..., Reports, Inspections, and Enforcement § 72.79 Facility information and verification. (a) In response to a... recipient of a certificate of compliance or specific or general license shall submit facility information...

  6. 10 CFR 61.32 - Facility information and verification.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Facility information and verification. 61.32 Section 61.32... WASTE Licenses Us/iaea Safeguards Agreement § 61.32 Facility information and verification. (a) In... license shall submit facility information, as described in § 75.10 of this chapter, on Form N-71 and...

  7. 24 CFR 5.659 - Family information and verification.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Family information and verification... § 5.659 Family information and verification. (a) Applicability. This section states requirements for... obligation to supply information. (1) The family must supply any information that HUD or the owner determines...

  8. 28 CFR 811.9 - Periodic verification of registration information.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Periodic verification of registration information. 811.9 Section 811.9 Judicial Administration COURT SERVICES AND OFFENDER SUPERVISION AGENCY FOR THE DISTRICT OF COLUMBIA SEX OFFENDER REGISTRATION § 811.9 Periodic verification of registration...

  9. 10 CFR 50.78 - Facility information and verification.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Facility information and verification. 50.78 Section 50.78... Safeguards Agreement § 50.78 Facility information and verification. (a) In response to a written request by... construction permit or a license shall submit facility information, as described in § 75.10 of this chapter, on...

  10. 10 CFR 63.47 - Facility information and verification.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Facility information and verification. 63.47 Section 63.47... REPOSITORY AT YUCCA MOUNTAIN, NEVADA Licenses Us/iaea Safeguards Agreement § 63.47 Facility information and verification. (a) In response to a written request by the Commission, each applicant for a construction...

  11. 19 CFR 181.73 - Notification of verification visit.

    Science.gov (United States)

    2010-04-01

    ... conducting a verification visit in Canada or Mexico pursuant to § 181.72(a)(2)(iii) of this part, Customs... 19 Customs Duties 2 2010-04-01 2010-04-01 false Notification of verification visit. 181.73 Section 181.73 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT...

  12. 45 CFR 1626.7 - Verification of eligible alien status.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Verification of eligible alien status. 1626.7... CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking representation shall submit appropriate documents to verify eligibility, unless the only...

  13. Modular verification of linked lists with views via separation logic

    DEFF Research Database (Denmark)

    Jensen, Jonas Braband; Birkedal, Lars; Sestoft, Peter

    2010-01-01

    We present a separation logic specification and verification of linked lists with views, a data structure from the C5 collection library for C#. A view is a generalization of the well-known concept of an iterator. Linked lists with views form an interesting case study for verification since...

  14. Certification and verification for calmac flat plate solar collector

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-27

    This document contains information used in the certification and verification of the Calmac Flat Plate Collector. Contained are such items as test procedures and results, information on materials used, Installation, Operation, and Maintenance Manuals, and other information pertaining to the verification and certification.

  15. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  16. Neutron spectrometric methods for core inventory verification in research reactors

    CERN Document Server

    Ellinger, A; Hansen, W; Knorr, J; Schneider, R

    2002-01-01

    In consequence of the Non-Proliferation Treaty safeguards, inspections are periodically made in nuclear facilities by the IAEA and the EURATOM Safeguards Directorate. The inspection methods are permanently improved. Therefore, the Core Inventory Verification method is being developed as an indirect method for the verification of the core inventory and to check the declared operation of research reactors.

  17. Formal Development and Verification of a Distributed Railway Control System

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    1998-01-01

    In this article we introduce the concept for a distributed railway control system and present the specification and verification of the main algorithm used for safe distributed control. Our design and verification approach is based on the RAISE method, starting with highly abstract algebraic spec...

  18. Formal development and verification of a distributed railway control system

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, J.

    2000-01-01

    The authors introduce the concept for a distributed railway control system and present the specification and verification of the main algorithm used for safe distributed control. Our design and verification approach is based on the RAISE method, starting with highly abstract algebraic specificati...

  19. Formal Development and Verification of a Distributed Railway Control System

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    1999-01-01

    In this article we introduce the concept for a distributed railway control system and present the specification and verification of the main algorithm used for safe distributed control. Our design and verification approach is based on the RAISE method, starting with highly abstract algebraic spec...

  20. A Tutorial on Text-Independent Speaker Verification

    Directory of Open Access Journals (Sweden)

    Frédéric Bimbot

    2004-04-01

    Full Text Available This paper presents an overview of a state-of-the-art text-independent speaker verification system. First, an introduction proposes a modular scheme of the training and test phases of a speaker verification system. Then, the most commonly speech parameterization used in speaker verification, namely, cepstral analysis, is detailed. Gaussian mixture modeling, which is the speaker modeling technique used in most systems, is then explained. A few speaker modeling alternatives, namely, neural networks and support vector machines, are mentioned. Normalization of scores is then explained, as this is a very important step to deal with real-world data. The evaluation of a speaker verification system is then detailed, and the detection error trade-off (DET curve is explained. Several extensions of speaker verification are then enumerated, including speaker tracking and segmentation by speakers. Then, some applications of speaker verification are proposed, including on-site applications, remote applications, applications relative to structuring audio information, and games. Issues concerning the forensic area are then recalled, as we believe it is very important to inform people about the actual performance and limitations of speaker verification systems. This paper concludes by giving a few research trends in speaker verification for the next couple of years.

  1. Grip-pattern verification for a smart gun

    NARCIS (Netherlands)

    Shang, X.; Groenland, J.P.J.; Groenland, J.P.J.; Veldhuis, Raymond N.J.

    In the biometric verification system of a smart gun, the rightful user of the gun is recognized based on grip-pattern recognition. It was found that the verification performance of grip-pattern recognition degrades strongly when the data for training and testing the classifier, respectively, have

  2. Multiple imputation to correct for partial verification bias revisited

    NARCIS (Netherlands)

    de Groot, J. A. H.; Janssen, K. J. M.; Zwinderman, A. H.; Moons, K. G. M.; Reitsma, J. B.

    2008-01-01

    Partial verification refers to the situation where a subset of patients is not verified by the reference (gold) standard and is excluded from the analysis. If partial verification is present, the present, the observed (naive) measures of accuracy such as sensitivity and specificity are most likely

  3. 77 FR 26822 - Pipeline Safety: Verification of Records

    Science.gov (United States)

    2012-05-07

    ... Pipeline and Hazardous Materials Safety Administration Pipeline Safety: Verification of Records AGENCY..., verifiable, and complete. If such a document and records search, review, and verification cannot be satisfactorily completed, the operator cannot rely on this method for calculating MAOP or MOP and must instead...

  4. Design, analysis, and test verification of advanced encapsulation system

    Science.gov (United States)

    Garcia, A.; Minning, C.

    1981-01-01

    Procurement of 4 in x 4 in polycrystalline solar cells were proceeded with some delays. A total of 1200 cells were procured for use in both the verification testing and qualification testing. Additional thermal structural analyses were run and the data are presented. An outline of the verification testing is included with information on test specimen construction.

  5. Implementation-level verification of algorithms with KeY

    NARCIS (Netherlands)

    Huisman, Marieke; Bruns, Daniel; Mostowski, Wojciech; Klebanov, V.; Monahan, R.; Ulbrich, Mattias

    2013-01-01

    We give an account on the authors’ experience and results from the software verification competition held at the Formal Methods 2012 conference. Competitions like this are meant to provide a benchmark for verification systems. It consisted of three algorithms which the authors have implemented in

  6. 45 CFR 1626.6 - Verification of citizenship.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Verification of citizenship. 1626.6 Section 1626.6... ON LEGAL ASSISTANCE TO ALIENS § 1626.6 Verification of citizenship. (a) A recipient shall require all... citizenship. A recipient shall not consider factors such as a person's accent, limited English-speaking...

  7. Automatic quality verification of the TV sets

    Science.gov (United States)

    Marijan, Dusica; Zlokolica, Vladimir; Teslic, Nikola; Pekovic, Vukota; Temerinac, Miodrag

    2010-01-01

    In this paper we propose a methodology for TV set verification, intended for detecting picture quality degradation and functional failures within a TV set. In the proposed approach we compare the TV picture captured from a TV set under investigation with the reference image for the corresponding TV set in order to assess the captured picture quality and therefore, assess the acceptability of TV set quality. The methodology framework comprises a logic block for designing the verification process flow, a block for TV set quality estimation (based on image quality assessment) and a block for generating the defect tracking database. The quality assessment algorithm is a full-reference intra-frame approach which aims at detecting various digital specific-TV-set picture degradations, coming from TV system hardware and software failures, and erroneous operational modes and settings in TV sets. The proposed algorithm is a block-based scheme which incorporates the mean square error and a local variance between the reference and the tested image. The artifact detection algorithm is shown to be highly robust against brightness and contrast changes in TV sets. The algorithm is evaluated by performance comparison with the other state-of-the-art image quality assessment metrics in terms of detecting TV picture degradations, such as illumination and contrast change, compression artifacts, picture misalignment, aliasing, blurring and other types of degradations that are due to defects within the TV set video chain.

  8. Gender verification of female Olympic athletes.

    Science.gov (United States)

    Dickinson, Barry D; Genel, Myron; Robinowitz, Carolyn B; Turner, Patricia L; Woods, Gary L

    2002-10-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Problems include invalid screening tests, failure to understand the problems of intersex, the discriminatory singling out of women based only on laboratory results, and the stigmatization and emotional trauma experienced by individuals screened positive. Genuine sex-impostors have not been uncovered by laboratory-based genetic testing; however, gender verification procedures have resulted in substantial harm to a number of women athletes born with relatively rare genetic abnormalities. Individuals with sex-related genetic abnormalities raised as females have no unfair physical advantage and should not be excluded or stigmatized, including those with 5-alpha-steroid-reductase deficiency, partial or complete androgen insensitivity, and chromosomal mosaicism. In 1990, the International Amateur Athletics Federation (IAAF) called for ending genetic screening of female athletes and in 1992 adopted an approach designed to prevent only male impostors from competing. The IAAF recommended that the "medical delegate" have the ultimate authority in all medical matters, including the authority to arrange for the determination of the gender of the competitor if that approach is judged necessary. The new policy advocated by the IAAF, and conditionally adopted by the International Olympic Committee, protects the rights and privacy of athletes while safeguarding fairness of competition, and the American Medical Association recommends that it become the permanent approach.

  9. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  10. Fifty years of progress in speaker verification

    Science.gov (United States)

    Rosenberg, Aaron E.

    2004-10-01

    The modern era in speaker recognition started about 50 years ago at Bell Laboratories with the controversial invention of the voiceprint technique for speaker identification based on expert analysis of speech spectrograms. Early speaker recognition research concentrated on finding acoustic-phonetic features effective in discriminating speakers. The first truly automatic text dependent speaker verification systems were based on time contours or templates of speaker specific acoustic features. An important element of these systems was the ability to time warp sample templates with model templates in order to provide useful comparisons. Most modern text dependent speaker verification systems are based on statistical representations of acoustic features analyzed as a function of time over specified utterances, most particularly the hidden markov model (HMM) representation. Modern text independent systems are based on vector quantization representations and, more recently, on Gaussian mixture model (GMM) representations. An important ingredient of statistically based systems is likelihood ratio decision techniques making use of speaker background models. Some recent research has shown how to extract higher level features based on speaking behavior and combine it with lower level, acoustic features for improved performance. The talk will present these topics in historical order showing the evolution of techniques.

  11. Monitoring/Verification using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Stephan Weeks, Kevin Kyle, Manuel Manard

    2008-05-30

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations-management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. Fast GC is the leading field analytical method for gas phase separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  12. Monitoring/Verification Using DMS: TATP Example

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Kyle; Stephan Weeks

    2008-03-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operationsmanagement systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  13. Nonintrusive verification attributes for excess fissile materials

    Energy Technology Data Exchange (ETDEWEB)

    Nicholas, N.J.; Eccleston, G.W.; Fearey, B.L. [and others

    1997-10-01

    Under US initiatives, over two hundred metric tons of fissile materials have been declared to be excess to national defense needs. These excess materials are in both classified and unclassified forms. The US has expressed the intent to place these materials under international inspections as soon as practicable. To support these commitments, members of the US technical community are examining a variety of nonintrusive approaches (i.e., those that would not reveal classified or sensitive information) for verification of a range of potential declarations for these classified and unclassified materials. The most troublesome and potentially difficult issues involve approaches for international inspection of classified materials. The primary focus of the work to date has been on the measurement of signatures of relevant materials attributes (e.g., element, identification number, isotopic ratios, etc.), especially those related to classified materials and items. The authors are examining potential attributes and related measurement technologies in the context of possible verification approaches. The paper will discuss the current status of these activities, including their development, assessment, and benchmarking status.

  14. A Verification Method of Inter-Task Cooperation in Embedded Real-time Systems and its Evaluation

    Science.gov (United States)

    Yoshida, Toshio

    In software development process of embedded real-time systems, the design of the task cooperation process is very important. The cooperating process of such tasks is specified by task cooperation patterns. Adoption of unsuitable task cooperation patterns has fatal influence on system performance, quality, and extendibility. In order to prevent repetitive work caused by the shortage of task cooperation performance, it is necessary to verify task cooperation patterns in an early software development stage. However, it is very difficult to verify task cooperation patterns in an early software developing stage where task program codes are not completed yet. Therefore, we propose a verification method using task skeleton program codes and a real-time kernel that has a function of recording all events during software execution such as system calls issued by task program codes, external interrupts, and timer interrupt. In order to evaluate the proposed verification method, we applied it to the software development process of a mechatronics control system.

  15. Formal verification of an oral messages algorithm for interactive consistency

    Science.gov (United States)

    Rushby, John

    1992-01-01

    The formal specification and verification of an algorithm for Interactive Consistency based on the Oral Messages algorithm for Byzantine Agreement is described. We compare our treatment with that of Bevier and Young, who presented a formal specification and verification for a very similar algorithm. Unlike Bevier and Young, who observed that 'the invariant maintained in the recursive subcases of the algorithm is significantly more complicated than is suggested by the published proof' and who found its formal verification 'a fairly difficult exercise in mechanical theorem proving,' our treatment is very close to the previously published analysis of the algorithm, and our formal specification and verification are straightforward. This example illustrates how delicate choices in the formulation of the problem can have significant impact on the readability of its formal specification and on the tractability of its formal verification.

  16. Approaches to verification of two-dimensional water quality models

    Energy Technology Data Exchange (ETDEWEB)

    Butkus, S.R. (Tennessee Valley Authority, Chattanooga, TN (USA). Water Quality Dept.)

    1990-11-01

    The verification of a water quality model is the one procedure most needed by decision making evaluating a model predictions, but is often not adequate or done at all. The results of a properly conducted verification provide the decision makers with an estimate of the uncertainty associated with model predictions. Several statistical tests are available for quantifying of the performance of a model. Six methods of verification were evaluated using an application of the BETTER two-dimensional water quality model for Chickamauga reservoir. Model predictions for ten state variables were compared to observed conditions from 1989. Spatial distributions of the verification measures showed the model predictions were generally adequate, except at a few specific locations in the reservoir. The most useful statistics were the mean standard error of the residuals. Quantifiable measures of model performance should be calculated during calibration and verification of future applications of the BETTER model. 25 refs., 5 figs., 7 tabs.

  17. Verification and quality control of routine hematology analyzers.

    Science.gov (United States)

    Vis, J Y; Huisman, A

    2016-05-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and linearity throughout the expected range of results. Yet, which standard should be met or which verification limit be used is at the discretion of the laboratory specialist. This paper offers practical guidance on verification and quality control of automated hematology analyzers and provides an expert opinion on the performance standard that should be met by the contemporary generation of hematology analyzers. Therefore (i) the state-of-the-art performance of hematology analyzers for complete blood count parameters is summarized, (ii) considerations, challenges, and pitfalls concerning the development of a verification plan are discussed, (iii) guidance is given regarding the establishment of reference intervals, and (iv) different methods on quality control of hematology analyzers are reviewed. © 2016 John Wiley & Sons Ltd.

  18. Simulation Environment Based on the Universal Verification Methodology

    CERN Document Server

    AUTHOR|(SzGeCERN)697338

    2016-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC desi...

  19. First order proofs for concurrent programs

    OpenAIRE

    Juan Sanz, Víctor de

    2016-01-01

    We study the uniform verification problem for infinite state processes. The problem consists on proving the parallel composition of an arbitrary number of processes running the same program satisfies a temporal property. As the general problem is too big for a bachelor thesis, we restrict our attention to concurrent implementations of sets using single linked list theory. We reduce the verification to the validity of formulas in this theory. By validity we mean that certain pro...

  20. Numerical Verification of Industrial Numerical Codes

    Directory of Open Access Journals (Sweden)

    Montan Sethy

    2012-04-01

    Full Text Available Several approximations occur during a numerical simulation: physical effects mapy be discarded, continuous functions replaced by discretized ones and real numbers replaced by finite-precision representations. The use of the floating point arithmetic generates round-off errors at each arithmetical expression and some mathematical properties are lost. The aim of the numerical verification activity at EDF R&D is to study the effect of the round-off error propagation on the results of a numerical simulation. It is indeed crucial to perform a numerical verification of industrial codes such as developped at EDF R&D even more for code running in HPC environments. This paper presents some recent studies around the numerical verification at EDF R&D. Le résultat d’un code de simulation numérique subit plusieurs approximations effectuées lors de la modélisation mathématique du problème physique, de la discrétisation du modèle mathématique et de la résolution numérique en arithmétique flottante. L’utilisation de l’arithmétique flottante génère en effet des erreurs d’arrondi lors de chaque opération flottante et des propriétés mathématiques sont perdues. Il existe à EDF R&D une activité transverse de vérification numérique consistant à étudier l’effet de la propagation des erreurs d’arrondi sur les résultats des simulations. Il est en effet important de vérifier numériquement des codes industriels et ce d’autant plus s’ils sont éxécutés dans environnements de calcul haute performance. Ce papier présente des études récentes autour de la vérification numérique à EDF R&D.