National Library of Energy BETA

Sample records for activities verification checklist

  1. Indoor airPLUS Version 1 (Rev. 01) Verification Checklist

    Broader source: Energy.gov [DOE]

    The Rev. 01 checklist has been modified to reflect only the additional Indoor airPLUS requirements and their corresponding section numbers that must be met after completing the ENERGY STAR checklists.

  2. DOE's New Checklist Helps Plants Assess Energy Management Activities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assess Energy Management Activities May 14, 2014 - 11:40am Addthis DOE developed the Strategic Energy Management Checklist to help manufacturing facilities conduct a...

  3. CAH TERMINATION POLICY All Exit Checklist activities must be conducted in accordance with all university policies and

    E-Print Network [OSTI]

    Wu, Shin-Tson

    CAH TERMINATION POLICY All Exit Checklist activities must be conducted in accordance with all://hr.ucf.edu/files/EmployeeExitQuestionnaire.pdf · Termination Checklist at: https://hr.ucf.edu/files/TerminationChecklist.pdf CAH TERMINATION PROCEDURES assigned to him/her. Specific PeopleSoft access should be terminated as well. Terminating employees must

  4. Design, Installation, and Field Verification of Integrated Active...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design, Installation, and Field Verification of Integrated Active Desiccant Hybrid Rooftop Systems Combined with a Natural Gas Driven Cogeneration Package, 2008 Design,...

  5. CAH TERMINATION POLICY All Exit Checklist activities must be conducted in accordance with all university policies and

    E-Print Network [OSTI]

    Wu, Shin-Tson

    CAH TERMINATION POLICY All Exit Checklist activities must be conducted in accordance with all Questionnaire at: http://www.hr.ucf.edu/web/forms/employeerelations/exitinterview.pdf CAH TERMINATION PROCEDURES assigned to him/her. Specific PeopleSoft access should be terminated as well. Terminating employees must

  6. Verification Testing Test Driven Development Testing with JUnit Verification

    E-Print Network [OSTI]

    Peters, Dennis

    Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

  7. Solar Photovoltaic SPECIFICATION, CHECKLIST...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CHECKLIST AND GUIDE Renewable Energy Ready Home Renewable Energy Ready Home SOLAR PHOTOVOLTAIC SPECIFICATION, CHECKLIST AND GUIDE i Table of Contents About the...

  8. EERE Website Content Checklist

    Broader source: Energy.gov [DOE]

    This checklist is a tool to guide EERE content developers and editors in creating and reviewing content for websites.

  9. NUSTAR User Guide Checklist Management

    E-Print Network [OSTI]

    Fleming, Andrew J.

    NUSTAR User Guide Checklist Management Page 1 of 3 Updated : 26/11/2012 Checklist Management Trigger: If a student has a checklist on their record that is associated with a restriction. Pathway: Campus Community>Checklists>Checklists Management - Person 1. Insert the student number or other

  10. NIST HANDBOOK 150-2 SUPPLEMENTAL CHECKLIST FOR ILAC-P14:12/2010 (2012-01-17) PAGE 1 OF 3 Enter Date: Enter NVLAP Lab Code

    E-Print Network [OSTI]

    NIST HANDBOOK 150-2 SUPPLEMENTAL CHECKLIST FOR ILAC-P14:12/2010 (2012-01-17) PAGE 1 OF 3 Enter Date: Enter NVLAP Lab Code: NVLAP CALIBRATION LABORATORIES SUPPLEMENTAL CHECKLIST for VERIFICATION: NVLAP LAB CODE: NIST HANDBOOK 150-2 SUPPLEMENTAL CHECKLIST FOR ILAC-P14:12/2010 (2012-01-17) PAGE 2 OF 3

  11. National Service Activation Checklist

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -Department ofDepartment ofEnergyIncreased Renewable

  12. A Visual Analytics Approach to Structured Data Analysis to Enhance Nonproliferation and Arms Control Verification Activities

    SciTech Connect (OSTI)

    Gillen, David S.

    2014-08-07

    Analysis activities for Nonproliferation and Arms Control verification require the use of many types of data. Tabular structured data, such as Excel spreadsheets and relational databases, have traditionally been used for data mining activities, where specific queries are issued against data to look for matching results. The application of visual analytics tools to structured data enables further exploration of datasets to promote discovery of previously unknown results. This paper discusses the application of a specific visual analytics tool to datasets related to the field of Arms Control and Nonproliferation to promote the use of visual analytics more broadly in this domain. Visual analytics focuses on analytical reasoning facilitated by interactive visual interfaces (Wong and Thomas 2004). It promotes exploratory analysis of data, and complements data mining technologies where known patterns can be mined for. Also with a human in the loop, they can bring in domain knowledge and subject matter expertise. Visual analytics has not widely been applied to this domain. In this paper, we will focus on one type of data: structured data, and show the results of applying a specific visual analytics tool to answer questions in the Arms Control and Nonproliferation domain. We chose to use the T.Rex tool, a visual analytics tool developed at PNNL, which uses a variety of visual exploration patterns to discover relationships in structured datasets, including a facet view, graph view, matrix view, and timeline view. The facet view enables discovery of relationships between categorical information, such as countries and locations. The graph tool visualizes node-link relationship patterns, such as the flow of materials being shipped between parties. The matrix visualization shows highly correlated categories of information. The timeline view shows temporal patterns in data. In this paper, we will use T.Rex with two different datasets to demonstrate how interactive exploration of the data can aid an analyst with arms control and nonproliferation verification activities. Using a dataset from PIERS (PIERS 2014), we will show how container shipment imports and exports can aid an analyst in understanding the shipping patterns between two countries. We will also use T.Rex to examine a collection of research publications from the IAEA International Nuclear Information System (IAEA 2014) to discover collaborations of concern. We hope this paper will encourage the use of visual analytics structured data analytics in the field of nonproliferation and arms control verification. Our paper outlines some of the challenges that exist before broad adoption of these kinds of tools can occur and offers next steps to overcome these challenges.

  13. SUMMARY OF 2013 ATLANTIC TROPICAL CYCLONE ACTIVITY AND VERIFICATION OF AUTHORS' SEASONAL AND TWO-WEEK FORECASTS

    E-Print Network [OSTI]

    Connors, Daniel A.

    -WEEK FORECASTS The 2013 Atlantic hurricane season was much quieter than predicted in our seasonal outlooks. While as past forecasts and verifications are available via the World Wide Web at http Cyclone Energy (ACE) (92) 165 165 142 30 32% Net Tropical Cyclone Activity (NTC) (103%) 175 175 150 43 42

  14. Pre-Show Checklist

    Broader source: Energy.gov [DOE]

    Before you leave for your event, you should check that you are prepared and ready to go.  This checklist was designed to remind you of the steps you are required to take before leaving for your event.

  15. COMPUTER WORKSTATION ERGONOMIC CHECKLIST COMPUTER WORKSTATION ERGONOMIC CHECKLIST

    E-Print Network [OSTI]

    Saskatchewan, University of

    people, task, equipment and work environment. If required, a detailed ergonomic evaluation, includingCOMPUTER WORKSTATION ERGONOMIC CHECKLIST 1 COMPUTER WORKSTATION ERGONOMIC CHECKLIST to be in-line with forearms when using keyboard and/or mouse. #12;COMPUTER WORKSTATION ERGONOMIC CHECKLIST

  16. PAINTING CHECKLIST GETTING STARTED

    E-Print Network [OSTI]

    Peters, Richard

    PAINTING CHECKLIST GETTING STARTED o Choose your colour scheme o Test colours using sample pots o Measure the area to be painted · Choose paint finish, matt, semi-gloss, gloss etc · Type of paint to use, water-based etc · State of repair of current surface · Painting over oil-based/gloss paint or wallpaper

  17. Pollution Prevention - Environmental Impact Reduction Checklists...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Pollution Prevention - Environmental Impact Reduction Checklists for NEPA309 Reviewers Pollution Prevention - Environmental Impact Reduction Checklists for NEPA309 Reviewers The...

  18. Food behavior checklist effectively evaluates nutrition education

    E-Print Network [OSTI]

    2006-01-01

    RESEARCH ARTICLE Food behavior checklist effectivelyB. Joy We developed a short food behavior checklist (FBC) todiverse women in the Food Stamp Nutrition Education

  19. QA Checklist for Partnership Sites

    Broader source: Energy.gov [DOE]

    This is the Quality Assurance (QA) Checklist for all EERE Web sites that are not in the standard EERE Web template.

  20. Home Inspection Checklist

    E-Print Network [OSTI]

    Quiring, Susan M.

    1987-01-01

    Extension Service HOME INSPECTION CHECKLIST MAR 3 1 1988 Susan M. Quiring* Why A Home Inspection? If you're looking for a "perfect" house, you won't find it. Every house has its strengths and weaknesses. Some flaws can be corrected easily, but others... will require expensive repairs. Selecting your new home will affect your family's financial security and satisfaction in years to come. So it's important to gather as much information as possible and to avoid decisions based purely on first impressions...

  1. Solar Permit Application and Checklist

    Broader source: Energy.gov [DOE]

    This Photovoltaic System Application and Checklist may be used by any jurisdiction in the Kansas City area as a standardized document to be used by those seeking a solar system permit for residential or commercial photovoltaic systems under 15kW. The Application and Checklist clarifies the permitting steps for small solar systems and details the information and documentation that is required in the permit application.

  2. Housing Checklist for Older Adults. 

    E-Print Network [OSTI]

    Anonymous,

    1980-01-01

    .1215 - HOUSING CHECKLIST FOR OLDER ADULTS ------ This checklist will help you evaluate a home to deter mine whether it meets the needs of the elderly and handicapped and furthers their independent living. It will also be helpful in evaluating a new house..., apart ment, mobile home or other facility for retirement living. Each statement reflects a desirable feature for the elderly and handicapped. Mark an X in the appropriate box according to the following: Yes D No D 3 Yes No LOCATION...

  3. Challenges with Software Verification and Validation Activities in the Space Industry

    E-Print Network [OSTI]

    Feldt, Robert

    , optimization of their methods and standards need to be investigated. The industry has to follow standards industry that are following ECSS standards in various V&V activities. The case studies reported here focus and dependability. Industry has a long tradition of developing standards that strictly set quality goals

  4. Final Report - Independent Verification Survey Activities at the Seperations Process Research Unit Sites, Niskayuna, New York

    SciTech Connect (OSTI)

    Evan Harpenau

    2011-03-15

    The Separations Process Research Unit (SPRU) complex located on the Knolls Atomic Power Laboratory (KAPL) site in Niskayuna, New York, was constructed in the late 1940s to research the chemical separation of plutonium and uranium (Figure A-1). SPRU operated as a laboratory scale research facility between February 1950 and October 1953. The research activities ceased following the successful development of the reduction oxidation and plutonium/uranium extraction processes. The oxidation and extraction processes were subsequently developed for large scale use by the Hanford and Savannah River sites (aRc 2008a). Decommissioning of the SPRU facilities began in October 1953 and continued through the 1990s.

  5. Verification and validation benchmarks.

    SciTech Connect (OSTI)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

  6. Guide to good practices for independent verification

    SciTech Connect (OSTI)

    NONE

    1998-12-01

    This Guide to Good Practices is written to enhance understanding of, and provide direction for, Independent Verification, Chapter X of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. The practices in this guide should be considered when planning or reviewing independent verification activities. Contractors are advised to adopt procedures that meet the intent of DOE Order 5480.19. Independent Verification is an element of an effective Conduct of Operations program. The complexity and array of activities performed in DOE facilities dictate the necessity for coordinated independent verification activities to promote safe and efficient operations.

  7. Computer Science Graduation Requirements Checklist

    E-Print Network [OSTI]

    Zadok, Erez

    Computer Science Graduation Requirements Checklist ­ Fall 2008 Computer Science Courses Course Gr. Sem. Comments CSE 114 Computer Science I [prerequisite: CSE 110] CSE 214 Computer Science II CSE 215 Foundations of Computer Science CSE 219 Computer Science III CSE 220 Computer Organization CSE 300 Writing

  8. Computer Science Graduation Requirements Checklist

    E-Print Network [OSTI]

    Zadok, Erez

    Computer Science Graduation Requirements Checklist ­ Fall 2009 Computer Science Courses Course Gr. Sem. Comments CSE 114 Computer Science I [prerequisite: CSE 110] CSE 214 Computer Science II CSE 215 Foundations of Computer Science CSE 219 Computer Science III CSE 220 Computer Organization CSE 300 Writing

  9. UNIVERSITY OF WASHINGTON HONORARIA CHECKLIST

    E-Print Network [OSTI]

    Matrajt, Graciela

    UNIVERSITY OF WASHINGTON HONORARIA CHECKLIST FOR INVITED GUEST SPEAKERS PROCUREMENT SERVICES Date Number 35 QUESTIONS? Contact the Tax Office, Phone: 206-616-3003 or Email: taxofc@u.washington.edu If the person IS NOT an invited guest speaker, please use form UoW 1632 available at http://www.washington

  10. HR Partners: Checklist, Forms & Reports

    E-Print Network [OSTI]

    Hammack, Richard

    HR Partners: Checklist, Forms & Reports VCU Human Resources September 17 & 18 #12;Agenda Opening the new 29 Hour Reporting Tool Share the "The Happenings" Clarify the purpose & execution of Separation;Our Session #12;Our Session 2. Outline how to document, report and adjust staff hours impacted

  11. HURRICANE AND SEVERE WEATHER CHECKLIST

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    should be used to protect them from wear at contact points. Old rags are very good. If water hose is used be a good idea. Keep bilge pumps in working order. 3. SECURING THE BOAT a. Prepare, in Advance, a Checklist

  12. LABORATORY SAFETY CHECKLIST LABORATORY: DATE

    E-Print Network [OSTI]

    Fleming, Andrew J.

    LABORATORY SAFETY CHECKLIST LABORATORY: DATE: RESPONSIBLE OFFICER: INSPECTION BY: Boxes/A indicates the item does not apply to this laboratory. 1 HAZARD IDENTIFICATION /x/NA Comments 1 in the laboratory? 1.2 Are current copies available of: (a) permits for notifiable or prohibited carcinogens, (b

  13. Quality Assurance Checklists for Video, Animations, and Audio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Animations, & Audio Quality Assurance Checklists for Video, Animations, and Audio Web Requirements Quality Assurance Checklists for Video, Animations, and Audio Web...

  14. Quality Assurance Checklists for Energy.gov Web Requirements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy.gov Content Management System Quality Assurance Checklists for Energy.gov Web Requirements Quality Assurance Checklists for Energy.gov Web Requirements For Office of...

  15. Policy Flash 2013-49 Updating Reporting Requirement Checklist...

    Energy Savers [EERE]

    Policy Flash 2013-49 Updating Reporting Requirement Checklist including the research performance progress report Policy Flash 2013-49 Updating Reporting Requirement Checklist...

  16. Checklist for Individuals with an Abnormal BeLPT | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Abnormal BeLPT This checklist is to assist individuals who have received an abnormal Beryllium Lymphocyte Proliferation Test. The checklist informs these individuals with the...

  17. Internship Checklist Ready Reference C-3

    E-Print Network [OSTI]

    Internship Checklist Ready Reference C-3 College of Engineering, Architecture & Technology Career Services Oklahoma State University College of Engineering, Architecture & Technology Career Services Office

  18. Crop and Soil Science Degree Checklist Name: ____________________________

    E-Print Network [OSTI]

    Grünwald, Niklaus J.

    and Soil Science Degree Checklist Name: ____________________________ ID Intensive (SOIL 325) (3) _______ HHS 231 ­ Lifetime Fitness for Health (2. Global Issues (3) (*soil science electives meeting requirement) _______ Science

  19. Proponent's Environmental Assessment (PEA) Checklist for Transmission...

    Open Energy Info (EERE)

    Proponent's Environmental Assessment (PEA) Checklist for Transmission Line and Substation Projects Jump to: navigation, search OpenEI Reference LibraryAdd to library Permitting...

  20. Solar Water Heating: SPECIFICATION, CHECKLIST AND GUIDE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Water Heating SPECIFICATION, CHECKLIST AND GUIDE Renewable Energy Ready Home Table of Contents About the Renewable Energy Ready Home Specifications Assumptions of the RERH Solar...

  1. Solar Photovoltaic (PV) System Permit Application Checklist

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Permit Application Checklist is intended to be used as a best management practice when establishing local government requirements for residential and commercial solar photovoltaic (PV) system permits. Local governments may modify this checklist to accommodate their local ordinances, code requirements, and permit procedures.

  2. ATTACHMENT 2 UNC Charlotte Export Control Checklist

    E-Print Network [OSTI]

    Jiang, Jiancheng

    ATTACHMENT 2 UNC Charlotte Export Control Checklist [FOR FOREIGN TRAVEL WITH UNIVERSITY OWNED EQUIPMENT] License Exception TMP (Temporary Exports) This checklist summarizes the requirements for an export license exception for temporary export of a laptop, PDA, cell phone, or digital storage device

  3. University Policy Process Policy Development Checklist

    E-Print Network [OSTI]

    Rev. 5/09 University Policy Process Policy Development Checklist The University Policy Office (UPO) has designed the Policy Development Checklist to assist you develop or revise university policy. This document provides a basic framework to follow as you navigate through the policy process. Policy

  4. CHECKLIST FOR MASTER'S DEGREE WITH THESIS

    E-Print Network [OSTI]

    Lawson, Catherine L.

    2014-2015 CHECKLIST FOR MASTER'S DEGREE WITH THESIS You are not eligible to receive your degree Agreement The Publishing Agreement form is located online at http://tinyurl.com/dissertationagree. Print

  5. Name:___________________________________ ID #:_________________________ CIVIL AND ENVIRONMENTAL ENGINEERING Checklist

    E-Print Network [OSTI]

    Kachroo, Pushkin

    : 3 Credits** **Choose from approved list in catalog Geotechnical, Enviro./Water Resources, Structural ENGINEERING Checklist 2015-2016 Catalog English: 6 Credits SEM CRED GRADE SEM CRED GRADE ENG 101* 3 CEE 210/L

  6. Name:___________________________________ ID #:_________________________ CIVIL AND ENVIRONMENTAL ENGINEERING Checklist

    E-Print Network [OSTI]

    Kachroo, Pushkin

    : 3 Credits** **Choose from approved list in catalog Geotechnical, Environ/Water Resources, Structural ENGINEERING Checklist 2014-2015 Catalog English: 6 Credits SEM CRED GRADE SEM CRED GRADE ENG 101* 3 CEE 110/L

  7. Acquisition & Financial Assistance Self-Assessment Checklist

    Office of Environmental Management (EM)

    in hardcopy or electronically? Data Quality Checklist O Identify if the quarterly FPDS-NG data quality submissions have been provided to MA-60. If so, ensure the required...

  8. University Policy Website Policy Development and Review Checklist

    E-Print Network [OSTI]

    Victoria, University of

    University Policy Website Policy Development and Review Checklist Updated May 2009 Page 1 of 3 UNIVERSITY POLICY DEVELOPMENT AND REVIEW CHECKLIST Purpose This checklist is designed to assist individuals developing and reviewing university policies and procedures. The questions below will not apply to every

  9. Academic Renewal Checklist Student Rules and Regulations Committee

    E-Print Network [OSTI]

    Li, Mo

    Academic Renewal Checklist Student Rules and Regulations Committee http://www.usg.edu/academic_affairs_handbook/section2/handbook/2.5_grading_system/#p2.5.1_academic_renewal 1 Georgia Institute of Technology Office of the Registrar Academic Renewal Application Checklist This checklist is intended to assist academic advisors

  10. National Service Activation Checklist | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergy Managing SwimmingMicrosoftPolicy, on May 28,March 11, 2016AuditNational

  11. ORISE: Independent verification

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (DOE) cleanup projects and the only verification contractor for the U.S. Nuclear Regulatory Commission (NRC), we validate that soil, water and structures are within established...

  12. http://wdrs.fnal.gov/orientation/checklist.pdf DEPARTMENT ORIENTATION CHECKLIST

    E-Print Network [OSTI]

    Quigg, Chris

    , WHEN, AND WHERE? MEET WITH MANAGER STAFF NAME Manager greets employee at new hire orientation, cafeteria/vending, mail station, employee refrigerators/microwaves) Location of Supplies and how and media used Documentation plans or specifications Project Checklists Directory

  13. Orc Verification Jayadev Misra

    E-Print Network [OSTI]

    Misra, Jayadev

    Orc Verification Jayadev Misra Department of Computer Science University of Texas at Austin http://orc.csres.utexas.edu WG 2.3, St. Petersburg June 5, 2013 #12;Orc Verification has been a disaster · Concurrency everywhere events but temporal ordering · Basic orc has no mutable variables, but sites do · Full functional

  14. Form 3501FR.27 New Employee Checklist

    E-Print Network [OSTI]

    Post, David M.

    will be used. Employee directory information has been verified or completed in HR database. Office location and mail code Directory title Directory listing preferences Employee has been directed to the ID CenterForm 3501FR.27 New Employee Checklist Revision Date: 11/25/09 Introductory Instructions: Please

  15. CHECKLIST FOR GRADUATE APPLICATIONS Department of Oceanography

    E-Print Network [OSTI]

    CHECKLIST FOR GRADUATE APPLICATIONS Department of Oceanography DEADLINES: U.S. Applicants: January 96822 · Please refer to the Graduate Division's Admissions requirements at: http://www.manoa.hawaii.edu/graduate/content/oceanography TO THE DEPARTMENT OF OCEANOGRAPHY: University of Hawaii at Manoa Department of Oceanography 1000 Pope Road Honolulu

  16. Checklist for Vacating Laboratories University of Maryland

    E-Print Network [OSTI]

    Rubloff, Gary W.

    regarding contaminated equipment 9 9 Shared Storage Areas Check all shared areas for hazardous materials 9 9 hazardous materials. CHECKLIST T N/A Chemicals/Gas Cylinders If transferring usable chemicals that cannot be returned to supplier with UM Hazardous Waste Tags 9 9 Insure all waste chemicals are in sealed

  17. PROGRAM ENROLMENT CHECKLIST Are You On Track?

    E-Print Network [OSTI]

    Fleming, Andrew J.

    Specialist Studies in Science 1 EDUC1751 Knowledge and Communication Technologies PHYS 1220 Advanced Physics of directed courses from a different science area other than Physics EDUC4195 Teachers, Ethics Information is current as at 5 September 2014 and is subject to change. #12;PROGRAM ENROLMENT CHECKLIST

  18. EXPORT CONTROLS: OVERVIEW & CHECKLIST FOR RESEARCHERS

    E-Print Network [OSTI]

    Mohanty, Saraju P.

    1 EXPORT CONTROLS: OVERVIEW & CHECKLIST FOR RESEARCHERS What are Export Controls? "Export Controls through its Export Administration Regulations (EAR), the U.S. Department of State through its of Foreign Assets Control (OFAC). The export control laws and regulations have several purposes: to restrict

  19. Report Review Checklist a. Ink is Black

    E-Print Network [OSTI]

    Report Review Checklist 1. General a. Ink is Black b. Margins Left & Top 1.5"; Right & Bottom 1" c. Page Numbers 1. Arabic numerals upper right corner within body of paper 2. Page Numbers: Lower case roman numerals for front matter. d. Spacing: Double spaced throughout report. e. Typeface: Arial, Times

  20. DOE Zero Energy Ready Home Solar Hot Water-Ready Checklist

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Zero Energy Ready Home Solar Hot Water-Ready Checklist (Encouraged) DOE Zero Energy Ready Home National Program encourages, but does not require, consideration of this checklist....

  1. Voltage verification unit

    DOE Patents [OSTI]

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  2. Checklist for Managing a General Program Evaluation Study

    Broader source: Energy.gov [DOE]

    This checklist for managing a general program evaluation study provides action items covering the following topics:  initial planning; evaluation design and procurement; implementation of study;...

  3. Quality Assurance Checklists for Video, Animations, and Audio Web Requirements

    Broader source: Energy.gov [DOE]

    Use these quality assurance (QA) checklists to ensure your audio files, flash animations, podcasts, and videos meet all Office of Energy Efficiency and Renewable Energy (EERE) standards.

  4. Quality Assurance Checklists for Energy.gov Websites

    Broader source: Energy.gov [DOE]

    Use these quality assurance (QA) checklists for websites and Web pages in energy.gov's Drupal content management system to ensure they meet mandatory requirements:

  5. FINAL REPORT –INDEPENDENT VERIFICATION SURVEY SUMMARY AND RESULTS FOR THE ARGONNE NATIONAL LABORATORY BUILDING 330 PROJECT FOOTPRINT, ARGONNE, ILLINOIS

    SciTech Connect (OSTI)

    ERIKA N. BAILEY

    2012-02-29

    ORISE conducted onsite verification activities of the Building 330 project footprint during the period of June 6 through June 7, 2011. The verification activities included technical reviews of project documents, visual inspections, radiation surface scans, and sampling and analysis. The draft verification report was issued in July 2011 with findings and recommendations. The contractor performed additional evaluations and remediation.

  6. Home Energy Checklist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy ServicesContracting OversightEMSHome Energy Checklist Home Energy

  7. Distributed Runtime Verification of JADE Multiagent Systems

    E-Print Network [OSTI]

    Mascardi, Viviana

    to a given global protocol is of paramount importance for most systems, and is mandatory for safety-critical of the verification activities. Reducing the log files dimension, re-implementing the monitor in a way independent in the JADE Homepage. FYPA (Find Your Path, Agent! [6, 7, 8]) is another industrial MAS developed in JADE

  8. Fuel Retrieval System (FRS) Design Verification

    SciTech Connect (OSTI)

    YANOCHKO, R.M.

    2000-01-27

    This document was prepared as part of an independent review to explain design verification activities already completed, and to define the remaining design verification actions for the Fuel Retrieval System. The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR).

  9. DOE Order Self Study Modules - DOE O 425.1D, Verification of...

    Office of Environmental Management (EM)

    NNSA line management regarding the verification of readiness to start up or restart nuclear facilities, activities, or operations? Note: If you think that you can complete the...

  10. Health Career Preparation Pre-Health Careers Checklist

    E-Print Network [OSTI]

    Amin, S. Massoud

    Health Career Preparation Pre-Health Careers Checklist The College of Continuing Education and the Health Careers Center have created a helpful checklist on how to explore and get started completing prerequisites for a health-related degree program (i.e. medical school, nursing, etc.). We recommend that you

  11. Hurricane Preparedness Checklist (From the St. Petersburg Times)

    E-Print Network [OSTI]

    Miles, Will

    Hurricane Preparedness Checklist (From the St. Petersburg Times) One of the biggest lessons of the disastrous 2004 hurricane season was that residents should have enough supplies on hand to survive for at least three days after a hurricane hits. Here's a checklist of the basic items for a disaster supplies

  12. New User Checklist | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesofPublications64 2.251 2.211New SpeciesNew User Checklist Register

  13. U.S. Navy Social Media Registration Checklist December 2013

    E-Print Network [OSTI]

    1 U.S. Navy Social Media Registration Checklist December 2013 Thank you for your interest in registering with the Navy's social media directory. Before you contact the Navy's Emerging Media Team at 703- 614-9154 or usnsocialmedia

  14. CHEMICAL ENGINEERING Graduation Checklist Bachelor of Science in Chemical Engineering

    E-Print Network [OSTI]

    Zallen, Richard

    CHEMICAL ENGINEERING Graduation Checklist Bachelor of Science in Chemical Engineering College of Engineering For Students Graduating in Calendar Year 2014 (Co-op students graduating in Calendar Year 2015

  15. Lockout -Tagout (LOTO) Annual Inspection and Training Assessment Checklist

    E-Print Network [OSTI]

    Sniadecki, Nathan J.

    Lockout - Tagout (LOTO) Annual Inspection and Training Assessment Checklist Department: Shop "No" to questions 2-11, has the employee been re- trained? Clear Form Save Form #12;Lockout - Tagout

  16. Quality Assurance Checklists for Energy.gov Web Requirements

    Broader source: Energy.gov [DOE]

    For Office of Energy Efficiency and Renewable Energy (EERE) websites, use these quality assurance (QA) checklists for websites and Web pages in Energy.gov's content management system (CMS) to ensure they meet mandatory requirements:

  17. Rotary mode core sampling approved checklist: 241-TX-113

    SciTech Connect (OSTI)

    Fowler, K.D.

    1998-08-03

    The safety assessment for rotary mode core sampling was developed using certain bounding assumptions, however, those assumptions were not verified for each of the existing or potential flammable gas tanks. Therefore, a Flammable Gas/Rotary Mode Core Sampling Approved Checklist has been completed for tank 241-TX-113 prior to sampling operations. This transmittal documents the dispositions of the checklist items from the safety assessment.

  18. Rotary mode core sampling approved checklist: 241-TX-116

    SciTech Connect (OSTI)

    FOWLER, K.D.

    1999-02-24

    The safety assessment for rotary mode core sampling was developed using certain bounding assumptions, however, those assumptions were not verified for each of the existing or potential flammable gas tanks. Therefore, a Flammable Gas/Rotary Mode Core Sampling Approved Checklist has been completed for tank 241-TX-116 prior to sampling operations. This transmittal documents the dispositions of the checklist items from the safety assessment.

  19. On Incremental Quantitative Verification for Probabilistic Systems

    E-Print Network [OSTI]

    Oxford, University of

    . Quantitative verification is an automated method to establish quantitative properties of a system model, non- probabilistic verification, which, in addition to exhaustive exploration of a system modelOn Incremental Quantitative Verification for Probabilistic Systems Marta Kwiatkowska, David Parker

  20. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. (2014)

    E-Print Network [OSTI]

    2014-01-01

    SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. (2014) Published online. INTRODUCTION As software evolves, engineers regression test it to validate new features and detect whether new in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/stvr.1562 Directed test suite augmentation

  1. Factors causing variation between the LEED final and pilot checklists in green health-care projects 

    E-Print Network [OSTI]

    Tyagi, Priyanka

    2005-11-01

    . In order to minimize the variation between the LEED pilot checklist and LEED approved checklist, the owner needs to conduct significant project planning. The owner should integrate the LEED objectives early in the project and should include the cost...

  2. ITL BULLETIN FOR MAY 2011 USING SECURITY CONFIGURATION CHECKLISTS AND THE NATIONAL

    E-Print Network [OSTI]

    ITL BULLETIN FOR MAY 2011 USING SECURITY CONFIGURATION CHECKLISTS AND THE NATIONAL CHECKLIST PROGRAM Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce The secure management of information

  3. Software Verification and Validation Procedure

    SciTech Connect (OSTI)

    Olund, Thomas S.

    2008-09-15

    This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

  4. Model Verification and Validation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7 AssessmentBusinessAlternativeModel Verification and

  5. Design, Installation, and Field Verification of Integrated Active Desiccant Hybrid Rooftop Systems Combined with a Natural Gas Driven Cogeneration Package, 2008

    Broader source: Energy.gov [DOE]

    Report summary of a research/demonstration project involving a custom 230 kW cogeneration package with four integrated active desiccant rooftop (IADR) systems

  6. Formal Verification Integration Approach for Faiez Zalila, Xavier Cregut, and Marc Pantel

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    critical systems. In this context, model validation and verification (V&V) activities are key features) for the verification of safety critical embedded systems has produced very good results and raised the inter- est the benefits of these power- ful methods. More precisely, we propose a language to formally express system

  7. Organics Verification Study for Sinclair and Dyes Inlets, Washington

    SciTech Connect (OSTI)

    Kohn, Nancy P.; Brandenberger, Jill M.; Niewolny, Laurie A.; Johnston, Robert K.

    2006-09-28

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. Because significant cleanup and source control activities have been conducted in the inlets since the data supporting the 1998 303(d) listings were collected, two verification studies were performed to address the 303(d) segments that were listed for metal and organic contaminants in marine sediment. The Metals Verification Study (MVS) was conducted in 2003; the final report, Metals Verification Study for Sinclair and Dyes Inlets, Washington, was published in March 2004 (Kohn et al. 2004). This report describes the Organics Verification Study that was conducted in 2005. The study approach was similar to the MVS in that many surface sediment samples were screened for the major classes of organic contaminants, and then the screening results and other available data were used to select a subset of samples for quantitative chemical analysis. Because the MVS was designed to obtain representative data on concentrations of contaminants in surface sediment throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, aliquots of the 160 MVS sediment samples were used in the analysis for the Organics Verification Study. However, unlike metals screening methods, organics screening methods are not specific to individual organic compounds, and are not available for some target organics. Therefore, only the quantitative analytical results were used in the organics verification evaluation. The results of the Organics Verification Study showed that sediment quality outside of Sinclair Inlet is unlikely to be impaired because of organic contaminants. Similar to the results for metals, in Sinclair Inlet, the distribution of residual organic contaminants is generally limited to nearshore areas already within the actively managed Puget Sound Naval Shipyard and Intermediate Maintenance Facility Superfund Site, where further source-control actions and monitoring are under way.

  8. Labs21 sustainable design programming checklist version 1.0

    SciTech Connect (OSTI)

    Mathew, Paul; Greenberg, Steve

    2005-01-07

    This checklist of sustainable design objectives and strategies can be used in the programming and conceptual design phases of a laboratory project. It includes the following: (1) Brief descriptions of each objective and strategy. (2) Metrics for each objective. This checklist is primarily to be used by owners, architects and engineers during the programming and conceptual design phase of a project. It is especially appropriate for use in design charrettes. The strategies and metrics can be included as requirements in the programming document or can be identified for further analysis or consideration during the design development phase. This checklist is hierarchically organized into design areas, objectives for each design area, and strategies and metrics for each objective. The design areas generally correspond to the design areas of the LEED(TM) rating system from the U.S. Green Building Council.

  9. Runtime verification for stochastic systems

    E-Print Network [OSTI]

    Wilcox, Cristina M

    2010-01-01

    We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

  10. Design for manufacturability Design verification

    E-Print Network [OSTI]

    Patel, Chintan

    ITRS Design #12;Design · Design for manufacturability · Design verification #12;Design for Manufacturability · Architecture challenges · Logic and circuit challenges · Layout and physical design challenges · Expected to be the source of multiple DFM challenges · Invest in variability reduction or design

  11. High Impact Technology Hub- Resources for Evaluators- Site Evaluation Checklists

    Broader source: Energy.gov [DOE]

    The HIT Catalyst conducts technology demonstrations in three main phases govern demonstrations: Site Evaluation, Selection and Project Kick-Off, Measurement and Verification Scoping and Plan...

  12. REVISED FINAL REPORT – INDEPENDENT VERIFICATION SURVEY ACTIVITIES AT THE SEPARATIONS PROCESS RESEARCH UNIT SITES, NISKAYUNA, NEW YORK – DCN 0496-SR-06-1

    SciTech Connect (OSTI)

    Evan Harpenau

    2011-10-10

    The Separations Process Research Unit (SPRU) complex located on the Knolls Atomic Power Laboratory (KAPL) site in Niskayuna, New York, was constructed in the late 1940s to research the chemical separation of plutonium and uranium (Figure A-1). SPRU operated as a laboratory scale research facility between February 1950 and October 1953. The research activities ceased following the successful development of the reduction oxidation and plutonium/uranium extraction processes. The oxidation and extraction processes were subsequently developed for large scale use by the Hanford and Savannah River sites (aRc 2008a). Decommissioning of the SPRU facilities began in October 1953 and continued through the 1990s.

  13. Occupational Health and Safety Checklist Home Based Work

    E-Print Network [OSTI]

    Tobar, Michael

    Occupational Health and Safety Checklist Home Based Work (to be completed by the Applicant) SAFETY RISK REQUIREMENTS COMMENTS Computer workstation Ensure appropriate workstation ergonomics, including as a result of computer use. Manual handling Know correct manual handling techniques. Know risks associated

  14. When your department is planning to move: An Ergonomics Checklist

    E-Print Network [OSTI]

    Yaghi, Omar M.

    for the move. Involve your computer workstation evaluator(s). Identify additional ergonomic evaluator evaluators. UC Berkeley's Ergonomics Program for Faculty and Staff ERGONOMICS@WORK (continues on page 2) #12When your department is planning to move: An Ergonomics Checklist A proactive, organized approach

  15. THESIS CHECKLIST FOR MASTER'S STUDENTS Step 3: Deposit

    E-Print Network [OSTI]

    Kent, Angela

    THESIS CHECKLIST FOR MASTER'S STUDENTS Step 3: Deposit Prepare your electronic thesis or dissertation (ETD) for submission to the Graduate College: o Convert your thesis file(s) to a single PDF file o. Complete all thesis corrections (if any; Thesis Office will notify you of required changes via email

  16. THESIS CHECKLIST FOR DOCTORAL STUDENTS Step 3: Deposit

    E-Print Network [OSTI]

    Kent, Angela

    THESIS CHECKLIST FOR DOCTORAL STUDENTS Step 3: Deposit Prepare your electronic thesis or dissertation (ETD) for submission to the Graduate College: o Convert your thesis file(s) to a single PDF file o. Complete all thesis corrections (if any; Thesis Office will notify you of required changes via email

  17. Thesis/Dissertation Defense Checklist Review the Graduation Deadlines

    E-Print Network [OSTI]

    Raina, Ramesh

    Thesis/Dissertation Defense Checklist Review the Graduation Deadlines Submit a Program of Study Advisor Consult your thesis/dissertation advisor to begin preparation for your defense. Be sure that you are aware of all departmental procedures and regulations that pertain to your thesis/dissertation and oral

  18. MA Thesis Degree Program Checklist By End of Second Term

    E-Print Network [OSTI]

    Arnold, Jonathan

    MA Thesis Degree Program Checklist By End of Second Term ( ) Select major professor and other two Advisory Committee members. ( ) Submit Program of Study. ( ) Submit thesis proposal to Advisory Committee for approval. ( ) Submit copy of approved thesis proposal to Grady Graduate Studies Office. ( ) Pick up thesis

  19. ENERGY STAR Back-To-School Shopping Checklist

    E-Print Network [OSTI]

    ENERGY STAR® Back-To-School Shopping Checklist Students can make a difference by shopping "smart" with ENERGY STAR® . Computing the Savings ENERGY STAR Qualified Computer Equipment Computer Monitor ENERGY up to 90 percent more energy than standard monitors. Printer If every home office were powered

  20. 2015 Promotion and Tenure Main Binder Checklist Name _________________________________ College _________________________

    E-Print Network [OSTI]

    McQuade, D. Tyler

    2015 Promotion and Tenure Main Binder Checklist Name _________________________________ College _________________________ This is an outline; please use Attachment 1 of the P&T Memo for detailed instructions. Labeling the Main Binder SPOT and/or # 13 from SPCI https://java.apps.fsu.edu/sussai2/main.jsp ___SPOT/SPCI Summary Forms

  1. PROGRAM ENROLMENT CHECKLIST: Are You On Track? Bachelor of Psychology

    E-Print Network [OSTI]

    Fleming, Andrew J.

    PROGRAM ENROLMENT CHECKLIST: Are You On Track? Bachelor of Psychology For students who commenced and Organisms (10 units) OR BIOL1040 Intro to Bio 1 (10 units) PSYC1010 Psychology Introduction 1 (10 units) PSYC1200 Pre-professional Psychology 1 (10 units) Elective at any level (10 units) As a first year

  2. PROGRAM ENROLMENT CHECKLIST: Are You On Track? Bachelor of Psychology

    E-Print Network [OSTI]

    Fleming, Andrew J.

    PROGRAM ENROLMENT CHECKLIST: Are You On Track? Bachelor of Psychology For students who commenced and Technology (10 units) PSYC1010 Psychology Introduction 1 (10 units) PSYC1200 Pre-professional Psychology 1 (10 units) PHIL1060 Introduction to Philosophy of Psychology (10 units) PSYC1020 Psychology

  3. UCSD New Laboratory Worker Checklist PI: ____________________ New Worker Name: _____________________

    E-Print Network [OSTI]

    Aluwihare, Lihini

    UCSD New Laboratory Worker Checklist PI: ____________________ New Worker Name laboratory staff, students, volunteers, etc : Online Laboratory Safety Orientation in UC Learning Center able to review each of the items below? UC San Diego Laboratory Safety Manual: http://blink.ucsd.edu/safety/research-lab/laboratory

  4. TRIP / DAILY OPERATOR CHECKLIST CALIFORNIA STATE UNIVERSITY, LONG BEACH

    E-Print Network [OSTI]

    Sorin, Eric J.

    TRIP / DAILY OPERATOR CHECKLIST CALIFORNIA STATE UNIVERSITY, LONG BEACH Date_____________ License Needing Attention Overheating Oil Leaking Knocks No power Oil pressure loss Noisy Slips Poor release Grabs Chatters Noisy Oil leakage Hard shifting Slips during shifts ( Shimmy-wander Free play Wheel balance Hard

  5. PhD Program Checklist (revised Nov 2000)

    E-Print Network [OSTI]

    Farritor, Shane

    PhD Program Checklist (revised Nov 2000) Advisor: Graduate Student Name: Email Address: Required Task Date Comments Entered Program First EE Graduate Course (PhD Program) Advisor Chosen PhD Qualifying Examination: Attempt 1 Math: P F EE: P F PhD Qualifying Examination: Attempt 2 Math: P F EE: P F (2 attempts

  6. Policy Writer's Checklist Updating your policy sections and exhibits

    E-Print Network [OSTI]

    California at Davis, University of

    6/4/13 1 Policy Writer's Checklist Updating your policy sections and exhibits: Request the most recent word processing file from your unit policy coordinator (see http of the policy section. Think specifically about what information campus departments will need in order to use

  7. Checklists for: Oklahoma 4-H Hall of Fame

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    Checklists for: Oklahoma 4-H Hall of Fame National 4-H Youth Congress Name County Oklahoma 4-H Hall of Fame National 4-H Youth Congress Oklahoma 4-H Hall of Fame has the following requirements: Oklahoma 4-H on the front page of the Oklahoma 4-H Report Form and on the heading for Section I Member must be 16 years

  8. Environmental Studies Major Checklist 2013-2014 Name: ID# Date

    E-Print Network [OSTI]

    Barrash, Warren

    Environmental Studies Major Checklist 2013-2014 Name: ID# Date: Course Number and Title Credits DLN GEOS 101 Global environmental science PREREQ: Math 108 or higher 4 DLV Visual and Performing Arts to Environmental studies 3 CID ENVSTD 221 People and Nature PREREQ: ENSTD 121 and ENG 102 4 ENVSTD 491 Project

  9. September 2011 Checklist for the Relocation of a Grantee

    E-Print Network [OSTI]

    de Leon, Alex R.

    September 2011 Checklist for the Relocation of a Grantee to an Eligible Canadian Institution-year extension or other approved extension period). Documents Required from the Grantee: written notification) with the grantee's address at the proposed new Institution Paid a signed relocation letter, including

  10. INDEPENDENT VERIFICATION SURVEY REPORT FOR ZONE 1 OF THE EAST TENNESSEE TECHNOLOGY PARK IN OAK RIDGE, TENNESSEE

    SciTech Connect (OSTI)

    King, David A.

    2012-08-16

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs).

  11. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    SciTech Connect (OSTI)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  12. New York University -Export Control Checklist Use this checklist to assist in determining whether or not Export Control regulations apply to your project.

    E-Print Network [OSTI]

    Wang, Da-Neng

    New York University - Export Control Checklist Use this checklist to assist in determining whether or not Export Control regulations apply to your project. Does this project or agreement: YES NO Restrict List ("CCL") under the Export Administration Regulations ("EAR"; see http

  13. Job Offer Checklist Use this checklist to make sure that no detail is missed when you receive an offer. However, keep in

    E-Print Network [OSTI]

    Job Offer Checklist Use this checklist to make sure that no detail is missed when you receive an offer. However, keep in mind that this is a very comprehensive list; every item may not necessarily apply to you or your specific offer. Topic Area Their Response Potential Questions Title (Is it what

  14. Monitoring, Verification and Reporting: Improving Compliance...

    Open Energy Info (EERE)

    GHG inventory, Policiesdeployment programs Resource Type: Guidemanual Website: www.iea.orgpaperspathwaysmonitoring.pdf Monitoring, Verification and Reporting: Improving...

  15. Technical challenges for dismantlement verification

    SciTech Connect (OSTI)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-11-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion.

  16. DOE's New Checklist Helps Plants Assess Energy Management Activities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i pStateDOE FederalTheofHeyeck,DepartmentProgram

  17. Verification = Specification + Deduction + Computation + Abstraction Logical foundations

    E-Print Network [OSTI]

    Jouannaud, Jean-Pierre

    of powerful, secure, interactive tools #12;Verification Given a system to be analyzed, 1. elaborate a model, interactive tools #12;Verification Given a system to be analyzed, 1. elaborate a model of the system. 2. Test;Verification Given a system to be analyzed, 1. elaborate a model of the system. 2. Test some liveness property

  18. Symbolic Verification of Timed Asynchronous Hardware Protocols

    E-Print Network [OSTI]

    Stevens, Ken

    of system level verification by applying symbolic model checking techniques to help mitigate the state constraints into verification models to prove timed behavioral correctness of systems employing timed protocol to model timing in asynchronous hardware protocols ­ a novel mapping of tim- ing into the verification flow

  19. Incremental Power Grid Verification ECE Department

    E-Print Network [OSTI]

    Najm, Farid N.

    Incremental Power Grid Verification Abhishek ECE Department University of Toronto Toronto, Ontario, Canada f.najm@utoronto.ca ABSTRACT Verification of the on-die power grid is a key step in the design General Terms Performance, Algorithms, Verification Keywords Power Grid, voltage drop 1. INTRODUCTION

  20. Fertilizing Texas Lawns: 10-Point Checklist for Warm-Season Grasses 

    E-Print Network [OSTI]

    Chalmers, David; McAfee, James

    2007-01-31

    Use this checklist on fertilization to make your lawn healthy and attractive while minimizing the costs and damage to the environment....

  1. Anglo-Scottish tracts, 1701-1714 : a descriptive checklist

    E-Print Network [OSTI]

    McLeod, William Reynolds; McLeod, V. B.

    1979-01-01

    Leod UNIVERSITY OF KANSAS LIBRARIES 1979 PRINTED IN LAWRENCE, KANSAS, U.S.A, BY THE UNIVERSITY OF KANSAS PRINTING SERVICE To Helen and Don CONTENTS PREFACE « LIBRARY SYMBOLS XV ABBREVIATIONS THE CHECKLIST 1 BIOGRAPHIES 154 CHRONOLOGICAL INDEX 210 VII... Succession, 1958. Davis & Ehrenpreis Herbert Davis and Irvin Ehrenpreis, eds., Jonathan Swift. Political Tracts, 1713-1719, 1964. Defoe, History Daniel Defoe, The history of the union of Great Britain, 1709. DNB Dictionary of National Biography. EHR...

  2. Verification Survey of the Building 315 Zero Power Reactor-6 Facility, Argonne National Laboratory-East, Argonne, Illinois

    SciTech Connect (OSTI)

    W. C. Adams

    2007-05-25

    Oak Ridge Institute for Science and Education (ORISE) conducted independent verification radiological survey activities at Argonne National Laboratory’s Building 315, Zero Power Reactor-6 facility in Argonne, Illinois. Independent verification survey activities included document and data reviews, alpha plus beta and gamma surface scans, alpha and beta surface activity measurements, and instrumentation comparisons. An interim letter report and a draft report, documenting the verification survey findings, were submitted to the DOE on November 8, 2006 and February 22, 2007, respectively (ORISE 2006b and 2007).

  3. Focus Sheet | Hazardous Waste Checklist How to be ready for state hazardous waste

    E-Print Network [OSTI]

    Wilcock, William

    storage cabinet. Avoid accumulating a lot of waste ­ keep areas clear. EPO ­ Hazardous Waste Checklist 07Focus Sheet | Hazardous Waste Checklist How to be ready for state hazardous waste inspectors. See a hazardous waste inspection. ons, rrosive. n hemicals? ical waste. Waste-like chemicals have als Are you

  4. Guide to the Green Lab Certification Checklist Section 1: Management and Training

    E-Print Network [OSTI]

    Guide to the Green Lab Certification Checklist Section 1: Management and Training 1a. Prerequisite - Lab participates in self assessment and sustainability innovation. Use the Green Lab Certification Checklist as a self-assessment guide to consider your lab's energy conservation and sustainability practices

  5. CHECKLIST of the PLANTS of the GUIANAS (Guyana, Surinam, French Guiana)

    E-Print Network [OSTI]

    Miller, Scott

    is a preliminary listing of the known vascular plants (flowering plants, gnetophytes, cycads, conifers, ferns. This checklist is an attempt to list all of the vascular plants and bryophytes of the Guianas in an effortCHECKLIST of the PLANTS of the GUIANAS (Guyana, Surinam, French Guiana) J. Boggan, V. Funk, C

  6. Termination or Transfer Checklist for Employees Employees can terminate from their positions for many reasons

    E-Print Network [OSTI]

    Fletcher, Robin

    HR-FRM-051 Termination or Transfer Checklist for Employees Employees can terminate from etc. This checklist is to be used by employees who are terminating from the University or transferring the University, review the voluntary termination policy for the minimum notice guidelines required

  7. Termination or Transfer Checklist for Managers Employees can terminate from their positions for many reasons including

    E-Print Network [OSTI]

    Fletcher, Robin

    HR-FRM-050 Termination or Transfer Checklist for Managers Employees can terminate from etc. This checklist is to be used by managers when an employee is going to terminate from as part of the termination process. Type of Termination Resignation: If your employee is resigning, review

  8. Chemistry Major Concentration Checklist (For students who matriculated at Tufts University in 2011 or later)

    E-Print Network [OSTI]

    Kounaves, Samuel P.

    Chemistry Major Concentration Checklist (For students who matriculated at Tufts University in 2011 a checklist with your degree sheet for each major) Foundation: Chemistry 1, 11, or 16; and Chemistry 2 or 12. Core courses: Chemistry 31, 33, 42, 51, 52, 53, 54; four additional courses in intermediate or advanced

  9. Chemistry Major Concentration Checklist (For students who matriculated at Tufts University in 2010 or earlier)

    E-Print Network [OSTI]

    Kounaves, Samuel P.

    Chemistry Major Concentration Checklist (For students who matriculated at Tufts University in 2010 a checklist with your degree sheet for each major) Foundation: Chemistry 1, 11, or 16; and Chemistry 2 or 12. Intermediate: Chemistry 31, 33, 42, 51, 53; five additional courses in intermediate or advanced chemistry

  10. Water Conservation Checklist for the Home 

    E-Print Network [OSTI]

    Harris, Janie; Kellner, Bev

    2002-08-10

    Modifying water use in the home can reduce water waste and save energy and money. This publication explains how to conserve water while doing various activities around the home. Tips are also given on inspecting plumbing....

  11. Nuclear Data Verification and Standardization

    SciTech Connect (OSTI)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  12. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  13. An on-line human signature verification system 

    E-Print Network [OSTI]

    Simsek, Burc A

    2000-01-01

    A study on human signature verification is presented. A literature survey of current and past methodologies for on-line signature verification is followed by a new approach to the problem of on-line signature verification. ...

  14. Verification and Validation of Hybrid Systems

    E-Print Network [OSTI]

    Jin, Xiaoqing

    2013-01-01

    Mathur. Foundations of software testing. Pearson Education,decision coverage to software testing. Software Engineeringmodel checkers: a survey. Software Testing, Verification and

  15. Input apparatus for dynamic signature verification systems

    DOE Patents [OSTI]

    EerNisse, Errol P. (Albuquerque, NM); Land, Cecil E. (Albuquerque, NM); Snelling, Jay B. (Albuquerque, NM)

    1978-01-01

    The disclosure relates to signature verification input apparatus comprising a writing instrument and platen containing piezoelectric transducers which generate signals in response to writing pressures.

  16. Alternative Breaks Emergency Contact & Verification of Medical

    E-Print Network [OSTI]

    Tipple, Brett

    Alternative Breaks Emergency Contact & Verification of Medical Insurance Form Participant Name is STRONGLY RECCOMENDED, it is not required for participation in Alternative Breaks. *Please note: All

  17. Flammable Gas Refined Safety Analysis Tool Software Verification and Validation Report for Resolve Version 2.5

    SciTech Connect (OSTI)

    BRATZEL, D.R.

    2000-09-28

    The purpose of this report is to document all software verification and validation activities, results, and findings related to the development of Resolve Version 2.5 for the analysis of flammable gas accidents in Hanford Site waste tanks.

  18. Checklist for Managing a General Evaluation Study | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power,5 BUDGETU SStateAnnounce Results7 -Met-OceanChecklist

  19. Numerical Verification of Bounce Harmonic Resonances in Neoclassical...

    Office of Scientific and Technical Information (OSTI)

    Numerical Verification of Bounce Harmonic Resonances in Neoclassical Toroidal Viscosity for Tokamaks Citation Details In-Document Search Title: Numerical Verification of Bounce...

  20. Fast 3D Scanning for Biometric Identification and Verification

    E-Print Network [OSTI]

    McShea, Daniel W.

    Fast 3D Scanning for Biometric Identification and Verification June 2011 Authors Anselmo., & Chen, A. (2011). Fast 3D Scanning for Biometric Identification and Verification. (Prepared by RTI

  1. CARB Verification of Catalyzed Diesel Particulate Filters for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets 2005...

  2. Numerical Verification of Bounce Harmonic Resonances in Neoclassical

    Office of Scientific and Technical Information (OSTI)

    for Tokamaks Kimin Kim, Jong-Kyu Park and Allen H. Boozer 70 PLASMA PHYSICS AND FUSION TECHNOLOGY Tokamaks, Numerical Verification Tokamaks, Numerical Verification This...

  3. "Hardware Verification for Arithmetic Circuits" Michael Shliselberg, Jordan Kaplan

    E-Print Network [OSTI]

    Mountziaris, T. J.

    "Hardware Verification for Arithmetic Circuits" Michael Shliselberg, Jordan Kaplan Professor Maciej Ciesielski Our research pertains to finding either new or more efficient methods of hardware verification

  4. LOPP Proposal Checklist | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville,LEDSGP/activities <LEDSGP/hometraining <FederalProposal

  5. The monitoring and verification of nuclear weapons

    SciTech Connect (OSTI)

    Garwin, Richard L., E-mail: RLG2@us.ibm.com [IBM Fellow Emeritus, IBM Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, NY 10598 (United States)

    2014-05-09

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

  6. Code Verification of the HIGRAD Computational Fluid Dynamics Solver

    SciTech Connect (OSTI)

    Van Buren, Kendra L. [Los Alamos National Laboratory; Canfield, Jesse M. [Los Alamos National Laboratory; Hemez, Francois M. [Los Alamos National Laboratory; Sauer, Jeremy A. [Los Alamos National Laboratory

    2012-05-04

    The purpose of this report is to outline code and solution verification activities applied to HIGRAD, a Computational Fluid Dynamics (CFD) solver of the compressible Navier-Stokes equations developed at the Los Alamos National Laboratory, and used to simulate various phenomena such as the propagation of wildfires and atmospheric hydrodynamics. Code verification efforts, as described in this report, are an important first step to establish the credibility of numerical simulations. They provide evidence that the mathematical formulation is properly implemented without significant mistakes that would adversely impact the application of interest. Highly accurate analytical solutions are derived for four code verification test problems that exercise different aspects of the code. These test problems are referred to as: (i) the quiet start, (ii) the passive advection, (iii) the passive diffusion, and (iv) the piston-like problem. These problems are simulated using HIGRAD with different levels of mesh discretization and the numerical solutions are compared to their analytical counterparts. In addition, the rates of convergence are estimated to verify the numerical performance of the solver. The first three test problems produce numerical approximations as expected. The fourth test problem (piston-like) indicates the extent to which the code is able to simulate a 'mild' discontinuity, which is a condition that would typically be better handled by a Lagrangian formulation. The current investigation concludes that the numerical implementation of the solver performs as expected. The quality of solutions is sufficient to provide credible simulations of fluid flows around wind turbines. The main caveat associated to these findings is the low coverage provided by these four problems, and somewhat limited verification activities. A more comprehensive evaluation of HIGRAD may be beneficial for future studies.

  7. Annotated checklist and database for vascular plants of the Jemez Mountains

    SciTech Connect (OSTI)

    Foxx, T. S.; Pierce, L.; Tierney, G. D.; Hansen, L. A.

    1998-03-01

    Studies done in the last 40 years have provided information to construct a checklist of the Jemez Mountains. The present database and checklist builds on the basic list compiled by Teralene Foxx and Gail Tierney in the early 1980s. The checklist is annotated with taxonomic information, geographic and biological information, economic uses, wildlife cover, revegetation potential, and ethnographic uses. There are nearly 1000 species that have been noted for the Jemez Mountains. This list is cross-referenced with the US Department of Agriculture Natural Resource Conservation Service PLANTS database species names and acronyms. All information will soon be available on a Web Page.

  8. Reuse of Verification Results Conditional Model Checking, Precision Reuse,

    E-Print Network [OSTI]

    Beyer, Dirk

    further verification runs of the system; information about the level of abstraction in the abstract modelReuse of Verification Results Conditional Model Checking, Precision Reuse, and Verification checker which parts of the system should be verified; thus, later verification runs can use the output

  9. The KivApproach to Software Verification ? Wolfgang Reif

    E-Print Network [OSTI]

    Reif, Wolfgang

    systems, a powerful proof component, and an evolutionary verification model supporting incremen­ tal error approach to the design and verification of large sequential systems. It is based on structured alge­ braic correction and verification. We present the design methodology for modular systems, a feasible verification

  10. AN INVESTIGATION INTO SUBSPACE RAPID SPEAKER ADAPTATION FOR VERIFICATION

    E-Print Network [OSTI]

    Chen, Tsuhan

    verification. 1. INTRODUCTION The rapid adaptation of speaker models for the purposes of speaker verification topic, with current state of the art speaker verification sys- tems based on hidden Markov models (HMMsAN INVESTIGATION INTO SUBSPACE RAPID SPEAKER ADAPTATION FOR VERIFICATION Simon Lucey and Tsuhan

  11. Verification: What works and what does not? Stephen A. Edwards

    E-Print Network [OSTI]

    Verification: What works and what does not? Stephen A. Edwards Columbia University Verification: What works and what does not? ­ p. 1/5 #12;Verification at Columbia · Luca Carloni et al. model detection. I want to verify my implementation obeys the semantics. Verification: What works and what does

  12. THE SCHMIDT COLLEGE OF ARTS & LETTERS HISTORY MAJOR CHECKLIST (updated: September 2011)

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Century American Social History AMH3310 3 _____ History of American Technology AMH3372 3 _____ The AmericaTHE SCHMIDT COLLEGE OF ARTS & LETTERS HISTORY MAJOR CHECKLIST (updated: September 2011) Student: ________________________ Student Phone#: _________________ Date: __________ Survey Courses (all required; 18cr.) History

  13. Checklist for Computer Science PSM Program ___ Application for Admission into the Graduate Program

    E-Print Network [OSTI]

    Harvey, Dan

    Checklist for Computer Science PSM Program ___ Application for Admission into the Graduate Program with advisor ___ PSM Master's Degree Program Form · Proposed program of studies, determined by you and your

  14. Biochemistry Major Concentration Checklist (To be submitted with University Degree Sheet)

    E-Print Network [OSTI]

    Kounaves, Samuel P.

    Biochemistry Major Concentration Checklist (To be submitted with University Degree Sheet) Revised). To be eligible for a summa cum laude degree, a student majoring in biochemistry must have done biology

  15. POLICY CHECKLIST To be submitted with the policy as presented at Cabinet

    E-Print Network [OSTI]

    Palffy-Muhoray, Peter

    POLICY CHECKLIST To be submitted with the policy as presented at Cabinet Initiating party: ______________________________________ Date: _______________ (person who initiated the policy change, project leader) Originating Department/Office: ________________________________________________ Policy name: ______________________________________________________________ New Policy: _____ Amended

  16. verification

    National Nuclear Security Administration (NNSA)

    %2A en NGSI Safeguards by Design http:www.nnsa.energy.govaboutusourprogramsdnnnissafeguardssbd

  17. verification

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2Anational lab8/%2A en6/%2A en NNSA/%2A

  18. Checklist for transition to new highway fuel(s).

    SciTech Connect (OSTI)

    Risch, C.; Santini, D.J.

    2011-12-15

    Transportation is vital to the U.S. economy and society. As such, U.S. Presidents have repeatedly stated that the nation needs to reduce dependence on petroleum, especially for the highway transportation sector. Throughout history, highway transportation fuel transitions have been completed successfully both in United States and abroad. Other attempts have failed, as described in Appendix A: Historical Highway Fuel Transitions. Planning for a transition is critical because the changes can affect our nation's ability to compete in the world market. A transition will take many years to complete. While it is tempting to make quick decisions about the new fuel(s) of choice, it is preferable and necessary to analyze all the pertinent criteria to ensure that correct decisions are made. Doing so will reduce the number of changes in highway fuel(s). Obviously, changes may become necessary because of occurrences such as significant technology breakthroughs or major world events. With any and all of the possible transitions to new fuel(s), the total replacement of gasoline and diesel fuels is not expected. These conventional fuels are envisioned to coexist with the new fuel(s) for decades, while the revised fuel and vehicle infrastructures are implemented. The transition process must analyze the needs of the primary 'players,' which consist of the customers, the government, the fuel industry, and the automotive industry. To maximize the probability of future successes, the prime considerations of these groups must be addressed. Section 2 presents a succinct outline of the Checklist. Section 3 provides a brief discussion about the groupings on the Checklist.

  19. Proof Planning for Automating Hardware Verification 

    E-Print Network [OSTI]

    Cantu-Ortiz, Francisco Javier

    In this thesis we investigate the applicability of proof planning to automate the verification of hardware systems. Proof planning is a meta-level reasoning technique which captures patterns of proof common to a family of theorems. It contributes...

  20. Correct Hardware Design and Verification Methods

    E-Print Network [OSTI]

    Margaria, T.; Melham, T.F.

    Margaria,T. Melham,T.F. Correct Hardware Design and Verification Methods: 11th IFIP WG10.5 Advanced Research Working Conference, CHARME 2001: UK Springer Verlag

  1. Curriculum Checklist ITU Dual Degree Program in Bioengineering 145 credits k:advising/BIOE degree/checklists/DW ITU DDP 2015 checklist and equivs 20142015 CATALOG Effective FALL 2015 ITU cr. 77 Student

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    Curriculum Checklist ITU Dual Degree Program in Bioengineering 145 credits k:advising/BIOE degree of Engineering (MSU CORE IA) 3 IA CORE No direct equivalent 3 BEN 111 Intro to Bioengineering Processes in Bioengineering 3 (3 + 0) EBIO 324 Bioengineering Transport 3 Bioengineering Elective 3 SEE

  2. Cleanup Verification Package for the 116-K-2 Effluent Trench

    SciTech Connect (OSTI)

    J. M. Capron

    2006-04-04

    This cleanup verification package documents completion of remedial action for the 116-K-2 effluent trench, also referred to as the 116-K-2 mile-long trench and the 116-K-2 site. During its period of operation, the 116-K-2 site was used to dispose of cooling water effluent from the 105-KE and 105-KW Reactors by percolation into the soil. This site also received mixed liquid wastes from the 105-KW and 105-KE fuel storage basins, reactor floor drains, and miscellaneous decontamination activities.

  3. Property Specification Patterns for Finite-State Verification* Matthew B. Dwyer George S. Avrunin

    E-Print Network [OSTI]

    Avrunin, George S.

    .g., model checking) provides a powerful means to detect errors that are often subtle and difficult specification, concurrent systems 1 INTRODUCTION Formal specification and verification have been active areas properties of finite-state models of computer systems. Properties are typically specified with temporal lo

  4. Cleanup Verification Package for the 118-F-5 PNL Sawdust Pit

    SciTech Connect (OSTI)

    L. D. Habel

    2008-05-20

    This cleanup verification package documents completion of remedial action, sampling activities, and compliance with cleanup criteria for the 118-F-5 Burial Ground, the PNL (Pacific Northwest Laboratory) Sawdust Pit. The 118-F-5 Burial Ground was an unlined trench that received radioactive sawdust from the floors of animal pens in the 100-F Experimental Animal Farm.

  5. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2007; 17:137157

    E-Print Network [OSTI]

    Memon, Atif M.

    -oracle creation, coverage evaluation, and regression testing is recast in terms of this model by defining event to define test coverage criteria for GUIs [17], graph-traversal to obtain smoke test cases for GUIsSOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2007; 17

  6. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2006; 16:332

    E-Print Network [OSTI]

    Belli, Fevzi

    a holistic view of fault modelling that is carried out as a complementary step to system modelling, enablingSOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2006; 16:3­32 Published-based modelling, analysis and testing of user interactions: approach and case study Fevzi Belli1,,, Christof J

  7. Approach to IAEA material-balance verification at the Portsmouth Gas Centrifuge Enrichment Plant

    SciTech Connect (OSTI)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1983-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP). The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistic for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of: (1) attributes and variables sample sizes for the various strata, (2) standard deviations of the relevant test statistics, and (3) the detection sensitivity which the IAEA might achieve by this verification strategy at GCEP.

  8. Verification survey report of the south waste tank farm training/test tower and hazardous waste storage lockers at the West Valley demonstration project, West Valley, New York

    SciTech Connect (OSTI)

    Weaver, Phyllis C.

    2012-08-29

    A team from ORAU's Independent Environmental Assessment and Verification Program performed verification survey activities on the South Test Tower and four Hazardous Waste Storage Lockers. Scan data collected by ORAU determined that both the alpha and alpha-plus-beta activity was representative of radiological background conditions. The count rate distribution showed no outliers that would be indicative of alpha or alpha-plus-beta count rates in excess of background. It is the opinion of ORAU that independent verification data collected support the site?s conclusions that the South Tower and Lockers sufficiently meet the site criteria for release to recycle and reuse.

  9. Monitoring and verification R&D

    SciTech Connect (OSTI)

    Pilat, Joseph F; Budlong - Sylvester, Kory W; Fearey, Bryan L

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  10. Towards more transparent and reproducible omics studies through a common metadata checklist and data publications

    SciTech Connect (OSTI)

    Kolker, Eugene; Ozdemir, Vural; Martens , Lennart; Hancock, William S.; Anderson, Gordon A.; Anderson, Nathaniel; Aynacioglu, Sukru; Baranova, Ancha; Campagna, Shawn R.; Chen, Rui; Choiniere, John; Dearth, Stephen P.; Feng, Wu-Chun; Ferguson, Lynnette; Fox, Geoffrey; Frishman, Dmitrij; Grossman, Robert; Heath, Allison; Higdon, Roger; Hutz, Mara; Janko, Imre; Jiang, Lihua; Joshi, Sanjay; Kel, Alexander; Kemnitz, Joseph W.; Kohane, Isaac; Kolker, Natali; Lancet, Doron; Lee, Elaine; Li, Weizhong; Lisitsa, Andrey; Llerena, Adrian; MacNealy-Koch, Courtney; Marhsall, Jean-Claude; Masuzzo, Paolo; May, Amanda; Mias, George; Monroe, Matthew E.; Montague, Elizabeth; Monney, Sean; Nesvizhskii, Alexey; Noronha, Santosh; Omenn, Gilbert; Rajasimha, Harsha; Ramamoorthy, Preveen; Sheehan, Jerry; Smarr, Larry; Smith, Charles V.; Smith, Todd; Snyder, Michael; Rapole, Srikanth; Srivastava, Sanjeeva; Stanberry, Larissa; Stewart, Elizabeth; Toppo, Stefano; Uetz, Peter; Verheggen, Kenneth; Voy, Brynn H.; Warnich, Louise; Wilhelm, Steven W.; Yandl, Gregory

    2014-01-01

    Biological processes are fundamentally driven by complex interactions between biomolecules. Integrated high-throughput omics studies enable multifaceted views of cells, organisms, or their communities. With the advent of new post-genomics technologies omics studies are becoming increasingly prevalent yet the full impact of these studies can only be realized through data harmonization, sharing, meta-analysis, and integrated research,. These three essential steps require consistent generation, capture, and distribution of the metadata. To ensure transparency, facilitate data harmonization, and maximize reproducibility and usability of life sciences studies, we propose a simple common omics metadata checklist. The proposed checklist is built on the rich ontologies and standards already in use by the life sciences community. The checklist will serve as a common denominator to guide experimental design, capture important parameters, and be used as a standard format for stand-alone data publications. This omics metadata checklist and data publications will create efficient linkages between omics data and knowledge-based life sciences innovation and importantly, allow for appropriate attribution to data generators and infrastructure science builders in the post-genomics era. We ask that the life sciences community test the proposed omics metadata checklist and data publications and provide feedback for their use and improvement.

  11. Langerhans Lab Protocols DRILL additions checklist.docx revised 8/30/12 by JW Page 1 of 7

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols DRILL additions checklist.docx revised 8/30/12 by JW Page 1 of 7 Checklist for Adding a Collection to the DRILL Photos Images: 1. Take dorsal and lateral photos. 2. Sort images in their collection folder into the specific file in Images Ready For DRILL folder on the FTP server. 4. Transfer

  12. Catalogue of alien plants of the Czech Republic (2nd edition): checklist update, taxonomic diversity and invasion patterns

    E-Print Network [OSTI]

    Kratochvíl, Lukas

    Catalogue of alien plants of the Czech Republic (2nd edition): checklist update, taxonomic): Catalogue of alien plants of the Czech Republic (2nd edition): checklist update, taxonomic diversity and invasion patterns. ­ Preslia 84: 155­255. A complete list of all alien taxa ever recorded in the flora

  13. Bioengineering Pre-Med Checklist Are you interested continuing on to medical school after you finish your Bachelor

    E-Print Network [OSTI]

    Lee, Tonghun

    Bioengineering Pre-Med Checklist Are you interested continuing on to medical school after you year of English (Comp I & Advanced Composition) Classes you need to take outside of the Bioengineering § Do well in the class § Discuss your goals #12;Bioengineering Pre-Med Checklist Freshmen Year

  14. Final Report Independent Verification Survey of the High Flux Beam Reactor, Building 802 Fan House Brookhaven National Laboratory Upton, New York

    SciTech Connect (OSTI)

    Harpeneau, Evan M.

    2011-06-24

    On May 9, 2011, ORISE conducted verification survey activities including scans, sampling, and the collection of smears of the remaining soils and off-gas pipe associated with the 802 Fan House within the HFBR (High Flux Beam Reactor) Complex at BNL. ORISE is of the opinion, based on independent scan and sample results obtained during verification activities at the HFBR 802 Fan House, that the FSS (final status survey) unit meets the applicable site cleanup objectives established for as left radiological conditions.

  15. ECE/CS 584: Fall 2012 Embedded System Verification

    E-Print Network [OSTI]

    Liberzon, Daniel

    powerful software tools (model checkers, SMT solvers, & theorem provers) for designing & analyzing systems · Real-time and hybrid system models, stability verification: Multiple Lyapunov functions, slow switchingECE/CS 584: Fall 2012 Embedded System Verification URL: http

  16. Using Measurement and Verification to Manage Risk in Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Measurement and Verification to Manage Risk in Federal Energy- and Water-Saving Projects Using Measurement and Verification to Manage Risk in Federal Energy- and Water-Saving...

  17. Vehicle Modeling and Verification of CNG-Powered Transit Buses

    E-Print Network [OSTI]

    Hedrick, J. K.; Ni, A.

    2004-01-01

    Modeling and Verification of CNG-Powered Transit BusesModeling and Verification of CNG-Powered Transit Buses.Modeling and Veri?cation of CNG-Powered Transit Buses J.K.

  18. Compiler verification meets cross-language linking via data abstraction

    E-Print Network [OSTI]

    Wang, Peng

    Many real programs are written in multiple different programming languages, and supporting this pattern creates challenges for formal compiler verification. We describe our Coq verification of a compiler for a high-level ...

  19. Logic verification using recursive learning, ATPG and transformations 

    E-Print Network [OSTI]

    Paul, Debjyoti

    1996-01-01

    We describe a new approach for formal verification of combinational logic circuits using Recursive learning, ATPG and Transformations. A logic verification tool, VeriLAT, was implemented based on this approach. Experimental results on the ISCAS85...

  20. MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP

    E-Print Network [OSTI]

    MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS Thesis Approved by: Dr.................................................................................................................... 16 MODELING OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS

  1. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  2. Verification of full functional correctness for imperative linked data structures

    E-Print Network [OSTI]

    Zee, Karen K

    2010-01-01

    We present the verification of full functional correctness for a collection of imperative linked data structures implemented in Java. A key technique that makes this verification possible is a novel, integrated proof ...

  3. AN ADVANCED BINARY ENCODED MATRIX REPRESENTATION FOR RULEBASE VERIFICATION

    E-Print Network [OSTI]

    Coenen, Frans

    reaching; consider the event where a KBS fails to apply an emergency shut down procedure. The verification

  4. MODELING AND VERIFICATION OF A PIPELINED CPU Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    of complex hardware and software systems. Several powerful verification methods, such as Symbolic ModelMODELING AND VERIFICATION OF A PIPELINED CPU Lubomir Ivanov Department of Computer Science, Iona interleavings of events in a system. In [8] we introduced a new partial order verification method, referred

  5. Applied Verification: The Ptolemy Approach Chihhong Patrick Cheng

    E-Print Network [OSTI]

    stronger claims regarding the correctness of the system. Theoretically, modeling and verification should face when doing formal verifi- cation. Existing theories and practices in verification are powerful, but when applying formal techniques, the use of detailed mathematical model descriptions in verification

  6. Competition on Software Verification University of Passau, Germany

    E-Print Network [OSTI]

    Beyer, Dirk

    and Analysis of Systems (TACAS). 1 Introduction The area of verification, in particular model checking, has). Several new and powerful software-verification tools became available, but they have not been comparedCompetition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract

  7. AUTOMATED REGRESSION TESTING AND VERIFICATION OF COMPLEX CODE

    E-Print Network [OSTI]

    Roychoudhury, Abhik

    AUTOMATED REGRESSION TESTING AND VERIFICATION OF COMPLEX CODE CHANGES DOCTORAL THESIS MARCEL B¨OHME NATIONAL UNIVERSITY OF SINGAPORE 2014 #12;AUTOMATED REGRESSION TESTING AND VERIFICATION OF COMPLEX CODE : Automated Regression Testing and Verification of Complex Code Changes Abstract How can we check software

  8. LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL PAGI OF

    E-Print Network [OSTI]

    Rathbun, Julie A.

    ATM 1109 LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL PAGI OF VACUUM TEST DATE 9 SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL VACUUM TEST LIST OF TABLES AND FIGURES;Figure 4.9 5. 1 5.2 5.3-5.4 5.5 5.6 5.7-5.8 LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION

  9. Power Grid Voltage Integrity Verification Department of ECE

    E-Print Network [OSTI]

    Najm, Farid N.

    Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i of the circuit attached to the grid, thereby precluding early verification of the grid. We propose a power grid

  10. Incremental Partitioning-Based Vectorless Power Grid Verification

    E-Print Network [OSTI]

    Najm, Farid N.

    Incremental Partitioning-Based Vectorless Power Grid Verification Dionysios Kouroussis Department performance of a chip, design verification of the power grid is of critical importance. This paper builds the efficient verification of local power grid sections or blocks, enabling incremen- tal design analysis

  11. Fuel Retrieval System Design Verification Report

    SciTech Connect (OSTI)

    GROTH, B.D.

    2000-04-11

    The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway. Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR). A Design Verification Status Questionnaire, Table 1, is included which addresses Corrective Action SNF-EG-MA-EG-20000060, Item No.9 (Miller 2000).

  12. Neutron spectrometry for UF6 enrichment verification in storage cylinders

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mengesha, Wondwosen; Kiff, Scott D.

    2015-01-29

    Verification of declared UF6 enrichment and mass in storage cylinders is of great interest in nuclear material nonproliferation. Nondestructive assay (NDA) techniques are commonly used for safeguards inspections to ensure accountancy of declared nuclear materials. Common NDA techniques used include gamma-ray spectrometry and both passive and active neutron measurements. In the present study, neutron spectrometry was investigated for verification of UF6 enrichment in 30B storage cylinders based on an unattended and passive measurement approach. MCNP5 and Geant4 simulated neutron spectra, for selected UF6 enrichments and filling profiles, were used in the investigation. The simulated neutron spectra were analyzed using principalmore »component analysis (PCA). The PCA technique is a well-established technique and has a wide area of application including feature analysis, outlier detection, and gamma-ray spectral analysis. Results obtained demonstrate that neutron spectrometry supported by spectral feature analysis has potential for assaying UF6 enrichment in storage cylinders. The results from the present study also showed that difficulties associated with the UF6 filling profile and observed in other unattended passive neutron measurements can possibly be overcome using the approach presented.« less

  13. Automatic verification of DEVS models Gabriel Wainer

    E-Print Network [OSTI]

    Wainer, Gabriel

    Viviana Passuello Departamento de Computación Universidad de Buenos Aires Pabellón I. Ciudad Universitaria (1428) Buenos Aires. Argentina. {lmoriham, vpassuel}@dc.uba.ar Keywords: DEVS, model verification, Cell a hierarchical approach [1]. In [2] the Cell-DEVS formalism was presented, as a means to de- scribe cell spaces

  14. Indexed Predicate Discovery for Unbounded System Verification

    E-Print Network [OSTI]

    Bryant, Randal E.

    and systems with arbitrary number of identical, concurrent processes, the system model must support state of a set of identical processes can be modeled as functions mapping an integer process idenIndexed Predicate Discovery for Unbounded System Verification Shuvendu K. Lahiri and Randal E

  15. Time-Bounded Verification Joel Ouaknine1

    E-Print Network [OSTI]

    Worrell, James

    Time-Bounded Verification Jo¨el Ouaknine1 , Alexander Rabinovich2 , and James Worrell1 1 Oxford prob- lems for timed automata over time intervals of fixed, bounded length. One of our main results is that time-bounded language inclusion for timed automata is 2EXPSPACE-complete. We also investigate the satis

  16. Secure Location Verification Using Radio Broadcast

    E-Print Network [OSTI]

    Nesterenko, Mikhail

    , exploits the difference between propagation speeds of radio and sound waves to estimate the position1 Secure Location Verification Using Radio Broadcast Adnan Vora and Mikhail Nesterenko Abstract of the prover. In this paper, we propose a solution that leverages the broadcast nature of the radio signal

  17. Secure Location Verification Using Radio Broadcast

    E-Print Network [OSTI]

    Nesterenko, Mikhail

    the difference between propagation speeds of radio and sound waves to estimate the position of the proverSecure Location Verification Using Radio Broadcast Adnan Vora and Mikhail Nesterenko Computer. In this paper, we propose a solution that leverages the broadcast nature of the radio signal emitted

  18. Automatic Verification of Multiqueue Discrete Timed Automata

    E-Print Network [OSTI]

    Dang, Zhe

    become a useful model to investigate the verification of real­ time systems and have been extensively studied. The expressive power of TA has many limitations in modeling, since many real­time systems. The MQDTA model can be used to specify and verify various systems with unbounded queues, such as a real

  19. Hybrid Systems: From Verification to Falsification

    E-Print Network [OSTI]

    Kavraki, Lydia E.

    Hybrid Systems: From Verification to Falsification Erion Plaku, Lydia E. Kavraki, and Moshe Y}@cs.rice.edu Abstract. We propose HyDICE, Hybrid DIscrete Continuous Exploration, a multi-layered approach for hybrid. The discrete search uses the discrete transitions of the hybrid system and coarse-grained decompositions

  20. RELAP-7 SOFTWARE VERIFICATION AND VALIDATION PLAN

    SciTech Connect (OSTI)

    Smith, Curtis L; Choi, Yong-Joon; Zou, Ling

    2014-09-01

    This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7.

  1. 1 Verification Techniques software testing: search bugs

    E-Print Network [OSTI]

    Verschelde, Jan

    objectives and requirements of software verification Software is a product, subject to quality control. A product has (industrial) quality if it performs as specified, as expected by the user. Software testing. The profession of a software tester is just as essential as that of a software developer to achieve quality

  2. Advances in Quantitative Verification for Ubiquitous Computing

    E-Print Network [OSTI]

    Oxford, University of

    Advances in Quantitative Verification for Ubiquitous Computing Marta Kwiatkowska Department of Computer Science, University of Oxford, Oxford, OX1 3QD Abstract. Ubiquitous computing, where computers and correcting flaws in a number of ubiquitous computing applications. In this paper, we focus on three key

  3. DOE handbook: Integrated safety management systems (ISMS) verification team leader`s handbook

    SciTech Connect (OSTI)

    1999-06-01

    The primary purpose of this handbook is to provide guidance to the ISMS verification Team Leader and the verification team in conducting ISMS verifications. The handbook describes methods and approaches for the review of the ISMS documentation (Phase I) and ISMS implementation (Phase II) and provides information useful to the Team Leader in preparing the review plan, selecting and training the team, coordinating the conduct of the verification, and documenting the results. The process and techniques described are based on the results of several pilot ISMS verifications that have been conducted across the DOE complex. A secondary purpose of this handbook is to provide information useful in developing DOE personnel to conduct these reviews. Specifically, this handbook describes methods and approaches to: (1) Develop the scope of the Phase 1 and Phase 2 review processes to be consistent with the history, hazards, and complexity of the site, facility, or activity; (2) Develop procedures for the conduct of the Phase 1 review, validating that the ISMS documentation satisfies the DEAR clause as amplified in DOE Policies 450.4, 450.5, 450.6 and associated guidance and that DOE can effectively execute responsibilities as described in the Functions, Responsibilities, and Authorities Manual (FRAM); (3) Develop procedures for the conduct of the Phase 2 review, validating that the description approved by the Approval Authority, following or concurrent with the Phase 1 review, has been implemented; and (4) Describe a methodology by which the DOE ISMS verification teams will be advised, trained, and/or mentored to conduct subsequent ISMS verifications. The handbook provides proven methods and approaches for verifying that commitments related to the DEAR, the FRAM, and associated amplifying guidance are in place and implemented in nuclear and high risk facilities. This handbook also contains useful guidance to line managers when preparing for a review of ISMS for radiological facilities, non-nuclear, or non-Defense Programs facilities. DOE line managers are encouraged to tailor the procedures described in this handbook for ISMS verifications for low risk facilities.

  4. Co-op Scholar IT Check List CO-OP PROGRAM IT CHECKLIST FOR SUPERVISORS

    E-Print Network [OSTI]

    Diessel, Oliver

    Co-op Scholar IT Check List 1 CO-OP PROGRAM IT CHECKLIST FOR SUPERVISORS SCOPE: These guidelines access to relevant Company systems (eg e-mail) as soon as they start. The same dept/person must documentation including letter of offer, Confidentiality Agreement, OH&S safety audit etc is completed

  5. ETSU Office of Human Resources Checklist for Advertising, Certifying Applicant Pools, Interviewing, & Hiring

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU Office of Human Resources Checklist for Advertising, Certifying Applicant Pools, Interviewing the position before advertisement. PPP-32, Compensation Plan (http://www.etsu.edu/humanres/relations/PPP-32 the need to Pre-audit the position before advertisement. See HR on-line training, ETSU's Compensation Plan

  6. Information is current as at 4 October 2011 and subject to change PROGRAM ENROLMENT CHECKLIST

    E-Print Network [OSTI]

    Fleming, Andrew J.

    in Core Mathematics EDUC1751 Knowledge and Communication Technologies MATH1120 Mathematics 2 Or MATH1220Information is current as at 4 October 2011 and subject to change PROGRAM ENROLMENT CHECKLIST Curriculum Elective #1 (Any Level) Elective #2 (Any Level) EDUC4195 Teachers, Ethics and Professionalism: 7

  7. Information is current as at 19 January 2012 and is subject to change. PROGRAM ENROLMENT CHECKLIST

    E-Print Network [OSTI]

    Fleming, Andrew J.

    1751 Knowledge and Communication Technologies EDUC1016 PE Studies 2: Court and Striking Games PUBH1010Information is current as at 19 January 2012 and is subject to change. PROGRAM ENROLMENT CHECKLIST EDUC4203 Extended Studies in PDHPE EDUC4014 PE Studies 7: Sports Coaching EDUC4195 Teachers, Ethics

  8. Information is current as at 2 October 2012 and subject to change PROGRAM ENROLMENT CHECKLIST

    E-Print Network [OSTI]

    Fleming, Andrew J.

    EDUC1751 Knowledge and Communication Technologies MATH1120 Mathematics 2 Or MATH1220 MathematicalInformation is current as at 2 October 2012 and subject to change PROGRAM ENROLMENT CHECKLIST Curriculum Elective #1 (Any Level) Elective #2 (Any Level) EDUC4195 Teachers, Ethics and Professionalism: 7

  9. Information is current as at 8 October 2012 and is subject to change. PROGRAM ENROLMENT CHECKLIST

    E-Print Network [OSTI]

    Fleming, Andrew J.

    1751 Knowledge and Communication Technologies EDUC1016 PE Studies 2: Court and Striking Games PUBH1010Information is current as at 8 October 2012 and is subject to change. PROGRAM ENROLMENT CHECKLIST EDUC4203 Extended Studies in PDHPE EDUC4014 PE Studies 7: Sports Coaching EDUC4195 Teachers, Ethics

  10. U15A SAFETY CHECKLIST BROOKHAVEN NATIONAL LABORATORY NATIONAL SYNCHROTRON LIGHT SOURCE

    E-Print Network [OSTI]

    Johnson, Peter D.

    from the TGM monochromator tank to Bremsstrahlung shielding #2; in place, secure, and photographed shielding and exclusion zones are in place and secured. Refer to U15A Beamline Diagram. Note: Bremsstrahlung Shielding #1 is not part of the Safety checklist and can only be viewed from the VUV mezzanine staircase

  11. Texas Tech University Pre-Flight Checklist for TTU Web Pages

    E-Print Network [OSTI]

    Rock, Chris

    Texas Tech University Pre-Flight Checklist for TTU Web Pages In order to help ensure that all Texas Tech University web pages are created and maintained in accordance with the TTU Web Guidelines-browser compatibility Accessibility Ensure pages comply with the Texas Administrative Code (TAC) §206, State Web

  12. M.Sc. PSYCHOLOGY -Application Checklist (Last updated: July 10, 2015)

    E-Print Network [OSTI]

    Northern British Columbia, University of

    M.Sc. PSYCHOLOGY - Application Checklist (Last updated: July 10, 2015) IMPORTANT NOTES 1 to: www.unbc.ca/financial-aid. 5. Applicants to the M.Sc. in Psychology must have an Honours degree in Psychology or an undergraduate degree in Psychology (or a related field) with research experience. ALL

  13. M.Sc. PSYCHOLOGY -Application Checklist (Last updated: November 27, 2013)

    E-Print Network [OSTI]

    Northern British Columbia, University of

    M.Sc. PSYCHOLOGY - Application Checklist (Last updated: November 27, 2013) IMPORTANT NOTES 1 to UNBC Financial Aid & Awards by the February 15th Deadline. 6. Applicants to the M.Sc. in Psychology must have an Honours degree in Psychology or an undergraduate degree in Psychology (or a related field

  14. Ph.D. PSYCHOLOGY -Application Checklist (Last updated: April 7, 2014)

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Ph.D. PSYCHOLOGY - Application Checklist (Last updated: April 7, 2014) IMPORTANT NOTES 1 & Awards by the February 15th Deadline. 5. Applicants to the Ph.D. in Psychology must have both a Bachelor's and Master's degree, at least one of which must be in Psychology with a research-based thesis. ALL APPLICANTS

  15. Ph.D. PSYCHOLOGY -Application Checklist (Last updated: July 10, 2015)

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Ph.D. PSYCHOLOGY - Application Checklist (Last updated: July 10, 2015) IMPORTANT NOTES 1 to: www.unbc.ca/financial-aid. 5. Applicants to the Ph.D. in Psychology must have both a Bachelor's and Master's degree, at least one of which must be in Psychology with a research-based thesis. ALL APPLICANTS

  16. JOURNAL PRODUCTION CHECKLIST For detailed instructions, refer to the Student Journal Editors Handbook

    E-Print Network [OSTI]

    Kammen, Daniel M.

    JOURNAL PRODUCTION CHECKLIST For detailed instructions, refer to the Student Journal Editors before agreements are forwarded to authors. Executed agreements are mandatory ­ no journal may by the printer for any additional corrections after your files have been submitted. #12; JOURNAL PRODUCTION

  17. Check-list for recruitment and registration of PhD students at ICM Persons responsible

    E-Print Network [OSTI]

    Uppsala Universitet

    Check-list for recruitment and registration of PhD students at ICM Persons responsible of the Department and the Departmental Board. Guidelines Each PhD student should have at least two supervisors. One education for registration of PhD studenst. At least one of the supervisors must be a docent. To qualify

  18. Directives Checklist and Cross-Reference Index as of 2-12-91

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-02-26

    The order transmits a checklist of current Department of Energy (DOE) and Headquarters (HQ) directives and a cross-reference index of DOE and HQ Orders published on or before 2-12-91. Cancels DOE O 0000.2c. Canceled by DOE N 1321.139.

  19. Pilot Study Checklist At least one of the following reasons to conduct the study applies

    E-Print Network [OSTI]

    Sherman, S. Murray

    Pilot Study Checklist At least one of the following reasons to conduct the study applies · Study in a statistical sense) The way in which the data collected will be used in the design of a larger study has been addressed This study will answer the question of whether a full scale trial/experiment is worth pursuing

  20. TYPES OF PAINT DIY CHECKLIST Consists of pigments, additives and binders in an oil or

    E-Print Network [OSTI]

    Peters, Richard

    TYPES OF PAINT DIY CHECKLIST PAINT · Consists of pigments, additives and binders in an oil or water of application and durability. · Cheaper paint generally contains more solvents than more expensive paint-based). · Oil-based (solvent-/polyurethane-based, also known as alkyd paint). · Natural (eg. mineral paint

  1. 10 September 2009 checklist of freshwater fishes of the guiana shield

    E-Print Network [OSTI]

    Miller, Scott

    10 September 2009 NUMBER 17 checklist of freshwater fishes of the guiana shield BULLETIN OF THE FRESHWATER FISHES OF THE GUIANA SHIELD Richard P. Vari, Carl J. Ferraris, Jr., Aleksandar Radosavljevic, Figure G). Illustrations facing each section: For the Introduction, montage of radiographs of fishes from

  2. EXAMINING THE ROLE AND RESEARCH CHALLENGES OF SOCIAL MEDIA AS A TOOL FOR NONPROLIFERATION AND ARMS CONTROL TREATY VERIFICATION

    SciTech Connect (OSTI)

    Henry, Michael J.; Cramer, Nicholas O.; Benz, Jacob M.; Gastelum, Zoe N.; Kreyling, Sean J.; West, Curtis L.

    2014-05-13

    Traditional arms control treaty verification activities typically involve a combination of technical measurements via physical and chemical sensors, state declarations, political agreements, and on-site inspections involving international subject matter experts. However, the ubiquity of the internet, and the electronic sharing of data that it enables, has made available a wealth of open source information with the potential to benefit verification efforts. Open source information is already being used by organizations such as the International Atomic Energy Agency to support the verification of state-declared information, prepare inspectors for in-field activities, and to maintain situational awareness . The recent explosion in social media use has opened new doors to exploring the attitudes, moods, and activities around a given topic. Social media platforms, such as Twitter, Facebook, and YouTube, offer an opportunity for individuals, as well as institutions, to participate in a global conversation at minimal cost. Social media data can also provide a more data-rich environment, with text data being augmented with images, videos, and location data. The research described in this paper investigates the utility of applying social media signatures as potential arms control and nonproliferation treaty verification tools and technologies, as determined through a series of case studies. The treaty relevant events that these case studies touch upon include detection of undeclared facilities or activities, determination of unknown events recorded by the International Monitoring System (IMS), and the global media response to the occurrence of an Indian missile launch. The case studies examine how social media can be used to fill an information gap and provide additional confidence to a verification activity. The case studies represent, either directly or through a proxy, instances where social media information may be available that could potentially augment the evaluation of an event. The goal of this paper is to instigate a discussion within the verification community as to where and how social media can be effectively utilized to complement and enhance traditional treaty verification efforts. In addition, this paper seeks to identify areas of future research and development necessary to adapt social media analytic tools and techniques, and to form the seed for social media analytics to aid and inform arms control and nonproliferation policymakers and analysts. While social media analysis (as well as open source analysis as a whole) will not ever be able to replace traditional arms control verification measures, they do supply unique signatures that can augment existing analysis.

  3. Metals Verification Study for Sinclair and Dyes Inlets,Washington

    SciTech Connect (OSTI)

    Kohn, Nancy P.; Miller, Martin C.; Brandenberger, Jill M.; Johnston, Robert K.

    2004-09-29

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington's 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. This Metals Verification Study was conducted to address the 303(d) segments that are listed for metal contaminants in marine sediment, because significant cleanup and source control activities have been conducted in the Inlets since the data supporting the 1998 303(d) listings were collected. The study was designed to obtain present-day sediment metals concentrations throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, with stations spatially distributed to support 303(d) listing updates and also watershed-level water quality and contaminant transport modeling efforts. A total of 160 surface sediment samples from Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage were screened for copper, lead, and zinc using X-Ray Fluorescence (XRF). 40 samples (25%) were selected for confirmatory metals analysis by ICP-MS for cadmium, silver, and arsenic in addition to copper, lead, and zinc. Regression relationships between the ICP-MS and XRF datasets were developed to estimate copper, lead, and zinc concentrations in all samples. The XRF results for copper, lead, and zinc correlated well with ICP-MS results, and predicted concentrations were calculated for all samples. The results of the Metals Verification Study show that sediment quality in Sinclair Inlet has improved markedly since implementation of cleanup and source control actions, and that the distribution of residual contaminants is limited to nearshore areas already within the actively managed Puget Sound Naval Shipyard Superfund Site where further source control actions and monitoring are under way. Outside of Sinclair Inlet, the target metals met state sediment quality standards.

  4. Dedication, Groundbreaking and Open House Checklist With new construction or major renovation projects come opportunities to generate

    E-Print Network [OSTI]

    Stuart, Steven J.

    Dedication, Groundbreaking and Open House Checklist With new construction in planning a successful groundbreaking, building dedication or open house. At least major groundbreaking or dedication event if possible, so contact the President

  5. Finite Model Finding for Parameterized Verification

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2010-01-01

    In this paper we investigate to which extent a very simple and natural "reachability as deducibility" approach, originated in the research in formal methods in security, is applicable to the automated verification of large classes of infinite state and parameterized systems. The approach is based on modeling the reachability between (parameterized) states as deducibility between suitable encodings of states by formulas of first-order predicate logic. The verification of a safety property is reduced to a pure logical problem of finding a countermodel for a first-order formula. The later task is delegated then to the generic automated finite model building procedures. In this paper we first establish the relative completeness of the finite countermodel finding method (FCM) for a class of parameterized linear arrays of finite automata. The method is shown to be at least as powerful as known methods based on monotonic abstraction and symbolic backward reachability. Further, we extend the relative completeness of ...

  6. NGSI: IAEA Verification of UF6 Cylinders

    SciTech Connect (OSTI)

    Curtis, Michael M.

    2012-06-05

    The International Atomic Energy Agency (IAEA) is often ignorant of the location of declared, uranium hexafluoride (UF6) cylinders following verification, because cylinders are not typically tracked onsite or off. This paper will assess various methods the IAEA uses to verify cylinder gross defects, and how the task could be ameliorated through the use of improved identification and monitoring. The assessment will be restricted to current verification methods together with one that has been applied on a trial basis—short-notice random inspections coupled with mailbox declarations. This paper is part of the NNSA Office of Nonproliferation and International Security’s Next Generation Safeguards Initiative (NGSI) program to investigate the concept of a global monitoring scheme that uniquely identifies and tracks UF6 cylinders.

  7. Survey of Existing Tools for Formal Verification.

    SciTech Connect (OSTI)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying %22safety and security%22 requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  8. Independent Verification and Validation Of SAPHIRE 8 System Test Plan Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-02-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE System Test Plan is to assess the approach to be taken for intended testing activities associated with the SAPHIRE software product. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production.

  9. High-Resolution Fast-Neutron Spectrometry for Arms Control and Treaty Verification

    SciTech Connect (OSTI)

    David L. Chichester; James T. Johnson; Edward H. Seabury

    2012-07-01

    Many nondestructive nuclear analysis techniques have been developed to support the measurement needs of arms control and treaty verification, including gross photon and neutron counting, low- and high-resolution gamma spectrometry, time-correlated neutron measurements, and photon and neutron imaging. One notable measurement technique that has not been extensively studied to date for these applications is high-resolution fast-neutron spectrometry (HRFNS). Applied for arms control and treaty verification, HRFNS has the potential to serve as a complimentary measurement approach to these other techniques by providing a means to either qualitatively or quantitatively determine the composition and thickness of non-nuclear materials surrounding neutron-emitting materials. The technique uses the normally-occurring neutrons present in arms control and treaty verification objects of interest as an internal source of neutrons for performing active-interrogation transmission measurements. Most low-Z nuclei of interest for arms control and treaty verification, including 9Be, 12C, 14N, and 16O, possess fast-neutron resonance features in their absorption cross sections in the 0.5- to 5-MeV energy range. Measuring the selective removal of source neutrons over this energy range, assuming for example a fission-spectrum starting distribution, may be used to estimate the stoichiometric composition of intervening materials between the neutron source and detector. At a simpler level, determination of the emitted fast-neutron spectrum may be used for fingerprinting 'known' assemblies for later use in template-matching tests. As with photon spectrometry, automated analysis of fast-neutron spectra may be performed to support decision making and reporting systems protected behind information barriers. This paper will report recent work at Idaho National Laboratory to explore the feasibility of using HRFNS for arms control and treaty verification applications, including simulations and experiments, using fission-spectrum neutron sources to assess neutron transmission through composite low-Z attenuators.

  10. Independent Verification and Validation Of SAPHIRE 8 Software Requirements Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-03-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE requirements definition is to assess the activities that results in the specification, documentation, and review of the requirements that the software product must satisfy, including functionality, performance, design constraints, attributes and external interfaces. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP).

  11. Independent Verification and Validation Of SAPHIRE 8 Software Requirements Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2009-09-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE requirements definition is to assess the activities that results in the specification, documentation, and review of the requirements that the software product must satisfy, including functionality, performance, design constraints, attributes and external interfaces. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP).

  12. Mechanism Design: from Partial to Probabilistic Verification IOANNIS CARAGIANNIS, University of Patras & CTI, Greece

    E-Print Network [OSTI]

    Elkind, Edith

    Mechanism Design: from Partial to Probabilistic Verification IOANNIS CARAGIANNIS, University) truthfully. We first consider the standard model of mechanism design with partial verification, where the set results, we then introduce a richer model of verification, which we term mechanism design

  13. Hanford Site Assessment & Characterization/Verification of Structures...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 Revision 0 Hanford Site Assessment & CharacterizationVerification of Structures & Conex Boxes Procedure Prepared for the U.S. Department of Energy Assistant Secretary for...

  14. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  15. Measurement and Verification of Low Income Energy Efficiency...

    Open Energy Info (EERE)

    Measurement and Verification of Low Income Energy Efficiency Programs in Brazil: Methodological Challenges Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Measurement...

  16. Verification Method for SSI Problems with Extended Parameter Ranges

    Broader source: Energy.gov [DOE]

    Verification Method for SSI Problems with Extended Parameter Ranges 2014 U.S. DOE Natural Phenomena Hazards Meeting Carl J. Costantino and Associates www.cjcassoc.com

  17. Measurement and Verification Options for Federal Energy- and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Options for Federal Energy- and Water-Saving Projects Measurement and Verification Options for Federal Energy- and Water-Saving Projects Federal Energy Management Program...

  18. Approach to IAEA verification of the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP)

    SciTech Connect (OSTI)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1982-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP), should that plant be placed under IAEA safeguards. The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistics for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of (a) attributes and variables sample sizes for the various strata, (b) standard deviations of the relevant test statistics, and (c) the sensitivity for detection of diversion which the IAEA might achieve by this verification strategy at GCEP.

  19. Nuclear Proliferation Using Laser Isotope Separation -- Verification Options

    SciTech Connect (OSTI)

    Erickson, S A

    2001-10-15

    Two levels of nonproliferation verification exist. Signatories of the basic agreements under the Nuclear Non-proliferation Treaty (NPT) agree to open their nuclear sites to inspection by the IAEA. A more detailed and intrusive level was developed following the determination that Iraq had begun a nuclear weapons development program that was not detected by the original level of verification methods. This level, referred to as 93+2 and detailed in model protocol INFCIRC/540, allows the IAEA to do environmental monitoring of non-declared facilities that are suspected of containing proliferation activity, and possibly further inspections, as well as allowing more detailed inspections of declared sites. 56 countries have signed a Strengthened Safeguards Systems Additional Protocol as of 16 July 2001. These additional inspections can be done on the instigation of the IAEA itself, or after requests by other parties to the NPT, based on information that they have collected. Since information able to cause suspicion of proliferation could arrive at any country, it is important that countries have procedures in place that will assist them in making decisions related to these inspections. Furthermore, IAEA inspection resources are limited, and therefore care needs to be taken to make best use of these resources. Most of the nonproliferation verification inspections may be concentrated on establishing that diversion of nuclear materials is not occurring, but some fraction will be related to determining if undeclared sites have nuclear materials production taking place within them. Of these, most suspicions will likely be related to the major existing technologies for uranium enrichment and reprocessing for plutonium extraction, as it would seem most likely that nations attempting proliferation would use tested means of producing nuclear materials. However, as technology continues to advance and new methods of enrichment and reprocessing are developed, inspection-related procedures will need to be adapted to keep up with them. In order to make 93+2 inspections more useful, a systematic way of finding clues to nuclear proliferation would be useful. Also, to cope with the possible use of newer technology for proliferation, the list of clues might need to be expanded. This paper discusses the development and recognition of such clues. It concentrates on laser isotope separation (LIS) as a new proliferation technology, and uses Uranium Atomic Vapor Laser Isotope Separation (U-AVLIS) as an example of LIS that is well known.

  20. The new geospatial tools: global transparency enhancing safeguards verification

    SciTech Connect (OSTI)

    Pabian, Frank Vincent [Los Alamos National Laboratory

    2010-09-16

    This paper focuses on the importance and potential role of the new, freely available, geospatial tools for enhancing IAEA safeguards and how, together with commercial satellite imagery, they can be used to promote 'all-source synergy'. As additional 'open sources', these new geospatial tools have heralded a new era of 'global transparency' and they can be used to substantially augment existing information-driven safeguards gathering techniques, procedures, and analyses in the remote detection of undeclared facilities, as well as support ongoing monitoring and verification of various treaty (e.g., NPT, FMCT) relevant activities and programs. As an illustration of how these new geospatial tools may be applied, an original exemplar case study provides how it is possible to derive value-added follow-up information on some recent public media reporting of a former clandestine underground plutonium production complex (now being converted to a 'Tourist Attraction' given the site's abandonment by China in the early 1980s). That open source media reporting, when combined with subsequent commentary found in various Internet-based Blogs and Wikis, led to independent verification of the reporting with additional ground truth via 'crowdsourcing' (tourist photos as found on 'social networking' venues like Google Earth's Panoramio layer and Twitter). Confirmation of the precise geospatial location of the site (along with a more complete facility characterization incorporating 3-D Modeling and visualization) was only made possible following the acquisition of higher resolution commercial satellite imagery that could be correlated with the reporting, ground photos, and an interior diagram, through original imagery analysis of the overhead imagery.

  1. Integrating Formal Verification into Computer Organization and Architecture Courses

    E-Print Network [OSTI]

    Ivanov, Lubomir

    to formal verification is based on the theory of - automata [5]. Given a model of the system in terms industry and have led to the development of powerful verification tools. However, the popularity facts about a mathematical model of the system under consideration. The proofs are general enough

  2. Specification and Formal Verification of Interconnect Bus Protocols Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    and functionality of devices has brought about the need for more powerful modeling and verification tools. Classical is using first generation formal verification tools based on Symbolic Model Checking [1] and -Automata of using partial orders in modeling and verifying system behavior is in avoiding the need to study all

  3. Formal Verification of Infinite State Systems Using Boolean Methods

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods Randal E. Bryant School automated formal verification tools are based on a bit-level model of computation, where a set of Boolean state variables encodes the system state. Using powerful inference engines, such as Binary Decision

  4. Improving large-sized PLC programs verification using abstractions

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    in formal verification by model-checking. In parallel, many researches have been undertaken since several project which was funded by Alstom Power Plant Information and Control Systems, Engineering toolsImproving large-sized PLC programs verification using abstractions V. Gourcuff O. de Smet J

  5. Quantitative Verification: Models, Techniques and Tools Marta Kwiatkowska

    E-Print Network [OSTI]

    Oxford, University of

    verification is an analogous technique for establishing quantitative properties of a system modelQuantitative Verification: Models, Techniques and Tools Marta Kwiatkowska Oxford University of the state-transition graph of the model and is therefore more powerful than test- ing. Quantitative

  6. Formal Verification of Infinite State Systems Using Boolean Methods #

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods # Randal E. Bryant School automated formal verification tools are based on a bit­level model of computation, where a set of Boolean state variables encodes the system state. Using powerful inference engines, such as Binary Decision

  7. Analytic Verification at NASA A View from the Trenches

    E-Print Network [OSTI]

    Jipsen, Peter

    Analytic Verification at NASA A View from the Trenches Willem C. Visser July 31, 1999 Autonomous software is considered a major enabling technology for NASA in order to achieve the goal of their slogan Software Engineering 2 (ASE) group at NASA Ames Research Center is developing analytic verification

  8. Scalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing

    E-Print Network [OSTI]

    Stevens, Ken

    verification ensures correctness of a system given a required set of properties. Scalability due to state exploScalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing Krishnaji Desai Kenneth S. Stevens University of Utah Electrical and Computer Engineering Department

  9. Formal property verification in a conformance testing framework

    E-Print Network [OSTI]

    Fainekos, Georgios E.

    Formal property verification in a conformance testing framework Houssam Abbas School of Electrical to develop a sequence of system models of different fidelity and complexity, each appropriate for a particular design or verification task. In such a sequence, one model is often derived from the other

  10. Automatic Verification of Multi-queue Discrete Timed Automata

    E-Print Network [OSTI]

    Dang, Zhe

    the verification of real- time systems and have been extensively studied. The expressive power of TA has many verification of many interesting properties of a MQDTA. The MQDTA model can be used to specify and verify-state model-checking, real-time systems. 1 Introduction Real-time systems are widely regarded as a natural

  11. Efficient Verification of the PCI Local Bus using Boolean Satisfiability

    E-Print Network [OSTI]

    Aloul, Fadi

    IWLS'00 Page 1 Efficient Verification of the PCI Local Bus using Boolean Satisfiability Fadi A is to study the application of Boolean Satisfiability to the verification of the PCI Local Bus. The novel such as achieving high speed testing. To demonstrate how our method works, we have modeled the PCI Local Bus

  12. Roadmap for Enhanced Languages and Methods to Aid Verification

    E-Print Network [OSTI]

    Miller, Dale

    Roadmap for Enhanced Languages and Methods to Aid Verification Gary T. Leavens, Jean-Raymond Abrial 50011-1041, USA #12;Roadmap for Enhanced Languages and Methods to Aid Verification Gary T. Leavens, Iowa, Aaron Stump, Washington University of St. Louis, USA July 21, 2006 Abstract This roadmap describes ways

  13. Efficient RC Power Grid Verification Using Node Elimination

    E-Print Network [OSTI]

    Najm, Farid N.

    Efficient RC Power Grid Verification Using Node Elimination Ankit Goyal Department of ECE to reduce the size of power grids but their fo- cus is more on simulation. In verification, we are concerned. This paper pro- poses a novel approach to systematically reduce the power grid and accurately compute

  14. Fast Vectorless Power Grid Verification Using an Approximate Inverse Technique

    E-Print Network [OSTI]

    Najm, Farid N.

    Fast Vectorless Power Grid Verification Using an Approximate Inverse Technique Nahi H. Abdul Ghani Department of ECE University of Toronto Toronto, Ontario, Canada f.najm@utoronto.ca ABSTRACT Power grid Aids General Terms Performance, Algorithms, Verification Keywords Power grid, voltage drop, approximate

  15. Software Verification in the Google App-Engine Cloud

    E-Print Network [OSTI]

    Beyer, Dirk

    University of Passau, Germany Abstract. Software verification often requires a large amount of com- puting resources. In the last years, cloud services emerged as an inexpen- sive, flexible, and energy who wish to solve sin- gle verification tasks (tutorial usage), and an API for integrating the service

  16. A Framework for Object Oriented Hardware Specification, Verification, and Synthesis*

    E-Print Network [OSTI]

    Ould Ahmedou, Mohameden

    A Framework for Object Oriented Hardware Specification, Verification, and Synthesis* T. Kuhn, T of hardware. For this purpose the object oriented language `e' is introduced along with a powerful run Object oriented hardware modeling, verification, high-level synthesis. 1. INTRODUCTION The ever

  17. Object Oriented Hardware Synthesis and Verification T. Kuhn, T. Oppold,

    E-Print Network [OSTI]

    Ould Ahmedou, Mohameden

    Object Oriented Hardware Synthesis and Verification T. Kuhn, T. Oppold, C. Schulz-Key, M of hardware from object oriented specifications is presented. Our approach utilizes the e language that has been proven to be highly efficient for the verification of hardware. The e language is similar to Java

  18. Timing verification of automotive communication architecture using quantile estimation

    E-Print Network [OSTI]

    Navet, Nicolas

    Timing verification of automotive communication architecture using quantile estimation Nicolas;1 Outline - 207/02/2014ERTSS'2014 Early-stage timing verification of wired automotive buses ­ CAN for quantiles derived by simulation 2 typical automotive use-cases #12;2 Automotive communication architectures

  19. Automated Verification of Model Transformations in the Automotive Industry

    E-Print Network [OSTI]

    Cordy, James R.

    Automated Verification of Model Transformations in the Automotive Industry Gehan M. K. Selim1 Verification, Automotive In- dustry 1 Introduction Model Driven Development (MDD) has been increasingly used of the Pays de la Loire Region (France), and by NSERC (Canada), as part of the NECSIS Automotive Partnership

  20. Nuclear Verification | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 survey includesScienceFacilityVerification

  1. Approaches to verification of two-dimensional water quality models

    SciTech Connect (OSTI)

    Butkus, S.R. . Water Quality Dept.)

    1990-11-01

    The verification of a water quality model is the one procedure most needed by decision making evaluating a model predictions, but is often not adequate or done at all. The results of a properly conducted verification provide the decision makers with an estimate of the uncertainty associated with model predictions. Several statistical tests are available for quantifying of the performance of a model. Six methods of verification were evaluated using an application of the BETTER two-dimensional water quality model for Chickamauga reservoir. Model predictions for ten state variables were compared to observed conditions from 1989. Spatial distributions of the verification measures showed the model predictions were generally adequate, except at a few specific locations in the reservoir. The most useful statistics were the mean standard error of the residuals. Quantifiable measures of model performance should be calculated during calibration and verification of future applications of the BETTER model. 25 refs., 5 figs., 7 tabs.

  2. Verification and validation for induction heating

    SciTech Connect (OSTI)

    Lam, Kin [Los Alamos National Laboratory; Tippetts, Trevor B [Los Alamos National Laboratory; Allen, David W [NON LANL

    2008-01-01

    Truchas is a software package being developed at LANL within the Telluride project for predicting the complex physical processes in metal alloy casting. The software was designed to be massively parallel, multi-material, multi-physics, and to run on 3D, fully unstructured meshes. This work describes a Verification and Validation assessment of Truchas for simulating the induction heating phase of a casting process. We used existing data from a simple experiment involving the induction heating of a graphite cylinder, as graphite is a common material used for mold assemblies. Because we do not have complete knowledge of all the conditions and properties in this experiment (as is the case in many other experiments), we performed a parameter sensitivity study, modeled the uncertainties of the most sensitive parameters, and quantified how these uncertainties propagate to the Truchas output response. A verification analysis produced estimates of the numerical error of the Truchas solution to our computational model. The outputs from Truchas runs with randomly sampled parameter values were used for the validation study.

  3. Experimental verification of active control in a microgravity environment 

    E-Print Network [OSTI]

    Cordera, Joseph Frank

    1990-01-01

    Experiment: Combinational Control, Random IC g2, 8 Dir Theory: Combinational Control, Random IC g2, 8 Dir Page 110 111 111 112 112 xvi NOMENCLATURE g = the acceleration due to gravity (9. 81 m/sec ) 2 natural frequency K = spring rate M...: 27 7// / RO tG1IGI i P 3p' '. 8 CI Figure 13 "Quadrifilar" Pendulum 28 I = (IIgd )y(wf L) 2 2 The experimental mass moment of inertia was determined to be 1. 15 kg-m' and was used in the theoretical model. Center of Mass The center of mass...

  4. Measurement and Verification Activities Required in the Energy Savings

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICESpecial ReportProposal to change FacRep Qualifications,Technologies

  5. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  6. NIST HANDBOOK 150-15 CHECKLIST (REV. 2011-10-20) PAGE 1 OF 16 Enter Date: Enter NVLAP Lab Code

    E-Print Network [OSTI]

    : NIST HANDBOOK 150-15 CHECKLIST THERMAL INSULATION MATERIALS TESTING PROGRAM Instructions to demonstrate selected test methods as requested by the assessor. #12;DATE: NVLAP LAB CODE: NIST HANDBOOK 150NIST HANDBOOK 150-15 CHECKLIST (REV. 2011-10-20) PAGE 1 OF 16 Enter Date: Enter NVLAP Lab Code

  7. Compositional Reactive Semantics of SystemC and Verification with RuleBase

    E-Print Network [OSTI]

    Gupta, Rajesh

    C. Keywords: SystemC, semantics, verification, model checking 1 Introduction System-level modeling using for verification of SystemC com- ponents, providing a powerful workbench for testing and verification. 2 OverviewCompositional Reactive Semantics of SystemC and Verification with RuleBase Rudrapatna K

  8. Comment submitted by Consumers Union regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Consumers Union regarding the Energy Star Verification Testing Program

  9. State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V)

    Broader source: Energy.gov [DOE]

    State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V) Webinar.

  10. Energy Savings Performance Contracting-Savings Measurement and Verification Transcript 2-24-2011.doc

    Broader source: Energy.gov [DOE]

    Energy Savings Performance Contracting-Savings Measurement and Verification Transcript 2-24-2011.doc

  11. Developing an Evaluation Measurement and Verification Plan for Your Energy Efficiency Project/Program

    Broader source: Energy.gov [DOE]

    Developing an Evaluation Measurement and Verification Plan for Your Energy Efficiency Project/Program

  12. Verification of the Equilibrium and MHD Stability Codes within the Integrated Tokamak Modeling Task Force

    E-Print Network [OSTI]

    Verification of the Equilibrium and MHD Stability Codes within the Integrated Tokamak Modeling Task Force

  13. Seeing is Not Believing: Visual Verifications through Liveness Analysis using Mobile Devices

    E-Print Network [OSTI]

    Carbunar, Bogdan

    , including citizen journalism, smart cities, mobile authentication, and product condition verification

  14. Measurement and verification protocols -- Facts and fiction, news from the field

    SciTech Connect (OSTI)

    Schiller, S.R.; Kromer, J.S.

    1998-07-01

    This paper provides descriptions of the 1997 International Performance Measurement and Verification Protocol (IPMVP), the 1996 Federal Energy Management Program's (FEMP) Measurement Verification Guidelines, and the draft ASHRAE 13-P Measurement of Energy and Demand Savings Guideline. These protocols and guidelines are establishing a framework for measurement and verification (M and V) activities throughout the world. The M and V protocols are also being used by the energy performance contracting industry as an educational tool and as the starting point for program specific M and V guidelines. Beyond descriptions of the documents the paper covers how the documents are being sued and the perspective of various user groups--such as government entities, utilities, private companies, and energy services companies. The protocols were designed around four main M and V options to allow flexibility in their application to different types of projects. However, this intentional flexibility has caused confusion among some users who are now required to select the appropriate option, method, level or rigor, and accuracy for their projects. Eventually though, as the protocols are more widely used and more documentation is available on M and V costs and accuracy the industry will become more comfortable selecting the best option and applying the M and V protocols in a more consistent manner for different types of projects and programs.

  15. SophomoreYearChecklist Meet with your Discovery A

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    on selecting courses that learning style. Meet with the Discovery academic advisor, located in the CIW Library advantage of study abroad programs or the National Student Exchange at http://oip.binghamton.edu or http and take an active role in them. #12;

  16. Patient position verification using small IMRT fields

    SciTech Connect (OSTI)

    Bol, G. H.; Heide, U. A. van der; Nederveen, A. J.; Kotte, A. N. T. J.; Lagendijk, J. J. W. [Department of Radiotherapy, University Medical Center Utrecht, Heidelberglaan 100, 3584 CX Utrecht (Netherlands)

    2006-07-15

    A commonly used approach to quantify and minimize patient setup errors is by using electronic portal imaging devices (EPIDs). The position of the tumor can be verified indirectly by matching the bony anatomy to a reference image containing the same structures. In this paper we present two off-line methods for detecting the position of the bony anatomy automatically, even if every single portal image of each segment of an IMRT treatment beam contains insufficient matching information. Extra position verification fields will no longer be necessary, which reduces the total dose to the patient. The first method, the stack matching method (SMM), stacks the portal image of each segment of a beam to a three dimensional (3D) volume, and this volume is subsequently used during the matching phase. The second method [the averaged projection matching method (APMM)], is a simplification of the first one, since the initially created volume is reduced again to a 2D artificial image, which speeds up the matching procedure considerably, without a significant loss of accuracy. Matching is based on normalized mutual information. We demonstrate our methods by comparing them to existing matching routines, such as matching based on the largest segment. Both phantom and patient experiments show that our methods are comparable with the results obtained from standard position verification methods. The matches are verified by means of visual inspection. Furthermore, we show that when a distinct area of 40-60 cm{sup 2} of the EPID is exposed during one treatment beam, both SMM and APMM are able to deliver a good matching result.

  17. Specification and Verification: The Spec# Experience Mike Barnett

    E-Print Network [OSTI]

    Leino, K. Rustan M.

    Specification and Verification: The Spec# Experience Mike Barnett Microsoft Research, Redmond or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 2009 Barnett, Fähndrich

  18. Combining Vision Verification with a High Level Robot Programming Language 

    E-Print Network [OSTI]

    Yin, Baolin

    1984-01-01

    This thesis describes work on using vision verification within an object level language for describing robot assembly (RAPT). The motivation for this thesis is provided by two problems. The first is how to enhance a ...

  19. Seventh International Workshop on Specification and Verification of

    E-Print Network [OSTI]

    Leavens, Gary T.

    , Brazil) Sergio Soares (UPE, Brazil) Ricardo Lima (Universidade de Pernambuco, Brazil) Paulo Borba (Federal University of Pernambuco, Brazil) Márcio Cornélio (UPE, Brazil) Total Correctness of Recursive Units and Proof Checking for Specification and Verification 59 Hampton Smith (Clemson University, USA

  20. Cleanup Verification Package for the 300-8 Waste Site

    SciTech Connect (OSTI)

    J. M. Capron

    2005-11-07

    This cleanup verification package documents completion of remedial action for the 300-8 waste site. This waste site was formerly used to stage scrap metal from the 300 Area in support of a program to recycle aluminum.

  1. Experiments in Automating Hardware Verification using Inductive Proof Planning 

    E-Print Network [OSTI]

    Cantu, Francisco; Bundy, Alan; Smaill, Alan; Basin, David

    1996-01-01

    We present a new approach to automating the verification of hardware designs based on planning techniques. A database of methods is developed that combines tactics, which construct proofs, using specifications of their ...

  2. Discriminating semi-continuous HMM for speaker verification 

    E-Print Network [OSTI]

    Forsyth, Mark; Jack, Mervyn A

    This paper describes the use of a multiple codebook SCHMM speaker verification system, which uses a novel technique for discriminative hidden Markov modelling known as discriminative observation probabilities (DOP). DOP ...

  3. M&V Guidelines: Measurement and Verification for Federal Energy...

    Energy Savers [EERE]

    and Verification Protocol (IPMVP) Concepts and Options for Determining Energy and Water Savings Volume 1, April 2007. M&V Guidelines 3.0 FEMP ii Contents Section Page Section...

  4. Evaluation of Kernal Methods for Speaker Verification and Identification 

    E-Print Network [OSTI]

    Wan, Vincent; Renals, Steve

    Support vector machines are evaluated on speaker verification and speaker identification tasks. We compare the polynomial kernel, the Fisher kernel, a likelihood ratio kernel and the pair hidden Markov model kernel with ...

  5. A Mobile-based Face Verification System Zongying Ou, Tieming Su, Fan Ou, Jianxin Zhang, Dianting Liu

    E-Print Network [OSTI]

    Shyu, Mei-Ling

    contains two modules: Model training module and Verification module. The verification module will run putting verification module into implementation the verification model training module should run first to yield the model parameters for verification. The training module will run on a table computer since

  6. Results of Remediation and Verification Sampling for the 600-270 Horseshoe Landfill

    SciTech Connect (OSTI)

    W. S. Thompson

    2005-12-14

    This report presents the results of the 2005 remedial action and verification soil sampling conducted at the 600-270 waste site after removal of soil containing residual concentrations of dichlorodiphenyl trichloroethane and its breakdown products dichlorodiphenyl dichloroethylene and dichlorodiphenyl dichloroethane. The remediation was performed in response to post-closure surface soil sampling performed between 1998 and 2003 that indicated the presence of residual DDT contamination exceeding the Record of Decision for the 1100 Area National Priorities List site cleanup criteria of 1 mg/kg that was established for the original 1994 cleanup activities.

  7. Simplifying EPID dosimetry for IMRT treatment verification

    SciTech Connect (OSTI)

    Pecharroman-Gallego, R.; Mans, Anton; Sonke, Jan-Jakob; Stroom, Joep C.; Olaciregui-Ruiz, Igor; Herk, Marcel van; Mijnheer, Ben J. [Department of Radiation Oncology, The Netherlands Cancer Institute-Antoni van Leeuwenhoek Hospital, Plesmanlaan 121, 1066 CX Amsterdam (Netherlands)

    2011-02-15

    Purpose: Electronic portal imaging devices (EPIDs) are increasingly used for IMRT dose verification, both pretreatment and in vivo. In this study, an earlier developed backprojection model has been modified to avoid the need for patient-specific transmission measurements and, consequently, leads to a faster procedure. Methods: Currently, the transmission, an essential ingredient of the backprojection model, is estimated from the ratio of EPID measurements with and without a phantom/patient in the beam. Thus, an additional irradiation to obtain ''open images'' under the same conditions as the actual phantom/patient irradiation is required. However, by calculating the transmission of the phantom/patient in the direction of the beam instead of using open images, this extra measurement can be avoided. This was achieved by using a model that includes the effect of beam hardening and off-axis dependence of the EPID response on photon beam spectral changes. The parameters in the model were empirically obtained by performing EPID measurements using polystyrene slab phantoms of different thickness in 6, 10, and 18 MV photon beams. A theoretical analysis to verify the sensitivity of the model with patient thickness changes was performed. The new model was finally applied for the analysis of EPID dose verification measurements of step-and-shoot IMRT treatments of head and neck, lung, breast, cervix, prostate, and rectum patients. All measurements were carried out using Elekta SL20i linear accelerators equipped with a hydrogenated amorphous silicon EPID, and the IMRT plans were made using PINNACLE software (Philips Medical Systems). Results: The results showed generally good agreement with the dose determined using the old model applying the measured transmission. The average differences between EPID-based in vivo dose at the isocenter determined using either the new model for transmission and its measured value were 2.6{+-}3.1%, 0.2{+-}3.1%, and 2.2{+-}3.9% for 47 patients treated with 6, 10, and 18 MV IMRT beams, respectively. For the same group of patients, the differences in mean {gamma} analysis (3% maximum dose, 3 mm) were 0.16{+-}0.26%, 0.21{+-}0.24%, and 0.02{+-}0.12%, respectively. For a subgroup of 11 patients, pretreatment verification was also performed, showing similar dose differences at the isocenter: -1.9{+-}0.9%, -1.4{+-}1.2%, and -0.4{+-}2.4%, with somewhat lower mean {gamma} difference values: 0.01{+-}0.09%, 0.01{+-}0.07%, and -0.09{+-}0.10%, respectively. Clinical implementation of the new model would save 450 h/yr spent in measurement of open images. Conclusions: It can be concluded that calculating instead of measuring the transmission leads to differences in the isocenter dose generally smaller than 2% (2.6% for 6 MV photon beams for in vivo dose) and yielded only slightly higher {gamma}-evaluation parameter values in planes through the isocenter. Hence, the new model is suitable for clinical implementation and measurement of open images can be omitted.

  8. Computer Science and Engineering, B.S. 2013-14 Degree Requirements Checklist All students must meet the University Requirements.

    E-Print Network [OSTI]

    Loudon, Catherine

    2013-14 Computer Science and Engineering, B.S. 2013-14 Degree Requirements Checklist All students Engineering, Computer Science, Information and Computer Science, nor the minors in Information and Computer Science 1) STATS 67 ­ Introduction to Probability and Statistics for Computer Science 1) Basic Science

  9. UC DAVIS CUPA SELF AUDIT CHECKLIST 1. Are chemical hazardous waste containers disposed of through Yes No NA

    E-Print Network [OSTI]

    Kolner, Brian H.

    UC DAVIS CUPA SELF AUDIT CHECKLIST 1. Are chemical hazardous waste containers disposed of through days if 1 pound or 1 quart of acutely hazardous waste is accumulated? (Prudent practice is to dispose of within 90 days). 2. Does each chemical hazardous waste container have a UC Davis Yes Ë No Ë NA Ë

  10. LAB HAZARD CHECKLIST Please check the hazards that are associated with your lab and complete the section

    E-Print Network [OSTI]

    Firestone, Jeremy

    LAB HAZARD CHECKLIST Please check the hazards that are associated with your lab and complete of Environmental Health and Safety. HAZARDS: Biological Hazard ­ Biosafety levels 2 or 3 organisms present Laser Radiation Hazards ­Any work involving class 3b or 4 lasers Flammable Gas ­ Compressed gas cylinders

  11. UCHC Competency Checklist: ANNUAL Position Title: Registered Nurse, JDH Employee Name: Unit: Med 4, Med 3, and

    E-Print Network [OSTI]

    Oliver, Douglas L.

    : CLUSTER SPECIFIC COMPETENCIES Alaris Pump-use of guardrails, secondary infusion tubing V Chest Drainage infusions, argatroban, insulin cont. infusions, insulin subcutaneous, narcotic infusions including epidural narcotic infusions, any med administered on an V #12;UCHC Competency Checklist: ANNUAL Position Title

  12. Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S. Sherif

    E-Print Network [OSTI]

    Bishop, Matt

    Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S@cs.ucdavis.edu Abstract A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Traditionally

  13. Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S. Sherif

    E-Print Network [OSTI]

    Bishop, Matt

    Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Traditionally, software

  14. City College of New York Residency Checklist All Students must complete the CUNY Residency Form with the appropriate documentation.

    E-Print Network [OSTI]

    Sun, Yi

    City College of New York Residency Checklist All Students must complete the CUNY Residency Form submit: [ ] NYS High School Diploma (only applies if you attended and completed High School in New York of application (I-485 form) or work authorization card Note: Students applying for the New York Tuition

  15. Langerhans Lab Protocols LiveFishCareDailyChecklistBRF.docx revised 10/3/2014 Page 1 of 3

    E-Print Network [OSTI]

    Langerhans, Brian

    Langerhans Lab Protocols LiveFishCareDailyChecklistBRF.docx revised 10/3/2014 Page 1 of 3 Daily Steps for Live Fish Care in BRF 221 and 223 Morning Feeding: Summary: Monday-Friday (7:00am - 10:00am disturbance to the fish after introducing the food). c. During the feeding process, make note of any dead fish

  16. Enhanced Verification Test Suite for Physics Simulation Codes

    SciTech Connect (OSTI)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of greater sophistication or other physics regimes (e.g., energetic material response, magneto-hydrodynamics), would represent a scientifically desirable complement to the fundamental test cases discussed in this report. The authors believe that this document can be used to enhance the verification analyses undertaken at the DOE WP Laboratories and, thus, to improve the quality, credibility, and usefulness of the simulation codes that are analyzed with these problems.

  17. Independent Verification and Validation Of SAPHIRE 8 Software Design and Interface Design Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-03-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE software design and interface design is to assess the activities that results in the development, documentation, and review of a software design that meets the requirements defined in the software requirements documentation. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP) design specification.

  18. Independent Verification and Validation Of SAPHIRE 8 Software Design and Interface Design Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2009-10-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE software design and interface design is to assess the activities that results in the development, documentation, and review of a software design that meets the requirements defined in the software requirements documentation. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP) design specification.

  19. Battery Technology Life Verification Testing and Analysis

    SciTech Connect (OSTI)

    Jon P. Christophersen; Gary L. Hunt; Ira Bloom; Ed Thomas; Vince Battaglia

    2007-12-01

    A critical component to the successful commercialization of batteries for automotive applications is accurate life prediction. The Technology Life Verification Test (TLVT) Manual was developed to project battery life with a high level of statistical confidence within only one or two years of accelerated aging. The validation effort that is presently underway has led to several improvements to the original methodology. For example, a newly developed reference performance test revealed a voltage path dependence effect on resistance for lithium-ion cells. The resistance growth seems to depend on how a target condition is reached (i.e., by a charge or a discharge). Second, the methodology for assessing the level of measurement uncertainty was improved using a propagation of errors in the fundamental measurements to the derived response (e.g., resistance). This new approach provides a more realistic assessment of measurement uncertainty. Third, the methodology for allocating batteries to the test matrix has been improved. The new methodology was developed to assign batteries to the matrix such that the average of each test group would be representative of the overall population. These changes to the TLVT methodology will help to more accurately predict a battery technology’s life capability with a high degree of confidence.

  20. Curriculum Checklist ITU Dual Degree Program in Bioengineering 145 credits k:advising/BIOE degree/checklists/DW ITU DDP 2014 checklist and equivs ONLY applies to students starting at MSU FALL 2014 and returning Fall 2016. ITU cr. 77 Student

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    Curriculum Checklist ITU Dual Degree Program in Bioengineering 145 credits k:advising/BIOE degree) 3 IA CORE No direct equivalent 3 BEN 111 Intro to Bioengineering (Biochem/Biotechnology) 2 (2 + 0 Processes in Bioengineering 3 (3 + 0) EBIO 324 Bioengineering Transport 3 Bioengineering Elective 3 SEE

  1. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    SciTech Connect (OSTI)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E.

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  2. National Energy Efficiency Evaluation, Measurement and Verification (EM&V) Standard: Scoping Study of Issues and Implementation Requirements

    E-Print Network [OSTI]

    Schiller, Steven R.

    2011-01-01

    Interval Data Energy Models: IPMVP Options B and C, Rev 1,and Verification Protocol (IPMVP): Concepts and Options forVerification Protocol (IPMVP)." San Francisco, CA. http://

  3. The Challenge for Arms Control Verification in the Post-New START World

    SciTech Connect (OSTI)

    Wuest, C R

    2012-05-24

    Nuclear weapon arms control treaty verification is a key aspect of any agreement between signatories to establish that the terms and conditions spelled out in the treaty are being met. Historically, arms control negotiations have focused more on the rules and protocols for reducing the numbers of warheads and delivery systems - sometimes resorting to complex and arcane procedures for counting forces - in an attempt to address perceived or real imbalances in a nation's strategic posture that could lead to instability. Verification procedures are generally defined in arms control treaties and supporting documents and tend to focus on technical means and measures designed to ensure that a country is following the terms of the treaty and that it is not liable to engage in deception or outright cheating in an attempt to circumvent the spirit and the letter of the agreement. As the Obama Administration implements the articles, terms, and conditions of the recently ratified and entered-into-force New START treaty, there are already efforts within and outside of government to move well below the specified New START levels of 1550 warheads, 700 deployed strategic delivery vehicles, and 800 deployed and nondeployed strategic launchers (Inter-Continental Ballistic Missile (ICBM) silos, Submarine-Launched Ballistic Missile (SLBM) tubes on submarines, and bombers). A number of articles and opinion pieces have appeared that advocate for significantly deeper cuts in the U.S. nuclear stockpile, with some suggesting that unilateral reductions on the part of the U.S. would help coax Russia and others to follow our lead. Papers and studies prepared for the U.S. Department of Defense and at the U.S. Air War College have also been published, suggesting that nuclear forces totaling no more than about 300 warheads would be sufficient to meet U.S. national security and deterrence needs. (Davis 2011, Schaub and Forsyth 2010) Recent articles by James M. Acton and others suggest that the prospects for maintaining U.S. security and minimizing the chances of nuclear war, while deliberately reducing stockpiles to a few hundred weapons, is possible but not without risk. While the question of the appropriate level of cuts to U.S. nuclear forces is being actively debated, a key issue continues to be whether verification procedures are strong enough to ensure that both the U.S. and Russia are fulfilling their obligations under the current New Start treaty and any future arms reduction treaties. A recent opinion piece by Henry Kissinger and Brent Scowcroft (2012) raised a number of issues with respect to governing a policy to enhance strategic stability, including: in deciding on force levels and lower numbers, verification is crucial. Particularly important is a determination of what level of uncertainty threatens the calculation of stability. At present, that level is well within the capabilities of the existing verification systems. We must be certain that projected levels maintain - and when possible, reinforce - that confidence. The strengths and weaknesses of the New START verification regime should inform and give rise to stronger regimes for future arms control agreements. These future arms control agreements will likely need to include other nuclear weapons states and so any verification regime will need to be acceptable to all parties. Currently, China is considered the most challenging party to include in any future arms control agreement and China's willingness to enter into verification regimes such as those implemented in New START may only be possible when it feels it has reached nuclear parity with the U.S. and Russia. Similarly, in keeping with its goals of reaching peer status with the U.S. and Russia, Frieman (2004) suggests that China would be more willing to accept internationally accepted and applied verification regimes rather than bilateral ones. The current verification protocols specified in the New START treaty are considered as the baseline case and are contrasted with possible alternative verification protocols that could be e

  4. NIST HANDBOOK 150-23 CHECKLIST (REV. 2010-04-13) PAGE 1 OF 11 Enter Date: Enter NVLAP Lab Code

    E-Print Network [OSTI]

    : NIST HANDBOOK 150-23 CHECKLIST RADIATION DETECTION INSTRUMENTS Instructions to the Assessor for potential improvements in the testing of radiation detection instruments used for homeland security. #12) radiation detection instrument models and design specifications for those inst

  5. Date Created: 4/24/2012 6:10:00 AM Page 1 Initiate a Termination Checklist from Workforce Administration Menu

    E-Print Network [OSTI]

    Calgary, University of

    . Select Person Checklist 6. Enter terminating employee's EmplID and select Search #12;Page 4 Date Created (e.g. term appointments ending on their expected end-date). This process is for Voluntary

  6. Order Module--DOE O 425.1D, VERIFICATION OF READINESS TO START...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5.1D, VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES Order Module--DOE O 425.1D, VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES "The...

  7. Documentation and verification required for type A packaging use

    SciTech Connect (OSTI)

    O`Brien, J.H.

    1997-07-30

    This document furnishes knowledge and methods for verifying compliance with the U.S. Department of Transportation (DOT) packaging requirements for shipping Type A quantities of radioactive material. The primary emphasis is on the requirements identified in 49 CFR 173.415(a), which states, ``Each offeror of a Specification 7A package must maintain on file for at least one year after the shipment, and shall provide to DOT on request, complete documentation of tests and an engineering evaluation of comparative data showing that the construction methods, packaging design, and materials of construction comply with that specification.`` This guidance document uses a checklist to show compliance.

  8. Independent Verification Survey Report for the Long Island Solar Farm, Brookhaven National Laboratory, Upton, New York

    SciTech Connect (OSTI)

    E.M. Harpenau

    2010-11-15

    5119-SR-01-0 INDEPENDENT VERIFICATION SURVEY REPORT FOR THE LONG ISLAND SOLAR FARM, BROOKHAVEN NATIONAL LABORATORY

  9. Comment submitted by CertainTeed Corporation regarding the Energy Star Verification Testing Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document is a comment submitted by CertainTeed Corporation regarding the Energy Star Verification Testing Program

  10. A SYSTEM DESIGN METHODOLOGY FOR REDUCING SYSTEM INTEGRATION TIME AND FACILITATING MODULAR DESIGN VERIFICATION

    E-Print Network [OSTI]

    Chow, Paul

    VERIFICATION Lesley Shannon, Blair Fort, Samir Parikh, Arun Patel, Manuel Salda~na and Paul Chow Department

  11. EECLP Webinar #2: Quality Assurance and Evaluation Monitoring Verification-- Text Version

    Broader source: Energy.gov [DOE]

    Below is the text version of the EECLP Webinar 2: Quality Assurance and Evaluation Monitoring Verification, presented in December 2014.

  12. Comment submitted by A. O. Smith Corporation regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by A. O. Smith Corporation regarding the Energy Star Verification Testing Program

  13. Comment submitted by the Alliance for Water Efficiency (AWE) regarding the Energy Star Verification Testing Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document is a comment submitted by the Alliance for Water Efficiency (AWE) regarding the Energy Star Verification Testing Program

  14. Comment submitted by Energizer Battery Manufacturing, Inc. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Energizer Battery Manufacturing, Inc. regarding the Energy Star Verification Testing Program

  15. Comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

  16. Comment submitted by Hobart/ITW Food Equipment Group regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Hobart/ITW Food Equipment Group regarding the Energy Star Verification Testing Program

  17. Comment submitted by InterMetro Industries Corp. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by InterMetro Industries Corp. regarding the Energy Star Verification Testing Program

  18. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  19. Formal verification of complex properties on PLC programs

    E-Print Network [OSTI]

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.

  20. Guidelines for Participation in the ETV ESTE Verification Test of Lead Paint Test Kits

    E-Print Network [OSTI]

    Guidelines for Participation in the ETV ESTE Verification Test of Lead Paint Test Kits Revised 09 in the ETV ESTE verification test of lead paint test kits. Test kits must conform to the following guidelines as part of the ETV verification test of lead paint test kits. Testing is scheduled to start by November

  1. The KeY Platform for Verification and Analysis of Java Programs

    E-Print Network [OSTI]

    Mostowski, Wojciech

    pure functional verification. We use the current release of the KeY system as an example to explain and prove this claim. 1 Overview Motivation. Over the last decades the reach and power of verification of real world systems. The basic technologies of deductive program verification have matured. State

  2. A Reachability-Based Method for Large-Signal Behavior Verification of DC-DC Converters

    E-Print Network [OSTI]

    Liberzon, Daniel

    -loop, large-signal system behavior verification, and iv) switching detail modeling. In open-loop, large´inguez-Garc´ia, Member, IEEE Abstract--A method for large-signal behavior verification of power electronics DC behavior verification, lengthy time-domain simula- tions are conducted to analyze the system response

  3. A knowledge-based verification method for dynamic access control policies

    E-Print Network [OSTI]

    Ryan, Mark

    . This abstraction of knowledge results in a simpler model, which makes the verification efficient, and is powerful may be a prior knowledge, or gained by exploring the system. In both cases, a verification method proposes a dynamic access control model supporting knowledge- based verification through reasoning about

  4. Real-time system verification techniques based on abstraction/deduction and model checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Real-time system verification techniques based on abstraction/deduction and model checking Eun in or- der to obtain a powerful and highly automatic verification environment for real-time systems. One-Young.Kang@loria.fr Abstract. Our research focuses on verification techniques for real-time systems based on predicate

  5. ISIS 9.0 | Enrollment Verification 1 Created: 02.12.13

    E-Print Network [OSTI]

    Capogna, Luca

    ISIS 9.0 | Enrollment Verification 1 Created: 02.12.13 Student Center ­ Enrollment Verification ISIS 9.0 Enrollment Verification in Student Center Students may choose to print/view an unofficial copy. Instructions for both follow. 1. Log in to your ISIS Student Center. 2. Click the other academic drop-down menu

  6. Component-based hardware/software co-verification for building trustworthy embedded systems q

    E-Print Network [OSTI]

    Xie, Fei

    -based approach to hardware/software co-verification of embedded systems using model checking. Embedded systemsComponent-based hardware/software co-verification for building trustworthy embedded systems q Fei systems require extensive verification. The close interactions between hardware and software of embedded

  7. A Verification Framework for FBD based Software in Nuclear Power Plants Junbeom Yoo

    E-Print Network [OSTI]

    Jee, Eunkyoung

    power reactor. Formal verification techniques such as model checking 1 Goal of KNICS consortium project in nuclear power plant's reactor protection systems. The software verification framework uses two differentA Verification Framework for FBD based Software in Nuclear Power Plants Junbeom Yoo Div

  8. Hierarchical Verification of the Implementation of The IEEE754 TableDriven FloatingPoint Exponential

    E-Print Network [OSTI]

    Tahar, Sofiène

    verification system allows its use for the verification task over the whole design path of the circuitHierarchical Verification of the Implementation of The IEEE­754 Table­Driven Floating­Point Exponential Function using HOL Amr T. Abdel­Hamid 1 , Sofiâ?? ene Tahar 1 , John Harrison 2 1 Electrical

  9. An Efficient Dual Algorithm for Vectorless Power Grid Verification under Linear Current Constraints

    E-Print Network [OSTI]

    Wang, Jia

    An Efficient Dual Algorithm for Vectorless Power Grid Verification under Linear Current Constraints, Chicago, IL 60616, USA ABSTRACT Vectorless power grid verification makes it possible to eval- uate worst, the vectorless power grid verification problem can be formulated and solved as a linear programming (LP) problem

  10. Modular Full-System Verification of Hardware Muralidaran Vijayaraghavan and Joonwon Choi

    E-Print Network [OSTI]

    Modular Full-System Verification of Hardware Muralidaran Vijayaraghavan and Joonwon Choi 1 of full-system verification for hardware designs. What does a full-system verification for a hardware of how to give a hardware specification and its implementation, and what the respective semantics are

  11. Finite countermodels for safety verification of parameterized tree systems

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2011-01-01

    In this paper we deal with verification of safety properties of parameterized systems with a tree topology. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel method is shown is at least as powerful as regular tree model checking and as the methods based on monotonic abstraction and backwards symbolic reachability. The practical efficiency of the method is illustrated on a set of examples taken from the literature.

  12. International comparison of product certification and verification methods for appliances

    SciTech Connect (OSTI)

    Zhou, Nan; Romankiewicz, John; Fridley, David; Zheng, Nina

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  13. International Comparison of Product Certification and Verification Methods for Appliances

    SciTech Connect (OSTI)

    Zhou, Nan; Romankiewicz, John; Fridley, David; Zheng, Nina

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  14. Carbon Storage Monitoring, Verification and Accounting Research...

    Office of Environmental Management (EM)

    closure, and post-closure monitoring activities at the storage site, as well as risk assessment and development of flexible operational plans, and mitigation strategies that can be...

  15. Reciprocity Checklist

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuildingBudget ||DepartmentReadout ofRecapping theRecent| Department

  16. MACCS2 development and verification efforts

    SciTech Connect (OSTI)

    Young, M.; Chanin, D.

    1997-03-01

    MACCS2 represents a major enhancement of the capabilities of its predecessor MACCS, the MELCOR Accident Consequence Code System. MACCS, released in 1987, was developed to estimate the potential impacts to the surrounding public of severe accidents at nuclear power plants. The principal phenomena considered in MACCS/MACCS2 are atmospheric transport and deposition under time-variant meteorology, short-term and long-term mitigative actions and exposure pathways, deterministic and stochastic health effects, and economic costs. MACCS2 was developed as a general-purpose analytical tool applicable to diverse reactor and nonreactor facilities. The MACCS2 package includes three primary enhancements: (1) a more flexible emergency response model, (2) an expanded library of radionuclides, and (3) a semidynamic food-chain model. In addition, errors that had been identified in MACCS version1.5.11.1 were corrected, including an error that prevented the code from providing intermediate-phase results. MACCS2 version 1.10 beta test was released to the beta-test group in May, 1995. In addition, the University of New Mexico (UNM) has completed an independent verification study of the code package. Since the beta-test release of MACCS2 version 1.10, a number of minor errors have been identified and corrected, and a number of enhancements have been added to the code package. The code enhancements added since the beta-test release of version 1.10 include: (1) an option to allow the user to input the {sigma}{sub y} and {sigma}{sub z} plume expansion parameters in a table-lookup form for incremental downwind distances, (2) an option to define different initial dimensions for up to four segments of a release, (3) an enhancement to the COMIDA2 food-chain model preprocessor to allow the user to supply externally calculated tables of tritium food-chain dose per unit deposition on farmland to support analyses of tritium releases, and (4) the capability to calculate direction-dependent doses.

  17. Radionuclide Inventory Distribution Project Data Evaluation and Verification White Paper

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2010-05-17

    Testing of nuclear explosives caused widespread contamination of surface soils on the Nevada Test Site (NTS). Atmospheric tests produced the majority of this contamination. The Radionuclide Inventory and Distribution Program (RIDP) was developed to determine distribution and total inventory of radionuclides in surface soils at the NTS to evaluate areas that may present long-term health hazards. The RIDP achieved this objective with aerial radiological surveys, soil sample results, and in situ gamma spectroscopy. This white paper presents the justification to support the use of RIDP data as a guide for future evaluation and to support closure of Soils Sub-Project sites under the purview of the Federal Facility Agreement and Consent Order. Use of the RIDP data as part of the Data Quality Objective process is expected to provide considerable cost savings and accelerate site closures. The following steps were completed: - Summarize the RIDP data set and evaluate the quality of the data. - Determine the current uses of the RIDP data and cautions associated with its use. - Provide recommendations for enhancing data use through field verification or other methods. The data quality is sufficient to utilize RIDP data during the planning process for site investigation and closure. Project planning activities may include estimating 25-millirem per industrial access year dose rate boundaries, optimizing characterization efforts, projecting final end states, and planning remedial actions. In addition, RIDP data may be used to identify specific radionuclide distributions, and augment other non-radionuclide dose rate data. Finally, the RIDP data can be used to estimate internal and external dose rates. The data quality is sufficient to utilize RIDP data during the planning process for site investigation and closure. Project planning activities may include estimating 25-millirem per industrial access year dose rate boundaries, optimizing characterization efforts, projecting final end states, and planning remedial actions. In addition, RIDP data may be used to identify specific radionuclide distributions, and augment other non-radionuclide dose rate data. Finally, the RIDP data can be used to estimate internal and external dose rates.

  18. WAG 2 remedial investigation and site investigation site-specific work plan/health and safety checklist for the soil and sediment task. Environmental Restoration Program

    SciTech Connect (OSTI)

    Holt, V.L.; Burgoa, B.B.

    1993-12-01

    This document is a site-specific work plan/health and safety checklist (WP/HSC) for a task of the Waste Area Grouping 2 Remedial Investigation and Site Investigation (WAG 2 RI&SI). Title 29 CFR Part 1910.120 requires that a health and safety program plan that includes site- and task-specific information be completed to ensure conformance with health- and safety-related requirements. To meet this requirement, the health and safety program plan for each WAG 2 RI&SI field task must include (1) the general health and safety program plan for all WAG 2 RI&SI field activities and (2) a WP/HSC for that particular field task. These two components, along with all applicable referenced procedures, must be kept together at the work site and distributed to field personnel as required. The general health and safety program plan is the Health and Safety Plan for the Remedial Investigation and Site Investigation of Waste Area Grouping 2 at the Oak Ridge National Laboratory, Oak Ridge, Tennessee (ORNL/ER-169). The WP/HSCs are being issued as supplements to ORNL/ER-169.

  19. Neutron spectrometry for ${\\rm UF}_6$ enrichment verification in storage cylinders

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mengesha, Wondwosen; Kiff, Scott D.

    2015-01-29

    Verification of declared UF6 enrichment and mass in storage cylinders is of great interest in nuclear material nonproliferation. Nondestructive assay (NDA) techniques are commonly used for safeguards inspections to ensure accountancy of declared nuclear materials. Common NDA techniques used include gamma-ray spectrometry and both passive and active neutron measurements. In the present study, neutron spectrometry was investigated for verification of UF6 enrichment in 30B storage cylinders based on an unattended and passive measurement approach. MCNP5 and Geant4 simulated neutron spectra, for selected UF6 enrichments and filling profiles, were used in the investigation. The simulated neutron spectra were analyzed using principalmore »component analysis (PCA). The PCA technique is a well-established technique and has a wide area of application including feature analysis, outlier detection, and gamma-ray spectral analysis. Results obtained demonstrate that neutron spectrometry supported by spectral feature analysis has potential for assaying UF6 enrichment in storage cylinders. The results from the present study also showed that difficulties associated with the UF6 filling profile and observed in other unattended passive neutron measurements can possibly be overcome using the approach presented.« less

  20. ECE 667 -Synthesis & Verification -Lecture 9 ECE 697B (667)

    E-Print Network [OSTI]

    Kalla, Priyank

    ,...} foreach gi { Vgi= foreach fj { if(fj contains all literals of gi) { vij=fj - literals of gi Vgi=Vgi vij } } } H = iVgi R = F - GH return (H,R); } ECE 667 - Synthesis & Verification - Lecture 9 10 Example

  1. VERIFICATION AND DIAGNOSIS OF TESTING PREORDER 4.1. Introduction

    E-Print Network [OSTI]

    von Bochmann, Gregor

    specifications are testing equivalent: first the two specifications are transformed into acceptance graphs, which92], although similar to the testing equivalence and the testing preorder defined in [Brin87CHAPTER 4 VERIFICATION AND DIAGNOSIS OF TESTING PREORDER 4.1. Introduction In protocol engineering

  2. Texture Classification and Verification Using Bispectral Estimates at All

    E-Print Network [OSTI]

    Sidorov, Nikita

    Texture Classification and Verification Using Bispectral Estimates at All the Frequencies and Statistics Group School of Mathematics, The University of Manchester #12;1 Texture Classification 3220 Email: jingsong.yuan@manchester.ac.uk Abstract Digitized texture images can often be considered

  3. Curriculum Model Checking: Declarative Representation and Verification of Properties

    E-Print Network [OSTI]

    Torino, Università di

    Curriculum Model Checking: Declarative Representation and Verification of Properties Matteo Baldoni-10149 Torino (Italy) baldoni@di.unito.it,elisa.mrng@gmail.com Abstract. When a curriculum is proposed, it is important to verify at least three aspects: that the curriculum allows the achievement of the user

  4. Ris-R-1331(EN) Simulation and Verification of Transient

    E-Print Network [OSTI]

    Risø-R-1331(EN) Simulation and Verification of Transient Events in Large Wind Power Installations-Jensen and Hans Nielsen Risø National Laboratory, Roskilde October 2003 #12;Abstract Models for wind power model 16 3.3.4 Control and protection system 17 3.4 Simulation outputs and data analyses 17 4 Simulation

  5. A Proof System for Compositional Verification of Probabilistic Concurrent Processes

    E-Print Network [OSTI]

    Simpson, Alex

    A Proof System for Compositional Verification of Probabilistic Concurrent Processes Matteo Mio1 established itself as a powerful and widely applicable method for verifying properties of systems, with its-state systems. Moreover, even in the finite-state case, the applicability of model checking is limited

  6. Formal Verification of a Microprocessor Control Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    to the modeling and formal verification of the MESI cache coherence protocol for a system of n write-back cache a powerful alternative for dealing with these problems. In this paper we present a mathematical model on a mathematical model of the system under consideration, attempts to prove or disprove facts about the system

  7. Fast Verification of Wind Turbine Power Summary of Project Results

    E-Print Network [OSTI]

    Fast Verification of Wind Turbine Power Curves: Summary of Project Results by: Cameron Brown ­ s in the FastWind project. Several methods of estimating the power curve uncertainty were developed, it was found to be sensitive to the coherence of high frequency wind speed and power measurements

  8. BRNS Workshop Verification of Digital and Hybrid Systems

    E-Print Network [OSTI]

    Shyamasundar, R.K.

    BRNS Workshop Verification of Digital and Hybrid Systems 7­11, January 1999, TIFR, Mumbai Advisory.K. Shyamasundar (TIFR, Chairman) K.C. Bhattacharjee (VSSC, Trivandrum) U. Chandra (BARC, Mumbai) V. Chandru (IISc., Bangalore) S.D. Dhodapkar (BARC, Mumbai) K. Karunakar (ADA, Bangalore) P.K. Pandya (TIFR, Mumbai) N. Raja

  9. NASA/TP2004213015 Formal Verification of a Conflict

    E-Print Network [OSTI]

    Muñoz, César A.

    NASA/TP­2004­213015 Formal Verification of a Conflict Resolution and Recovery Algorithm Jeffrey~noz National Institute of Aerospace, Hampton, Virginia April 2004 #12;The NASA STI Program Office . . . in Profile Since its founding, NASA has been dedicated to the advancement of aeronautics and space science

  10. LVT: A Layered Verification Technique for Distributed Computing Systems

    E-Print Network [OSTI]

    Olsson, Ron

    LVT: A Layered Verification Technique for Distributed Computing Systems Cui Zhang ? , Brian R of distributed computing systems with multiple component layers. Each lower layer in such a system provides languages as interfaces of systems, LVT treats each layer in a distributed computing system as a distributed

  11. Automatic Synthesis of Computation Interference Constraints for Relative Timing Verification

    E-Print Network [OSTI]

    Stevens, Ken

    unit delays to solve this problem [6]. This technique simplifies pre-layout verification but over in terms of efficiency and quality. I. INTRODUCTION Timing is an inherent quality and correctness aspect exponentials. Several approaches have been taken to mitigate this complexity. In the world of asynchronous

  12. Timed Verification of the Generic Architecture of a Memory Circuit

    E-Print Network [OSTI]

    Encrenaz-Tiphène, Emmanuelle

    #cient linear constraints relating the delays of the internal gates of the circuit to the exter­ nal delays on the reachability analysis of a timed model of the circuit (with additional abstract interpretation techniques [10Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata

  13. Experimental Verification of Morphological Instability in Freezing Aqueous Colloidal Suspensions

    E-Print Network [OSTI]

    Wettlaufer, John S.

    Experimental Verification of Morphological Instability in Freezing Aqueous Colloidal Suspensions S; published 9 June 2008) We describe an experimental test of a new theory of the unidirectional freezing of aqueous colloidal suspensions. At low freezing speeds a planar ice lens completely rejects the particles

  14. Compiler Correctness and Implementation Verification: The Verifix Approach

    E-Print Network [OSTI]

    Pfeifer, Holger

    Compiler Correctness and Implementation Verification: The Verifix Approach Wolfgang Goerigk \\Lambda \\Lambda Hans Langmaack \\Lambda Holger Pfeifer x Harald Ruess x Wolf Zimmermann z Abstract Compiler the correctness of the compiling specification and the correctness of the compiler implementation. We will discuss

  15. Verification in Loosely Synchronous Queue-Connected Discrete Timed Automata

    E-Print Network [OSTI]

    Dang, Zhe

    , the expressive power of timed automata has many limitations in modeling, since many real-time systems are simply. We look at a model of a queue system that consists of the following components: 1. Two discrete timed model for investigating verification problems of real-time sys- tems (see [1, 30] for surveys). However

  16. Verification in Loosely Synchronous QueueConnected Discrete Timed Automata ?

    E-Print Network [OSTI]

    Dang, Zhe

    , the expressive power of timed automata has many limitations in modeling, since many real­time systems are simply. We look at a model of a queue system that consists of the following components: 1. Two discrete timed model for investigating verification problems of real­time sys­ tems (see [1, 30] for surveys). However

  17. Signaling P Systems and Verification Problems , Oscar H. Ibarra

    E-Print Network [OSTI]

    Dang, Zhe

    of quantum and DNA computing). It turns out that P systems are a powerful model: even with only one membraneSignaling P Systems and Verification Problems Cheng Li ¡ , Zhe Dang ¡£¢¤¢ , Oscar H. Ibarra.O.C. Abstract. We introduce a new model of membrane computing system (or P system), called signaling P system

  18. ForPeerReview Verification of Mountain Weather Information Service

    E-Print Network [OSTI]

    Birch, Cathryn

    ForPeerReview Verification of Mountain Weather Information Service forecasts for three upland areas in the UK Journal: Weather Manuscript ID: WEA-13-0098.R1 Wiley - Manuscript type: Research Article Date and Environment Birch, Cathryn; University of Leeds, School of Earth and Environment Monk, Geoffrey; The Weather

  19. Project W-030 flammable gas verification monitoring test

    SciTech Connect (OSTI)

    BARKER, S.A.

    1999-02-24

    This document describes the verification monitoring campaign used to document the ability of the new ventilation system to mitigate flammable gas accumulation under steady state tank conditions. This document reports the results of the monitoring campaign. The ventilation system configuration, process data, and data analysis are presented.

  20. DEGAS 2 Verification Test with Fluid Neutral Momentum Transport Reference

    E-Print Network [OSTI]

    Budny, Robert

    DEGAS 2 Verification Test with Fluid Neutral Momentum Transport Reference Problem D. P. Stotler, PPPL 1 Background The "Fluid Neutral Momentum Transport Reference Problem" [1] was used to verify the original DEGAS [2] Monte Carlo neutral transport code. The resulting benchmark was subsequently employed

  1. Formal Development and Verification of a Distributed Railway Control System

    E-Print Network [OSTI]

    Peleska, Jan - Fachbereich 3

    Formal Development and Verification of a Distributed Railway Control System Anne E. Haxthausen 1@informatik.uni­bremen.de Abstract. In this article we introduce the concept for a distributed rail­ way control system and present the sys­ tem model into a domain model describing the physical system in absence of control

  2. APPENDIX A: VERIFICATION CODES A1.0 MODFLOW2000

    E-Print Network [OSTI]

    be developed, reviewed, and maintained for the MODFLOW software: Software Quality Assurance (QA) Plan A1 APPENDIX A: VERIFICATION CODES A1.0 MODFLOW2000 The MODFLOW ground water software has been and transport simulator, the MODFLOW and related software is suited to the simulation of a wide variety

  3. Cleanup Verification Package for the 118-F-6 Burial Ground

    SciTech Connect (OSTI)

    H. M. Sulloway

    2008-10-02

    This cleanup verification package documents completion of remedial action for the 118-F-6 Burial Ground located in the 100-FR-2 Operable Unit of the 100-F Area on the Hanford Site. The trenches received waste from the 100-F Experimental Animal Farm, including animal manure, animal carcasses, laboratory waste, plastic, cardboard, metal, and concrete debris as well as a railroad tank car.

  4. The Method of Generated Solutions for Numerical Verification of ICE

    E-Print Network [OSTI]

    for verifying numerical code. The exact solution to the set of equations is derived using mathematical methodsThe Method of Generated Solutions for Numerical Verification of ICE Code Amjidanutpan Ramanujam, Christopher Sikorski, Todd Harman* UUCS­07­006 School of Computing University of Utah Salt Lake City, UT 84112

  5. The Method of Generated Solutions for Numerical Verification of ICE

    E-Print Network [OSTI]

    for verifying numerical code. The exact solution to the set of equations is derived using mathematical methodsThe Method of Generated Solutions for Numerical Verification of ICE Code Amjidanutpan Ramanujam, Christopher Sikorski, Todd Harman* UUCS-07-006 School of Computing University of Utah Salt Lake City, UT 84112

  6. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ¢¡¤£ Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  7. Early Power Grid Verification Under Circuit Current Uncertainties

    E-Print Network [OSTI]

    Najm, Farid N.

    Early Power Grid Verification Under Circuit Current Uncertainties Imad A. Ferzli Department of ECE Eindhoven, The Netherlands lars@magma-da.com ABSTRACT As power grid safety becomes increasingly important in modern integrated circuits, so does the need to start power grid verifica- tion early in the design cycle

  8. c 2013 Zhenqi Huang ON SIMULATION BASED VERIFICATION OF NONLINEAR

    E-Print Network [OSTI]

    Liberzon, Daniel

    navigation benchmarks, room heating benchmarks, non-linear satellite systems and engine hybrid control safety verification of hybrid systems typically involves computing precise reach sets of such systems of a class of deterministic hybrid system. The algo- rithm first constructs a cover of the initial set

  9. MAINTENANCE, UPGRADE AND VERIFICATION OF OPERATIONAL FORECASTS OF

    E-Print Network [OSTI]

    MAINTENANCE, UPGRADE AND VERIFICATION OF OPERATIONAL FORECASTS OF CLOUD COVER AND WATER VAPOUR Purchase Order 58311/ODG/99/8362/GWI/LET #12;i PREFACE Starting in August 1998, operational forecasts satellite imagery from the Co-operative Institute for Research in the Atmosphere (CIRA) and upper

  10. 2015.06.04-06 Verification Techniques for COTSq

    E-Print Network [OSTI]

    power plants PLC(Programmable Logic Controller) has been used to implement I&Cs for decades - SW;ISET 2015 2015.06.04-06 Deagu Formal Verification Techniques which can be used for COTS SW Dedication of Commercialused for COTS SW Dedication of Commercial FPGA Tools used to Develop Safety-Critical Control Software

  11. The KivApproach to Software Verification ? Wolfgang Reif

    E-Print Network [OSTI]

    Reif, Wolfgang

    approach to the design and verification of large sequential systems. It is based on structured alge­ braic Interactive Verifier), and supports the entire design process starting from formal specifications and ending with verified code. Its main characteristics are a strict de­ compositional design discipline for modular

  12. Department of Computing CSP||B modelling for railway verification

    E-Print Network [OSTI]

    Doran, Simon J.

    University of Surrey Department of Computing Computing Sciences Report CS-12-03 CSP||B modelling Schneider Helen Treharne March 30th 2012 #12;CSP||B modelling for railway verification: the double junction work in verifying railway systems through CSP k B modelling and analysis. In particular we consider

  13. Swarm Verification1 Gerard J. Holzmann, Rajeev Joshi, Alex Groce

    E-Print Network [OSTI]

    Joshi, Rajeev

    Swarm Verification1 Gerard J. Holzmann, Rajeev Joshi, Alex Groce Jet Propulsion Laboratory was carried out at the Jet propulsion Laboratory, California Institute of Technology, under a contract generation. Curiously, although the raw speed of CPUs has stalled at roughly 2002 levels, the size of RAM

  14. INDEPENDENT VERIFICATION SURVEY OF THE SPRU LOWER LEVEL HILLSIDE AREA AT THE KNOLLS ATOMIC POWER LABORATORY NISKAYUNA, NEW YORK

    SciTech Connect (OSTI)

    Harpenau, Evan M.; Weaver, Phyllis C.

    2012-06-06

    During August 10, 2011 through August 19, 2011, and October 23, 2011 through November 4, 2011, ORAU/ORISE conducted verification survey activities at the Separations Process Research Unit (SPRU) site that included in-process inspections, surface scans, and soil sampling of the Lower Level Hillside Area. According to the Type-B Investigation Report, Sr-90 was the primary contributor to the majority of the activity (60 times greater than the Cs-137 activity). The evaluation of the scan data and sample results obtained during verification activities determined that the primary radionuclide of concern, Sr-90, was well below the agreed upon soil cleanup objective (SCO) of 30 pCi/g for the site. However, the concentration of Cs-137 in the four judgmental samples collected in final status survey (FSS) Units A and B was greater than the SCO. Both ORAU and aRc surveys identified higher Cs-137 concentrations in FSS Units A and B; the greatest concentrations were indentified in FSS Unit A.

  15. Chemical Waste in Satellite Campuses or Buildings and Non-Laboratories on Campus -This checklist is for managing Chemical Waste in all satellite campuses such as but not limited

    E-Print Network [OSTI]

    Subramanian, Venkat

    . This checklist is also for off campus clinics and physician offices. The checklist should also be used for non a yellow Hazardous Waste label to the waste container at time of first filling and complete the label. o Ensure full chemical name is printed on the label (no acronyms). o Ensure location and Manager Name

  16. The Work Number -CSU Employment Verification Colorado State University (CSU) utilizes The Work Number for employment and salary verification. The Work

    E-Print Network [OSTI]

    Number for employment and salary verification. The Work Number allows verifications to be completed your consent before requesting income or salary information. In some instances, you may be asked to provide a Salary Key to verify your income (see explanation below). For enhanced security, you might

  17. ICRCCM Phase 2: Verification and calibration of radiation codes in climate models

    SciTech Connect (OSTI)

    Ellingson, R.G.; Wiscombe, W.J.; Murcray, D.; Smith, W.; Strauch, R.

    1992-01-01

    Following the finding by the InterComparison of Radiation Codes used in Climate Models (ICRCCM) of large differences among fluxes predicted by sophisticated radiation models that could not be sorted out because of the lack of a set of accurate atmospheric spectral radiation data measured simultaneously with the important radiative properties of the atmosphere, our team of scientists proposed to remedy the situation by carrying out a comprehensive program of measurement and analysis called SPECTRE (Spectral Radiance Experiment). The data collected during SPECTRE form the test bed for the second phase of ICRCCM, namely verification and calibration of radiation codes used in climate models. This should lead to more accurate radiation models for use in parameterizing climate models, which in turn play a key role in the prediction of trace-gas greenhouse effects. This report summarizes the activities of our group during the project's Third year to meet our stated objectives. The report is divided into three sections entitled: SPECTRE Activities, ICRCCM Activities, and summary information. The section on SPECTRE activities summarizes the field portion of the project during 1991, and the data reduction/analysis performed by the various participants. The section on ICRCCM activities summarizes our initial attempts to select data for distribution to ICRCCM participants and at comparison of observations with calculations as will be done by the ICRCCM participants. The Summary Information section lists data concerning publications, presentations, graduate students supported, and post-doctoral appointments during the project.

  18. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  19. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  20. Cleanup Verification Package for the 618-3 Burial Ground

    SciTech Connect (OSTI)

    M. J. Appel

    2006-09-12

    This cleanup verification package documents completion of remedial action for the 618-3 Solid Waste Burial Ground, also referred to as Burial Ground Number 3 and the Dry Waste Burial Ground Number 3. During its period of operation, the 618-3 site was used to dispose of uranium-contaminated construction debris from the 311 Building and construction/demolition debris from remodeling of the 313, 303-J and 303-K Buildings.

  1. A comparison of adjoint and data-centric verification techniques.

    SciTech Connect (OSTI)

    Wildey, Timothy Michael; Cyr, Eric Christopher; Shadid, John Nicolas; Pawlowski, Roger Patrick; Smith, Thomas Michael

    2013-03-01

    This document summarizes the results from a level 3 milestone study within the CASL VUQ effort. We compare the adjoint-based a posteriori error estimation approach with a recent variant of a data-centric verification technique. We provide a brief overview of each technique and then we discuss their relative advantages and disadvantages. We use Drekar::CFD to produce numerical results for steady-state Navier Stokes and SARANS approximations. 3

  2. Assignment 5 Verification of ANSI-C with PVS

    E-Print Network [OSTI]

    Clarke, Edmund M.

    15-820-a Assignment 5 Verification of ANSI-C with PVS Due Apr. 30, 2003 1 Find the Minimum 1. Write a function in ANSI­C that finds the minumum number in an array. The size of the array is passed as a parameter. 2. Translate your ANSI­C code into PVS language, as described in the class. You may assume

  3. Enrichment Assay Methods Development for the Integrated Cylinder Verification System

    SciTech Connect (OSTI)

    Smith, Leon E.; Misner, Alex C.; Hatchell, Brian K.; Curtis, Michael M.

    2009-10-22

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility's entire product-cylinder inventory. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100 percent product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The three main objectives of this FY09 project are summarized here and described in more detail in the report: (1) Develop a preliminary design for a prototype NDA system, (2) Refine PNNL's MCNP models of the NDA system, and (3) Procure and test key pulse-processing components. Progress against these tasks to date, and next steps, are discussed.

  4. Monitoring and Commissioning Verification Algorithms for CHP Systems

    SciTech Connect (OSTI)

    Brambley, Michael R.; Katipamula, Srinivas; Jiang, Wei

    2008-03-31

    This document provides the algorithms for CHP system performance monitoring and commissioning verification (CxV). It starts by presenting system-level and component-level performance metrics, followed by descriptions of algorithms for performance monitoring and commissioning verification, using the metric presented earlier. Verification of commissioning is accomplished essentially by comparing actual measured performance to benchmarks for performance provided by the system integrator and/or component manufacturers. The results of these comparisons are then automatically interpreted to provide conclusions regarding whether the CHP system and its components have been properly commissioned and where problems are found, guidance is provided for corrections. A discussion of uncertainty handling is then provided, which is followed by a description of how simulations models can be used to generate data for testing the algorithms. A model is described for simulating a CHP system consisting of a micro-turbine, an exhaust-gas heat recovery unit that produces hot water, a absorption chiller and a cooling tower. The process for using this model for generating data for testing the algorithms for a selected set of faults is described. The next section applies the algorithms developed to CHP laboratory and field data to illustrate their use. The report then concludes with a discussion of the need for laboratory testing of the algorithms on a physical CHP systems and identification of the recommended next steps.

  5. AUTOMATED, HIGHLY ACCURATE VERIFICATION OF RELAP5-3D

    SciTech Connect (OSTI)

    George L Mesina; David Aumiller; Francis Buschman

    2014-07-01

    Computer programs that analyze light water reactor safety solve complex systems of governing, closure and special process equations to model the underlying physics. In addition, these programs incorporate many other features and are quite large. RELAP5-3D[1] has over 300,000 lines of coding for physics, input, output, data management, user-interaction, and post-processing. For software quality assurance, the code must be verified and validated before being released to users. Verification ensures that a program is built right by checking that it meets its design specifications. Recently, there has been an increased importance on the development of automated verification processes that compare coding against its documented algorithms and equations and compares its calculations against analytical solutions and the method of manufactured solutions[2]. For the first time, the ability exists to ensure that the data transfer operations associated with timestep advancement/repeating and writing/reading a solution to a file have no unintended consequences. To ensure that the code performs as intended over its extensive list of applications, an automated and highly accurate verification method has been modified and applied to RELAP5-3D. Furthermore, mathematical analysis of the adequacy of the checks used in the comparisons is provided.

  6. Guidelines for the verification and validation of expert system software and conventional software: Survey and documentation of expert system verification and validation methodologies. Volume 3

    SciTech Connect (OSTI)

    Groundwater, E.H.; Miller, L.A.; Mirsky, S.M.

    1995-03-01

    This report is the third volume in the final report for the Expert System Verification and Validation (V&V) project which was jointly sponsored by the Nuclear Regulatory Commission and the Electric Power Research Institute. The ultimate objective is the formulation of guidelines for the V&V of expert systems for use in nuclear power applications. The purpose of this activity was to survey and document techniques presently in use for expert system V&V. The survey effort included an extensive telephone interviewing program, site visits, and a thorough bibliographic search and compilation. The major finding was that V&V of expert systems is not nearly as established or prevalent as V&V of conventional software systems. When V&V was used for expert systems, it was almost always at the system validation stage after full implementation and integration usually employing the non-systematic dynamic method of {open_quotes}ad hoc testing.{close_quotes} There were few examples of employing V&V in the early phases of development and only weak sporadic mention of the possibilities in the literature. There is, however, a very active research area concerning the development of methods and tools to detect problems with, particularly, rule-based expert systems. Four such static-testing methods were identified which were not discovered in a comprehensive review of conventional V&V methods in an earlier task.

  7. INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT

    SciTech Connect (OSTI)

    W.C. Adams

    2010-05-24

    INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT, MIAMISBURG, OHIO DCN: 0468-SR-02-0

  8. INDEPENDENT VERIFICATION SURVEY REPORT OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT

    SciTech Connect (OSTI)

    W.C. Adams

    2010-07-21

    INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT, MIAMISBURG, OHIO DCN: 0468-SR-03-0

  9. Round-Robin Verification and Final Development of the IEC 62788...

    Office of Scientific and Technical Information (OSTI)

    Verification and Final Development of the IEC 62788-1-5 Encapsulation Size Change Test; NREL (National Renewable Energy Laboratory) Citation Details In-Document Search Title:...

  10. Round-Robin Verification and Final Development of the IEC 62788...

    Office of Scientific and Technical Information (OSTI)

    Development of the IEC 62788-1-5 Encapsulation Size Change Test; NREL (National Renewable Energy Laboratory) Citation Details In-Document Search Title: Round-Robin Verification...

  11. Spying on Components: A Runtime Verification Technique Mike Barnett and Wolfram Schulte

    E-Print Network [OSTI]

    Leavens, Gary T.

    Spying on Components: A Runtime Verification Technique Mike Barnett and Wolfram Schulte Microsoft, USA Copyright 2001 M. Barnett and W. Schulte. Machines (ASMs) [16], it allows the writing

  12. EFFICIENT MODELING AND VERIFICATION OF ANALOG/MIXED-SIGNAL CIRCUITS USING

    E-Print Network [OSTI]

    Myers, Chris J.

    finite groups of equivalent states for verification. Difference bound matrices (DBMs), a restricted form using DBMs is very efficient at the cost of exactness. This dissertation presents algorithms

  13. Finite-State Verification for High Performance Computing George S. Avrunin

    E-Print Network [OSTI]

    Avrunin, George S.

    Finite-State Verification for High Performance Computing George S. Avrunin Department (top500.org) reveals that high performance computing has become practically synonymous with parallel

  14. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  15. Measurement & verification reality check: A yawning gap between theory and practice

    E-Print Network [OSTI]

    2002-01-01

    Energy-Efficient Economy. [IPMVP] International PerformanceVerification Protocol (IPMVP), provides standard measurementThe success of the IPMVP as a market transformation tool has

  16. DEMAND SIDE ENERGY MANAGEMENT AND CONSERVATION PROGRAM Measurement and Verification Program

    E-Print Network [OSTI]

    Hofmann, Hans A.

    DEMAND SIDE ENERGY MANAGEMENT AND CONSERVATION PROGRAM Measurement and Verification Program 4&V deliverables requested here meet the Federal Energy Management Program (FEMP) intent for a "Post- Installation

  17. verification & Validation of High-Order Short-Characteristics-Based Deterministic Transport Methodology on Unstructured Grids

    SciTech Connect (OSTI)

    Azmy, Yousry; Wang, Yaqi

    2013-12-20

    The research team has developed a practical, high-order, discrete-ordinates, short characteristics neutron transport code for three-dimensional configurations represented on unstructured tetrahedral grids that can be used for realistic reactor physics applications at both the assembly and core levels. This project will perform a comprehensive verification and validation of this new computational tool against both a continuous-energy Monte Carlo simulation (e.g. MCNP) and experimentally measured data, an essential prerequisite for its deployment in reactor core modeling. Verification is divided into three phases. The team will first conduct spatial mesh and expansion order refinement studies to monitor convergence of the numerical solution to reference solutions. This is quantified by convergence rates that are based on integral error norms computed from the cell-by-cell difference between the code’s numerical solution and its reference counterpart. The latter is either analytic or very fine- mesh numerical solutions from independent computational tools. For the second phase, the team will create a suite of code-independent benchmark configurations to enable testing the theoretical order of accuracy of any particular discretization of the discrete ordinates approximation of the transport equation. For each tested case (i.e. mesh and spatial approximation order), researchers will execute the code and compare the resulting numerical solution to the exact solution on a per cell basis to determine the distribution of the numerical error. The final activity comprises a comparison to continuous-energy Monte Carlo solutions for zero-power critical configuration measurements at Idaho National Laboratory’s Advanced Test Reactor (ATR). Results of this comparison will allow the investigators to distinguish between modeling errors and the above- listed discretization errors introduced by the deterministic method, and to separate the sources of uncertainty.

  18. This letter is to inform AHAM that DOE is adopting a new policy regarding DOE ENERGY STAR verification testing of models that are part of the AHAM verification program.

    Office of Energy Efficiency and Renewable Energy (EERE)

    This letter is to inform AHAM that DOE is adopting a new policy regarding DOE ENERGY STAR verification testing of models that are part of the AHAM verification program.

  19. Data Packages for the Hanford Immobilized Low Activity Tank Waste Performance Assessment 2001 Version [SEC 1 THRU 5

    SciTech Connect (OSTI)

    MANN, F.M.

    2000-03-02

    Data package supporting the 2001 Immobilized Low-Activity Waste Performance Analysis. Geology, hydrology, geochemistry, facility, waste form, and dosimetry data based on recent investigation are provided. Verification and benchmarking packages for selected software codes are provided.

  20. Verification and Validation Strategy for LWRS Tools

    SciTech Connect (OSTI)

    Carl M. Stoots; Richard R. Schultz; Hans D. Gougar; Thomas K Larson; Michael Corradini; Laura Swiler; David Pointer; Jess Gehin

    2012-09-01

    One intension of the Department of Energy (DOE) Light Water Reactor Sustainability (LWRS) program is to create advanced computational tools for safety assessment that enable more accurate representation of a nuclear power plant safety margin. These tools are to be used to study the unique issues posed by lifetime extension and relicensing of the existing operating fleet of nuclear power plants well beyond their first license extension period. The extent to which new computational models / codes such as RELAP-7 can be used for reactor licensing / relicensing activities depends mainly upon the thoroughness with which they have been verified and validated (V&V). This document outlines the LWRS program strategy by which RELAP-7 code V&V planning is to be accomplished. From the perspective of developing and applying thermal-hydraulic and reactivity-specific models to reactor systems, the US Nuclear Regulatory Commission (NRC) Regulatory Guide 1.203 gives key guidance to numeric model developers and those tasked with the validation of numeric models. By creating Regulatory Guide 1.203 the NRC defined a framework for development, assessment, and approval of transient and accident analysis methods. As a result, this methodology is very relevant and is recommended as the path forward for RELAP-7 V&V. However, the unique issues posed by lifetime extension will require considerations in addition to those addressed in Regulatory Guide 1.203. Some of these include prioritization of which plants / designs should be studied first, coupling modern supporting experiments to the stringent needs of new high fidelity models / codes, and scaling of aging effects.

  1. Remaining Sites Verification Package for the 100-B-18, 184-B Powerhouse Debris Pile, Waste Site Reclassification Form 2007-020

    SciTech Connect (OSTI)

    L. M. Dittmer

    2007-11-30

    The 100-B-18 Powerhouse Debris Pile contained miscellaneous demolition waste from the decommissioning activities of the 184-B Powerhouse. The debris covered an area roughly 15 m by 30 m and included materials such as concrete blocks, mixed aggregate/concrete slabs, stone rubble, asphalt rubble, traces of tar/coal, broken fluorescent lights, brick chimney remnants, and rubber hoses. In accordance with this evaluation, the verification sampling results support a reclassification of this site to Interim Closed Out. The results of verification sampling show that residual contaminant concentrations do not preclude any future uses and allow for unrestricted use of shallow zone soils. The results also demonstrate that residual contaminant concentrations are protective of groundwater and the Columbia River.

  2. DEVELOPMENT OF A PORTAL MONITOR FOR UF6 CYLINDER VERIFICATION

    SciTech Connect (OSTI)

    Smith, Leon E.; Curtis, Michael M.; Shaver, Mark W.; Benz, Jacob M.; Misner, Alex C.; Mace, Emily K.; Jordan, David V.; Noss, Daniel; Ford, Herbert

    2009-10-06

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s operations. As additional enrichment plans come online to support the expansion of nuclear power, reducing person-days of inspection will take on greater importance. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100% product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Automated Cylinder Enrichment Verification System (ACEVS) would be located at key measurement points and will positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. Given the potential for reduced inspector presence, the operational and manpower-reduction benefits of the portal concept are clear. However, it is necessary to assess whether the cylinder portal concept can meet, or potentially improve upon, today’s U-235 enrichment assay performance. PNNL’s ACEVS concept utilizes sensors that could be operated in an unattended mode: moderated He-3 neutron detectors and large NaI(Tl) scintillators for gamma-ray spectroscopy. The medium-resolution NaI(Tl) scintillators are a sacrifice in energy resolution but do provide high collection efficiency for signatures above 1 MeV. The He-3/NaI sensor combination allows the exploitation of additional, more-penetrating signatures than those currently utilized: Neutrons produced from F-19(?,n) reactions (spawned primarily from U-234 alpha emission) and high-energy gamma rays (extending up to 10 MeV) induced by neutrons interacting in the steel cylinder. These signatures are indirect measures of U-235 that require a relatively stable U-234/U-235 ratio in the product material in order to be useful. The hypothesis of this work is that the U-234/U-235 ratio is sufficiently constant, for the specific facility where the automated system is installed, to rely on neutron and high-energy gamma-ray signatures for indirect measurement of U-235. Further, these highly penetrating signatures can be combined with a modified form of NaI-based 185-keV enrichment measurements to meet target uncertainties for the verification of product cylinders, with the additional benefits of full-volume assay of the cylinder and 100% product-cylinder verification (as opposed to today’s sampling-based approach). This paper focuses on the enrichment measurement aspects of the ACEVS concept: neutron and high-energy gamma-ray signatures, the radiation sensors designed to collect those signatures, and proof-of-principle cylinder measurements and analysis. Preliminary analysis indicates that an automated cylinder verification approach has the potential to meet target uncertainty values for 30B products cylinders (5%), assuming ore-based enrichment feed and a facility-specific calibration. Also described is the additional work needed to more definitively assess the concept’s viability, particularly through a better understanding of the U-234/U-235 ratio variability in modern enrichment plants.

  3. Applying Multi-Physics Requirements and Loads in FEM Analysis and Testing – The JET KL11 Endoscope Design Verification Process

    E-Print Network [OSTI]

    Applying Multi-Physics Requirements and Loads in FEM Analysis and Testing – The JET KL11 Endoscope Design Verification Process

  4. A Runtime Verification Framework for Control System Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Fuller, Jason C.; Daily, Jeffrey A.; Makhmalbaf, Atefe; Callahan, Charles D.

    2014-08-02

    n a standard workflow for the validation of a control system, the control system is implemented as an extension to a simulator. Such simulators are complex software systems, and engineers may unknowingly violate constraints a simulator places on extensions. As such, errors may be introduced in the implementation of either the control system or the simulator leading to invalid simulation results. This paper presents a novel runtime verification approach for verifying control system implementations within simulators. The major contribution of the approach is the two-tier specification process. In the first tier, engineers model constraints using a domain-specific language tailored to modeling a controller’s response to changes in its input. The language is high-level and effectively hides the implementation details of the simulator, allowing engineers to specify design-level constraints independent of low-level simulator interfaces. In the second tier, simulator developers provide mapping rules for mapping design-level constraints to the implementation of the simulator. Using the rules, an automated tool transforms the design-level specifications into simulator-specific runtime verification specifications and generates monitoring code which is injected into the implementation of the simulator. During simulation, these monitors observe the input and output variables of the control system and report changes to the verifier. The verifier checks whether these changes follow the constraints of the control system. We describe application of this approach to the verification of the constraints of an HVAC control system implemented with the power grid simulator GridLAB-D.

  5. Greenhouse Heating Checklist1 R. A. Bucklin, P. H. Jones, B. A. Barmby, D. B. McConnell, and R. W. Henley2

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    CIR791 Greenhouse Heating Checklist1 R. A. Bucklin, P. H. Jones, B. A. Barmby, D. B. Mc/IFAS Extension. Effective and economical greenhouse heating is the union of an appropriate heat source and an efficient heat distribu- tion system. The best greenhouse heat source in the world is useless if the heat

  6. Housing Coordinator Fire Watch Implementation Checklist A Fire Watch is an inspection conducted by DFSL staff in order to provide fire and smoke detection and emergency

    E-Print Network [OSTI]

    Hill, Wendell T.

    12 Fire Watch Housing Coordinator Fire Watch Implementation Checklist A Fire Watch is an inspection conducted by DFSL staff in order to provide fire and smoke detection and emergency warning to occupants when a building's fire alarm or sprinkler system is non-operational. Fire Watch inspectors serve as a "human smoke

  7. Fire Watch Inspector Checklist A Fire Watch is an inspection conducted by DFSL staff to provide fire and smoke detection and emergency warning

    E-Print Network [OSTI]

    Hill, Wendell T.

    14 Fire Watch Fire Watch Inspector Checklist A Fire Watch is an inspection conducted by DFSL staff to provide fire and smoke detection and emergency warning to occupants when a building's fire alarm or sprinkler system is non-operational. Fire Watch inspectors serve as a "human smoke detector" and notify 911

  8. Master's Thesis Checklist The items listed below must be completed with the offices noted in order to meet degree completion requirements.

    E-Print Network [OSTI]

    Bystroff, Chris

    Master's Thesis Checklist The items listed below must be completed with the offices noted in order with courses shown on your transcript. An approved Master's Thesis Committee Nomination Form must be on file Education before a formal review of the thesis will be conducted. In order to complete the review process

  9. 3/16/10 Questions? Contact -employee.services@yale.edu Page 1 of 1 FORM 3501 FR.18 PROMOTION & TRANSFER CHECKLIST REVISION DATE: 3/16/10

    E-Print Network [OSTI]

    Post, David M.

    will be used. Employee directory information has been verified or completed in HR database: Office location3/16/10 Questions? Contact - employee.services@yale.edu Page 1 of 1 FORM 3501 FR.18 PROMOTION & TRANSFER CHECKLIST REVISION DATE: 3/16/10 Employee Name: Old Department: New Department University Personal

  10. Degree Checklist MASTER OF MUSIC IN WIND CONDUCTING The Master of Music degree in Wind Conducting is intended for musicians who desire to pursue graduate

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Degree Checklist MASTER OF MUSIC IN WIND CONDUCTING The Master of Music degree in Wind Conducting the development of their creative skills and to improve their knowledge of wind instrument repertoire and their skills at analyzing and conducting music for winds. The goals of the Master of Music degree

  11. B.A. GEOLOGY CHECKLIST of required courses for major Courses in Natural Sciences: 5-6 courses, 18 credits minimum*

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    B.A. GEOLOGY CHECKLIST of required courses for major Courses in Natural Sciences: 5-6 courses, 18 year, either semester *COURSES MUST BE SELECTED WITH CONSULTATION AND APPROVAL OF A GEOLOGY FACULTY or 4th year, either semester Introductory Geology Courses: 3 courses, 11-12 credits Course Credits When

  12. Checklist for Minor in GEOLOGY The minor in geology is flexible, so that it can complement the student's major in the best

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Checklist for Minor in GEOLOGY The minor in geology is flexible, so that it can complement the student's major in the best possible manner. Students minoring in Geology are strongly encouraged to plan their programs with an undergraduate geology advisor. A total of 20 credits are required for the minor as follows

  13. B.S. GEOLOGY (Geology Subplan) CHECKLIST of required courses for major Geology Core Courses: 9-10 courses, 33-34 credits

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    B.S. GEOLOGY (Geology Subplan) CHECKLIST of required courses for major Geology Core Courses: 9 - Experiencing Geology Lab and either GEOSCI 103 - Intro to Oceanography or GEOSCI 105 - Dynamic Earth 4 (1) (4 semester GEOSCI 201 ­ History of the Earth 4 1st or 2nd year, spring semester GEOSCI 231 ­ Geological Field

  14. Challenges and a checklist for biodiversity conservation in fire-prone forests: Perspectives from the Pacific Northwest of USA and Southeastern Australia

    E-Print Network [OSTI]

    Stephens, Scott L.

    Review Challenges and a checklist for biodiversity conservation in fire-prone forests: Perspectives a b s t r a c t Conserving biodiversity in fire-prone forest ecosystems is challenging for several encroachment into forest landscapes by humans. We briefly compare two ecologically distinct fire-prone forest

  15. What PRO information will link to my faculty web page? Use this document as a checklist for things you want to see displayed on your

    E-Print Network [OSTI]

    What PRO information will link to my faculty web page? Use this document as a checklist for things you want to see displayed on your departmental faculty web page. Please contact the PRO Team if you have questions at akulp@ku.edu. You can run "Web Page Information Report" in PRO to see how many

  16. EXPORT CONTROL REVIEW CHECKLIST FOR NEGOTIATORS *This formshould be completed and kept in file even if all of the answersare "No."*

    E-Print Network [OSTI]

    Alabama in Huntsville, University of

    Sponsor: EXPORT CONTROL REVIEW CHECKLIST FOR NEGOTIATORS *This formshould be completed and kept for possible patents and/or sponsor proprietary information)? 2. Reference U.S. export regulations or security research exclusion may be lost and an export control issue may exist. Finalize export control review

  17. NIST HANDBOOK 150-1 CHECKLIST (REV. 2010-12-30) PAGE 1 OF 14 Enter Date: Enter NVLAP Lab Code

    E-Print Network [OSTI]

    process 3.2 Management system review 3.2.1 The laboratory shall have a fully implemented management system the laboratory's own test results shall be documented in its management system. #12;DATE: NVLAP LAB CODE: NIST HANDBOOK 150-1 CHECKLIST ENERGY EFFICIENT LIGHTING PRODUCTS PROGRAM Instructions to the Assessor

  18. C:\\Documents and Settings\\vivian\\My Documents\\Recruiting\\Packet\\Checklist for applicants.doc PhD in Nursing

    E-Print Network [OSTI]

    Huang, Haiying

    C:\\Documents and Settings\\vivian\\My Documents\\Recruiting\\Packet\\Checklist for applicants.doc PhD transcripts to Graduate School Goal Statement Written per guidelines; sent to PhD Program GRE (for BSN of record send transcript to Graduate School 2 years clinical experience (BSN-PhD) To be verified by PhD

  19. VISITOR SAFETY TRAINING CHECKLIST: Free Electron Laser (FEL) Laboratory Under California law and campus policy, the University must provide documented safety training for workers.

    E-Print Network [OSTI]

    Ahlers, Guenter

    VISITOR SAFETY TRAINING CHECKLIST: Free Electron Laser (FEL) Laboratory Under California law and campus policy, the University must provide documented safety training for workers. For FEL visitors, this generally means covering the basic guidelines/tasks below. The FEL management loosely defines a "visitor

  20. NIST HANDBOOK 150-17 ANNEX B CHECKLIST (REV. 2012-04-05) PAGE 1 OF 7 Enter Date: Enter NVLAP Lab Code

    E-Print Network [OSTI]

    Code: NIST HANDBOOK 150-17 Annex B CHECKLIST Cryptographic Algorithms and Cryptographic Modules Testing), Cryptographic Hardward Modules (17CMH) and Cryptographic Software Modules (17CMS) test methods. It is used. B.5.2.2 The laboratory's personnel shall have experience, training, knowledge, or familiarity

  1. Title of the paper: Comparison of frailty between users and non-users of a day care center using the Kihon Checklist in Brazil

    E-Print Network [OSTI]

    Takada, Shoji

    care center using the Kihon Checklist in Brazil Short running title: Frailty in users and non in Brazil to meet the needs of the increasing older population. However, the health profiles were recruited at a day care center for the elderly in Brazil. The measurements consisted

  2. DEEP NEURAL NETWORKS FOR SMALL FOOTPRINT TEXT-DEPENDENT SPEAKER VERIFICATION

    E-Print Network [OSTI]

    Cortes, Corinna

    DEEP NEURAL NETWORKS FOR SMALL FOOTPRINT TEXT-DEPENDENT SPEAKER VERIFICATION Ehsan Variani1 , Xin the use of deep neural networks (DNNs) for a small footprint text-dependent speaker verification task% relative in equal error rate (EER) for clean and noisy conditions respectively. Index Terms-- Deep neural

  3. Verification of Relational Data-Centric Dynamic Systems with External Services

    E-Print Network [OSTI]

    Calvanese, Diego

    Verification of Relational Data-Centric Dynamic Systems with External Services Babak Bagheri Hariri@cs.ucsd.edu ABSTRACT Data-centric dynamic systems are systems where both the process controlling the dynamics processes. In this paper we study verification of (first-order) µ-calculus variants over relational data-centric

  4. A Brief Account of Runtime Verification Martin Leucker and Christian Schallhart

    E-Print Network [OSTI]

    Leucker, Martin

    to well-known verification techniques like model checking and testing is provided, and applications-skid system must speed with exactly the right velocity to stabi- lize the car. Moreover, for a power plant;verification is particularly challenging as the overall behavior of such systems depends heavily

  5. A Formal Verification Methodology for Checking Data Integrity Yasushi Umezawa, Takeshi Shimizu

    E-Print Network [OSTI]

    Boyer, Edmond

    and complexity of system on chip (SoC) designs. Powerful formal verification methods have been playing, model checking for complex designs may be beyond the power of available tools and computing resourceA Formal Verification Methodology for Checking Data Integrity Yasushi Umezawa, Takeshi Shimizu

  6. Foundations of Software Technology and Theoretical Computer Science (2009) Submission Deductive Verification of Continuous

    E-Print Network [OSTI]

    Tiwari, Ashish

    2009-01-01

    state transition systems is a powerful modeling formalism, it is inadequate for modeling systems Verification of Continuous Dynamical Systems Ankur Taly1 , Ashish Tiwari2 1 Computer Science Department inference rules for safety verification of polynomial continuous dynamical systems. We present two different

  7. Query Based UML Modeling Validation and Verification of the System Model and

    E-Print Network [OSTI]

    Austin, Mark

    1 Query Based UML Modeling Validation and Verification of the System Model and Behavior. UML/SysML was designed to provide simple but powerful constructs for modeling a wide range of systems for a Hydraulic Crane Denny Mathew ENPM 643 System Validation and Verification Instructor: Dr. Mark Austin Fall

  8. An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration

    E-Print Network [OSTI]

    Hilley, George

    An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration J. L the success of geologic carbon sequestration projects. To detect subtle CO2 leakage signals, we present), An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration, Geophys. Res

  9. Modeling and Verification of Leaders Agreement in the IntrusionTolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion­Tolerant Enclaves Using PVS Mohamed issue in formal verification. It arises the problem of how much power should be given to a Byzantine Layouni 1 , Jozef Hooman 2 , and Sofiâ?? ene Tahar 1 1 Department of Electrical and Computer Engineering

  10. Taylor Expansion Diagrams: A Canonical Representation for Verification of Data Flow Designs

    E-Print Network [OSTI]

    Ciesielski, Maciej

    series expansion that allows to model word-level signals as alge- braic symbols. This power increase in the size and complexity of digital systems has made it essential to address verification issues verification meth- ods, such as theorem proving, property and model checking, equiv- alence checking, etc

  11. Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS Mohamed]. Modeling Byzantine behavior has been always a big issue in formal verification. It arises the problem of how much power should be given to a Byzantine fault and how general the model should be to

  12. Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement

    E-Print Network [OSTI]

    Clarke, Edmund M.

    verification, abstraction transforms the inherently infinite state system into a finite-state model [7Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement Edmund Clarke1 generated by the model checker. For hybrid systems, analysis of the counterexample requires the computation

  13. Verification of Hybrid Systems Based on CounterexampleGuided Abstraction Refinement ?

    E-Print Network [OSTI]

    Theobald, Michael

    verification, abstraction transforms the inherently infinite state system into a finite­state model [7, 8Verification of Hybrid Systems Based on Counterexample­Guided Abstraction Refinement ? Edmund that eliminates a counterexample generated by the model checker. For hybrid systems, analy­ sis

  14. On the Formal Verification of Embedded Software Using Multiway Decision Graphs

    E-Print Network [OSTI]

    Tahar, Sofiène

    . Recently attention has been given to the verification of embedded systems using formal methods and Claesen [10] suggested a methodology for modeling both the software and hardware of an embedded system1 On the Formal Verification of Embedded Software Using Multiway Decision Graphs Subhashini

  15. FORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY MODELING

    E-Print Network [OSTI]

    Xu, Haiping

    that DRBD provides a powerful tool for system reliability modeling, and our proposed verification approachFORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY-scale computer-based systems. KEY WORDS Reliability modeling, dynamic reliability block diagrams (DRBD), Object

  16. A New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol

    E-Print Network [OSTI]

    Barak, Boaz

    accountable delivery platforms, i.e., missile silos, submarines, and bombers. The next round of nuclear armsA New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol Alex Glaser, Boaz-control agreements. This article presents a concept for a new approach to nuclear warhead verification that minimizes

  17. Formal Verification of an ARM processor Vishnu A. Patankar Alok Jain Randal E. Bryant

    E-Print Network [OSTI]

    Bryant, Randal E.

    1 Formal Verification of an ARM processor Vishnu A. Patankar Alok Jain Randal E. Bryant Department presents a detailed description of the application of a formal verification methodology to an ARM processor. The processor, a hybrid between the ARM7 and the StrongARM processors, uses features such as a 5-stage

  18. HOW TO: Complete Form I-9 Verification for Off-Site Employees 1 Background info

    E-Print Network [OSTI]

    HOW TO: Complete Form I-9 Verification for Off-Site Employees 1 Background info: By law, the university must have a valid Form I-9 on file for employees. The Form I-9 form must be completed within 3 location to complete their Form I-9 ­ Employment Eligibility Verification. The form has three parts

  19. A Load Balancing Mechanism with Verification Daniel Grosu and Anthony T. Chronopoulos

    E-Print Network [OSTI]

    Chronopoulos, Anthony T.

    A Load Balancing Mechanism with Verification £ Daniel Grosu and Anthony T. Chronopoulos Department mechanisms with verification for heteroge- neous distributed systems. We derive a compensation and bonus type mechanism that solves the load balancing prob- lem in distributed systems in which computers are charac

  20. A Static PatternIndependent Technique for Power Grid Voltage Integrity Verification #

    E-Print Network [OSTI]

    Najm, Farid N.

    A Static Pattern­Independent Technique for Power Grid Voltage Integrity Verification # Dionysios Design verification must include the power grid. Checking that the voltage on the power grid does) the obviously large size of the power grids for modern high­performance chips, and ii) the di#culty of setting

  1. Handling Inductance in Early Power Grid Verification Nahi H. Abdul Ghani

    E-Print Network [OSTI]

    Najm, Farid N.

    Handling Inductance in Early Power Grid Verification Nahi H. Abdul Ghani Department of ECE design verification, one should check if the voltage drop on the power grid exceeds some critical thresh, the currents drawn by the logic beneath the power grid are described by means of current constraints

  2. A geometric approach for early power grid verification using current constraints

    E-Print Network [OSTI]

    Najm, Farid N.

    A geometric approach for early power grid verification using current constraints Imad A. Ferzli Automation Eindhoven, The Netherlands lars@magma-da.com ABSTRACT The verification of power grids in modern programs as there are power grid nodes, to an- other involving a user-limited number of solutions of one

  3. A Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification

    E-Print Network [OSTI]

    Najm, Farid N.

    by the circuit off the grid. The current waveforms of these current sources may be determined by a priorA Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification Dionysios Design verification must include the power grid. Checking that the voltage on the power grid does

  4. A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification

    E-Print Network [OSTI]

    Belaïd, Abdel

    A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature to grid schemes. Different grid-segmentation schemes have been used in off-line signature verification.belaid@loria.fr Abstract--One of the main challenges in off-line signature verification systems is to make them robust

  5. Management Services for Performance Verification in Broadband Multi-Service Networks

    E-Print Network [OSTI]

    Griffin, David

    Management Services for Performance Verification in Broadband Multi-Service Networks Panos Georgatsos1 , David Griffin2 Abstract This paper presents a practical management system for performance monitoring and network performance verification to support the larger goals of performance management systems

  6. WICT PROCEEDINGS, DECEMBER 2008 1 Meta-Functional Languages for Hardware Design and Verification

    E-Print Network [OSTI]

    Pace, Gordon J.

    WICT PROCEEDINGS, DECEMBER 2008 1 Meta-Functional Languages for Hardware Design and Verification of embedding hardware description lan- guages in general-purpose languages has been widely explored in the literature and has been shown to aid hardware design and verification. In this paper we ex- plore the use

  7. Using Sparse Representation for Fish Recognition and Verification in Real World Observation

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    Using Sparse Representation for Fish Recognition and Verification in Real World Observation Yi, Hsinchu, Taiwan Abstract - The purpose of this paper is to present an innovated fish recognition and verification method suited for the real world automatic underwater fish observation. Based on the fish

  8. MODELING AND VERIFICATION OF REAL-TIME AND CYBER-PHYSICAL SYSTEMS

    E-Print Network [OSTI]

    Gupta, Gopal

    MODELING AND VERIFICATION OF REAL-TIME AND CYBER-PHYSICAL SYSTEMS by Neda Saeedloei APPROVED Copyright 2011 Neda Saeedloei All Rights Reserved #12;To my mother. #12;MODELING AND VERIFICATION OF REAL-TIME AND CYBER-PHYSICAL SYSTEMS by NEDA SAEEDLOEI, B.S., M.S. DISSERTATION Presented to the Faculty

  9. HARVARD UNIVERSITY VENDOR JUSTIFICATION/PRICE VERIFICATION FORM TUB AND ORG NAME: ___________________________ACCT.CODE:________________________________________________________DATE:_______

    E-Print Network [OSTI]

    Xie, Xiaoliang Sunney

    HARVARD UNIVERSITY VENDOR JUSTIFICATION/PRICE VERIFICATION FORM TUB AND ORG NAME (please check one) The Federal Government requires vendor selection justification and price verification, blanket orders) complete Section B and Section C. GGRRAANNTTSS $2,500-$9,999 OMB A-110 requires price

  10. Comments for A Conference on Verification in the 21st Century

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  11. Reactor physics verification of the MCNP6 unstructured mesh capability

    SciTech Connect (OSTI)

    Burke, T. P. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States); Kiedrowski, B. C.; Martz, R. L. [X-Computational Physics Division, Monte Carlo Codes Group, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Martin, W. R. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States)

    2013-07-01

    The Monte Carlo software package MCNP6 has the ability to transport particles on unstructured meshes generated from the Computed-Aided Engineering software Abaqus. Verification is performed using benchmarks with features relevant to reactor physics - Big Ten and the C5G7 computational benchmark. Various meshing strategies are tested and results are compared to reference solutions. Computational performance results are also given. The conclusions show MCNP6 is capable of producing accurate calculations for reactor physics geometries and the computational requirements for small lattice benchmarks are reasonable on modern computing platforms. (authors)

  12. ICDF Complex Waste Profile and Verification Sample Guidance

    SciTech Connect (OSTI)

    W. M. Heileson

    2006-10-01

    This guidance document will assist waste generators who characterize waste streams destined for disposal at the Idaho Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) Disposal Facility (ICDF) Complex. The purpose of this document is to develop a conservative but appropriate way to (1) characterize waste for entry into the ICDF; (2) ensure compliance with the waste acceptance criteria; and (3) facilitate disposal at the ICDF landfill or evaporation pond. In addition, this document will establish the waste verification process used by ICDF personnel to ensure that untreated waste meets applicable ICDF acceptance limits

  13. Transforming PLC Programs into Formal Models for Verification Purposes

    E-Print Network [OSTI]

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  14. Digital data storage systems, computers, and data verification methods

    DOE Patents [OSTI]

    Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A.

    2005-12-27

    Digital data storage systems, computers, and data verification methods are provided. According to a first aspect of the invention, a computer includes an interface adapted to couple with a dynamic database; and processing circuitry configured to provide a first hash from digital data stored within a portion of the dynamic database at an initial moment in time, to provide a second hash from digital data stored within the portion of the dynamic database at a subsequent moment in time, and to compare the first hash and the second hash.

  15. Sandia National Laboratories: Advanced Simulation Computing: Verification &

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcoming Release of the UniversityValidation Verification &

  16. Formal Specification and Verification of a Dataflow Processor Array \\Lambday Thomas A. Henzinger Xiaojun Liu Shaz Qadeer Sriram K. Rajamani

    E-Print Network [OSTI]

    Henzinger, Thomas A.

    and verification of the VGI parallel DSP chip [1], which contains 64 compute processors with ¸30K gates in each verification tools. However, the check can be decomposed using assume­guarantee reasoning. For VGI to decompose the verification problem of the VGI chip into smaller proof obliga­ tions that were discharged

  17. Developing Embedded/Real-Time and Cyber-Physical Systems: Functional Reactive Programming, RTL-based Formal Verification, Response Time

    E-Print Network [OSTI]

    Cheng, Albert M. K.

    , specification, modeling, scheduling, and formal verification of real- time, embedded, and cyber-physical systems-based Formal Verification, Response Time Analysis, and Power-Aware Scheduling Albert M. K. Cheng Real reactive programming, RTL (real-time logic)-based formal verification, response time analysis, and power

  18. Verification as a Foundation for Validation of a Nuclear Fuel Performance Code

    SciTech Connect (OSTI)

    J. D. Hales; S. R. Novascone; B. W. Spencer; R. L. Williamson; G. Pastore; D. M. Perez

    2014-09-01

    Complex multiphysics simulations such as nuclear fuel performance analysis are composed of many submodels used to describe specific phenomena. These phenomena include, as examples, the relationship between stress and strain, heat transfer across a gas gap, and mechanical contact. These submodels work in concert to simulate real-world events, like the behavior of a fuel rod in a reactor. If a simulation tool is able to represent real-world behavior, the tool is said to be validated. While much emphasis is rightly placed on validation, model verification may be undervalued. Verification involves showing that a model performs as intended, that it computes results consistent with its mathematical description. This paper explains the differences between verification and validation and shows how validation should be preceded by verification. Specific verification problems, including several specific to nuclear fuel analysis, are given. Validation results are also presented.

  19. Combining Space Geodesy, Seismology, and Geochemistry for Monitoring Verification and Accounting of CO2 in Sequestration Sites

    SciTech Connect (OSTI)

    Swart, Peter K.; Dixon, Tim

    2014-09-30

    A series of surface geophysical and geochemical techniques are tested in order to demonstrate and validate low cost approaches for Monitoring, Verification and Accounting (MVA) of the integrity of deep reservoirs for CO2 storage. These techniques are (i) surface deformation by GPS; ii) surface deformation by InSAR; iii) passive source seismology via broad band seismometers; and iv) soil gas monitoring with a cavity ring down spectrometer for measurement of CO2 concentration and carbon isotope ratio. The techniques were tested at an active EOR (Enhanced Oil Recovery) site in Texas. Each approach has demonstrated utility. Assuming Carbon Capture, Utilization and Storage (CCUS) activities become operational in the future, these techniques can be used to augment more expensive down-hole techniques.

  20. Standard practices for verification of speed for material testing machines

    E-Print Network [OSTI]

    American Society for Testing and Materials. Philadelphia

    2011-01-01

    1.1 These practices cover procedures and requirements for the calibration and verification of testing machine speed by means of standard calibration devices. This practice is not intended to be complete purchase specifications for testing machines. 1.2 These practices apply to the verification of the speed application and measuring systems associated with the testing machine, such as a scale, dial, marked or unmarked recorder chart, digital display, setting, etc. In all cases the buyer/owner/user must designate the speed-measuring system(s) to be verified. 1.3 These practices give guidance, recommendations, and examples, specific to electro-mechanical testing machines. The practice may also be used to verify actuator speed for hydraulic testing machines. 1.4 This standard cannot be used to verify cycle counting or frequency related to cyclic fatigue testing applications. 1.5 Since conversion factors are not required in this practice, either SI units (mm/min), or English [in/min], can be used as the standa...

  1. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    SciTech Connect (OSTI)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the genetic information associated with the various pathogens. In addition, it has been determined that a suitable information barrier could be applied to this technology when the verification regime has been defined. Finally, the report posits a path forward for additional development of information barriers in a biological weapons verification regime. This path forward has shown that a new analysis approach coined as Information Loss Analysis might need to be pursued so that a numerical understanding of how information can be lost in specific measurement systems can be achieved.

  2. Admissions Checklist for Degree Seeking U.S. Resident Aliens You can save a filled copy of this form on your computer by clicking on the icon on your browser.

    E-Print Network [OSTI]

    Texas at Arlington, University of

    Admissions Checklist for Degree Seeking U.S. Resident Aliens You can save a filled copy as quickly as possible to ensure timely processing. 5. [ ] Documentation verifying U.S. Resident Alien

  3. Inverse Load Calculation of Wind Turbine Support Structures - A Numerical Verification Using the Comprehensive Simulation Code FAST: Preprint (Revised)

    SciTech Connect (OSTI)

    Pahn, T.; Jonkman, J.; Rolges, R.; Robertson, A.

    2012-11-01

    Physically measuring the dynamic responses of wind turbine support structures enables the calculation of the applied loads using an inverse procedure. In this process, inverse means deriving the inputs/forces from the outputs/responses. This paper presents results of a numerical verification of such an inverse load calculation. For this verification, the comprehensive simulation code FAST is used. FAST accounts for the coupled dynamics of wind inflow, aerodynamics, elasticity and turbine controls. Simulations are run using a 5-MW onshore wind turbine model with a tubular tower. Both the applied loads due to the instantaneous wind field and the resulting system responses are known from the simulations. Using the system responses as inputs to the inverse calculation, the applied loads are calculated, which in this case are the rotor thrust forces. These forces are compared to the rotor thrust forces known from the FAST simulations. The results of these comparisons are presented to assess the accuracy of the inverse calculation. To study the influences of turbine controls, load cases in normal operation between cut-in and rated wind speed, near rated wind speed and between rated and cut-out wind speed are chosen. The presented study shows that the inverse load calculation is capable of computing very good estimates of the rotor thrust. The accuracy of the inverse calculation does not depend on the control activity of the wind turbine.

  4. Request for Alternative Activity for PLI Credit Last Name First Name M.I.

    E-Print Network [OSTI]

    Connors, Daniel A.

    Request for Alternative Activity for PLI Credit Full Name: Last Name First Name M.I. Email Address information for Coordinator of Program: Requesting Alternate Activity credit for which PLI Track (Choose one): Verification Information Email Address: College of Engineering Student Information Alternate Activity

  5. REPORT OF THE WORKSHOP ON NUCLEAR FACILITY DESIGN INFORMATION EXAMINATION AND VERIFICATION FOR SAFEGUARDS

    SciTech Connect (OSTI)

    Richard Metcalf; Robert Bean

    2009-10-01

    Executive Summary The International Atomic Energy Agency (IAEA) implements nuclear safeguards and verifies countries are compliant with their international nuclear safeguards agreements. One of the key provisions in the safeguards agreement is the requirement that the country provide nuclear facility design and operating information to the IAEA relevant to safeguarding the facility, and at a very early stage. , This provides the opportunity for the IAEA to verify the safeguards-relevant features of the facility and to periodically ensure that those features have not changed. The national authorities (State System of Accounting for and Control of Nuclear Material - SSAC) provide the design information for all facilities within a country to the IAEA. The design information is conveyed using the IAEA’s Design Information Questionnaire (DIQ) and specifies: (1) Identification of the facility’s general character, purpose, capacity, and location; (2) Description of the facility’s layout and nuclear material form, location, and flow; (3) Description of the features relating to nuclear material accounting, containment, and surveillance; and (4) Description of existing and proposed procedures for nuclear material accounting and control, with identification of nuclear material balance areas. The DIQ is updated as required by written addendum. IAEA safeguards inspectors examine and verify this information in design information examination (DIE) and design information verification (DIV) activities to confirm that the facility has been constructed or is being operated as declared by the facility operator and national authorities, and to develop a suitable safeguards approach. Under the Next Generation Safeguards Initiative (NGSI), the National Nuclear Security Administrations (NNSA) Office of Non-Proliferation and International Security identified the need for more effective and efficient verification of design information by the IAEA for improving international safeguards in the future. Consequently, the NNSA Office of International Regimes and Agreements (NA-243) sponsored a team of U.S. Department of Energy National Laboratory nuclear safeguards experts and technologists to conduct a workshop on methods and technologies for improving this activity, under the ASA-100 Advanced Safeguards Approaches Project. The workshop focused on reviewing and discussing the fundamental safeguards needs, and presented technology and/or methods that could potentially address those needs more effectively and efficiently. Conclusions and Recommendations for technology to enhance the performance of DIV inspections are presented by the workshop team.

  6. First-order finite satisfiability vs tree automata in safety verification

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2011-01-01

    In this paper we deal with verification of safety properties of term-rewriting systems. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel produced during successful verification provides with a concise description of the system invariant sufficient to demonstrate a specific safety property. We show the relative completeness of this approach with respect to the tree automata completion technique. On a set of examples taken from the literature we demonstrate the efficiency of finite model finding approach as well as its explanatory power.

  7. Review of Evaluation, Measurement and Verification Approaches Used to Estimate the Load Impacts and Effectiveness of Energy Efficiency Programs

    SciTech Connect (OSTI)

    Messenger, Mike; Bharvirkar, Ranjit; Golemboski, Bill; Goldman, Charles A.; Schiller, Steven R.

    2010-04-14

    Public and private funding for end-use energy efficiency actions is expected to increase significantly in the United States over the next decade. For example, Barbose et al (2009) estimate that spending on ratepayer-funded energy efficiency programs in the U.S. could increase from $3.1 billion in 2008 to $7.5 and 12.4 billion by 2020 under their medium and high scenarios. This increase in spending could yield annual electric energy savings ranging from 0.58% - 0.93% of total U.S. retail sales in 2020, up from 0.34% of retail sales in 2008. Interest in and support for energy efficiency has broadened among national and state policymakers. Prominent examples include {approx}$18 billion in new funding for energy efficiency programs (e.g., State Energy Program, Weatherization, and Energy Efficiency and Conservation Block Grants) in the 2009 American Recovery and Reinvestment Act (ARRA). Increased funding for energy efficiency should result in more benefits as well as more scrutiny of these results. As energy efficiency becomes a more prominent component of the U.S. national energy strategy and policies, assessing the effectiveness and energy saving impacts of energy efficiency programs is likely to become increasingly important for policymakers and private and public funders of efficiency actions. Thus, it is critical that evaluation, measurement, and verification (EM&V) is carried out effectively and efficiently, which implies that: (1) Effective program evaluation, measurement, and verification (EM&V) methodologies and tools are available to key stakeholders (e.g., regulatory agencies, program administrators, consumers, and evaluation consultants); and (2) Capacity (people and infrastructure resources) is available to conduct EM&V activities and report results in ways that support program improvement and provide data that reliably compares achieved results against goals and similar programs in other jurisdictions (benchmarking). The National Action Plan for Energy Efficiency (2007) presented commonly used definitions for EM&V in the context of energy efficiency programs: (1) Evaluation (E) - The performance of studies and activities aimed at determining the effects and effectiveness of EE programs; (2) Measurement and Verification (M&V) - Data collection, monitoring, and analysis associated with the calculation of gross energy and demand savings from individual measures, sites or projects. M&V can be a subset of program evaluation; and (3) Evaluation, Measurement, and Verification (EM&V) - This term is frequently seen in evaluation literature. EM&V is a catchall acronym for determining both the effectiveness of program designs and estimates of load impacts at the portfolio, program and project level. This report is a scoping study that assesses current practices and methods in the evaluation, measurement and verification (EM&V) of ratepayer-funded energy efficiency programs, with a focus on methods and practices currently used for determining whether projected (ex-ante) energy and demand savings have been achieved (ex-post). M&V practices for privately-funded energy efficiency projects (e.g., ESCO projects) or programs where the primary focus is greenhouse gas reductions were not part of the scope of this study. We identify and discuss key purposes and uses of current evaluations of end-use energy efficiency programs, methods used to evaluate these programs, processes used to determine those methods; and key issues that need to be addressed now and in the future, based on discussions with regulatory agencies, policymakers, program administrators, and evaluation practitioners in 14 states and national experts in the evaluation field. We also explore how EM&V may evolve in a future in which efficiency funding increases significantly, innovative mechanisms for rewarding program performance are adopted, the role of efficiency in greenhouse gas mitigation is more closely linked, and programs are increasingly funded from multiple sources often with multiple program administrators and in

  8. An Information Theoretic Location Verification System for Wireless Networks

    E-Print Network [OSTI]

    Yan, Shihao; Nevat, Ido; Peters, Gareth W

    2012-01-01

    As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No "malicious decision" to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, wh...

  9. Pulsar Magnetic Field Oscillation Model and Verification Method

    E-Print Network [OSTI]

    Zhu-Xing Liang; Yi Liang

    2014-05-06

    We constructed the magnetic field oscillation model (hereafter the MO model) by analogizing the periodically reversing phenomenon of the solar magnetic field to pulsars. Almost all kinds of pulsar radiation phenomena are best explained using the MO model, especially polarization characteristics, glitch, generation rate, the geodetic precession of pulsars and the configuration of pulsar-wind nebula of the Crab. The MO model also provides satisfactory explanation for other characteristics of pulsars, e.g., interpulse, spin-down, pulse nulling, beat and pulse drift, the loss rate of the rotating energy, and the accuracy of frequency. We present eight verification methods for the MO model. In addition to pulsars, our MO model can also be used to explain the pulse emission from non-compact stars such as the ultracool dwarf TVLM 513-46546 and the magnetic chemically peculiar star CU Virginis.

  10. Shell Element Verification & Regression Problems for DYNA3D

    SciTech Connect (OSTI)

    Zywicz, E

    2008-02-01

    A series of quasi-static regression/verification problems were developed for the triangular and quadrilateral shell element formulations contained in Lawrence Livermore National Laboratory's explicit finite element program DYNA3D. Each regression problem imposes both displacement- and force-type boundary conditions to probe the five independent nodal degrees of freedom employed in the targeted formulation. When applicable, the finite element results are compared with small-strain linear-elastic closed-form reference solutions to verify select aspects of the formulations implementation. Although all problems in the suite depict the same geometry, material behavior, and loading conditions, each problem represents a unique combination of shell formulation, stabilization method, and integration rule. Collectively, the thirty-six new regression problems in the test suite cover nine different shell formulations, three hourglass stabilization methods, and three families of through-thickness integration rules.

  11. Scope and verification of a Fissile Material (Cutoff) Treaty

    SciTech Connect (OSTI)

    Hippel, Frank N. von [Program on Science and Global Security, Princeton University, 221 Nassau St., 2nd floor, Princeton, NJ 08542 (United States)

    2014-05-09

    A Fissile Material Cutoff Treaty (FMCT) would ban the production of fissile material - in practice highly-enriched uranium and separated plutonium - for weapons. It has been supported by strong majorities in the United Nations. After it comes into force, newly produced fissile materials could only be produced under international - most likely International Atomic Energy Agency - monitoring. Many non-weapon states argue that the treaty should also place under safeguards pre-existing stocks of fissile material in civilian use or declared excess for weapons so as to make nuclear-weapons reductions irreversible. This paper discusses the scope of the FMCT, the ability to detect clandestine production and verification challenges in the nuclear-weapons states.

  12. Battery Technology Life Verification Test Manual Revision 1

    SciTech Connect (OSTI)

    Jon P. Christophersen

    2012-12-01

    The purpose of this Technology Life Verification Test (TLVT) Manual is to help guide developers in their effort to successfully commercialize advanced energy storage devices such as battery and ultracapacitor technologies. The experimental design and data analysis discussed herein are focused on automotive applications based on the United States Advanced Battery Consortium (USABC) electric vehicle, hybrid electric vehicle, and plug-in hybrid electric vehicle (EV, HEV, and PHEV, respectively) performance targets. However, the methodology can be equally applied to other applications as well. This manual supersedes the February 2005 version of the TLVT Manual (Reference 1). It includes criteria for statistically-based life test matrix designs as well as requirements for test data analysis and reporting. Calendar life modeling and estimation techniques, including a user’s guide to the corresponding software tool is now provided in the Battery Life Estimator (BLE) Manual (Reference 2).

  13. ITOUGH2 V3.2 verification and validation report

    SciTech Connect (OSTI)

    Finsterle, S.

    1998-06-01

    This report describes the Verification and Validation (V and V) test cases performed to qualify ITOUGH2 V3.2. ITOUGH2 V3.2 was installed in a directory {approximately}/itough2v3.2 on a SUN ULTRA 1 workstation under UNIX Solaris 2. Instructions for installing ITOUGH2 can be found in file read.me and the user`s manual. This report is structured as follows: for each functional requirement, the corresponding design is described, which may include the mathematical model implemented in ITOUGH2 V3.2, if appropriate. Next, the author discusses the test case or sequence of test cases performed to validate each requirement, followed by a description of the test results and their compliance with the acceptance criteria. ITOUGH2 simulates fluid flow in fractures.

  14. Global climate change mitigation and sustainable forest management--The challenge of monitoring and verification

    SciTech Connect (OSTI)

    Makundi, Willy R.

    1997-12-31

    In this paper, sustainable forest management is discussed within the historical and theoretical framework of the sustainable development debate. The various criteria and indicators for sustainable forest management put forth by different institutions are critically explored. Specific types of climate change mitigation policies/projects in the forest sector are identified and examined in the light of the general criteria for sustainable forest management. Areas of compatibility and contradiction between the climate mitigation objectives and the minimum criteria for sustainable forest management are identified and discussed. Emphasis is put on the problems of monitoring and verifying carbon benefits associated with such projects given their impacts on pre-existing policy objectives on sustainable forest management. The implications of such policy interactions on assignment of carbon credits from forest projects under Joint Implementation/Activities Implemented Jointly initiatives are discussed. The paper concludes that a comprehensive monitoring and verification regime must include an impact assessment on the criteria covered under other agreements such as the Biodiversity and/or Desertification Conventions. The actual carbon credit assigned to a specific project should at least take into account the negative impacts on the criteria for sustainable forest management. The value of the impacts and/or the procedure to evaluate them need to be established by interested parties such as the Councils of the respective Conventions.

  15. Under consideration for publication in Formal Aspects of Computing Concurrent Software Verification with

    E-Print Network [OSTI]

    Ouaknine, Joël

    , Oxford, UK Abstract. We present a framework for model checking concurrent software systems which powerful verification techniques, counterexample-guided abstraction refinement and compositional reasoning with hardware and communication proto- cols, model checking is increasingly used to verify software systems

  16. U.S. EPA Environmental Technology Verification (ETV) Program Advanced Monitoring Systems (AMS) Center

    E-Print Network [OSTI]

    for verification of water monitoring technologies: #12;2 Evaluation of Nitrate Sensors for Groundwater Remediation interested in testing. Oklahoma Department of Agriculture has sites for the nitrate sensor evaluation

  17. Independent Verification Survey Report for the Operable Unit-1 Miamisburg Closure Project, Miamisburg, OH

    SciTech Connect (OSTI)

    Weaver, P.

    2008-03-17

    The objectives of the independent verification survey were to confirm that remedial actions have been effective in meeting established release criteria and that documentation accurately and adequately describes the current radiological and chemical conditions of the MCP site.

  18. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOE Patents [OSTI]

    Foo Kune, Denis (Saint Paul, MN); Mahadevan, Karthikeyan (Mountain View, CA)

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  19. Revisiting the security of speaker verification systems against imposture using synthetic speech 

    E-Print Network [OSTI]

    De Leon, P. L.; Apsingekar, V. R.; Pucher, M.; Yamagishi, Junichi

    2010-01-01

    In this paper, we investigate imposture using synthetic speech. Although this problem was first examined over a decade ago, dramatic improvements in both speaker verification (SV) and speech synthesis have renewed ...

  20. Field Scale Test and Verification of CHP System at the Ritz Carlton, San Francisco, August 2007

    Broader source: Energy.gov [DOE]

    ITP Industrial Distributed Energy: National Account Energy Alliance Final Report for the Field Scale Test and Verification of a PureComfort® 240M Combined Heat and Power System at the Ritz Carlton, San Francisco

  1. A Platform Architecture for Sensor Data Processing and Verification in Buildings

    E-Print Network [OSTI]

    Ortiz, Jorge Jose

    2013-01-01

    Functionality and Metadata 6.1 Verification through Sensorinformation such as the metadata of sensors. The labels “A-of SBS using the sensor metadata (i.e. device types and

  2. A Platform Architecture for Sensor Data Processing and Verification in Buildings

    E-Print Network [OSTI]

    Ortiz, Jorge Jose

    2013-01-01

    associated metadata for each sensor in the building. TheseMetadata Verification through Sensor Data Every system that manages data in the buildingAND METADATA Building Todai KETI No. Sensors No. Types

  3. Software verification and validation for commercial statistical packages utilized by the statistical consulting section of SRTC

    SciTech Connect (OSTI)

    Edwards, T.B.

    2000-03-22

    The purpose of this report is to provide software verification and validation for the statistical packages used by the Statistical Consulting Section (SCS) of the Savannah River Technology Center. The need for this verification and validation stems from the requirements of the Quality Assurance programs that are frequently applicable to the work conducted by SCS. The IBM Personal Computer 300PL and 300XL are both Pentium II based desktops. Therefore the software verification and validation in this report is valid interchangeably between both platforms. As new computing platforms, statistical packages, or revisions to existing packages are reevaluated using these new tools, this report is to be revised to address their verification and validation.

  4. Application of functional learning to ATPG and design verification for combinational circuits 

    E-Print Network [OSTI]

    Mukherjee, Rajarshim

    1994-01-01

    to detect faults and in detecting redundant faults. Learning techniques have also been effectively applied to the problem of design verification for combinational circuits. This paper presents Functional Learning, a new method of learning, based...

  5. Memory Usage Verification for OO Programs Wei-Ngan Chin1,2

    E-Print Network [OSTI]

    Rinard, Martin

    to precisely capture these correlations. C. Hankin and I. Siveroni (Eds.): SAS 2005, LNCS 3672, pp. 70­86, 2005. c Springer-Verlag Berlin Heidelberg 2005 #12;Memory Usage Verification for OO Programs 71 ­ Heap

  6. Draft M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0)

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal, state, and local government energy managers and procurement officials and utility and energy service providers.

  7. M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 3.0)

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  8. Better Buildings Alliance, Advanced Rooftop Unit Campaign: Rooftop Unit Measurement and Verification (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-09-01

    This document provides facility managers and building owners an introduction to measurement and verification (M&V) methods to estimate energy and cost savings of rooftop units replacement or retrofit projects to estimate paybacks or to justify future projects.

  9. Investigating Correlated Neutrons from Pulsed Photonuclear Interrogation for Treaty Verification Applications 

    E-Print Network [OSTI]

    Stewart, Scott

    2013-06-03

    support future U.S. verification missions. A technology employing pulses of high-energy photons from an electron linear accelerator is one technique under consideration. High-energy photons are advantageous as an interrogation source because they penetrate...

  10. Conditions Affecting the Relationship between Power and Identity Verification in Power Imbalanced Dyads 

    E-Print Network [OSTI]

    Davis, Jennifer 1983-

    2012-12-10

    In the present study, I look at the relationship between power and identity verification and the conditions under which this relationship can be disrupted. Specifically, I look at the role of information in disrupting power differences within...

  11. POSTER: Secure Path Verification using Mobility-Differentiated ToA

    E-Print Network [OSTI]

    Lenders, Vincent

    POSTER: Secure Path Verification using Mobility-Differentiated ToA Matthias Schäfer Vincent Lenders@cs.uni-kl.de vincent.lenders@armasuisse.ch jschmitt@cs.uni-kl.de ABSTRACT In this poster, we generalize the problem

  12. Independent Verification and Validation Of SAPHIRE 8 Software Acceptance Test Plan Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-03-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE 8 Software Acceptance Test Plan is to assess the approach to be taken for intended testing activities. The plan typically identifies the items to be tested, the requirements being tested, the testing to be performed, test schedules, personnel requirements, reporting requirements, evaluation criteria, and any risks requiring contingency planning. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production.

  13. Independent Verification and Validation Of SAPHIRE 8 Software Configuration Management Plan Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2009-10-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE configuration management is to assess the activities that results in the process of identifying and defining the baselines associated with the SAPHIRE software product; controlling the changes to baselines and release of baselines throughout the life cycle; recording and reporting the status of baselines and the proposed and actual changes to the baselines; and verifying the correctness and completeness of baselines.. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production.

  14. Independent Verification and Validation Of SAPHIRE 8 Software Quality Assurance Plan Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-03-01

    This report provides an evaluation of the Software Quality Assurance Plan. The Software Quality Assurance Plan is intended to ensure all actions necessary for the software life cycle; verification and validation activities; documentation and deliverables; project management; configuration management, nonconformance reporting and corrective action; and quality assessment and improvement have been planned and a systematic pattern of all actions necessary to provide adequate confidence that a software product conforms to established technical requirements; and to meet the contractual commitments prepared by the sponsor; the Nuclear Regulatory Commission.

  15. Independent Verification and Validation Of SAPHIRE 8 Software Configuration Management Plan Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-02-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE configuration management is to assess the activities that results in the process of identifying and defining the baselines associated with the SAPHIRE software product; controlling the changes to baselines and release of baselines throughout the life cycle; recording and reporting the status of baselines and the proposed and actual changes to the baselines; and verifying the correctness and completeness of baselines.. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production.

  16. Independent Verification and Validation Of SAPHIRE 8 Software Quality Assurance Plan Project Number: N6423 U.S. Nuclear Regulatory Commission

    SciTech Connect (OSTI)

    Kent Norris

    2010-02-01

    This report provides an evaluation of the Software Quality Assurance Plan. The Software Quality Assurance Plan is intended to ensure all actions necessary for the software life cycle; verification and validation activities; documentation and deliverables; project management; configuration management, nonconformance reporting and corrective action; and quality assessment and improvement have been planned and a systematic pattern of all actions necessary to provide adequate confidence that a software product conforms to established technical requirements; and to meet the contractual commitments prepared by the sponsor; the Nuclear Regulatory Commission.

  17. Design of a Direct-Modulation Transmitter with Self-Optimizing Feedback and a Highly Linear, Highly Reconfigurable, Continuously-Tunable Active-RC Baseband Filter for Multiple Standards 

    E-Print Network [OSTI]

    Amir Aslanzadeh Mamaghani, Hesam

    2012-02-14

    , power-adjustable Active-RC filter for multiple standards. The design, analysis, and experimental verification of a proposed self-calibrating, current reused 2.4GHz, direct-modulation transmitter are introduced. A stacked arrangement of the power...

  18. Review of Evaluation, Measurement and Verification Approaches Used to Estimate the Load Impacts and Effectiveness of Energy Efficiency Programs

    SciTech Connect (OSTI)

    none,

    2012-04-01

    Provides an overview of evaluation, measurement, and verification approaches used to estimate the load impacts and effectiveness of energy efficiency programs.

  19. Comment submitted by the Air Conditioning, Heating and Refrigeration Institute (AHRI) regarding the Energy Star Verification Testing Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document is a comment submitted by the Air Conditioning, Heating and Refrigeration Institute (AHRI) regarding the Energy Star Verification Testing Program

  20. Comment submitted by the North American Association of Food Equipment Manufacturers (NAFEM) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the North American Association of Food Equipment Manufacturers (NAFEM) regarding the Energy Star Verification Testing Program