Sample records for verification sections address

  1. ADDRESSING PROCESS PLANNING AND VERIFICATION ISSUES WITH MTCONNECT

    E-Print Network [OSTI]

    Vijayaraghavan, Athulan; Dornfeld, David; Artisanal Software; Remmele Engineering Inc.

    2009-01-01T23:59:59.000Z

    Surfaces in the Cybercut Process Planning Pipeline”, Trans.ADDRESSING PROCESS PLANNING AND VERIFICATION ISSUES WITHInc. Big Lake, MN KEYWORDS Process planning verification,

  2. addressing verification challenges: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kulyukin Computer Technologies and Information Sciences Websites Summary: A Cartesian Robot for RFID Signal Distribution Model Verification Aliasgar Kutiyanawala Vladimir (PRF)...

  3. Address:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 IntroductionActinideAddingAddress: ~~. . ~L~

  4. Verification study of thorium cross section in MVP calculation of thorium based fuel core using experimental data

    SciTech Connect (OSTI)

    Mai, V. T.; Fujii, T.; Wada, K.; Kitada, T. [Osaka Univ., 2-1, Yamadaoka, Suita-shi, Osaka 565-0871 (Japan); Takaki, N.; Yamaguchi, A.; Watanabe, H. [Tokai Univ., 4-1-1 Kitakaname, Hiratsuka-shi, Kanagawa, 259-1292 (Japan); Unesaki, H. [Kyoto Univ. Research Reactor Inst., Asahiro-nishi, Kumatori-cho, Sennan-gun, Osaka 590-0494 (Japan)

    2012-07-01T23:59:59.000Z

    Considering the importance of thorium data and concerning about the accuracy of Th-232 cross section library, a series of experiments of thorium critical core carried out at KUCA facility of Kyoto Univ. Research Reactor Inst. have been analyzed. The core was composed of pure thorium plates and 93% enriched uranium plates, solid polyethylene moderator with hydro to U-235 ratio of 140 and Th-232 to U-235 ratio of 15.2. Calculations of the effective multiplication factor, control rod worth, reactivity worth of Th plates have been conducted by MVP code using JENDL-4.0 library [1]. At the experiment site, after achieving the critical state with 51 fuel rods inserted inside the reactor, the measurements of the reactivity worth of control rod and thorium sample are carried out. By comparing with the experimental data, the calculation overestimates the effective multiplication factor about 0.90%. Reactivity worth of the control rods evaluation using MVP is acceptable with the maximum discrepancy about the statistical error of the measured data. The calculated results agree to the measurement ones within the difference range of 3.1% for the reactivity worth of one Th plate. From this investigation, further experiments and research on Th-232 cross section library need to be conducted to provide more reliable data for thorium based fuel core design and safety calculation. (authors)

  5. Verification of Allowable Stresses In ASME Section III Subsection NH For Grade 91 Steel & Alloy 800H

    SciTech Connect (OSTI)

    R. W. Swindeman; M. J. Swindeman; B. W. Roberts; B. E. Thurgood; D. L. Marriott

    2007-11-30T23:59:59.000Z

    The database for the creep-rupture of 9Cr-1Mo-V (Grade 91) steel was collected and reviewed to determine if it met the needs for recommending time-dependent strength values, S{sub t}, for coverage in ASME Section III Subsection NH (ASME III-NH) to 650 C (1200 F) and 600,000 hours. The accumulated database included over 300 tests for 1% total strain, nearly 400 tests for tertiary creep, and nearly 1700 tests to rupture. Procedures for analyzing creep and rupture data for ASME III-NH were reviewed and compared to the procedures used to develop the current allowable stress values for Gr 91 for ASME II-D. The criteria in ASME III-NH for estimating S{sub t} included the average strength for 1% total strain for times to 600,000 hours, 80% of the minimum strength for tertiary creep for times to 600,000 hours, and 67% of the minimum rupture strength values for times to 600,000 hours. Time-temperature-stress parametric formulations were selected to correlate the data and make predictions of the long-time strength. It was found that the stress corresponding to 1% total strain and the initiation of tertiary creep were not the controlling criteria over the temperature-time range of concern. It was found that small adjustments to the current values in III-NH could be introduced but that the existing values were conservative and could be retained. The existing database was found to be adequate to extend the coverage to 600,000 hours for temperatures below 650 C (1200 F).

  6. Verification Checklist Home Address: City: State: Zip:

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    completed. o o HVAC System Quality Installation Rater Checklist completed. o o Moisture Control 1.1 Drain or sump pump installed in basements and crawlspaces (Exception:...

  7. Verification and validation benchmarks.

    SciTech Connect (OSTI)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01T23:59:59.000Z

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

  8. INTERIM REPORT--INDEPENDENT VERIFICATION SURVEY OF SECTION 3, SURVEY UNITS 1, 4 AND 5 EXCAVATED SURFACES, WHITTAKER CORPORATION, REYNOLDS INDUSTRIAL PARK, TRANSFER, PENNSYLVANIA DCN: 5002-SR-04-0"

    SciTech Connect (OSTI)

    ADAMS, WADE C

    2013-04-18T23:59:59.000Z

    At Pennsylvania Department of Environmental Protection's request, ORAU's IEAV program conducted verification surveys on the excavated surfaces of Section 3, SUs 1, 4, and 5 at the Whittaker site on March 13 and 14, 2013. The survey activities included visual inspections, gamma radiation surface scans, gamma activity measurements, and soil sampling activities. Verification activities also included the review and assessment of the licensee?s project documentation and methodologies. Surface scans identified four areas of elevated direct gamma radiation distinguishable from background; one area within SUs 1 and 4 and two areas within SU5. One area within SU5 was remediated by removing a golf ball size piece of slag while ORAU staff was onsite. With the exception of the golf ball size piece of slag within SU5, a review of the ESL Section 3 EXS data packages for SUs 1, 4, and 5 indicated that these locations of elevated gamma radiation were also identified by the ESL gamma scans and that ESL personnel performed additional investigations and soil sampling within these areas. The investigative results indicated that the areas met the release criteria.

  9. Technical challenges for dismantlement verification

    SciTech Connect (OSTI)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-11-01T23:59:59.000Z

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion.

  10. Introduction Verification

    E-Print Network [OSTI]

    Kuhn, Matthew R.

    Introduction Model Verification Entropy model for granular materials at the critical state Matthew at the critical state. 2D materials only. Biaxial loading conditions. Six contact quantities Objective: Contact forces, movements, and orientations at the critical state. 2D materials only. Biaxial loading

  11. EPA -- Addressing Children's Health through Reviews Conducted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act EPA -- Addressing Children's Health...

  12. Monitoring and verification R&D

    SciTech Connect (OSTI)

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01T23:59:59.000Z

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  13. Model Verification and Validation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1 SECTION A.Model Verification and Validation Engineering

  14. Design for manufacturability Design verification

    E-Print Network [OSTI]

    Patel, Chintan

    -digital effects · Heterogeneous systems · Analog-Mixed signal · Soft failures · Verification for redundancy #12; · Robustness · Verification metrics · Software · Reuse · Specialized verification methodology · Specialized

  15. TFE Verification Program

    SciTech Connect (OSTI)

    Not Available

    1993-05-01T23:59:59.000Z

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE (thermionic fuel element) suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern.

  16. Verification Challenges at Low Numbers

    SciTech Connect (OSTI)

    Benz, Jacob M.; Booker, Paul M.; McDonald, Benjamin S.

    2013-06-01T23:59:59.000Z

    Many papers have dealt with the political difficulties and ramifications of deep nuclear arms reductions, and the issues of “Going to Zero”. Political issues include extended deterrence, conventional weapons, ballistic missile defense, and regional and geo-political security issues. At each step on the road to low numbers, the verification required to ensure compliance of all parties will increase significantly. Looking post New START, the next step will likely include warhead limits in the neighborhood of 1000 . Further reductions will include stepping stones at1000 warheads, 100’s of warheads, and then 10’s of warheads before final elimination could be considered of the last few remaining warheads and weapons. This paper will focus on these three threshold reduction levels, 1000, 100’s, 10’s. For each, the issues and challenges will be discussed, potential solutions will be identified, and the verification technologies and chain of custody measures that address these solutions will be surveyed. It is important to note that many of the issues that need to be addressed have no current solution. In these cases, the paper will explore new or novel technologies that could be applied. These technologies will draw from the research and development that is ongoing throughout the national laboratory complex, and will look at technologies utilized in other areas of industry for their application to arms control verification.

  17. Fuel Retrieval System Design Verification Report

    SciTech Connect (OSTI)

    GROTH, B.D.

    2000-04-11T23:59:59.000Z

    The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway. Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR). A Design Verification Status Questionnaire, Table 1, is included which addresses Corrective Action SNF-EG-MA-EG-20000060, Item No.9 (Miller 2000).

  18. Nuclear Data Verification and Standardization

    SciTech Connect (OSTI)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01T23:59:59.000Z

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  19. Verification Testing Test Driven Development Testing with JUnit Verification

    E-Print Network [OSTI]

    Peters, Dennis

    Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

  20. Results of the independent radiological verification survey at the former Bridgeport Brass Company Facility, Seymour, Connecticut (SSC001)

    SciTech Connect (OSTI)

    Foley, R.D.; Rice, D.E.; Allred, J.F.; Brown, K.S.

    1995-03-01T23:59:59.000Z

    At the request of the USDOE, a team from ORNL conducted an independent radiological verification survey at the former Bridgeport Brass Company Facility, Seymour, Connecticut, from September 1992 to March 1993. Purpose of the survey was to determine whether residual levels of radioactivity inside the Ruffert Building and selected adjacent areas were rmediated to levels below DOE guidelines for FUSRAP sites. The property was contaminated with radioactive residues of {sup 238}U from uranium processing experiments conducted by Reactive Metals, Inc., from 1962 to 1964 for the Atomic Energy Commission. A previous radiological survey did not characterize the entire floor space because equipment which could not be moved at the time made it inaccessible for radiological surveys. During the remediation process, additional areas of elevated radioactivity were discovered under stationary equipment, which required additional remediation and further verification. Results of the independent radiological verification survey confirm that, with the exception of the drain system inside the building, residual uranium contamination has been remediated to levels below DOE guidelines for unrestricted release of property at FUSRAP sites inside and outside the Ruffert Building. However, certain sections of the drain system retain uranium contamination above DOE surface guideline levels. These sections of pipe are addressed in separate, referenced documentation.

  1. University of Massachusetts Amherst Measurement & Verification Guidelines

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    University of Massachusetts Amherst Measurement & Verification Guidelines & Template Plan 11 ..............................................................................................................1 UMASS AMHERST MEASUREMENT & VERIFICATION (M&V) GUIDELINES ..........3 PREFACE ....................................................................................................................................................................3 BENEFITS OF MEASUREMENT & VERIFICATION

  2. Carbon Storage Monitoring, Verification and Accounting Research...

    Office of Environmental Management (EM)

    Monitoring, Verification and Accounting Research Carbon Storage Monitoring, Verification and Accounting Research Reliable and cost-effective monitoring, verification and accounting...

  3. Voltage verification unit

    DOE Patents [OSTI]

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15T23:59:59.000Z

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  4. Verification of RADTRAN

    SciTech Connect (OSTI)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-12-31T23:59:59.000Z

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes.

  5. Conceptual design. Final report: TFE Verification Program

    SciTech Connect (OSTI)

    Not Available

    1994-03-01T23:59:59.000Z

    This report documents the TFE Conceptual Design, which provided the design guidance for the TFE Verification program. The primary goals of this design effort were: (1) establish the conceptual design of an in-core thermionic reactor for a 2 Mw(e) space nuclear power system with a 7-year operating lifetime; (2) demonstrate scalability of the above concept over the output power range of 500 kW(e) to 5 MW(e); and (3) define the TFE which is the basis for the 2 MW (e) reactor design. This TFE specification provided the basis for the test program. These primary goals were achieved. The technical approach taking in the conceptual design effort is discussed in Section 2, and the results are discussed in Section 3. The remainder of this introduction draws a perspective on the role that this conceptual design task played in the TFE Verification Program.

  6. Environmental Technology Verification of Mobile Sources Control...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Technology Verification of Mobile Sources Control Technologies Environmental Technology Verification of Mobile Sources Control Technologies 2005 Diesel Engine...

  7. Electric Utility Measurement & Verification Program

    E-Print Network [OSTI]

    Lau, K.; Henderson, G.; Hebert, D.

    Electric Utility Measurement & Verification Program Ken Lau, P.Eng., CMVP Graham Henderson, P.Eng., CMVP Dan Hebert, P.Eng.,CMVP Mgr, Measurement & Verification Engineering Team Leader Senior Engineer BC Hydro Burnaby, BC Canada...

  8. MULTIVESSEL BATCH DISTILLATION EXPERIMENTAL VERIFICATION

    E-Print Network [OSTI]

    Skogestad, Sigurd

    MULTIVESSEL BATCH DISTILLATION ­ EXPERIMENTAL VERIFICATION Bernd Wittgens and Sigurd Skogestad 1 The experimental verification of the operation of a multivessel batch distillation column, operated under total vessels, provides a generalization of previously proposed batch distillation schemes. We propose a simple

  9. Nuclear disarmament verification

    SciTech Connect (OSTI)

    DeVolpi, A.

    1993-12-31T23:59:59.000Z

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  10. HEATING6 verification

    SciTech Connect (OSTI)

    Bryan, C.B.; Childs, K.W.; Giles, G.E.

    1986-12-01T23:59:59.000Z

    The HEATING series of general purpose, finite-difference, conduction heat transfer codes have been in use for many years. During this time the codes have been used extensively, and a general confidence has been developed in regard to their accuracy. However, there has never been a formal verification in a published, citable document. This report documents just such a verification study for the latest code in the HEATING series, HEATING6. This study confirms that HEATING6 is capable of producing accurate results for a large class of heat transfer problems. 11 refs., 170 figs., 82 tabs.

  11. Environmental Technology Verification Program

    E-Print Network [OSTI]

    Activities.................4 Table 2.0 Records Management Responsibilities for the MMR CenterEnvironmental Technology Verification Program Quality Management Plan (QMP) for the ETV Materials Management and Remediation Center Version 1.0 #12;QUALITY MANAGEMENT PLAN (QMP) for the ETV MATERIALS

  12. Architecture AddressingModes

    E-Print Network [OSTI]

    Nguyen, Dat H.

    MIPS R2000 Architecture and Assembly (Part 1) 1. CPU Registers 2. Byte Order 3. AddressingModes 4­endian byte order 3 2 1 0 0 1 2 3 Or Byte number #12; AddressingModes . MIPS is a load/store architecture . RICS -- Load/Store architecture -- All instructions have equal length of 4 bytes -- Every register can

  13. Addressing Genetics Delivering Health

    E-Print Network [OSTI]

    Rambaut, Andrew

    Addressing Genetics Delivering Health A strategy for advancing the dissemination and application of genetics knowledge throughout our health professions Funded by Hilary Burton September 2003 Executive education of health workers q providing strategic overview of education programme q collaborating

  14. On Incremental Quantitative Verification for Probabilistic Systems

    E-Print Network [OSTI]

    Oxford, University of

    . Quantitative verification is an automated method to establish quantitative properties of a system model, non- probabilistic verification, which, in addition to exhaustive exploration of a system modelOn Incremental Quantitative Verification for Probabilistic Systems Marta Kwiatkowska, David Parker

  15. EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________

    E-Print Network [OSTI]

    Bolding, M. Chad

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment Department__________________________________________________ Employment Position

  16. Converter performance TFE Verification Program. Final test report

    SciTech Connect (OSTI)

    Not Available

    1994-03-01T23:59:59.000Z

    This report details TFE Verification Program, the objective, of which is to demonstrate the technology readiness of a TFE suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program built directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addressed that concern.

  17. Organics Verification Study for Sinclair and Dyes Inlets, Washington

    SciTech Connect (OSTI)

    Kohn, Nancy P.; Brandenberger, Jill M.; Niewolny, Laurie A.; Johnston, Robert K.

    2006-09-28T23:59:59.000Z

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. Because significant cleanup and source control activities have been conducted in the inlets since the data supporting the 1998 303(d) listings were collected, two verification studies were performed to address the 303(d) segments that were listed for metal and organic contaminants in marine sediment. The Metals Verification Study (MVS) was conducted in 2003; the final report, Metals Verification Study for Sinclair and Dyes Inlets, Washington, was published in March 2004 (Kohn et al. 2004). This report describes the Organics Verification Study that was conducted in 2005. The study approach was similar to the MVS in that many surface sediment samples were screened for the major classes of organic contaminants, and then the screening results and other available data were used to select a subset of samples for quantitative chemical analysis. Because the MVS was designed to obtain representative data on concentrations of contaminants in surface sediment throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, aliquots of the 160 MVS sediment samples were used in the analysis for the Organics Verification Study. However, unlike metals screening methods, organics screening methods are not specific to individual organic compounds, and are not available for some target organics. Therefore, only the quantitative analytical results were used in the organics verification evaluation. The results of the Organics Verification Study showed that sediment quality outside of Sinclair Inlet is unlikely to be impaired because of organic contaminants. Similar to the results for metals, in Sinclair Inlet, the distribution of residual organic contaminants is generally limited to nearshore areas already within the actively managed Puget Sound Naval Shipyard and Intermediate Maintenance Facility Superfund Site, where further source-control actions and monitoring are under way.

  18. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  19. Software Verification and Validation Procedure

    SciTech Connect (OSTI)

    Olund, Thomas S.

    2008-09-15T23:59:59.000Z

    This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

  20. ORISE: Independent verification

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparencyDOE ProjectCrisisIndependent verification ORISE

  1. Current address: Samuel Johnson

    E-Print Network [OSTI]

    Johnson, Samuel

    CV: E-mail : Homepage: Current address: Samuel Johnson samuel.johnson@imperial.ac.uk www. #12;Submitted work 1. The meaning of niche: Cause or consequence of food-web structure?, S. Johnson, V learning, S. Johnson, J. Marro, and J.J. Torres, PLoS ONE 8(1): e50276 (2013) 3. Enhancing neural network

  2. Comments for A Conference on Verification in the 21st Century

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-06-12T23:59:59.000Z

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  3. Learning Minimal Separating DFA's for Compositional Verification

    E-Print Network [OSTI]

    Clarke, Edmund M.

    version is evaluated on the LTSA benchmarks and compared with other automated com- positional verification

  4. Excerpts from keynote address

    SciTech Connect (OSTI)

    Creel, G.C.

    1995-06-01T23:59:59.000Z

    Excerpts from the keynote principally address emissions issues in the fossil power industry as related to heat rate improvements. Stack emissions of both sulfur and nitrogen oxides are discussed, and a number of examples are given: (1) PEPCO`s Potomac River Station, and (2) Morgantown station`s NOX reduction efforts. Circulating water emissions are also briefly discussed, as are O & M costs of emission controls.

  5. Addressing Common Subsurface Challenges

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartmentDepartment of2 ofEmergencyAcrobat PDFMakerAdamAddressing Common

  6. Addressing Big Data

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 IntroductionActinideAddingAddress: ~~. . ~L~Big Data

  7. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    SciTech Connect (OSTI)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01T23:59:59.000Z

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  8. Runtime verification for stochastic systems

    E-Print Network [OSTI]

    Wilcox, Cristina M

    2010-01-01T23:59:59.000Z

    We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

  9. Software Modeling and Verification Professors

    E-Print Network [OSTI]

    Ábrahám, Erika

    Software Modeling and Verification Staff · Professors Prof. Dr. Ir. Joost-Pieter Katoen Prof. em) Mark Timmer (Uni Twente, NL) Dr. Olga Tveretina (Karlsruhe University, D) Ralf Wimmer (Universität

  10. EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________

    E-Print Network [OSTI]

    Bolding, M. Chad

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment Department_ Clemson University ________________________________ Employment Posn Title

  11. Generation of RTL verification input stimulus

    E-Print Network [OSTI]

    Selvarathinam, Anand Manivannan

    2001-01-01T23:59:59.000Z

    This thesis presents an approach for generating input stimulus for verification of register-transfer level (RTL) design of VLSI circuits. RTL design is often subjected to a significant verification effort due to errors introduced during manual...

  12. Verification = Specification + Deduction + Computation + Abstraction Logical foundations

    E-Print Network [OSTI]

    Jouannaud, Jean-Pierre

    of powerful, secure, interactive tools #12;Verification Given a system to be analyzed, 1. elaborate a model, interactive tools #12;Verification Given a system to be analyzed, 1. elaborate a model of the system. 2. Test;Verification Given a system to be analyzed, 1. elaborate a model of the system. 2. Test some liveness property

  13. Image Hashes as Templates for Verification

    SciTech Connect (OSTI)

    Janik, Tadeusz; Jarman, Kenneth D.; Robinson, Sean M.; Seifert, Allen; McDonald, Benjamin S.; White, Timothy A.

    2012-07-17T23:59:59.000Z

    Imaging systems can provide measurements that confidently assess characteristics of nuclear weapons and dismantled weapon components, and such assessment will be needed in future verification for arms control. Yet imaging is often viewed as too intrusive, raising concern about the ability to protect sensitive information. In particular, the prospect of using image-based templates for verifying the presence or absence of a warhead, or of the declared configuration of fissile material in storage, may be rejected out-of-hand as being too vulnerable to violation of information barrier (IB) principles. Development of a rigorous approach for generating and comparing reduced-information templates from images, and assessing the security, sensitivity, and robustness of verification using such templates, are needed to address these concerns. We discuss our efforts to develop such a rigorous approach based on a combination of image-feature extraction and encryption-utilizing hash functions to confirm proffered declarations, providing strong classified data security while maintaining high confidence for verification. The proposed work is focused on developing secure, robust, tamper-sensitive and automatic techniques that may enable the comparison of non-sensitive hashed image data outside an IB. It is rooted in research on so-called perceptual hash functions for image comparison, at the interface of signal/image processing, pattern recognition, cryptography, and information theory. Such perceptual or robust image hashing—which, strictly speaking, is not truly cryptographic hashing—has extensive application in content authentication and information retrieval, database search, and security assurance. Applying and extending the principles of perceptual hashing to imaging for arms control, we propose techniques that are sensitive to altering, forging and tampering of the imaged object yet robust and tolerant to content-preserving image distortions and noise. Ensuring that the information contained in the hashed image data (available out-of-IB) cannot be used to extract sensitive information about the imaged object is of primary concern. Thus the techniques are characterized by high unpredictability to guarantee security. We will present an assessment of the performance of our techniques with respect to security, sensitivity and robustness on the basis of a methodical and mathematically precise framework.

  14. SECTION B

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FY2015 is 200,000. SECTION V - PERFORMANCE REQUIREMENTS DEFINE COMPLETION: Specify Performance Elements and describe indicators of success (qualityprogress). Include...

  15. Section B

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    121 B-i PART I - THE SCHEDULE SECTION B - SUPPLIES OR SERVICES AND PRICESCOSTS TABLE OF CONTENTS B.1 TYPE OF CONTRACT - ITEMS BEING ACQUIRED ......

  16. SECTION E

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - E8 - Electrical load list panel schedules - E9 - Details sections - EC - 480V motor control center schedules - Setroute report identifying released cables and raceway WTP...

  17. (Please type of print and return with Application for Admission) Verification of Employment Hours

    E-Print Network [OSTI]

    (Please type of print and return with Application for Admission) Verification of Employment Hours to distribute to all employers of the last five years. Section 1: TO BE COMPLETED BY THE APPLICANT AND SENT TO THE EMPLOYER. PLEASE PRINT. Surname:_________________________________ Given Name

  18. Functional Verification through Operation Diagnostics

    E-Print Network [OSTI]

    Burgoyne, B.

    ICEBO'11 Abstract Burgoyne 110328.docx Page 1 of 1 ? Ebert & Baumann Consulting Engineers, Inc. A B S T R A C T ICEBO 2011 New York City March 28, 2011 Functional Verification through Operation Diagnostics One of the core objectives... of actual operation produces the most accurate results. This is accomplished through trend logging. With analysis of regularly recorded control point data through visualization (including graphs, charts, etc.), a quick and accurate diagnosis of incorrect...

  19. Section CC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    C.2.1.9 GF0024 DOE will provide the Cross-Service Agreement with GSA that addresses preventive maintenance and repair services and reimbursement rates for GSA Fleet vehicles....

  20. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  1. Employment Verifications Requests for verification of title and dates of employment for Harvard staff are

    E-Print Network [OSTI]

    Paulsson, Johan

    Employment Verifications Requests for verification of title and dates of employment for Harvard information during the verification process. Need Proof of Employment? Give the person needing proof of your employment the following information: Your Social Security Number Harvard University Employer Code: 14392

  2. Monitoring and Commissioning Verification Algorithms for CHP Systems

    SciTech Connect (OSTI)

    Brambley, Michael R.; Katipamula, Srinivas; Jiang, Wei

    2008-03-31T23:59:59.000Z

    This document provides the algorithms for CHP system performance monitoring and commissioning verification (CxV). It starts by presenting system-level and component-level performance metrics, followed by descriptions of algorithms for performance monitoring and commissioning verification, using the metric presented earlier. Verification of commissioning is accomplished essentially by comparing actual measured performance to benchmarks for performance provided by the system integrator and/or component manufacturers. The results of these comparisons are then automatically interpreted to provide conclusions regarding whether the CHP system and its components have been properly commissioned and where problems are found, guidance is provided for corrections. A discussion of uncertainty handling is then provided, which is followed by a description of how simulations models can be used to generate data for testing the algorithms. A model is described for simulating a CHP system consisting of a micro-turbine, an exhaust-gas heat recovery unit that produces hot water, a absorption chiller and a cooling tower. The process for using this model for generating data for testing the algorithms for a selected set of faults is described. The next section applies the algorithms developed to CHP laboratory and field data to illustrate their use. The report then concludes with a discussion of the need for laboratory testing of the algorithms on a physical CHP systems and identification of the recommended next steps.

  3. EMERGING RENEWABLES PROGRAM SYSTEMS VERIFICATION REPORT

    E-Print Network [OSTI]

    survey that measured customer experience in applying to the ERP, receiving utility interconnection, renewable energy, shading, solar, system performance, system verification, utility interconnection, wind #12

  4. Guide to good practices for independent verification

    SciTech Connect (OSTI)

    NONE

    1998-12-01T23:59:59.000Z

    This Guide to Good Practices is written to enhance understanding of, and provide direction for, Independent Verification, Chapter X of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. The practices in this guide should be considered when planning or reviewing independent verification activities. Contractors are advised to adopt procedures that meet the intent of DOE Order 5480.19. Independent Verification is an element of an effective Conduct of Operations program. The complexity and array of activities performed in DOE facilities dictate the necessity for coordinated independent verification activities to promote safe and efficient operations.

  5. Verification and Validation of Facilities Procedures Assessment...

    Broader source: Energy.gov (indexed) [DOE]

    Verification and Validation of Facilities Procedures Assessment Plan NNSANevada Site Office Independent Oversight Division Performance Objective: The purpose of this assessment is...

  6. DOE Zero Energy Ready Home Verification...

    Broader source: Energy.gov (indexed) [DOE]

    Zero Energy Ready Home Verification Summary DRAFT REMRate - Residential Energy Analysis and Rating Software v14.5.1 This information does not constitute any warranty of energy...

  7. Assessment of Evaluation, Measurement, and Verification Methods...

    Broader source: Energy.gov (indexed) [DOE]

    smart meters, devices, and analytics to enable the delivery of streamlined measurement and verification (M&V) that reduces cost while increasing the speed and accuracy of...

  8. Reviewing Measurement and Verification Plans for Federal ESPC...

    Office of Environmental Management (EM)

    Measurement and Verification Plans for Federal ESPC Projects Reviewing Measurement and Verification Plans for Federal ESPC Projects Document provides a framework for implementing...

  9. M&V Guidelines: Measurement and Verification for Federal Energy...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Introduction to Measurement & Verification for DOE Super ESPC Projects Introduction to Measurement and Verification for DOE Super ESPC Projects DRAFT...

  10. ENERGY STAR Test Procedures and Verification | Department of...

    Energy Savers [EERE]

    ENERGY STAR ENERGY STAR Test Procedures and Verification ENERGY STAR Test Procedures and Verification The Department of Energy (DOE) is the lead agency in the development and...

  11. M&V Guidelines: Measurement and Verification for Federal Energy...

    Broader source: Energy.gov (indexed) [DOE]

    M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 3.0) Draft M&V Guidelines: Measurement and Verification for Federal Energy Projects...

  12. CARB Verification of Catalyzed Diesel Particulate Filters for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets 2005...

  13. Measurement and Verification Plan and Savings Calculations Methods...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Measurement and Verification Plan and Savings Calculations Methods Outline (IDIQ Attachment J-8) Measurement and Verification Plan and Savings Calculations Methods Outline (IDIQ...

  14. Formal Specification and Verification of Concurrent

    E-Print Network [OSTI]

    Berry, Daniel M.

    Formal Specification and Verification of Concurrent ProgramsCurriculum Module SEI-CM-27-1.0 #12;Formal Specification and Verification of Concurrent Programs SEI Curriculum Module SEI-CM-27-1.0 February 1993 Daniel M. Berry Technion and Software Engineering Institute Software Engineering Institute

  15. The monitoring and verification of nuclear weapons

    SciTech Connect (OSTI)

    Garwin, Richard L., E-mail: RLG2@us.ibm.com [IBM Fellow Emeritus, IBM Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, NY 10598 (United States)

    2014-05-09T23:59:59.000Z

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

  16. Department of Computer Science AUTOMATIC VERIFICATION OF

    E-Print Network [OSTI]

    Oxford, University of

    Department of Computer Science AUTOMATIC VERIFICATION OF COMPETITIVE STOCHASTIC SYSTEMS Taolue Chen Automatic verification techniques for probabilistic systems have been success- fully applied in a variety systems also exhibit non- deterministic behaviour, e.g. due to concurrency, underspecification or control

  17. Verification after Synthesis Alan Mishchenko Robert Brayton

    E-Print Network [OSTI]

    Brayton, Robert K.

    in verification based on BDDs, SAT, and AIGs (And-Inverter Graphs), these results do not readily transfer to large are necessary to advance both synthesis and verification. We propose a methodology for scalable sequential it by a functionally equivalent one (up to complementation of outputs). (2) Retiming changes the positions of one

  18. A Verification Platform System on Chip

    E-Print Network [OSTI]

    Melham, Tom

    A Verification Platform for System on Chip Kong Woei Susanto A Dissertation submitted a platform based design method, called a system integration platform. In this design methodology, a system specifications. Subsequently, a similar platform can be constructed for formal verification. Every component

  19. Technical Documentation and Verification for the

    E-Print Network [OSTI]

    PNNL-15202 Technical Documentation and Verification for the Buildings Module in the Visual Sample://www.ntis.gov/ordering.htm This document was printed on recycled paper. (9/2003) #12;PNNL-15202 Technical Documentation and Verification ...................................................................... 1 2.0 Documentation of Statistical Methods and Computations

  20. State of the Lab Address

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01T23:59:59.000Z

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  1. Building Address Locations -Assumes entire

    E-Print Network [OSTI]

    Guenther, Frank

    Building Address Locations - Assumes entire building unless noted Designation Submit through* 560, 4 BU Crosstown Center 801 Massachusetts Ave Floor 1, 2 BMC BCD Building 800 Harrison Avenue BCD BMC Biosquare III 670 Albany Floors 2, 3, 6, 7 BMC Biosquare III 670 Albany Floors 1, 4, 5, 8 BU Building

  2. DEPARTMENT OF DEPARTMENTAL MANAGEMENT ADDRESS

    E-Print Network [OSTI]

    Knowles, David William

    investment in alternative fuel and clean energy technologies. It's about a 22 percent increase up to a levelU.S. DEPARTMENT OF ENERGY DEPARTMENTAL MANAGEMENT ADDRESS WITH SECRETARY OF ENERGY SAMUEL W. BODMAN was instrumental in helping to achieve the passing of the Energy Policy Act last summer, coming up on a year ago

  3. E. ALLAN LIND Office Address

    E-Print Network [OSTI]

    Reif, John H.

    E. ALLAN LIND Office Address Fuqua School of Business Box 90120 Duke University Durham, NC 27708 tel. +1-919-660-7849 or +1-919-724-1130; e-mail: Allan.Lind@duke.edu Personal Information: Born: April, Paris, France. Book: Lind, E. A., and Tyler, T. R. (1988). The social psychology of procedural justice

  4. Incrementally Deployable Source Address Validity

    E-Print Network [OSTI]

    Li, Jun

    ID-SAVE: Incrementally Deployable Source Address Validity Enforcement Toby Ehrenkranz ://netsec.cs.uoregon.edu #12;Ehrenkranz WiP ID-SAVE What's The Problem? While routers know which direction a packet should are unreliable ID-SAVE attacks this root cause! 1 #12;Ehrenkranz WiP ID-SAVE ID-SAVE Basics Create and maintain

  5. Final Report on Internet Addressable Lightswitch

    SciTech Connect (OSTI)

    Rubinstein, Francis; Pettler, Peter

    2001-08-27T23:59:59.000Z

    This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be economi cally installed even in existing buildings that were not wired for dual-level lighting.

  6. Section J

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection 3161L-1 Section J

  7. Section J

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection 3161L-1 Section JM-1

  8. Section Number:

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection 3161L-1 SectionIVV

  9. Term-Level Verification of a Pipelined CISC Microprocessor

    E-Print Network [OSTI]

    Term-Level Verification of a Pipelined CISC Microprocessor Randal E. Bryant December, 2005 CMU verification, Microprocessor verification, UCLID #12;Abstract By abstracting the details of the data representations and operations in a microprocessor, term-level verification can formally prove that a pipelined

  10. TermLevel Verification of a Pipelined CISC Microprocessor

    E-Print Network [OSTI]

    Term­Level Verification of a Pipelined CISC Microprocessor Randal E. Bryant December, 2005 CMU verification, Microprocessor verification, UCLID #12; Abstract By abstracting the details of the data representations and operations in a microprocessor, term­level verification can formally prove that a pipelined

  11. Reuse of Verification Results Conditional Model Checking, Precision Reuse,

    E-Print Network [OSTI]

    Beyer, Dirk

    further verification runs of the system; information about the level of abstraction in the abstract modelReuse of Verification Results Conditional Model Checking, Precision Reuse, and Verification checker which parts of the system should be verified; thus, later verification runs can use the output

  12. The KivApproach to Software Verification ? Wolfgang Reif

    E-Print Network [OSTI]

    Reif, Wolfgang

    systems, a powerful proof component, and an evolutionary verification model supporting incremen­ tal error approach to the design and verification of large sequential systems. It is based on structured alge­ braic correction and verification. We present the design methodology for modular systems, a feasible verification

  13. Example Measurement & Verification Plan for a Super ESPC Project

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    REPORTING FOR VERIFICATION ACTIVITIES ... 5 2.4 OPERATIONS, PREVENTIVE MAINTENANCE, REPAIR, AND REPLACEMENT REPORTING REQUIREMENTS...

  14. verification

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby/%2A en NGSI Safeguards by Design

  15. The Mechanized Verification of Garbage Collector Implementations

    E-Print Network [OSTI]

    Abstract The Mechanized Verification of Garbage Collector Implementations Andrew Evan Mc complex, requiring a garbage collector. Garbage collectors are becoming increasingly sophis- ticated to adapt them to high-performance, concurrent and real-time applications, making internal collector

  16. Runtime verification of object lifetime specifications

    E-Print Network [OSTI]

    Benjamin, Zev (Zev A.)

    2009-01-01T23:59:59.000Z

    This thesis reports on the implementation of a runtime verification system for object lifetime specifications. This system is used to explore and evaluate the expressiveness object lifetime specifications. Object lifetime ...

  17. Addressing the workforce pipeline challenge

    SciTech Connect (OSTI)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01T23:59:59.000Z

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  18. Keynote Address | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732on ArmedManufacturingJune 17, 2015 - SEABSmallKenAddress

  19. Brinkman Addresses JLab | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced Materials FindAdvanced MaterialsDepartmentBrinkman Addresses JLab

  20. Interagency Collaboration to Address Environmental Impacts of...

    Energy Savers [EERE]

    Interagency Collaboration to Address Environmental Impacts of Shale Gas Drilling Interagency Collaboration to Address Environmental Impacts of Shale Gas Drilling April 23, 2013 -...

  1. Symbiosis: Addressing Biomass Production Challenges and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening...

  2. Addressing Wind Turbine Tribological Challenges with Surface...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Addressing Wind Turbine Tribological Challenges with Surface Engineering Presented by Gary Doll of the University of Akron at the Wind Turbine Tribology Seminar 2014. Addressing...

  3. SECTION J

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy at Waste-to-EnergySEAB_Minutes_1_20_11.pdfSEB SecretariatJ-1 SECTION J

  4. SECTION J

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy at Waste-to-EnergySEAB_Minutes_1_20_11.pdfSEB SecretariatJ-1 SECTION JK-1

  5. North Korea's nuclear weapons program:verification priorities and new challenges.

    SciTech Connect (OSTI)

    Moon, Duk-ho (Korean Consulate General in New York)

    2003-12-01T23:59:59.000Z

    A comprehensive settlement of the North Korean nuclear issue may involve military, economic, political, and diplomatic components, many of which will require verification to ensure reciprocal implementation. This paper sets out potential verification methodologies that might address a wide range of objectives. The inspection requirements set by the International Atomic Energy Agency form the foundation, first as defined at the time of the Agreed Framework in 1994, and now as modified by the events since revelation of the North Korean uranium enrichment program in October 2002. In addition, refreezing the reprocessing facility and 5 MWe reactor, taking possession of possible weapons components and destroying weaponization capabilities add many new verification tasks. The paper also considers several measures for the short-term freezing of the North's nuclear weapon program during the process of negotiations, should that process be protracted. New inspection technologies and monitoring tools are applicable to North Korean facilities and may offer improved approaches over those envisioned just a few years ago. These are noted, and potential bilateral and regional verification regimes are examined.

  6. Addressing failures in exascale computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01T23:59:59.000Z

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  7. Addressing Failures in Exascale Computing

    SciTech Connect (OSTI)

    Snir, Marc [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Wisniewski, Robert [Intel Corporation] [Intel Corporation; Abraham, Jacob [unknown] [unknown; Adve, Sarita [University of Illinois, Urbana-Champaign] [University of Illinois, Urbana-Champaign; Bagchi, Saurabh [Purdue University] [Purdue University; Balaji, Pavan [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Belak, J. [Lawrence Livermore National Laboratory (LLNL)] [Lawrence Livermore National Laboratory (LLNL); Bose, Pradip [IBM T. J. Watson Research Center] [IBM T. J. Watson Research Center; Cappello, Franck [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Carlson, Bill [unknown] [unknown; Chien, Andrew [University of Chicago] [University of Chicago; Coteus, Paul [IBM T. J. Watson Research Center] [IBM T. J. Watson Research Center; DeBardeleben, Nathan [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL); Diniz, Pedro [University of Southern California] [University of Southern California; Engelmann, Christian [ORNL] [ORNL; Erez, Mattan [University of Texas at Austin] [University of Texas at Austin; Fazzari, Saverio [Booz Allen Hamilton] [Booz Allen Hamilton; Geist, Al [ORNL] [ORNL; Gupta, Rinku [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Johnson, Fred [Science Applications International Corporation (SAIC), Oak Ridge, TN] [Science Applications International Corporation (SAIC), Oak Ridge, TN; Krishnamoorthy, Sriram [Pacific Northwest National Laboratory (PNNL)] [Pacific Northwest National Laboratory (PNNL); Leyffer, Sven [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Liberty, Dean [AMD] [AMD; Mitra, Subhasish [Stanford University] [Stanford University; Munson, Todd [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Schreiber, Rob [HP Labs] [HP Labs; Stearley, Jon [Sandia National Laboratories (SNL)] [Sandia National Laboratories (SNL); Van Hensbergen, Eric [ARM] [ARM

    2014-01-01T23:59:59.000Z

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  8. MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP

    E-Print Network [OSTI]

    MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS Thesis Approved by: Dr.................................................................................................................... 16 MODELING OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS

  9. M&V Guidelines: Measurement and Verification for Federal Energy...

    Office of Environmental Management (EM)

    M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 3.0) M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 3.0)...

  10. A Tutorial on Text-Independent Speaker Verification

    E-Print Network [OSTI]

    Bimbot, Frederic

    This paper presents an overview of a state-of-the-art text-independent speaker verification system. First, an introduction proposes a modular scheme of the training and test phases of a speaker verification system. Then, ...

  11. ECE/CS 584: Fall 2012 Embedded System Verification

    E-Print Network [OSTI]

    Liberzon, Daniel

    powerful software tools (model checkers, SMT solvers, & theorem provers) for designing & analyzing systems · Real-time and hybrid system models, stability verification: Multiple Lyapunov functions, slow switchingECE/CS 584: Fall 2012 Embedded System Verification URL: http

  12. Verification of full functional correctness for imperative linked data structures

    E-Print Network [OSTI]

    Zee, Karen K

    2010-01-01T23:59:59.000Z

    We present the verification of full functional correctness for a collection of imperative linked data structures implemented in Java. A key technique that makes this verification possible is a novel, integrated proof ...

  13. Measurement and Verification for Commissioning Projects: Challenges and Opportunities

    E-Print Network [OSTI]

    Heinemeier, K.

    2005-01-01T23:59:59.000Z

    ESL-IC-10/05-49 1 Measurement and Verification for Commissioning Projects: Challenges and Opportunities Kristin Heinemeier, Ph.D., P.E. Portland Energy Conservation, Inc., Sacramento CA Measurement and Verification (M&V) is a key...

  14. Draft M&V Guidelines: Measurement and Verification for Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Draft M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0) Draft M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version...

  15. Shared Signals: Using Existing Facility Meters for Energy Savings Verification

    E-Print Network [OSTI]

    McBride, J. R.; Bohmer, C. J.; Price, S. D.; Carlson, K.; Lopez, J.

    of metering. Facility engineers wonder whether existing meters can be used for savings verification purposes. They want to know whether an existing energy management and control system (EMCS) can serve double duty and be used for savings verification... an existing EMCS for energy savings verification purposes is even more complex. While at first glance the idea of using an existing EMCS for energy savings verification purposes seems absolutely reasonable, the practicality of the situation must...

  16. Plug-and-Play Architectural Design and Verification

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    uses finite-state verification techniques (e.g., SPIN [17], SMV [19], LTSA [22], FLAVERS [10]) to check

  17. Active alignment/contact verification system

    DOE Patents [OSTI]

    Greenbaum, William M. (Modesto, CA)

    2000-01-01T23:59:59.000Z

    A system involving an active (i.e. electrical) technique for the verification of: 1) close tolerance mechanical alignment between two component, and 2) electrical contact between mating through an elastomeric interface. For example, the two components may be an alumina carrier and a printed circuit board, two mating parts that are extremely small, high density parts and require alignment within a fraction of a mil, as well as a specified interface point of engagement between the parts. The system comprises pairs of conductive structures defined in the surfaces layers of the alumina carrier and the printed circuit board, for example. The first pair of conductive structures relate to item (1) above and permit alignment verification between mating parts. The second pair of conductive structures relate to item (2) above and permit verification of electrical contact between mating parts.

  18. Fuel Retrieval System (FRS) Design Verification

    SciTech Connect (OSTI)

    YANOCHKO, R.M.

    2000-01-27T23:59:59.000Z

    This document was prepared as part of an independent review to explain design verification activities already completed, and to define the remaining design verification actions for the Fuel Retrieval System. The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR).

  19. Software Verification and Testing Lecture Notes: Testing I

    E-Print Network [OSTI]

    Struth, Georg

    of Testing Methods dynamic testing: software component is executed with concrete input values (in a realSoftware Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence

  20. Competition on Software Verification University of Passau, Germany

    E-Print Network [OSTI]

    Beyer, Dirk

    and Analysis of Systems (TACAS). 1 Introduction The area of verification, in particular model checking, has). Several new and powerful software-verification tools became available, but they have not been comparedCompetition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract

  1. Applied Verification: The Ptolemy Approach Chihhong Patrick Cheng

    E-Print Network [OSTI]

    stronger claims regarding the correctness of the system. Theoretically, modeling and verification should face when doing formal verifi- cation. Existing theories and practices in verification are powerful, but when applying formal techniques, the use of detailed mathematical model descriptions in verification

  2. MODELING AND VERIFICATION OF A PIPELINED CPU Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    of complex hardware and software systems. Several powerful verification methods, such as Symbolic ModelMODELING AND VERIFICATION OF A PIPELINED CPU Lubomir Ivanov Department of Computer Science, Iona interleavings of events in a system. In [8] we introduced a new partial order verification method, referred

  3. Measurement and Verification (M&V)

    E-Print Network [OSTI]

    Masuda, H

    2014-01-01T23:59:59.000Z

    5. Continuous Commissioning Measures 6. Measurement and Verification 2 ESL-KT-14-11-39 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Measurement and Verification (M&V) Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko...Workshop on the Continuous Commissioning® Process Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko Masuda, Juan-Carlos Baltazar, PhD, PE Ahmet Ugursal, PhD Clean Air Through Energy Efficiency (CATEE) Conference, Dallas, Texas. November 18, 2014...

  4. Scalable Address Spaces Using Rcu Balanced Trees

    E-Print Network [OSTI]

    Clements, Austin T.

    Software developers commonly exploit multicore processors by building multithreaded software in which all threads of an application share a single address space. This shared address space has a cost: kernel virtual memory ...

  5. Addressing Climate Change in Environmental Impact Analysis

    E-Print Network [OSTI]

    Minnesota, University of

    Addressing Climate Change in Environmental Impact Analysis 2010 CTS Research Conference Carissa impact analysis (EIA) as a tool to address climate change ·! Consider approaches to measuring and addressing climate change at the project scale #12;Purpose ·! Funded by U of M Institute on the Environment

  6. CERTIFICATE OF FIELD VERIFICATION AND DIAGNOSTIC TESTING CF-4R-ENV-22 Quality Insulation Installation (QII) -Insulation Stage Checklist (Page 1 of 3)

    E-Print Network [OSTI]

    CERTIFICATE OF FIELD VERIFICATION AND DIAGNOSTIC TESTING CF-4R-ENV-22 Quality Insulation Installation (QII) - Insulation Stage Checklist (Page 1 of 3) Site Address: Enforcement Agency: Permit Number: ____________ 2008 Residential Compliance Forms May 2012 All structural framing areas shall be insulated in a manner

  7. VERIFICATION OF EMPLOYMENT According to the rules and regulations set forth by the State of New Mexico for establishing residency for tuition

    E-Print Network [OSTI]

    New Mexico, University of

    VERIFICATION OF EMPLOYMENT According to the rules and regulations set forth by the State of New: Address: Date of Hire: Employment Status: Permanent Yes No Full-Time Yes No Temporary Yes No Part-Time Yes No Supervisor's Name Supervisor's Title Signature of Supervisor Phone Date NOTE: Employment will be verified

  8. High-Resolution Fast-Neutron Spectrometry for Arms Control and Treaty Verification

    SciTech Connect (OSTI)

    David L. Chichester; James T. Johnson; Edward H. Seabury

    2012-07-01T23:59:59.000Z

    Many nondestructive nuclear analysis techniques have been developed to support the measurement needs of arms control and treaty verification, including gross photon and neutron counting, low- and high-resolution gamma spectrometry, time-correlated neutron measurements, and photon and neutron imaging. One notable measurement technique that has not been extensively studied to date for these applications is high-resolution fast-neutron spectrometry (HRFNS). Applied for arms control and treaty verification, HRFNS has the potential to serve as a complimentary measurement approach to these other techniques by providing a means to either qualitatively or quantitatively determine the composition and thickness of non-nuclear materials surrounding neutron-emitting materials. The technique uses the normally-occurring neutrons present in arms control and treaty verification objects of interest as an internal source of neutrons for performing active-interrogation transmission measurements. Most low-Z nuclei of interest for arms control and treaty verification, including 9Be, 12C, 14N, and 16O, possess fast-neutron resonance features in their absorption cross sections in the 0.5- to 5-MeV energy range. Measuring the selective removal of source neutrons over this energy range, assuming for example a fission-spectrum starting distribution, may be used to estimate the stoichiometric composition of intervening materials between the neutron source and detector. At a simpler level, determination of the emitted fast-neutron spectrum may be used for fingerprinting 'known' assemblies for later use in template-matching tests. As with photon spectrometry, automated analysis of fast-neutron spectra may be performed to support decision making and reporting systems protected behind information barriers. This paper will report recent work at Idaho National Laboratory to explore the feasibility of using HRFNS for arms control and treaty verification applications, including simulations and experiments, using fission-spectrum neutron sources to assess neutron transmission through composite low-Z attenuators.

  9. EXPERIMENTAL VERIFICATION OF DYNAMIC OPERATION OF

    E-Print Network [OSTI]

    Skogestad, Sigurd

    - ponent mixtures can be separated into a number of product fractions, whereas in continuous distillationEXPERIMENTAL VERIFICATION OF DYNAMIC OPERATION OF CONTINUOUS AND MULTIVESSEL BATCH DISTILLATION to the paper "Evaluation of Dynamic Models of Distillation Columns with Emphasis on the Initial Response

  10. SAVCBS 2003 Specification and Verification of

    E-Print Network [OSTI]

    Leavens, Gary T.

    ://www.cs.iastate.edu/SAVCBS/ September 1-2, 2003 Helsinki, Finland Workshop at ESEC/FSE 2003 9th European Software Engineering ConferenceSAVCBS 2003 Specification and Verification of Component-Based Systems ESEC/FSE 2003 9th European Software Engineering Conference and 11th ACM SIGSOFT Symposium on the Foundations of Software Engineering

  11. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2014­2015 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  12. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2013­2014 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2013­2014 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  13. Machine Learning for Signature Verification Harish Srinivasan

    E-Print Network [OSTI]

    types of learning to be accomplished. In the first, the training set consists of genuines and forgeriesMachine Learning for Signature Verification Harish Srinivasan , Sargur N. Srihari and Matthew J it can be viewed as one that involves machine learning from a population of signatures. There are two

  14. Formal Verification of Hybrid Systems Rajeev Alur

    E-Print Network [OSTI]

    Alur, Rajeev

    -1-4503-0714-7/11/10 ...$5.00. mathematical model for design of embedded control systems is hybrid systems that combines for dynamical systems. Such models can capture both the controller -- the system under design, and the plant@cis.upenn.edu ABSTRACT In formal verification, a designer first constructs a model, with mathematically precise semantics

  15. RELAP-7 SOFTWARE VERIFICATION AND VALIDATION PLAN

    SciTech Connect (OSTI)

    Smith, Curtis L [Idaho National Laboratory; Choi, Yong-Joon [Idaho National Laboratory; Zou, Ling [Idaho National Laboratory

    2014-09-01T23:59:59.000Z

    This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7.

  16. Beryllium and Graphite Neutron Total Cross-Section Measurements from 0.4 to 20 MeV

    E-Print Network [OSTI]

    Danon, Yaron

    Beryllium and Graphite Neutron Total Cross-Section Measurements from 0.4 to 20 MeV M. J. Rapp,* Y of the neutron total cross section of natural beryllium and carbon (graphite) in the energy range of 0.4 to 20 Me a verification of the accuracy in the measurement and analytical methods used. The measurements of beryllium

  17. addresses: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    equipped with a variable geometryshore vehicles. In marine diesel propulsion, the turbocharger, the engine, and the propeller operation* Corresponding author. E-mail address:...

  18. Recommendations to Address Power Reliability Concerns Raised...

    Energy Savers [EERE]

    Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a...

  19. Addressing the needs of mobile users

    E-Print Network [OSTI]

    Sohn, Timothy Youngjin

    2008-01-01T23:59:59.000Z

    Based Localization Technology for Mobile Users . . . . . 3.1for designing future mobile technology. Methods There arefor ways future mobile technology might better address

  20. An independent verification and validation of the Future Theater Level Model conceptual model

    SciTech Connect (OSTI)

    Hartley, D.S. III; Kruse, K.L.; Martellaro, A.J.; Packard, S.L.; Thomas, B. Jr.; Turley, V.K.

    1994-08-01T23:59:59.000Z

    This report describes the methodology and results of independent verification and validation performed on a combat model in its design stage. The combat model is the Future Theater Level Model (FTLM), under development by The Joint Staff/J-8. J-8 has undertaken its development to provide an analysis tool that addresses the uncertainties of combat more directly than previous models and yields more rapid study results. The methodology adopted for this verification and validation consisted of document analyses. Included were detailed examination of the FTLM design documents (at all stages of development), the FTLM Mission Needs Statement, and selected documentation for other theater level combat models. These documents were compared to assess the FTLM as to its design stage, its purpose as an analytical combat model, and its capabilities as specified in the Mission Needs Statement. The conceptual design passed those tests. The recommendations included specific modifications as well as a recommendation for continued development. The methodology is significant because independent verification and validation have not been previously reported as being performed on a combat model in its design stage. The results are significant because The Joint Staff/J-8 will be using the recommendations from this study in determining whether to proceed with develop of the model.

  1. LLNL`s partnership with selected US mines, for CTBT verification: A pictorial and some reflections

    SciTech Connect (OSTI)

    Heuze, F.E.

    1996-01-01T23:59:59.000Z

    The verification of an upcoming Comprehensive Test Ban Treaty (CTBT) will involve seismic monitoring and will provide for on-site inspections which may include drilling. Because of the fact that mining operations can send out strong seismic signals, many mining districts in the US and abroad may come under special scrutiny. The seismic signals can be generated by the use of large quantities of conventional explosives, by the collapse of underground workings, or by sudden energy release in the ground such as in rock bursts and coal bumps. These mining activities may be the cause of false alarms, but may also offer opportunities for evasive nuclear testing. So in preparing for future verification of a CTBT it becomes important to address the mining-related questions. For the United States, these are questions to be answered with respect to foreign mines. But there is a good amount of commonality in mining methods worldwide. Studies conducted at US mine sites can provide good analogs of activities that may be carried out for overseas CTBT verification, save for the expected logistical impediments.

  2. Addressing Childhood Obesity through Translational Research

    E-Print Network [OSTI]

    Church, George M.

    Addressing Childhood Obesity through Translational Research Funded Projects The Harvard Catalyst the prevention of childhood obesity in the context of national and state health systems reforms. This 2012 for the Addressing Childhood Obesity through Translational Research pilot grants were announced in October of 2012

  3. GRIMHX verification and validation action matrix summary

    SciTech Connect (OSTI)

    Trumble, E.F.

    1991-12-01T23:59:59.000Z

    WSRC-RP-90-026, Certification Plan for Reactor Analysis Computer Codes, describes a series of action items to be completed for certification of reactor analysis computer codes used in Technical Specifications development and for other safety and production support calculations. Validation and verification of the code is an integral part of this process. This document identifies the work performed and documentation generated to satisfy these action items for the Reactor Physics computer code GRIMHX. Each action item is discussed with the justification for its completion. Specific details of the work performed are not included in this document but are found in the references. The publication of this document signals the validation and verification effort for the GRIMHX code is completed.

  4. NGSI: IAEA Verification of UF6 Cylinders

    SciTech Connect (OSTI)

    Curtis, Michael M.

    2012-06-05T23:59:59.000Z

    The International Atomic Energy Agency (IAEA) is often ignorant of the location of declared, uranium hexafluoride (UF6) cylinders following verification, because cylinders are not typically tracked onsite or off. This paper will assess various methods the IAEA uses to verify cylinder gross defects, and how the task could be ameliorated through the use of improved identification and monitoring. The assessment will be restricted to current verification methods together with one that has been applied on a trial basis—short-notice random inspections coupled with mailbox declarations. This paper is part of the NNSA Office of Nonproliferation and International Security’s Next Generation Safeguards Initiative (NGSI) program to investigate the concept of a global monitoring scheme that uniquely identifies and tracks UF6 cylinders.

  5. Finite Model Finding for Parameterized Verification

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2010-01-01T23:59:59.000Z

    In this paper we investigate to which extent a very simple and natural "reachability as deducibility" approach, originated in the research in formal methods in security, is applicable to the automated verification of large classes of infinite state and parameterized systems. The approach is based on modeling the reachability between (parameterized) states as deducibility between suitable encodings of states by formulas of first-order predicate logic. The verification of a safety property is reduced to a pure logical problem of finding a countermodel for a first-order formula. The later task is delegated then to the generic automated finite model building procedures. In this paper we first establish the relative completeness of the finite countermodel finding method (FCM) for a class of parameterized linear arrays of finite automata. The method is shown to be at least as powerful as known methods based on monotonic abstraction and symbolic backward reachability. Further, we extend the relative completeness of ...

  6. Survey of Existing Tools for Formal Verification.

    SciTech Connect (OSTI)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01T23:59:59.000Z

    Formal methods have come into wide use because of their effectiveness in verifying %22safety and security%22 requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  7. Logic verification using recursive learning, ATPG and transformations

    E-Print Network [OSTI]

    Paul, Debjyoti

    1996-01-01T23:59:59.000Z

    17 Example Circuits for Verification Showing an Existing Condi- tional Don't Care Condition. 33 18 Justification of the Conditional Don't Care Condition in the Ex- ample Circuits. FIGURE Page Transformation Using Conditional Don't Care Condition... of the Implementation Verification phase, sometimes it is termed Design Verification as in [17j. In this case the specification and design are both at logic level. Logic circuits can be combinational or sequential. If the circuits being compared are combinational, i...

  8. SAT-based Verification for Analog and Mixed-signal Circuits

    E-Print Network [OSTI]

    Deng, Yue

    2012-07-16T23:59:59.000Z

    The wide application of analog and mixed-signal (AMS) designs makes the verification of AMS circuits an important task. However, verification of AMS circuits remains as a significant challenge even though verification techniques for digital circuits...

  9. A golden anniversary for space-based treaty verification

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    enabled serendipitous discoveries of remarkable natural phenomena such as cosmic gamma-ray bursts, X-ray novae and solar wind composition. Modern space-based verification systems...

  10. Introduction to Measurement and Verification for DOE Super ESPC...

    Broader source: Energy.gov (indexed) [DOE]

    and verification is conducted in super energy savings performance contracts (ESPC) projects. Topics include allocating project risk, steps to verify savings, and M&V...

  11. Measurement and Verification for Federal Energy Savings Performance Contracts

    Broader source: Energy.gov [DOE]

    Measurement and verification (M&V) activities help agencies confirm that legally and contractually required savings guarantees are met in federal energy savings performance contracts (ESPCs).

  12. Example Measurement & Verification Plan for a Super ESPC Project

    Broader source: Energy.gov [DOE]

    Report features a comprehensive measurement and verification (M&V) plan for a fictitious super energy savings performance contract (ESPC) project.

  13. ESPC Measurement and Verification (M&V) Planning Tool

    Broader source: Energy.gov [DOE]

    Document provides instructions for Federal agencies on how to use a measurement and verification (M&V) planning tool for energy savings performance contracts (ESPCs).

  14. Optimization Online - Termination and Verification for Ill-Posed ...

    E-Print Network [OSTI]

    Christian Jansson

    2005-06-17T23:59:59.000Z

    Jun 17, 2005 ... Termination and Verification for Ill-Posed Semidefinite Programming Problems. Christian Jansson (jansson ***at*** tu-harburg.de). Abstract: ...

  15. assertions based verification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A possible explanation is given. 1 SCIAMACHY'S PMD CHANNELS Graaf, Martin de 418 LTSA-WS: a tool for modelbased verification of web service compositions and choreography...

  16. Thermal Hydraulic Modeling: Cross-Verification, Validation and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Aleks Obabko, Paul Fischer, and Tim Tautges, Argonne National Laboratory Thermal Hydraulic Modeling: Cross-Verification, Validation and Co-design PI Name: Paul F. Fischer PI...

  17. attribute verification system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our results are well founded. Index TermsBiometric verification systems, statistical pattern recognition, Bayes error rate, rejection error rate, hand geometry, human face....

  18. automated verification process: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kulyukin Computer Technologies and Information Sciences Websites Summary: A Cartesian Robot for RFID Signal Distribution Model Verification Aliasgar Kutiyanawala Vladimir (PRF)...

  19. Measurement and Verification, Best Practices in Design and Implementation

    E-Print Network [OSTI]

    Martin, T.; Khatami, H.

    2013-01-01T23:59:59.000Z

    . Measurement?and? Verification,?Best?Practices? in?Design?and? Implementation Tom?Martin? CMVP,?LEED?AP Homay?Khatami? CEM,?LEED?AP PMP,?CMC? 1. Definition?of?Measurement?and?Verification?(M&V) 2. Applications?of?M&V 3. Specific.... Analyze?? Reporting M&V,?Best?Practices?in?Design?and?Implementation ?Measurement?and?Verification?is?the?process? of?using?measurements?to?reliably?determine? actual?savings? International?Performance?Measurement?and? Verification?Protocol?? Vol I...

  20. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  1. Mechanical Verification of Hypercube Algorithms Eric Gascard, Laurence Pierre

    E-Print Network [OSTI]

    Pierre, Laurence

    Mechanical Verification of Hypercube Algorithms Eric Gascard, Laurence Pierre LIM ­ CMI in the development of parallel programs, rather few results have been reported re­ garding solutions for formally

  2. Advanced Waste Management Now Available as Accredited SEP Verification...

    Office of Environmental Management (EM)

    "Our auditing teams provide robust, independent confirmation that a facility conforms to ISO 50001 and has really improved its energy performance." SEP Verification Bodies...

  3. Technical safety requirements control level verification

    SciTech Connect (OSTI)

    STEWART, J.L.

    1999-05-21T23:59:59.000Z

    A Technical Safety Requirement (TSR) control level verification process was developed for the Tank Waste Remediation System (TWRS) TSRs at the Hanford Site in Richland, WA, at the direction of the US. Department of Energy, Richland Operations Office (RL). The objective of the effort was to develop a process to ensure that the TWRS TSR controls are designated and managed at the appropriate levels as Safety Limits (SLs), Limiting Control Settings (LCSs), Limiting Conditions for Operation (LCOs), Administrative Controls (ACs), or Design Features. The TSR control level verification process was developed and implemented by a team of contractor personnel with the participation of Fluor Daniel Hanford, Inc. (FDH), the Project Hanford Management Contract (PHMC) integrating contractor, and RL representatives. The team was composed of individuals with the following experience base: nuclear safety analysis; licensing; nuclear industry and DOE-complex TSR preparation/review experience; tank farm operations; FDH policy and compliance; and RL-TWRS oversight. Each TSR control level designation was completed utilizing TSR control logic diagrams and TSR criteria checklists based on DOE Orders, Standards, Contractor TSR policy, and other guidance. The control logic diagrams and criteria checklists were reviewed and modified by team members during team meetings. The TSR control level verification process was used to systematically evaluate 12 LCOs, 22 AC programs, and approximately 100 program key elements identified in the TWRS TSR document. The verification of each TSR control required a team consensus. Based on the results of the process, refinements were identified and the TWRS TSRs were modified as appropriate. A final report documenting key assumptions and the control level designation for each TSR control was prepared and is maintained on file for future reference. The results of the process were used as a reference in the RL review of the final TWRS TSRs and control suite. RL concluded that the TSR control level verification process is clear and logically based upon DOE Order 5480.22, Technical Safety Requirements, and other TSR control selection guidelines. The process provides a documented, traceable basis for TSR level decisions and is a valid reference for preparation of new TSRs.

  4. Major Address Patterns in Polish and How They Compare with Major Address Patterns in English

    E-Print Network [OSTI]

    Moszczak, Elzbieta

    1986-01-01T23:59:59.000Z

    The paper deals with some of the differences between Polish and English address patterns. It presents in table form the basic patterns of Polish pronominal and nominal address. It touches upon problems that learners of ...

  5. Measurement and Verification Options for Federal Energy- and Water-Saving Projects

    Broader source: Energy.gov [DOE]

    Federal Energy Management Program (FEMP) measurement and verification (M&V) guidelines and International Performance Measurement and Verification Protocol M&V methodologies are broken into four options.

  6. DeLib Materials Donation Form Address

    E-Print Network [OSTI]

    Chen, Tsuhan

    DeLib Materials Donation Form Name: Address: Phone Materials:____________ I, ______________________________ (signature), hereby deed this gift of library materials to the Distributed eLibrary of Weill Cornell Medical

  7. 2015 State of Indian Nations Address

    Broader source: Energy.gov [DOE]

    The President of the National Congress of American Indians will deliver his annual State of the Indian Nations address to Member of Congress, government officials, tribal leaders and citizens, and...

  8. Optimal combination of data verification and materials accountancy

    SciTech Connect (OSTI)

    Beedgen, R.; Hafer, J.F.

    1982-01-01T23:59:59.000Z

    Materials accountancy accompanied by data verification is one of the main elements in international safeguards of nuclear material. In this paper statistical combinations of materials accountancy and data verification are discussed with the boundary condition of a fixed total false-alarm probability.

  9. Evaluating Verification and Validation Methods in Knowledge Engineering

    E-Print Network [OSTI]

    Chen-Burger, Yun-Heh (Jessica)

    Evaluating Verification and Validation Methods in Knowledge Engineering Alun Preece University: Verification and validation (V&V) techniques have always been an essential part of the knowledge engineering effective V&V techniques. 1. The Art of Knowledge Engineering Knowledge-based systems (KBS) have proven

  10. Comparison-based File Server Verification Yuen-Lin Tan

    E-Print Network [OSTI]

    Comparison-based File Server Verification Yuen-Lin Tan£ , Terrence Wong, John D. Strunk, Gregory R. Ganger Carnegie Mellon University Abstract Comparison-based server verification involves testing a server by comparing its responses to those of a refer- ence server. An intermediary, called a "server Tee," in

  11. First Eye Movement Verification and Identification Competition at BTAS 2012

    E-Print Network [OSTI]

    Oleg, Komogortsev - Department of Computer Science, Texas State University

    First Eye Movement Verification and Identification Competition at BTAS 2012 Pawel Kasprowski11,ak26}@txstate.edu Abstract--This paper presents the results of the first eye movement verification and methods used in the competition. The results highlight the importance of very careful eye positional data

  12. Verification of Probabilistic Real-time Systems Marta Kwiatkowska1

    E-Print Network [OSTI]

    Oxford, University of

    widely taken up (downloaded more than 20,000 times) and used for quan- titative verification in a broad of (priced) probabilistic timed automata. These model systems exhibiting probabilistic, nondeterministic-time characteristics, through support for verification of (priced) probabilistic timed automata. PRISM already provides

  13. Modular Verification of Timed Circuits Using Automatic Abstraction

    E-Print Network [OSTI]

    Zheng, Hao

    Modular Verification of Timed Circuits Using Automatic Abstraction Hao Zheng, Eric Mercer, Member for verification of timed circuits using automatic abstraction. This approach partitions the design into modules by the RAPPID instruction length decoder designed at Intel [2]. This design was 3 times faster while using only

  14. Formal Verification of Infinite State Systems Using Boolean Methods #

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods # Randal E. Bryant School automated formal verification tools are based on a bit­level model of computation, where a set of Boolean state variables encodes the system state. Using powerful inference engines, such as Binary Decision

  15. Quantitative Verification: Models, Techniques and Tools Marta Kwiatkowska

    E-Print Network [OSTI]

    Oxford, University of

    verification is an analogous technique for establishing quantitative properties of a system modelQuantitative Verification: Models, Techniques and Tools Marta Kwiatkowska Oxford University of the state-transition graph of the model and is therefore more powerful than test- ing. Quantitative

  16. Integrating Formal Verification into Computer Organization and Architecture Courses

    E-Print Network [OSTI]

    Ivanov, Lubomir

    to formal verification is based on the theory of - automata [5]. Given a model of the system in terms industry and have led to the development of powerful verification tools. However, the popularity facts about a mathematical model of the system under consideration. The proofs are general enough

  17. Formal Verification of Infinite State Systems Using Boolean Methods

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods Randal E. Bryant School automated formal verification tools are based on a bit-level model of computation, where a set of Boolean state variables encodes the system state. Using powerful inference engines, such as Binary Decision

  18. Specification and Formal Verification of Interconnect Bus Protocols Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    and functionality of devices has brought about the need for more powerful modeling and verification tools. Classical is using first generation formal verification tools based on Symbolic Model Checking [1] and -Automata of using partial orders in modeling and verifying system behavior is in avoiding the need to study all

  19. VIS Analyzer: A Visual Assistant for VIS Verification and Analysis

    E-Print Network [OSTI]

    Institute of Nuclear Safety), often mandate that developers or SQA (Software Quality Assurance) teams apply in demonstrating the quality of safety-critical [1] systems such as nuclear power plants. We have used the VIS necessary to understand the full verification scenario accurately. Many nuclear engineers and verification

  20. Lawson Job Description Acknowledgment Verification Instructions Log In to Lawson

    E-Print Network [OSTI]

    Gleeson, Joseph G.

    Lawson Job Description Acknowledgment Verification Instructions · Log In to Lawson o Lawson Web Lawson e-mail your password to you. Updated 3/15/10 Page 1 of 3 #12;Lawson Job Description Acknowledgment Verification Instructions Click "Employee's Sign-off of their Job Description" · Click "Employee's Sign

  1. Power Grid Voltage Integrity Verification Department of ECE

    E-Print Network [OSTI]

    Najm, Farid N.

    Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i.e., if the voltage drop on the grid does not exceed a cer- tain threshold. The traditional simulation-based solution

  2. Core analysis workstation development and verification

    SciTech Connect (OSTI)

    Mays, C.W.; Kochendarfer, R.A.; Mays, B.E.

    1987-01-01T23:59:59.000Z

    An engineering workstation utilizing a three-dimensional reactor simulator along with a series of auxiliary programs has been developed for use in predicting core reactivity and power distributions. This workstation can be used by both core analysis and core operations personnel. Expected applications are power distribution analyses, technical specification limit verification, and various types of reactivity analyses. Reactor operations personnel can quickly simulate load follow or other reactor maneuvers and, through the interactive graphics capability of the personal computer, the reactor responses, such as power distribution and control rod position, can be displayed and understood by operations personnel.

  3. Headquarters Employment Verification | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAM Flash2011-37 OPAMResourceEmployment Verification Headquarters

  4. Shared address collectives using counter mechanisms

    DOE Patents [OSTI]

    Blocksome, Michael; Dozsa, Gabor; Gooding, Thomas M; Heidelberger, Philip; Kumar, Sameer; Mamidala, Amith R; Miller, Douglas

    2014-02-18T23:59:59.000Z

    A shared address space on a compute node stores data received from a network and data to transmit to the network. The shared address space includes an application buffer that can be directly operated upon by a plurality of processes, for instance, running on different cores on the compute node. A shared counter is used for one or more of signaling arrival of the data across the plurality of processes running on the compute node, signaling completion of an operation performed by one or more of the plurality of processes, obtaining reservation slots by one or more of the plurality of processes, or combinations thereof.

  5. The Pronouns of Address of Simplicissimus

    E-Print Network [OSTI]

    Lehman, Harvey C.

    1913-06-01T23:59:59.000Z

    that the Pastor uses the third person in addressing him would be sufficient reason for Simplicius using the third person in reply* He does this in his reply on page 269, line 12, and lines 37 and 38. "Er sehe doch , so will ich ihm mit grosser Dank­ barkeit.... The particular pronouns which we have found used in di­ rect address in Simplicissimus are; du s thou, ihr s ye, er z he, sie z she, and sie • they* The last three of these pronouns are of the third person and it is with these pronouns especially that we have...

  6. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    DOE Patents [OSTI]

    Gala, Alan; Ohmacht, Martin

    2014-09-02T23:59:59.000Z

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  7. Monitoring/Verification Using DMS: TATP Example

    SciTech Connect (OSTI)

    Kevin Kyle; Stephan Weeks

    2008-03-01T23:59:59.000Z

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operationsmanagement systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  8. Monitoring/Verification using DMS: TATP Example

    SciTech Connect (OSTI)

    Stephan Weeks, Kevin Kyle, Manuel Manard

    2008-05-30T23:59:59.000Z

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations-management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. Fast GC is the leading field analytical method for gas phase separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.

  9. No. Course and web address Teacher email address 4201 Math Methods for Theoretical Physics sarben.sarkar@kcl.ac.uk

    E-Print Network [OSTI]

    Thompson, Samantha

    No. Course and web address Teacher email address 4201 Math Methods for Theoretical Physics sarben.sarkar

  10. Energy Savings Performance Contracting-Savings Measurement and Verification Transcript 2-24-2011.doc

    Broader source: Energy.gov [DOE]

    Energy Savings Performance Contracting-Savings Measurement and Verification Transcript 2-24-2011.doc

  11. State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V)

    Broader source: Energy.gov [DOE]

    State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V) Webinar.

  12. Developing an Evaluation Measurement and Verification Plan for Your Energy Efficiency Project/Program

    Broader source: Energy.gov [DOE]

    Developing an Evaluation Measurement and Verification Plan for Your Energy Efficiency Project/Program

  13. Verification of the Equilibrium and MHD Stability Codes within the Integrated Tokamak Modeling Task Force

    E-Print Network [OSTI]

    Verification of the Equilibrium and MHD Stability Codes within the Integrated Tokamak Modeling Task Force

  14. Comment submitted by Whirlpool Corporation regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Whirlpool Corporation regarding the Energy Star Verification Testing Program

  15. Compositional Reactive Semantics of SystemC and Verification with RuleBase

    E-Print Network [OSTI]

    Gupta, Rajesh

    C. Keywords: SystemC, semantics, verification, model checking 1 Introduction System-level modeling using for verification of SystemC com- ponents, providing a powerful workbench for testing and verification. 2 OverviewCompositional Reactive Semantics of SystemC and Verification with RuleBase Rudrapatna K

  16. Creating Addressable Aqueous Microcompartments above Solid Supported

    E-Print Network [OSTI]

    combinatorial libraries of solid supported fluid lipid membranes because these systems retain many a novel soft lithographic technique5 for partitioning and addressing aqueous solutions above supported methodology affords the ability to create a large number of aqueous compartments consisting of various

  17. 1 Addressing Blindness via Cell Phones

    E-Print Network [OSTI]

    -evaluation eye diagnostic tool that attaches to a cell phone and uses a light-scattering technique to scan1 Addressing Blindness via Cell Phones 2 Welcome Letter 3 15 Years of SDM 4 Product Requirements for Contemporary Challenges > Using Systems Thinking to Fuel High-Velocity Organizations > Applying Systems

  18. Addressing Childhood Obesity through Translational Research

    E-Print Network [OSTI]

    Church, George M.

    Addressing Childhood Obesity through Translational Research Funded Projects The Harvard Catalyst research to prevent and treat childhood obesity. This 2013 request for applications (RFA) sought proposals-cultural aspects of the food and physical activity environment · Research on childhood obesity development

  19. Address: Computer Sciences Department University of Tulsa

    E-Print Network [OSTI]

    Sen, Sandip

    VITA Sandip Sen Address: Computer Sciences Department University of Tulsa 600 South College Avenue Tulsa, OK 74104-3189 Phone: 918-631-2985 FAX: 918-631-3077 e-mail: sandip@utulsa.edu URL: http, University of Tulsa, Tulsa, OK (September, 2004 ­ present) Associate Professor, Department of Mathematical

  20. Addressing Nitrate in California's Drinking Water

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    for the California State Water Resources Control Board With a Focus on Tulare Lake Basin and Salinas Valley #12;Addressing Nitrate in California's Drinking Water With a Focus on Tulare Lake Basin and Salinas Lake Basin and Salinas Valley Groundwater. Report for the State Water Resources Control Board Report

  1. NEUTRON MULTIPLICITY AND ACTIVE WELL NEUTRON COINCIDENCE VERIFICATION MEASUREMENTS PERFORMED FOR MARCH 2009 SEMI-ANNUAL DOE INVENTORY

    SciTech Connect (OSTI)

    Dewberry, R.; Ayers, J.; Tietze, F.; Klapper, K.

    2010-02-05T23:59:59.000Z

    The Analytical Development (AD) Section field nuclear measurement group performed six 'best available technique' verification measurements to satisfy a DOE requirement instituted for the March 2009 semi-annual inventory. The requirement of (1) yielded the need for SRNL Research Operations Department Material Control & Accountability (MC&A) group to measure the Pu content of five items and the highly enrich uranium (HEU) content of two. No 14Q-qualified measurement equipment was available to satisfy the requirement. The AD field nuclear group has routinely performed the required Confirmatory Measurements for the semi-annual inventories for fifteen years using sodium iodide and high purity germanium (HpGe) {gamma}-ray pulse height analysis nondestructive assay (NDA) instruments. With appropriate {gamma}-ray acquisition modeling, the HpGe spectrometers can be used to perform verification-type quantitative assay for Pu-isotopics and HEU content. The AD nuclear NDA group is widely experienced with this type of measurement and reports content for these species in requested process control, MC&A booking, and holdup measurements assays Site-wide. However none of the AD HpGe {gamma}-ray spectrometers have been 14Q-qualified, and the requirement of reference 1 specifically excluded a {gamma}-ray PHA measurement from those it would accept for the required verification measurements. The requirement of reference 1 was a new requirement for which the Savannah River National Laboratory (SRNL) Research Operations Department (ROD) MC&A group was unprepared. The criteria for exemption from verification were: (1) isotope content below 50 grams; (2) intrinsically tamper indicating or TID sealed items which contain a Category IV quantity of material; (3) assembled components; and (4) laboratory samples. Therefore all (SRNL) Material Balance Area (MBA) items with greater than 50 grams total Pu or greater than 50 grams HEU were subject to a verification measurement. The pass/fail criteria of reference 7 stated 'The facility will report measured values, book values, and statistical control limits for the selected items to DOE SR...', and 'The site/facility operator must develop, document, and maintain measurement methods for all nuclear material on inventory'. These new requirements exceeded SRNL's experience with prior semi-annual inventory expectations, but allowed the AD nuclear field measurement group to demonstrate its excellent adaptability and superior flexibility to respond to unpredicted expectations from the DOE customer. The requirements yielded five SRNL items subject to Pu verification and two SRNL items subject to HEU verification. These items are listed and described in Table 1.

  2. Business Name Year Address City State Zip Phone Email Address Contact

    E-Print Network [OSTI]

    water heating systems in the Tri-cities and surrounding area 2382 Solar Heating equipment installationBusiness Name Year Founded Address City State Zip Phone Email Address Contact First Name Contact Last Name URL Products/Services NAICS Code NAICS Description Energy Northwest 1957 PO Box 968 Richland

  3. Automated Verification of Quantum Protocols using MCMAS

    E-Print Network [OSTI]

    F. Belardinelli; P. Gonzalez; A. Lomuscio

    2012-07-04T23:59:59.000Z

    We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC), an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  4. Automated Verification of Practical Garbage Collectors

    E-Print Network [OSTI]

    Hawblitzel, Chris

    2010-01-01T23:59:59.000Z

    Garbage collectors are notoriously hard to verify, due to their low-level interaction with the underlying system and the general difficulty in reasoning about reachability in graphs. Several papers have presented verified collectors, but either the proofs were hand-written or the collectors were too simplistic to use on practical applications. In this work, we present two mechanically verified garbage collectors, both practical enough to use for real-world C# benchmarks. The collectors and their associated allocators consist of x86 assembly language instructions and macro instructions, annotated with preconditions, postconditions, invariants, and assertions. We used the Boogie verification generator and the Z3 automated theorem prover to verify this assembly language code mechanically. We provide measurements comparing the performance of the verified collector with that of the standard Bartok collectors on off-the-shelf C# benchmarks, demonstrating their competitiveness.

  5. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  6. Patient position verification using small IMRT fields

    SciTech Connect (OSTI)

    Bol, G. H.; Heide, U. A. van der; Nederveen, A. J.; Kotte, A. N. T. J.; Lagendijk, J. J. W. [Department of Radiotherapy, University Medical Center Utrecht, Heidelberglaan 100, 3584 CX Utrecht (Netherlands)

    2006-07-15T23:59:59.000Z

    A commonly used approach to quantify and minimize patient setup errors is by using electronic portal imaging devices (EPIDs). The position of the tumor can be verified indirectly by matching the bony anatomy to a reference image containing the same structures. In this paper we present two off-line methods for detecting the position of the bony anatomy automatically, even if every single portal image of each segment of an IMRT treatment beam contains insufficient matching information. Extra position verification fields will no longer be necessary, which reduces the total dose to the patient. The first method, the stack matching method (SMM), stacks the portal image of each segment of a beam to a three dimensional (3D) volume, and this volume is subsequently used during the matching phase. The second method [the averaged projection matching method (APMM)], is a simplification of the first one, since the initially created volume is reduced again to a 2D artificial image, which speeds up the matching procedure considerably, without a significant loss of accuracy. Matching is based on normalized mutual information. We demonstrate our methods by comparing them to existing matching routines, such as matching based on the largest segment. Both phantom and patient experiments show that our methods are comparable with the results obtained from standard position verification methods. The matches are verified by means of visual inspection. Furthermore, we show that when a distinct area of 40-60 cm{sup 2} of the EPID is exposed during one treatment beam, both SMM and APMM are able to deliver a good matching result.

  7. TFE Verification Program. Semiannual report for the period ending March 31, 1993

    SciTech Connect (OSTI)

    Not Available

    1993-05-01T23:59:59.000Z

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE (thermionic fuel element) suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern.

  8. The Challenge for Arms Control Verification in the Post-New START World

    SciTech Connect (OSTI)

    Wuest, C R

    2012-05-24T23:59:59.000Z

    Nuclear weapon arms control treaty verification is a key aspect of any agreement between signatories to establish that the terms and conditions spelled out in the treaty are being met. Historically, arms control negotiations have focused more on the rules and protocols for reducing the numbers of warheads and delivery systems - sometimes resorting to complex and arcane procedures for counting forces - in an attempt to address perceived or real imbalances in a nation's strategic posture that could lead to instability. Verification procedures are generally defined in arms control treaties and supporting documents and tend to focus on technical means and measures designed to ensure that a country is following the terms of the treaty and that it is not liable to engage in deception or outright cheating in an attempt to circumvent the spirit and the letter of the agreement. As the Obama Administration implements the articles, terms, and conditions of the recently ratified and entered-into-force New START treaty, there are already efforts within and outside of government to move well below the specified New START levels of 1550 warheads, 700 deployed strategic delivery vehicles, and 800 deployed and nondeployed strategic launchers (Inter-Continental Ballistic Missile (ICBM) silos, Submarine-Launched Ballistic Missile (SLBM) tubes on submarines, and bombers). A number of articles and opinion pieces have appeared that advocate for significantly deeper cuts in the U.S. nuclear stockpile, with some suggesting that unilateral reductions on the part of the U.S. would help coax Russia and others to follow our lead. Papers and studies prepared for the U.S. Department of Defense and at the U.S. Air War College have also been published, suggesting that nuclear forces totaling no more than about 300 warheads would be sufficient to meet U.S. national security and deterrence needs. (Davis 2011, Schaub and Forsyth 2010) Recent articles by James M. Acton and others suggest that the prospects for maintaining U.S. security and minimizing the chances of nuclear war, while deliberately reducing stockpiles to a few hundred weapons, is possible but not without risk. While the question of the appropriate level of cuts to U.S. nuclear forces is being actively debated, a key issue continues to be whether verification procedures are strong enough to ensure that both the U.S. and Russia are fulfilling their obligations under the current New Start treaty and any future arms reduction treaties. A recent opinion piece by Henry Kissinger and Brent Scowcroft (2012) raised a number of issues with respect to governing a policy to enhance strategic stability, including: in deciding on force levels and lower numbers, verification is crucial. Particularly important is a determination of what level of uncertainty threatens the calculation of stability. At present, that level is well within the capabilities of the existing verification systems. We must be certain that projected levels maintain - and when possible, reinforce - that confidence. The strengths and weaknesses of the New START verification regime should inform and give rise to stronger regimes for future arms control agreements. These future arms control agreements will likely need to include other nuclear weapons states and so any verification regime will need to be acceptable to all parties. Currently, China is considered the most challenging party to include in any future arms control agreement and China's willingness to enter into verification regimes such as those implemented in New START may only be possible when it feels it has reached nuclear parity with the U.S. and Russia. Similarly, in keeping with its goals of reaching peer status with the U.S. and Russia, Frieman (2004) suggests that China would be more willing to accept internationally accepted and applied verification regimes rather than bilateral ones. The current verification protocols specified in the New START treaty are considered as the baseline case and are contrasted with possible alternative verification protocols that could be e

  9. M&V Guidelines: Measurement and Verification for Federal Energy...

    Broader source: Energy.gov (indexed) [DOE]

    M&V Guidelines: Measurement and Verifi cation for Federal Energy Projects Version 3.0 M&V Guidelines: Measurement and Verification for Federal Energy Projects Version 3.0 Prepared...

  10. M&V Guidelines: Measurement and Verification for Federal Energy...

    Broader source: Energy.gov (indexed) [DOE]

    M&V Guidelines: Measurement and Verification for Federal Energy Projects Version 4.0 Prepared for the U.S. Department of Energy Federal Energy Management Program By

  11. IT Licentiate theses Practical Verification of Real-Time Systems

    E-Print Network [OSTI]

    David, Alexandre

    IT Licentiate theses 2001-013 Practical Verification of Real-Time Systems ALEXANDRE DAVID UPPSALA UPPSALA SWEDEN Dissertation for the degree of Licentiate of Philosophy in Computer Science at Uppsala

  12. IT Licentiate theses Practical Verification of RealTime Systems

    E-Print Network [OSTI]

    David, Alexandre

    IT Licentiate theses 2001­013 Practical Verification of Real­Time Systems ALEXANDRE DAVID UPPSALA UPPSALA SWEDEN Dissertation for the degree of Licentiate of Philosophy in Computer Science at Uppsala

  13. A Framework for Verification of Software with Time and Probabilities

    E-Print Network [OSTI]

    Oxford, University of

    verification techniques are able to establish sys- tem properties such as "the probability of an airbag failing quantitative properties. These might include, for example, "the probability of an airbag failing to deploy

  14. DRAFT Measurement & Verification Guidelines Version 4.0

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  15. Introduction to Measurement and Verification for DOE Super ESPC Projects

    Broader source: Energy.gov [DOE]

    Document offers an overview of why and how measurement and verification is conducted in super energy savings performance contracts (ESPC) projects. Topics include allocating project risk, steps to verify savings, and M&V plans and reports.

  16. INL/EXT-14-33201 RELAP-7 Software Verification

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    01 RELAP-7 Software Verification and Validation Plan Curtis L. Smith Yong-Joon Choi Ling Zou September 25, 2014 NOTICE This report was prepared as an account of work sponsored by...

  17. Precise Steps for Choreography Modeling for SOA Validation and Verification

    E-Print Network [OSTI]

    Southampton, University of

    as the next evolutionary step to cope with the software complexity of ERP systems where monolithic approaches component models by verification. This fits well into the model-driven development approach practiced at SAP

  18. Process Abstraction in the Verification of Temporal Properties 

    E-Print Network [OSTI]

    Bruns, Glen R

    as abstraction operations. We show that an abstract process satisfies a property expressed as a temporal logic formula just if the original process satisfies a transformed formula. We define various abstraction operators and illustrate their use in verification...

  19. Verification and Validation of RADTRAN 5.5.

    SciTech Connect (OSTI)

    Osborn, Douglas.; Weiner, Ruth F.; Mills, George Scott; Hamp, Steve C.

    2005-02-01T23:59:59.000Z

    This document contains a description of the verification and validation process used for the RADTRAN 5.5 code. The verification and validation process ensured the proper calculational models and mathematical and numerical methods were used in the RADTRAN 5.5 code for the determination of risk and consequence assessments. The differences between RADTRAN 5 and RADTRAN 5.5 are the addition of tables, an expanded isotope library, and the additional User-Defined meteorological option for accident dispersion. 3

  20. Enhanced verification test suite for physics simulation codes

    SciTech Connect (OSTI)

    Kamm, James R.; Brock, Jerry S.; Brandon, Scott T.; Cotrell, David L.; Johnson, Bryan; Knupp, Patrick; Rider, William J.; Trucano, Timothy G.; Weirs, V. Gregory

    2008-09-01T23:59:59.000Z

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations.

  1. A robot manipulator calibration procedure with experimental verification

    E-Print Network [OSTI]

    Padavala, Satya Srinivas

    1988-01-01T23:59:59.000Z

    A ROBOT MANIPULATOR CALIBRATION PROCEDURE WITH EXPERIMENTAL VERIFICATION A Thesis by SATYA SRINIVAS PADAVALA Submitted to the Graduate College of Texas ARM University in partial fulfillment of the requirement for the degree of MASTER... OF SCIENCE May 1988 Major Subject: Mechanical Engineering A ROBOT MANIPULATOR CALIBRATION PROCEDURE WITH EXPERIMENTAL VERIFICATION A Thesis by SATYA SRINIVAS PADAVALA Approved as to style and content by: njamin W. M ng (Chairman of Co 'ttee) jr gi...

  2. Become an SEP Verification Body | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergyDepartmentWind SitingVerification Body Become an SEP Verification

  3. Dynamic address allocation protocols for Mobile ad hoc networks

    E-Print Network [OSTI]

    Patchipulusu, Praveena

    2001-01-01T23:59:59.000Z

    Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

  4. Addressing the Crisis in Fundamental Physics

    E-Print Network [OSTI]

    Christopher W. Stubbs

    2007-12-18T23:59:59.000Z

    I present the case for fundamental physics experiments in space playing an important role in addressing the current "dark energy'' crisis. If cosmological observations continue to favor a value of the dark energy equation of state parameter w=-1, with no change over cosmic time, then we will have difficulty understanding this new fundamental physics. We will then face a very real risk of stagnation unless we detect some other experimental anomaly. The advantages of space-based experiments could prove invaluable in the search for the a more complete understanding of dark energy. This talk was delivered at the start of the Fundamental Physics Research in Space Workshop in May 2006.

  5. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical...

    Broader source: Energy.gov (indexed) [DOE]

    Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company:...

  6. Strategies to Address Split Incentives in Multifamily Buildings...

    Office of Environmental Management (EM)

    Strategies to Address Split Incentives in Multifamily Buildings Strategies to Address Split Incentives in Multifamily Buildings Better Buildings Neighborhood Program Multifamily ...

  7. NAP Coalition Response to DOE RFI: Addressing Policy and Logistical...

    Energy Savers [EERE]

    NAP Coalition Response to DOE RFI: Addressing Policy and Logistical Challenges to Smart Grid Implementation NAP Coalition Response to DOE RFI: Addressing Policy and Logistical...

  8. Response to Request for Information titled "Addressing Policy...

    Energy Savers [EERE]

    to Request for Information titled "Addressing Policy and Logistical Challenges to Smart Grid Implementation" Response to Request for Information titled "Addressing Policy and...

  9. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Environmental Management (EM)

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  10. Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology Plenary IV: Advances in Bioenergy...

  11. NERSC Organizational Changes to Better Address Evolving Data...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC Organizational Changes to Better Address Evolving Data Environment NERSC Implements Organizational Changes to Better Address Evolving Data Environment February 23, 2015...

  12. New York Independent System Operator, Smart Grid RFI: Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Independent System Operator, Smart Grid RFI: Addressing Policy and Logistical Challenges. New York Independent System Operator, Smart Grid RFI: Addressing Policy and Logistical...

  13. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2013 DOE...

  14. Bush Administration Plays Leading Role in Studying and Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Plays Leading Role in Studying and Addressing Global Climate Change Bush Administration Plays Leading Role in Studying and Addressing Global Climate Change February 27, 2007 -...

  15. Addressing Policy and Logistical Challenges to smart grid Implementati...

    Energy Savers [EERE]

    Addressing Policy and Logistical Challenges to smart grid Implementation: eMeter Response to Department of Energy RFI Addressing Policy and Logistical Challenges to smart grid...

  16. Recent Research to Address Technical Barriers to Increased Use...

    Broader source: Energy.gov (indexed) [DOE]

    Recent Research to Address Technical Barriers to Increased Use of Biodiesel Recent Research to Address Technical Barriers to Increased Use of Biodiesel 2005 Diesel Engine Emissions...

  17. Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical...

    Energy Savers [EERE]

    Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Implementation Okaloosa Gas District Smart Grid RFI: Addressing Policy and...

  18. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...

    Energy Savers [EERE]

    Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation...

  19. Smart Grid RFI: Addressing Policy and Logistical Challenges....

    Broader source: Energy.gov (indexed) [DOE]

    of DRSG to DOE Smart Grid RFI: Addressing Policy and Logistical Challenges Association of Home Appliance Manufacturers Comments on Smart Grid RFI Addressing Policy and Logistical...

  20. Measurement of electron neutrino CCQE-like cross-section in MINERvA

    E-Print Network [OSTI]

    Jeremy Wolcott; for the MINERvA collaboration

    2015-01-21T23:59:59.000Z

    The electron-neutrino charged-current quasi-elastic (CCQE) cross-section on nuclei is an important input parameter to appearance-type neutrino oscillation experiments. Current experiments typically work from the muon neutrino cross-section and apply corrections from theoretical arguments to obtain a prediction for the electron neutrino cross-section, but to date there has been no experimental verification of the estimates for this channel at an energy scale appropriate to such experiments. We present a preliminary result from the MINERvA experiment on the first measurement of an exclusive reaction in few-GeV electron neutrino interactions, namely, the cross-section for a CCQE-like process. The result is given both as differential cross-sections vs. the electron energy, electron angle, and $Q^{2}$, as well as a total cross-section vs. neutrino energy.

  1. Section 1: Contact Information Section 2: Employment History

    E-Print Network [OSTI]

    Section 1: Contact Information Section 2: Employment History Section 3: Educational History Section 4: Additional Required Information Employment Application The Ernest Orlando Lawrence Berkeley National Laboratory is an equal opportunity employer committed to the development of a diverse workforce

  2. Simplifying EPID dosimetry for IMRT treatment verification

    SciTech Connect (OSTI)

    Pecharroman-Gallego, R.; Mans, Anton; Sonke, Jan-Jakob; Stroom, Joep C.; Olaciregui-Ruiz, Igor; Herk, Marcel van; Mijnheer, Ben J. [Department of Radiation Oncology, The Netherlands Cancer Institute-Antoni van Leeuwenhoek Hospital, Plesmanlaan 121, 1066 CX Amsterdam (Netherlands)

    2011-02-15T23:59:59.000Z

    Purpose: Electronic portal imaging devices (EPIDs) are increasingly used for IMRT dose verification, both pretreatment and in vivo. In this study, an earlier developed backprojection model has been modified to avoid the need for patient-specific transmission measurements and, consequently, leads to a faster procedure. Methods: Currently, the transmission, an essential ingredient of the backprojection model, is estimated from the ratio of EPID measurements with and without a phantom/patient in the beam. Thus, an additional irradiation to obtain ''open images'' under the same conditions as the actual phantom/patient irradiation is required. However, by calculating the transmission of the phantom/patient in the direction of the beam instead of using open images, this extra measurement can be avoided. This was achieved by using a model that includes the effect of beam hardening and off-axis dependence of the EPID response on photon beam spectral changes. The parameters in the model were empirically obtained by performing EPID measurements using polystyrene slab phantoms of different thickness in 6, 10, and 18 MV photon beams. A theoretical analysis to verify the sensitivity of the model with patient thickness changes was performed. The new model was finally applied for the analysis of EPID dose verification measurements of step-and-shoot IMRT treatments of head and neck, lung, breast, cervix, prostate, and rectum patients. All measurements were carried out using Elekta SL20i linear accelerators equipped with a hydrogenated amorphous silicon EPID, and the IMRT plans were made using PINNACLE software (Philips Medical Systems). Results: The results showed generally good agreement with the dose determined using the old model applying the measured transmission. The average differences between EPID-based in vivo dose at the isocenter determined using either the new model for transmission and its measured value were 2.6{+-}3.1%, 0.2{+-}3.1%, and 2.2{+-}3.9% for 47 patients treated with 6, 10, and 18 MV IMRT beams, respectively. For the same group of patients, the differences in mean {gamma} analysis (3% maximum dose, 3 mm) were 0.16{+-}0.26%, 0.21{+-}0.24%, and 0.02{+-}0.12%, respectively. For a subgroup of 11 patients, pretreatment verification was also performed, showing similar dose differences at the isocenter: -1.9{+-}0.9%, -1.4{+-}1.2%, and -0.4{+-}2.4%, with somewhat lower mean {gamma} difference values: 0.01{+-}0.09%, 0.01{+-}0.07%, and -0.09{+-}0.10%, respectively. Clinical implementation of the new model would save 450 h/yr spent in measurement of open images. Conclusions: It can be concluded that calculating instead of measuring the transmission leads to differences in the isocenter dose generally smaller than 2% (2.6% for 6 MV photon beams for in vivo dose) and yielded only slightly higher {gamma}-evaluation parameter values in planes through the isocenter. Hence, the new model is suitable for clinical implementation and measurement of open images can be omitted.

  3. Interim Letter Report - Verification Survey of Partial Grid E9, David Witherspoon, Inc. 1630 Site Knoxville, Tennessee

    SciTech Connect (OSTI)

    P.C. Weaver

    2008-06-12T23:59:59.000Z

    Conduct verification surveys of available grids at the DWI 1630 in Knoxville, Tennessee. A representative with the Independent Environmental Assessment and Verification (IEAV) team from ORISE conducted a verification survey of a partial area within Grid E9.

  4. Battery Technology Life Verification Testing and Analysis

    SciTech Connect (OSTI)

    Jon P. Christophersen; Gary L. Hunt; Ira Bloom; Ed Thomas; Vince Battaglia

    2007-12-01T23:59:59.000Z

    A critical component to the successful commercialization of batteries for automotive applications is accurate life prediction. The Technology Life Verification Test (TLVT) Manual was developed to project battery life with a high level of statistical confidence within only one or two years of accelerated aging. The validation effort that is presently underway has led to several improvements to the original methodology. For example, a newly developed reference performance test revealed a voltage path dependence effect on resistance for lithium-ion cells. The resistance growth seems to depend on how a target condition is reached (i.e., by a charge or a discharge). Second, the methodology for assessing the level of measurement uncertainty was improved using a propagation of errors in the fundamental measurements to the derived response (e.g., resistance). This new approach provides a more realistic assessment of measurement uncertainty. Third, the methodology for allocating batteries to the test matrix has been improved. The new methodology was developed to assign batteries to the matrix such that the average of each test group would be representative of the overall population. These changes to the TLVT methodology will help to more accurately predict a battery technology’s life capability with a high degree of confidence.

  5. Understanding correlation coefficients in treaty verification. Revised

    SciTech Connect (OSTI)

    DeVolpi, A.

    1993-02-01T23:59:59.000Z

    When a pair of images is compared on a point-by-point basis, the linear-correlation coefficient is usually used as a measure of similarity or dissimilarity. This report evaluates the theoretical underpinnings and limitations of the linear-correlation coefficient, as well as other related statistics, particularly for cases where inherent white noise is present. As a result of the limitations in linear-correlation, an additional step has been derived -- local-sum clustering -- in order to improve recognition of small dissimilarities in a pair of otherwise identical images. Results show an optimal three-stage procedure: first, establish congruence of the two images; second, use the linear-correlation coefficient as a test of true negatives; and, third, qualify a true positive by using the cluster (local-sum) method. These three algorithmic stages would be especially useful in application to arms control treaty verification, particularly for comparison of unique identifiers (tags or seals). This is illustrated by comparing scanning-electron microscope topographical images for an intrinsic-surface tag.

  6. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    SciTech Connect (OSTI)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E. [Nuclear and Radiological Engineering Program, George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, 770 State St, Atlanta, GA 30332-0745 (United States)

    2013-07-01T23:59:59.000Z

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  7. 14655 Section J

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    0, Revision 4 ATTACHMENT J.10 WAGE DETERMINATIONS - SERVICE CONTRACT ACT (SCA) AND DAVIS-BACON ACT J.10-1 Plateau Remediation Contract Section J Contract No. DE-AC06-08RL14788...

  8. Building, landscape and section

    E-Print Network [OSTI]

    Johnson, Daniel B. (Daniel Bryant)

    1992-01-01T23:59:59.000Z

    All buildings have in their section a relationship to the landscape on which they are sited. Therefore we as inhabitants of these buildings may or may not have a relationship with the landscape. It is the supposition of ...

  9. Name: ) Section: ' PID:

    E-Print Network [OSTI]

    MATH 173 ' Quiz 4 Thursday Sep. 23. Name: ) Section: ' PID: Solve the problem systematically and neatly and show all your work. 1.(3pts) Find the length of the ...

  10. Field Scale Test and Verification of CHP System at the Ritz Carlton...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Field Scale Test and Verification of CHP System at the Ritz Carlton, San Francisco, August 2007 Field Scale Test and Verification of CHP System at the Ritz Carlton, San Francisco,...

  11. Employment Verification and Compensation Release Authorization Form Forward the completed form

    E-Print Network [OSTI]

    Employment Verification and Compensation Release Authorization Form Forward the completed form: Via Research Triangle Park, NC 27709 Attn: Employment Verification Name information relative to my employment with the IBM Corporation

  12. Address Allocation ModelsAddress Allocation Models Clean Slate Research "Agenda"

    E-Print Network [OSTI]

    Guerin, Roch

    ----------------------------------------- Clean Slate Research "Agenda" R G iR. Guerin University of Pennsylvania 1 Some Level Setting · What does "clean slate research" have to do with allocation of IP addresses? ­ Learn from past mistakes and try ­ As a matter of fact the IPv6 vs. IPv4 story holds many lessons that clean slate proposals can benefit from

  13. Monitoring/Verification using DMS: TATP Example

    SciTech Connect (OSTI)

    Stephan Weeks; Kevin Kyle

    2008-03-01T23:59:59.000Z

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the use of explosives or chemical and biological weapons in terrorist activities. Two peroxide-based liquid explosives, triacetone triperoxide (TATP) and hexamethylene triperoxide diamine (HMTD), are synthesized from common chemicals such as hydrogen peroxide, acetone, sulfuric acid, ammonia, and citric acid (Figure 1). Recipes can be readily found on the Internet by anyone seeking to generate sufficient quantities of these highly explosive chemicals to cause considerable collateral damage. Detection of TATP and HMTD by advanced sensing systems can provide the early warning necessary to prevent terror plots from coming to fruition. DMS is currently one of the foremost emerging technologies for the separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. DMS separates and identifies ions at ambient pressures by utilizing the non-linear dependence of an ion's mobility on the radio frequency (rf) electric field strength. GC is widely considered to be one of the leading analytical methods for the separation of chemical species in complex mixtures. Advances in the technique have led to the development of low-thermal-mass fast GC columns. These columns are capable of completing runs in less than 3 minutes. Fast GC columns are also more compact than their traditional counterparts. An earlier collaborative effort involving these authors optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for the detection of TATP (Figure 2). The unit combines the separation capabilities of GC with the selectivity of DMS. Analytes are identified both by their elution time from the column and by the characteristic response in the DMS spectrum. Analysis times required to obtain results for these analytes are approximately 80 seconds for TATP and 160 seconds for HMTD (Figure 3). The limit of detection for both TATP and HMTD is approximately 1 ng/{micro}L. Substances that could interfere with the detection of peroxide-based explosives have been studied. Both the GC elution time and the DMS spectral peak locations were unique and do not hinder the detection of either TATP or HMTD.

  14. Comment submitted by Energizer Battery Manufacturing, Inc. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Energizer Battery Manufacturing, Inc. regarding the Energy Star Verification Testing Program

  15. Comment submitted by Hoshizaki America, Inc. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Hoshizaki America, Inc. regarding the Energy Star Verification Testing Program

  16. Independent Verification Survey Report for the Long Island Solar Farm, Brookhaven National Laboratory, Upton, New York

    SciTech Connect (OSTI)

    E.M. Harpenau

    2010-11-15T23:59:59.000Z

    5119-SR-01-0 INDEPENDENT VERIFICATION SURVEY REPORT FOR THE LONG ISLAND SOLAR FARM, BROOKHAVEN NATIONAL LABORATORY

  17. Comment submitted by United Lighting, Inc. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by United Lighting, Inc. regarding the Energy Star Verification Testing Program

  18. INDEPENDENT VERIFICATION REVIEW AND SURVEY of the Argonne National Laboratory Building 301 Footprint

    SciTech Connect (OSTI)

    E.N. Bailey

    2010-05-26T23:59:59.000Z

    INDEPENDENT VERIFICATION REVIEW AND SURVEY of the Argonne National Laboratory Building 301 Footprint, Argonne Illinois 5061-SR-01-0

  19. Comment submitted by A. O. Smith Corporation regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by A. O. Smith Corporation regarding the Energy Star Verification Testing Program

  20. Comment submitted by Hobart/ITW Food Equipment Group regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Hobart/ITW Food Equipment Group regarding the Energy Star Verification Testing Program

  1. Measurement and Verification Activities Required in the Energy Savings Performance Contract Process

    Broader source: Energy.gov [DOE]

    There are four major measurement and verification (M&V) activities in the energy savings performance contract (ESPC) procurement process.

  2. Comment submitted by BSH Home Appliances Corporation regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by BSH Home Appliances Corporation regarding the Energy Star Verification Testing Program

  3. Efficient Methods for Practical Fully-Homomorphic Symmetric-key Encryption, Randomization, and Verification

    E-Print Network [OSTI]

    , and Verification Aviad Kipnis akipnis@nds.com; Eli Hibshoosh ehibshoo@nds.com Abstract We present high performance

  4. EECLP Webinar #2: Quality Assurance and Evaluation Monitoring Verification-- Text Version

    Broader source: Energy.gov [DOE]

    Below is the text version of the EECLP Webinar 2: Quality Assurance and Evaluation Monitoring Verification, presented in December 2014.

  5. Comment submitted by the Alliance for Water Efficiency (AWE) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the Alliance for Water Efficiency (AWE) regarding the Energy Star Verification Testing Program

  6. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

    2014-03-14T23:59:59.000Z

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  7. Formal verification of complex properties on PLC programs

    E-Print Network [OSTI]

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01T23:59:59.000Z

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.

  8. Bibliography for Verification and Validation in Computational Simulations

    SciTech Connect (OSTI)

    Oberkampf, W.L.

    1998-10-01T23:59:59.000Z

    A bibliography has been compiled dealing with the verification and validation of computational simulations. The references listed in this bibliography are concentrated in the field of computational fluid dynamics (CFD). However, references from the following fields are also included: operations research, heat transfer, solid dynamics, software quality assurance, software accreditation, military systems, and nuclear reactor safety. This bibliography, containing 221 references, is not meant to be comprehensive. It was compiled during the last ten years in response to the author's interest and research in the methodology for verification and validation. The emphasis in the bibliography is in the following areas: philosophy of science underpinnings, development of terminology and methodology, high accuracy solutions for CFD verification, experimental datasets for CFD validation, and the statistical quantification of model validation. This bibliography should provide a starting point for individual researchers in many fields of computational simulation in science and engineering.

  9. Programmatic methods for addressing contaminated volume uncertainties.

    SciTech Connect (OSTI)

    DURHAM, L.A.; JOHNSON, R.L.; RIEMAN, C.R.; SPECTOR, H.L.; Environmental Science Division; U.S. ARMY CORPS OF ENGINEERS BUFFALO DISTRICT

    2007-01-01T23:59:59.000Z

    Accurate estimates of the volumes of contaminated soils or sediments are critical to effective program planning and to successfully designing and implementing remedial actions. Unfortunately, data available to support the preremedial design are often sparse and insufficient for accurately estimating contaminated soil volumes, resulting in significant uncertainty associated with these volume estimates. The uncertainty in the soil volume estimates significantly contributes to the uncertainty in the overall project cost estimates, especially since excavation and off-site disposal are the primary cost items in soil remedial action projects. The Army Corps of Engineers Buffalo District's experience has been that historical contaminated soil volume estimates developed under the Formerly Utilized Sites Remedial Action Program (FUSRAP) often underestimated the actual volume of subsurface contaminated soils requiring excavation during the course of a remedial activity. In response, the Buffalo District has adopted a variety of programmatic methods for addressing contaminated volume uncertainties. These include developing final status survey protocols prior to remedial design, explicitly estimating the uncertainty associated with volume estimates, investing in predesign data collection to reduce volume uncertainties, and incorporating dynamic work strategies and real-time analytics in predesign characterization and remediation activities. This paper describes some of these experiences in greater detail, drawing from the knowledge gained at Ashland1, Ashland2, Linde, and Rattlesnake Creek. In the case of Rattlesnake Creek, these approaches provided the Buffalo District with an accurate predesign contaminated volume estimate and resulted in one of the first successful FUSRAP fixed-price remediation contracts for the Buffalo District.

  10. Page 1 of 4 Refrigerant Charge Verification: 70F Return Air Requirement

    E-Print Network [OSTI]

    Page 1 of 4 Refrigerant Charge Verification: 70°F Return Air Requirement This article describes refrigerant charge verification when the outdoor temperature is between 55 and 65°F, in accordance than 70°F has been an explicit requirement since the refrigerant charge verification protocol was first

  11. Real-time system verification techniques based on abstraction/deduction and model checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Real-time system verification techniques based on abstraction/deduction and model checking Eun in or- der to obtain a powerful and highly automatic verification environment for real-time systems. One-Young.Kang@loria.fr Abstract. Our research focuses on verification techniques for real-time systems based on predicate

  12. A knowledge-based verification method for dynamic access control policies

    E-Print Network [OSTI]

    Ryan, Mark

    . This abstraction of knowledge results in a simpler model, which makes the verification efficient, and is powerful may be a prior knowledge, or gained by exploring the system. In both cases, a verification method proposes a dynamic access control model supporting knowledge- based verification through reasoning about

  13. A Reachability-Based Method for Large-Signal Behavior Verification of DC-DC Converters

    E-Print Network [OSTI]

    Liberzon, Daniel

    -loop, large-signal system behavior verification, and iv) switching detail modeling. In open-loop, large´inguez-Garc´ia, Member, IEEE Abstract--A method for large-signal behavior verification of power electronics DC behavior verification, lengthy time-domain simula- tions are conducted to analyze the system response

  14. The KeY Platform for Verification and Analysis of Java Programs

    E-Print Network [OSTI]

    Mostowski, Wojciech

    pure functional verification. We use the current release of the KeY system as an example to explain and prove this claim. 1 Overview Motivation. Over the last decades the reach and power of verification of real world systems. The basic technologies of deductive program verification have matured. State

  15. Finite countermodels for safety verification of parameterized tree systems

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2011-01-01T23:59:59.000Z

    In this paper we deal with verification of safety properties of parameterized systems with a tree topology. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel method is shown is at least as powerful as regular tree model checking and as the methods based on monotonic abstraction and backwards symbolic reachability. The practical efficiency of the method is illustrated on a set of examples taken from the literature.

  16. Verification for measurement-only blind quantum computing

    E-Print Network [OSTI]

    Tomoyuki Morimae

    2014-06-19T23:59:59.000Z

    Blind quantum computing is a new secure quantum computing protocol where a client who does not have any sophisticated quantum technlogy can delegate her quantum computing to a server without leaking any privacy. It is known that a client who has only a measurement device can perform blind quantum computing [T. Morimae and K. Fujii, Phys. Rev. A {\\bf87}, 050301(R) (2013)]. It has been an open problem whether the protocol can enjoy the verification, i.e., the ability of client to check the correctness of the computing. In this paper, we propose a protocol of verification for the measurement-only blind quantum computing.

  17. Supporting the President's Arms Control and Nonproliferation Agenda: Transparency and Verification for Nuclear Arms Reductions

    SciTech Connect (OSTI)

    Doyle, James E [Los Alamos National Laboratory; Meek, Elizabeth [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    The President's arms control and nonproliferation agenda is still evolving and the details of initiatives supporting it remain undefined. This means that DOE, NNSA, NA-20, NA-24 and the national laboratories can help define the agenda, and the policies and the initiatives to support it. This will require effective internal and interagency coordination. The arms control and nonproliferation agenda is broad and includes the path-breaking goal of creating conditions for the elimination of nuclear weapons. Responsibility for various elements of the agenda will be widely scattered across the interagency. Therefore an interagency mapping exercise should be performed to identify the key points of engagement within NNSA and other agencies for creating effective policy coordination mechanisms. These can include informal networks, working groups, coordinating committees, interagency task forces, etc. It will be important for NA-20 and NA-24 to get a seat at the table and a functional role in many of these coordinating bodies. The arms control and nonproliferation agenda comprises both mature and developing policy initiatives. The more mature elements such as CTBT ratification and a follow-on strategic nuclear arms treaty with Russia have defined milestones. However, recent press reports indicate that even the START follow-on strategic arms pact that is planned to be complete by the end of 2009 may take significantly longer and be more expansive in scope. The Russians called for proposals to count non-deployed as well as deployed warheads. Other elements of the agenda such as FMCT, future bilateral nuclear arms reductions following a START follow-on treaty, nuclear posture changes, preparations for an international nuclear security summit, strengthened international safeguards and multilateral verification are in much earlier stages of development. For this reason any survey of arms control capabilities within the USG should be structured to address potential needs across the near-term (1-4) years and longer-term (5-10) years planning horizons. Some final observations include acknowledging the enduring nature of several key objectives on the Obama Administration's arms control and nonproliferation agenda. The CTBT, FMCT, bilateral nuclear arms reductions and strengthening the NPT have been sought by successive U.S. Administrations for nearly thirty years. Efforts towards negotiated arms control, although de-emphasized by the G.W. Bush Administration, have remained a pillar of U.S. national security strategy for decades and are likely to be of enduring if not increasing importance for decades to come. Therefore revitalization and expansion of USG capabilities in this area can be a positive legacy no matter what near-term arms control goals are achieved over the next four years. This is why it is important to reconstruct integrated bureaucratic, legislative, budgetary and diplomatic strategies to sustain the arms control and nonproliferation agenda. In this endeavor some past lessons must be taken to heart to avoid bureaucratic overkill and keep interagency policy-making and implementation structures lean and effective. On the Technical side a serious, sustained multilateral program to develop, down select and performance test nuclear weapons dismantlement verification technologies and procedures should be immediately initiated. In order to make this happen the United States and Russia should join with the UK and other interested states in creating a sustained, full-scale research and development program for verification at their respective nuc1ear weapons and defense establishments. The goals include development of effective technologies and procedures for: (1) Attribute measurement systems to certify nuclear warheads and military fissile materials; (2) Chain-of-custody methods to track items after they are authenticated and enter accountability; (3) Transportation monitoring; (4) Storage monitoring; (5) Fissile materials conversion verification. The remainder of this paper focuses on transparency and verification for nuclear arms a

  18. Programmatic methods for addressing contaminated volume uncertainties

    SciTech Connect (OSTI)

    Rieman, C.R.; Spector, H.L. [U.S. Army Corps of Engineers Buffalo District, Buffalo, NY (United States); Durham, L.A.; Johnson, R.L. [Argonne National Laboratory, Environmental Science Div., IL (United States)

    2007-07-01T23:59:59.000Z

    Accurate estimates of the volumes of contaminated soils or sediments are critical to effective program planning and to successfully designing and implementing remedial actions. Unfortunately, data available to support the pre-remedial design are often sparse and insufficient for accurately estimating contaminated soil volumes, resulting in significant uncertainty associated with these volume estimates. The uncertainty in the soil volume estimates significantly contributes to the uncertainty in the overall project cost estimates, especially since excavation and off-site disposal are the primary cost items in soil remedial action projects. The U.S. Army Corps of Engineers Buffalo District's experience has been that historical contaminated soil volume estimates developed under the Formerly Utilized Sites Remedial Action Program (FUSRAP) often underestimated the actual volume of subsurface contaminated soils requiring excavation during the course of a remedial activity. In response, the Buffalo District has adopted a variety of programmatic methods for addressing contaminated volume uncertainties. These include developing final status survey protocols prior to remedial design, explicitly estimating the uncertainty associated with volume estimates, investing in pre-design data collection to reduce volume uncertainties, and incorporating dynamic work strategies and real-time analytics in pre-design characterization and remediation activities. This paper describes some of these experiences in greater detail, drawing from the knowledge gained at Ashland 1, Ashland 2, Linde, and Rattlesnake Creek. In the case of Rattlesnake Creek, these approaches provided the Buffalo District with an accurate pre-design contaminated volume estimate and resulted in one of the first successful FUSRAP fixed-price remediation contracts for the Buffalo District. (authors)

  19. Developing a monitoring and verification plan with reference to the Australian Otway CO2 pilot project

    SciTech Connect (OSTI)

    Dodds, K.; Daley, T.; Freifeld, B.; Urosevic, M.; Kepic, A.; Sharma, S.

    2009-05-01T23:59:59.000Z

    The Australian Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC) is currently injecting 100,000 tons of CO{sub 2} in a large-scale test of storage technology in a pilot project in southeastern Australia called the CO2CRC Otway Project. The Otway Basin, with its natural CO{sub 2} accumulations and many depleted gas fields, offers an appropriate site for such a pilot project. An 80% CO{sub 2} stream is produced from a well (Buttress) near the depleted gas reservoir (Naylor) used for storage (Figure 1). The goal of this project is to demonstrate that CO{sub 2} can be safely transported, stored underground, and its behavior tracked and monitored. The monitoring and verification framework has been developed to monitor for the presence and behavior of CO{sub 2} in the subsurface reservoir, near surface, and atmosphere. This monitoring framework addresses areas, identified by a rigorous risk assessment, to verify conformance to clearly identifiable performance criteria. These criteria have been agreed with the regulatory authorities to manage the project through all phases addressing responsibilities, liabilities, and to assure the public of safe storage.

  20. Section D - G

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection 3161 SECTION BPART

  1. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Energy Savers [EERE]

    DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by...

  2. addressing medical coding: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (more) Muhit, Abdullah Al 2011-01-01 4 EZ Encoding: A Class of Irredundant Low Power Codes for Data Address and Multiplexed Address Buses Engineering Websites Summary: , we send...

  3. Slovene Ultra-Formal Address: Borrowing, Innovation, and Analysis

    E-Print Network [OSTI]

    Reindl, Donald F.

    2007-01-01T23:59:59.000Z

    osvetlile pojav, ki je prisoten v ve? slovanskih jezikih. Slovene has a system of address that differs from the basic binary address system of many European languages by grammatically distinguishing up to four levels of formality (informal, semiformal...

  4. MACCS2 development and verification efforts

    SciTech Connect (OSTI)

    Young, M.; Chanin, D.

    1997-03-01T23:59:59.000Z

    MACCS2 represents a major enhancement of the capabilities of its predecessor MACCS, the MELCOR Accident Consequence Code System. MACCS, released in 1987, was developed to estimate the potential impacts to the surrounding public of severe accidents at nuclear power plants. The principal phenomena considered in MACCS/MACCS2 are atmospheric transport and deposition under time-variant meteorology, short-term and long-term mitigative actions and exposure pathways, deterministic and stochastic health effects, and economic costs. MACCS2 was developed as a general-purpose analytical tool applicable to diverse reactor and nonreactor facilities. The MACCS2 package includes three primary enhancements: (1) a more flexible emergency response model, (2) an expanded library of radionuclides, and (3) a semidynamic food-chain model. In addition, errors that had been identified in MACCS version1.5.11.1 were corrected, including an error that prevented the code from providing intermediate-phase results. MACCS2 version 1.10 beta test was released to the beta-test group in May, 1995. In addition, the University of New Mexico (UNM) has completed an independent verification study of the code package. Since the beta-test release of MACCS2 version 1.10, a number of minor errors have been identified and corrected, and a number of enhancements have been added to the code package. The code enhancements added since the beta-test release of version 1.10 include: (1) an option to allow the user to input the {sigma}{sub y} and {sigma}{sub z} plume expansion parameters in a table-lookup form for incremental downwind distances, (2) an option to define different initial dimensions for up to four segments of a release, (3) an enhancement to the COMIDA2 food-chain model preprocessor to allow the user to supply externally calculated tables of tritium food-chain dose per unit deposition on farmland to support analyses of tritium releases, and (4) the capability to calculate direction-dependent doses.

  5. Neile Miller addresses DOE/NNSA intergovernmental meeting | National...

    National Nuclear Security Administration (NNSA)

    Neile Miller addresses DOENNSA intergovernmental meeting | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile...

  6. addressing soil gas: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Addressing the dryland decomposition conundrum by integrating vegetation structure, soil transport, and UV photodegradation Environmental Sciences and Ecology Websites Summary: ....

  7. Introduction Introduction Section 1

    E-Print Network [OSTI]

    of many people. These people share a love for the Deschutes, though they value the river in many different. The voices of many of people throughout the Deschutes subbasin were heard during the subbasin planningIntroduction Introduction Section 1 Now as in the past, The Deschutes River binds the people

  8. POLICY SECTIONS POLICY OFFICE

    E-Print Network [OSTI]

    Minnesota, University of

    POLICY SECTIONS POLICY OFFICE POLICIES FORMS PROCEDURES UNIVERSITY POLICY #12;guide to WRITING POLICIES Administrative policies align opera- tions, set behavior expectations across the University system and communicate policy roles and responsibilities. You, as the policy owner or writer, have the important task

  9. (Business/Store Name) (Business/Store Address)

    E-Print Network [OSTI]

    Maroncelli, Mark

    (Business/Store Name) (Business/Store Address) (City) (State) (Zip Code) (Business/Store Phone Number) (Business/Store Fax Number) (Business Description) (Business/Store Primary Contact) (Primary Contact E-mail address) (Business/Store Secondary Contact) (Secondary Contact E-mail Address) (Business

  10. Individually addressable cathodes with integrated focusing stack or detectors

    DOE Patents [OSTI]

    Thomas, Clarence E.; Baylor, Larry R.; Voelkl, Edgar; Simpson, Michael L.; Paulus, Michael J.; Lowndes, Douglas; Whealton, John; Whitson, John C.; Wilgen, John B.

    2005-07-12T23:59:59.000Z

    Systems and method are described for addressable field emission array (AFEA) chips. A plurality of individually addressable cathodes are integrated with an electrostatic focusing stack and/or a plurality of detectors on the addressable field emission array. The systems and methods provide advantages including the avoidance of space-charge blow-up.

  11. Self-adaptive software needs quantitative verification at Radu Calinescu

    E-Print Network [OSTI]

    Oxford, University of

    , performance and operating cost (e.g., energy consumption) of software. These techniques include model checkingSelf-adaptive software needs quantitative verification at runtime Radu Calinescu Department 1: The world and the machine. [19, 30]. In contrast, several mathematically-based modelling

  12. Self-adaptive software needs quantitative verification at Radu Calinescu

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , performance and operating cost (e.g., energy consumption) of software. These techniques include model checkingSelf-adaptive software needs quantitative verification at runtime Radu Calinescu Department"#.&*#.+$ Figure 1: The world and the machine. [19, 30]. In contrast, several mathematically-based modelling

  13. Verification of Network Management System Configurations David L. Cohrs

    E-Print Network [OSTI]

    Miller, Barton P.

    , with the use of simple, ad hoc tools. However in a large network, managing the net- work management system the amount of sharing and coordination possible in configuring the net- work management system. EachVerification of Network Management System Configurations David L. Cohrs (608) 262-6617 dave

  14. Automated Verification of Practical Garbage Collectors Chris Hawblitzel

    E-Print Network [OSTI]

    Petrank, Erez

    Automated Verification of Practical Garbage Collectors Chris Hawblitzel Microsoft Research One Technion Haifa 32000 Israel erez@cs.technion.ac.il Abstract Garbage collectors are notoriously hard in reasoning about reachability in graphs. Several papers have presented verified collectors, but either

  15. Verification of Data-Aware Commitment-Based Multiagent System

    E-Print Network [OSTI]

    De Giacomo, Giuseppe

    on the dynamics of such systems, and on the evolution of their commitments. This requires to lift the commitment I.2.11 [Artificial Intelligence]: Distributed Artificial Intelligence--Multiagent Systems; D.2Verification of Data-Aware Commitment-Based Multiagent System Marco Montali Diego Calvanese KRDB

  16. CLOSED OPERATION OF MULTIVESSEL BATCH DISTILLATION -EXPERIMENTAL VERIFICATION

    E-Print Network [OSTI]

    Skogestad, Sigurd

    1 CLOSED OPERATION OF MULTIVESSEL BATCH DISTILLATION - EXPERIMENTAL VERIFICATION Submitted to AICheÆcient operation, multicomponent distillation, batch distillation, total re ux operation ABSTRACT. The multivessel batch distillation column, as well as conven- tional batch distillation, may be operated in a closed

  17. Combining Tools for the Verification of FaultTolerant Systems

    E-Print Network [OSTI]

    Peleska, Jan - Fachbereich 3

    and verification of fault­tolerant systems according to the invent&verify paradigm. Our method is based on the CSP specifications (CSP process terms), refinement relations or combinations of these three description formalisms specification paradigms ac­ cording to the specific needs of each development step is essential to cope

  18. Verification of Soundness and Other Properties of Business Processes

    E-Print Network [OSTI]

    Sidorova, Natalia

    © 2007 by Olivia Oanea. All Rights Reserved. CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Oanea Oanea. Eindhoven : Technische Universiteit Eindhoven, 2007. Proefschrift. ISBN 978-90-386-11662 NUR 993 Dissertation Series D101 Printed by University Press Facilities, Eindhoven #12;Verification of Soundness

  19. Formal Verification of Unreliable Failure Detectors in Partially Synchronous Systems

    E-Print Network [OSTI]

    Mousavi, Mohammad

    Formal Verification of Unreliable Failure Detectors in Partially Synchronous Systems M. Atif TU/Eindhoven Dept. of Computer Science P.O. Box 513, 5600 MB Eindhoven, The Netherlands m.atif@tue.nl M.R. Mousavi TU/Eindhoven Dept. of Computer Science P.O. Box 513, 5600 MB Eindhoven, The Netherlands m

  20. MODELING AND VERIFICATION OF AN ATM PORT CONTROLLER IN VIS

    E-Print Network [OSTI]

    Tahar, Sofiène

    MODELING AND VERIFICATION OF AN ATM PORT CONTROLLER IN VIS Jianping Lu and Sofiène Tahar Dept port controller using model checking. The ATM port controller is part of the Cambridge Fairisle ATM on the model checking of the ATM port controller using the VIS tool from UC Berkeley. To this end, we

  1. Software Verification for Weak Memory via Program Transformation

    E-Print Network [OSTI]

    Kröning, Daniel

    on a PowerPC cluster, due to the memory model. We study this bug in detail in Sec. 5. This observation handle the write atomicity relaxation of Power/ARM: generality remains a challenge. Since we want verification w.r.t. weak memory. We present experi- ments for a broad variety of models (from x86-TSO to Power

  2. Getting Out of the Way Safety Verification without Compromise

    E-Print Network [OSTI]

    Sivilotti, Paul

    verification of adaptive cruise control algorithms require both discrete braking modes and overly conservative conditions for adaptive cruise control algorithms that do not require discontinuous braking and also allow · Assume global upper and lower braking bounds · Assume worst-case scenario (WCS) ­ Leader uses strongest

  3. 3D Scanning for Biometric Identification and Verification

    E-Print Network [OSTI]

    McShea, Daniel W.

    June 2010 3D Scanning for Biometric Identification and Verification Project Leads Anselmo Lastra example the subject's face could be rapidly scanned while his or her smart-card ID is being examined, and the system could then match the scan with data on the ID); (b) identification at a secure site or even

  4. Quantitative verification of ab initio self-consistent laser theory

    E-Print Network [OSTI]

    Stone, A. Douglas

    ­1564 (1998). 6. O. Painter, R. K. Lee, A. Scherer, A. Yariv, J. D. O'Brien, P. D. Dapkus, and I. Kim, "TwoQuantitative verification of ab initio self-consistent laser theory Li Ge,1 Robert J. Tandy,1 A¨ureci, A. D. Stone, and B. Collier, "Self-consistent multimode lasing theory for complex or random lasing

  5. LVT: A Layered Verification Technique for Distributed Computing Systems

    E-Print Network [OSTI]

    Olsson, Ron

    LVT: A Layered Verification Technique for Distributed Computing Systems Cui Zhang ? , Brian R of distributed computing systems with multiple component layers. Each lower layer in such a system provides languages as interfaces of systems, LVT treats each layer in a distributed computing system as a distributed

  6. A Proof System for Compositional Verification of Probabilistic Concurrent Processes

    E-Print Network [OSTI]

    Simpson, Alex

    A Proof System for Compositional Verification of Probabilistic Concurrent Processes Matteo Mio1 established itself as a powerful and widely applicable method for verifying properties of systems, with its-state systems. Moreover, even in the finite-state case, the applicability of model checking is limited

  7. Formal Verification of a Microprocessor Control Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    to the modeling and formal verification of the MESI cache coherence protocol for a system of n write-back cache a powerful alternative for dealing with these problems. In this paper we present a mathematical model on a mathematical model of the system under consideration, attempts to prove or disprove facts about the system

  8. Precise Dynamic Verification of Noninterference Gurvan Le Guernic

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Precise Dynamic Verification of Noninterference Gurvan Le Guernic INRIA-MSR - Parc Orsay Universit analysis is used to analyze some un- executed pieces of code in order to take into account all types is that nowadays it is nearly impossible for consumers to prevent the execution of "bad" code on their devices

  9. Cleanup Verification Package for the 618-2 Burial Ground

    SciTech Connect (OSTI)

    W. S. Thompson

    2006-12-28T23:59:59.000Z

    This cleanup verification package documents completion of remedial action for the 618-2 Burial Ground, also referred to as Solid Waste Burial Ground No. 2; Burial Ground No. 2; 318-2; and Dry Waste Burial Site No. 2. This waste site was used primarily for the disposal of contaminated equipment, materials and laboratory waste from the 300 Area Facilities.

  10. Verification of Function Block Diagram through Verilog Translation

    E-Print Network [OSTI]

    safety became a critical issue in nuclear power plant area because tra- ditional analog systems are being, Sungdeok Cha1 , Junbeom Yoo2 , and Geeyoung Park3 1 Div. of Computer Science, Korea Advanced Institute Institute, Daejeon, Republic of Korea gypark@kaeri.re.kr Abstract. The formal verification of FBD program

  11. Cleanup Verification Package for the 118-F-6 Burial Ground

    SciTech Connect (OSTI)

    H. M. Sulloway

    2008-10-02T23:59:59.000Z

    This cleanup verification package documents completion of remedial action for the 118-F-6 Burial Ground located in the 100-FR-2 Operable Unit of the 100-F Area on the Hanford Site. The trenches received waste from the 100-F Experimental Animal Farm, including animal manure, animal carcasses, laboratory waste, plastic, cardboard, metal, and concrete debris as well as a railroad tank car.

  12. Formal Development and Verification of a Distributed Railway Control System

    E-Print Network [OSTI]

    Peleska, Jan - Fachbereich 3

    of refinement and verification steps. Concrete safety requirements are derived from an abstract version that can and a controller model introducing the safety­related control mechanisms as a separate entity monitoring if the costs for initial installation, operation and maintenance of the control system are low. Today

  13. Automated Verification of Model Transformations in the Automotive Industry

    E-Print Network [OSTI]

    Cordy, James R.

    Automated Verification of Model Transformations in the Automotive Industry Gehan M. K. Selim1] transformation developed for the automotive industry [29]. More specifically, we check the correctness reported on such industrial expe- riences by discussing the effects of MDD and the issues that still need

  14. Towards automatic verification of ladder logic Bohumir Zoubek

    E-Print Network [OSTI]

    Oxford, University of

    Birmingham, B15 2TT United Kingdom Email: mzk@cs.bham.ac.uk Abstract-- Control system programs are usually techniques of automatic verification to a control program written in ladder logic. A model is constructed procedures for control programs. I. INTRODUCTION Control systems are used in many applications of process

  15. Parameterized Specification and Verification of PLC Systems in Coq

    E-Print Network [OSTI]

    Boyer, Edmond

    Parameterized Specification and Verification of PLC Systems in Coq Hai Wan D.CST, Tsinghua and verify PLC software systems with the theorem proving system Coq. Dependent inductive data types are har to cope with this situation, modular development of PLC software is adopted. During the modular

  16. Improving large-sized PLC programs verification using abstractions

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Improving large-sized PLC programs verification using abstractions V. Gourcuff O. de Smet J [2005]) models of PLC programs, which can be verified with well- known model-checkers, like UPPAAL the development of industrial PLC programs up to now (John- son [2007]). Several reasons can explain

  17. Department of Computing CSP||B modelling for railway verification

    E-Print Network [OSTI]

    Doran, Simon J.

    University of Surrey Department of Computing Computing Sciences Report CS-12-03 CSP||B modelling Schneider Helen Treharne March 30th 2012 #12;CSP||B modelling for railway verification: the double junction work in verifying railway systems through CSP k B modelling and analysis. In particular we consider

  18. Timed Verification of the Generic Architecture of a Memory Circuit

    E-Print Network [OSTI]

    Encrenaz-Tiphène, Emmanuelle

    #cient linear constraints relating the delays of the internal gates of the circuit to the exter­ nal delays on the reachability analysis of a timed model of the circuit (with additional abstract interpretation techniques [10Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata

  19. Fast Verification of Wind Turbine Power Summary of Project Results

    E-Print Network [OSTI]

    Fast Verification of Wind Turbine Power Curves: Summary of Project Results by: Cameron Brown ­ s equation on high frequency wind turbine measurement data sampled at one sample per second or more. The aim's Nordtank wind turbine at the Risø site, the practical application of this new method was tested

  20. MEASUREMENT SENSITIVITY AND ACCURACY VERIFICATION FOR AN ANTENNA MEASUREMENT SYSTEM

    E-Print Network [OSTI]

    Arakaki, Dean Y.

    MEASUREMENT SENSITIVITY AND ACCURACY VERIFICATION FOR AN ANTENNA MEASUREMENT SYSTEM Newlyn Hui Luis Obispo, CA 93407 ABSTRACT An antenna measurement system was developed to complement a new an RF link budget is calculated to evaluate the performance of the antenna measurement system. Keywords

  1. c 2013 Zhenqi Huang ON SIMULATION BASED VERIFICATION OF NONLINEAR

    E-Print Network [OSTI]

    Liberzon, Daniel

    navigation benchmarks, room heating benchmarks, non-linear satellite systems and engine hybrid control safety verification of hybrid systems typically involves computing precise reach sets of such systems of a class of deterministic hybrid system. The algo- rithm first constructs a cover of the initial set

  2. Venus: Verification for Untrusted Cloud Storage Alexander Shraer

    E-Print Network [OSTI]

    Keidar, Idit

    Venus: Verification for Untrusted Cloud Storage Alexander Shraer Dept. of Electrical Engineering, Switzerland cca@zurich.ibm.com Asaf Cidon Dept. of Electrical Engineering Technion, Haifa, Israel asaf@cidon.com Idit Keidar Dept. of Electrical Engineering Technion, Haifa, Israel idish@ee.technion.ac.il Yan

  3. HEALTH AND ACCIDENT INSURANCE VERIFICATION ******************** TO BE COMPLETED BY STUDENT ********************

    E-Print Network [OSTI]

    Jawitz, James W.

    HEALTH AND ACCIDENT INSURANCE VERIFICATION ******************** TO BE COMPLETED BY STUDENT Services Office of the university of Florida requires that s/he has health and accident insurance with your participating in study abroad activate hold health and accident insurance with a minimum coverage of $200

  4. Multi-canister overpack project -- verification and validation, MCNP 4A

    SciTech Connect (OSTI)

    Goldmann, L.H.

    1997-11-10T23:59:59.000Z

    This supporting document contains the software verification and validation (V and V) package used for Phase 2 design of the Spent Nuclear Fuel Multi-Canister Overpack. V and V packages for both ANSYS and MCNP are included. Description of Verification Run(s): This software requires that it be compiled specifically for the machine it is to be used on. Therefore to facilitate ease in the verification process the software automatically runs 25 sample problems to ensure proper installation and compilation. Once the runs are completed the software checks for verification by performing a file comparison on the new output file and the old output file. Any differences between any of the files will cause a verification error. Due to the manner in which the verification is completed a verification error does not necessarily indicate a problem. This indicates that a closer look at the output files is needed to determine the cause of the error.

  5. Finance President's Council Section Page 6 Motion: 199610.30

    E-Print Network [OSTI]

    Bolch, Tobias

    Finance President's Council Section Page 6 Motion: 199610.30 UNIVERSITY OF NORTHERN BRITISH by the Finance Department. 1. Cheque Requisition Procedure Complete the Cheque Requisition form in full as indicated (form available from the Finance department). This includes the name of the payee, address, amount

  6. 2004 HYDROLOGY SECTION AWARD CITATION OF YORAM RUBIN

    E-Print Network [OSTI]

    Rubin, Yoram

    2004 HYDROLOGY SECTION AWARD CITATION OF YORAM RUBIN Yoram Rubin, Professor of Civil hydrology. Starting from 1987, Yoram has published a considerable body of important articles, primarily works have always addressed central problems of hydrologic modeling, on both fundamental and applied

  7. Math 550 (Section 1) University of South Carolina D. Meade Spring 1997

    E-Print Network [OSTI]

    Meade, Douglas B.

    Math 550 (Section 1) University of South Carolina D. Meade Spring 1997 Day One Questionnaire -- Math 550 (Spring 1997) ffl Personal Information Name Phone Number E­mail Address Major Year ffl

  8. Section I: Contract Clause

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection 3161

  9. analysis framework addressing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    learning systems has led to the development Michalski, Ryszard S. 6 Addressing Climate Change in Environmental Impact Analysis Energy Storage, Conversion and Utilization Websites...

  10. address operational issues: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a silicon-based SET, conditional on its spin state, and then detecting this change electrically. The optical frequency addressing in high spectral resolution conquers the thermal...

  11. Addressing Policy and Logistical Challenges to Smart Grid Implementati...

    Broader source: Energy.gov (indexed) [DOE]

    Smart Grid Implementation: Comments by the Office of the Ohio Consumers' Counsel Addressing Policy and Logistical Challenges to Smart Grid Implementation: Comments by the Office of...

  12. Addressing Policy and Logistical Challenges to Smart Grid Implementati...

    Broader source: Energy.gov (indexed) [DOE]

    Smart Grid Implementation: Federal Register Notice Volume 75, No. 180 - Sep. 17, 2010 Addressing Policy and Logistical Challenges to Smart Grid Implementation: Federal Register...

  13. addressing environmental justice: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Myers, Lawrence C. 37 Multiple scales of diamond mining in Akwatia, Ghana: addressing environmental and human development impact Multidisciplinary Databases and Resources...

  14. address global challenges: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (for example, by addressing issues of global health, poverty and equality, and sustainable living). The aim of this document Saunders, Mark 124 GLOBAL INITIATIVES AT...

  15. New partnership uses advanced computer science modeling to address...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to address the most challenging and demanding climate change issues. Accelerated Climate Modeling for Energy, or ACME, is designed to accelerate the development and application...

  16. address generation easing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that the proposed protocol is effective to allocate addresses in a MANET with reasonable latency and communication overhead. I. INTRODUCTION A Mobile Ad hoc NETwork (MANET) is a...

  17. Energy Department Addresses Largest Gathering of Geothermal Energy...

    Broader source: Energy.gov (indexed) [DOE]

    Resources Council (GRC) in Reno, Nevada-the industry's largest annual gathering of geothermal energy stakeholders in the nation. In his keynote address, Hollett discussed...

  18. Addressing Energy Demand through Demand Response: International Experiences and Practices

    E-Print Network [OSTI]

    Shen, Bo

    2013-01-01T23:59:59.000Z

    Addressing Energy Demand through Demand Response:both the avoided energy costs (and demand charges) as wellCoordination of Energy Efficiency and Demand Response,

  19. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

  20. addressing environmental issues: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    q collaborating Rambaut, Andrew 134 Health and the environment : assessing the impacts, addressing the uncertainties. Open Access Theses and Dissertations Summary:...

  1. Africa - Technical Potential of Solar Energy to Address Energy...

    Open Energy Info (EERE)

    Africa - Technical Potential of Solar Energy to Address Energy Poverty and Avoid GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Technical Potential of...

  2. Sandia National Laboratories: standard that addresses wind turbine...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    standard that addresses wind turbine and wind-plant availability Sandia Contributes to International Electrotechnical Commission IEC 61400-26 Availability Standard On June 12,...

  3. Moving North Texas Forward by Addressing Alternative Fuel Barriers...

    Broader source: Energy.gov (indexed) [DOE]

    Spent: 23% Timeline Budget Barriers Addressed * Dallas County Schools * National Biodiesel Board * North Texas Commission * The Sales NetWork * West Virginia University...

  4. Recent Research to Address Technical Barriers to Increased Use...

    Broader source: Energy.gov (indexed) [DOE]

    Research to Address Technical Barriers to Increased Use of Biodiesel Wendy Clark & Bob McCormick National Renewable Energy Laboratory Golden, Colorado August 23, 2005 What is...

  5. Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical...

    Broader source: Energy.gov (indexed) [DOE]

    Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges. Pepco Holdings, Inc. (PHI) is pleased to respond to the US Department of Energy (DOE) request for...

  6. address mental health: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    practice, group dynamics, and systems that are of critical importance in addressing the health care needs of older adults. Psychologists are highly qualified health professionals...

  7. addressing mental health: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    practice, group dynamics, and systems that are of critical importance in addressing the health care needs of older adults. Psychologists are highly qualified health professionals...

  8. Verification of sub-grid filtered drag models for gas-particle fluidized beds with immersed cylinder arrays

    SciTech Connect (OSTI)

    Sarkar, Avik; Sun, Xin; Sundaresan, Sankaran

    2014-03-01T23:59:59.000Z

    The accuracy of coarse-grid multiphase CFD simulations of fluidized beds may be improved via the inclusion of filtered constitutive models. In our previous study (Sarkar et al., Chem. Eng. Sci., 104, 399-412), we developed such a set of filtered drag relationships for beds with immersed arrays of cooling tubes. Verification of these filtered drag models is addressed in this work. Predictions from coarse-grid simulations with the sub-grid filtered corrections are compared against accurate, highly-resolved simulations of full-scale turbulent and bubbling fluidized beds. The filtered drag models offer a computationally efficient yet accurate alternative for obtaining macroscopic predictions, but the spatial resolution of meso-scale clustering heterogeneities is sacrificed.

  9. Specification and Verification of Context-dependent Services

    E-Print Network [OSTI]

    Ibrahim, Naseem; Mohammad, Mubarak; 10.4204/EPTCS.61.2

    2011-01-01T23:59:59.000Z

    Current approaches for the discovery, specification, and provision of services ignore the relationship between the service contract and the conditions in which the service can guarantee its contract. Moreover, they do not use formal methods for specifying services, contracts, and compositions. Without a formal basis it is not possible to justify through formal verification the correctness conditions for service compositions and the satisfaction of contractual obligations in service provisions. We remedy this situation in this paper. We present a formal definition of services with context-dependent contracts. We define a composition theory of services with context-dependent contracts taking into consideration functional, nonfunctional, legal and contextual information. Finally, we present a formal verification approach that transforms the formal specification of service composition into extended timed automata that can be verified using the model checking tool UPPAAL.

  10. Experimental device-independent verification of quantum steering

    E-Print Network [OSTI]

    Sacha Kocsis; Michael J. W. Hall; Adam J. Bennet; Dylan J. Saunders; G. J. Pryde

    2014-08-07T23:59:59.000Z

    Bell nonlocality between distant quantum systems---i.e., joint correlations which violate a Bell inequality---can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell nonlocality requires high detection efficiencies, and is not robust to the typical transmission losses that occur in long distance applications. In contrast, quantum steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. We present device-independent steering protocols that remove this need for trust, even when Bell nonlocality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  11. Modeling and Verification for Timing Satisfaction of Fault-Tolerant Systems with Finiteness

    E-Print Network [OSTI]

    Cheng, Chih-Hong; Esparza, Javier; Knoll, Alois

    2009-01-01T23:59:59.000Z

    The increasing use of model-based tools enables further use of formal verification techniques in the context of distributed real-time systems. To avoid state explosion, it is necessary to construct a verification model that focuses on the aspects under consideration. In this paper, we discuss how we construct a verification model for timing analysis in distributed real-time systems. We (1) give observations concerning restrictions of timed automata to model these systems, (2) formulate mathematical representations how to perform model-to-model transformation to derive verification models from system models, and (3) propose some theoretical criteria how to reduce the model size. The latter is in particular important, as for the verification of complex systems, an efficient model reflecting the properties of the system under consideration is equally important to the verification algorithm itself. Finally, we present an extension of the model-based development tool FTOS, designed to develop fault-tolerant system...

  12. A comparison of adjoint and data-centric verification techniques.

    SciTech Connect (OSTI)

    Wildey, Timothy Michael; Cyr, Eric Christopher; Shadid, John Nicolas; Pawlowski, Roger Patrick; Smith, Thomas Michael

    2013-03-01T23:59:59.000Z

    This document summarizes the results from a level 3 milestone study within the CASL VUQ effort. We compare the adjoint-based a posteriori error estimation approach with a recent variant of a data-centric verification technique. We provide a brief overview of each technique and then we discuss their relative advantages and disadvantages. We use Drekar::CFD to produce numerical results for steady-state Navier Stokes and SARANS approximations. 3

  13. Direct experimental verification of quantum commutation relations for Pauli operators

    E-Print Network [OSTI]

    Xing-Can Yao; Jaromir Fiurasek; He Lu; Wei-Bo Gao; Yu-Ao Chen; Zeng-Bing Chen; Jian-Wei Pan

    2010-02-08T23:59:59.000Z

    We propose and demonstrate scheme for direct experimental testing of quantum commutation relations for Pauli operators. The implemented device is an advanced quantum processor that involves two programmable quantum gates. Depending on a state of two-qubit program register, we can test either commutation or anti-commutation relations. Very good agreement between theory and experiment is observed, indicating high-quality performance of the implemented quantum processor and reliable verification of commutation relations for Pauli operators.

  14. Cleanup Verification Package for the 618-8 Burial Ground

    SciTech Connect (OSTI)

    M. J. Appel

    2006-08-10T23:59:59.000Z

    This cleanup verification package documents completion of remedial action for the 618-8 Burial Ground, also referred to as the Solid Waste Burial Ground No. 8, 318-8, and the Early Solid Waste Burial Ground. During its period of operation, the 618-8 site is speculated to have been used to bury uranium-contaminated waste derived from fuel manufacturing, and construction debris from the remodeling of the 313 Building.

  15. An on-line human signature verification system

    E-Print Network [OSTI]

    Simsek, Burc A

    2000-01-01T23:59:59.000Z

    of Prisons Other Prisons U. S. Department of State U. S. Department of Treasury Internal Revenue Service U. S. Secret Service Bureau of Printing and Engraving Border Patrol evaluating facial imaging, voice verification, hand geometry, and finger... for smart gun technology. A smart gun incorporates, for example, biometric technology into the operating system of a firearm to restrict the firing of the weapon to authorized users. Finger imaging to secure access to information about narcotics Hand...

  16. Code Verification of the HIGRAD Computational Fluid Dynamics Solver

    SciTech Connect (OSTI)

    Van Buren, Kendra L. [Los Alamos National Laboratory; Canfield, Jesse M. [Los Alamos National Laboratory; Hemez, Francois M. [Los Alamos National Laboratory; Sauer, Jeremy A. [Los Alamos National Laboratory

    2012-05-04T23:59:59.000Z

    The purpose of this report is to outline code and solution verification activities applied to HIGRAD, a Computational Fluid Dynamics (CFD) solver of the compressible Navier-Stokes equations developed at the Los Alamos National Laboratory, and used to simulate various phenomena such as the propagation of wildfires and atmospheric hydrodynamics. Code verification efforts, as described in this report, are an important first step to establish the credibility of numerical simulations. They provide evidence that the mathematical formulation is properly implemented without significant mistakes that would adversely impact the application of interest. Highly accurate analytical solutions are derived for four code verification test problems that exercise different aspects of the code. These test problems are referred to as: (i) the quiet start, (ii) the passive advection, (iii) the passive diffusion, and (iv) the piston-like problem. These problems are simulated using HIGRAD with different levels of mesh discretization and the numerical solutions are compared to their analytical counterparts. In addition, the rates of convergence are estimated to verify the numerical performance of the solver. The first three test problems produce numerical approximations as expected. The fourth test problem (piston-like) indicates the extent to which the code is able to simulate a 'mild' discontinuity, which is a condition that would typically be better handled by a Lagrangian formulation. The current investigation concludes that the numerical implementation of the solver performs as expected. The quality of solutions is sufficient to provide credible simulations of fluid flows around wind turbines. The main caveat associated to these findings is the low coverage provided by these four problems, and somewhat limited verification activities. A more comprehensive evaluation of HIGRAD may be beneficial for future studies.

  17. Cleanup Verification Package for the118-F-2 Burial Ground

    SciTech Connect (OSTI)

    J. M. Capron and K. A. Anselm

    2008-02-21T23:59:59.000Z

    This cleanup verification package documents completion of remedial action, sampling activities, and compliance with cleanup criteria for the 118-F-2 Burial Ground. This burial ground, formerly called Solid Waste Burial Ground No. 1, was the original solid waste disposal site for the 100-F Area. Eight trenches contained miscellaneous solid waste from the 105-F Reactor and one trench contained solid waste from the biology facilities.

  18. Cleanup Verification Package for the 618-3 Burial Ground

    SciTech Connect (OSTI)

    M. J. Appel

    2006-09-12T23:59:59.000Z

    This cleanup verification package documents completion of remedial action for the 618-3 Solid Waste Burial Ground, also referred to as Burial Ground Number 3 and the Dry Waste Burial Ground Number 3. During its period of operation, the 618-3 site was used to dispose of uranium-contaminated construction debris from the 311 Building and construction/demolition debris from remodeling of the 313, 303-J and 303-K Buildings.

  19. Verification and Validation Strategy for LWRS Tools

    SciTech Connect (OSTI)

    Carl M. Stoots; Richard R. Schultz; Hans D. Gougar; Thomas K Larson; Michael Corradini; Laura Swiler; David Pointer; Jess Gehin

    2012-09-01T23:59:59.000Z

    One intension of the Department of Energy (DOE) Light Water Reactor Sustainability (LWRS) program is to create advanced computational tools for safety assessment that enable more accurate representation of a nuclear power plant safety margin. These tools are to be used to study the unique issues posed by lifetime extension and relicensing of the existing operating fleet of nuclear power plants well beyond their first license extension period. The extent to which new computational models / codes such as RELAP-7 can be used for reactor licensing / relicensing activities depends mainly upon the thoroughness with which they have been verified and validated (V&V). This document outlines the LWRS program strategy by which RELAP-7 code V&V planning is to be accomplished. From the perspective of developing and applying thermal-hydraulic and reactivity-specific models to reactor systems, the US Nuclear Regulatory Commission (NRC) Regulatory Guide 1.203 gives key guidance to numeric model developers and those tasked with the validation of numeric models. By creating Regulatory Guide 1.203 the NRC defined a framework for development, assessment, and approval of transient and accident analysis methods. As a result, this methodology is very relevant and is recommended as the path forward for RELAP-7 V&V. However, the unique issues posed by lifetime extension will require considerations in addition to those addressed in Regulatory Guide 1.203. Some of these include prioritization of which plants / designs should be studied first, coupling modern supporting experiments to the stringent needs of new high fidelity models / codes, and scaling of aging effects.

  20. Enrichment Assay Methods Development for the Integrated Cylinder Verification System

    SciTech Connect (OSTI)

    Smith, Leon E.; Misner, Alex C.; Hatchell, Brian K.; Curtis, Michael M.

    2009-10-22T23:59:59.000Z

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility's entire product-cylinder inventory. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100 percent product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The three main objectives of this FY09 project are summarized here and described in more detail in the report: (1) Develop a preliminary design for a prototype NDA system, (2) Refine PNNL's MCNP models of the NDA system, and (3) Procure and test key pulse-processing components. Progress against these tasks to date, and next steps, are discussed.

  1. Verification and validation guidelines for high integrity systems. Volume 1

    SciTech Connect (OSTI)

    Hecht, H.; Hecht, M.; Dinsmore, G.; Hecht, S.; Tang, D. [SoHaR, Inc., Beverly Hills, CA (United States)

    1995-03-01T23:59:59.000Z

    High integrity systems include all protective (safety and mitigation) systems for nuclear power plants, and also systems for which comparable reliability requirements exist in other fields, such as in the process industries, in air traffic control, and in patient monitoring and other medical systems. Verification aims at determining that each stage in the software development completely and correctly implements requirements that were established in a preceding phase, while validation determines that the overall performance of a computer system completely and correctly meets system requirements. Volume I of the report reviews existing classifications for high integrity systems and for the types of errors that may be encountered, and makes recommendations for verification and validation procedures, based on assumptions about the environment in which these procedures will be conducted. The final chapter of Volume I deals with a framework for standards in this field. Volume II contains appendices dealing with specific methodologies for system classification, for dependability evaluation, and for two software tools that can automate otherwise very labor intensive verification and validation activities.

  2. AUTOMATED, HIGHLY ACCURATE VERIFICATION OF RELAP5-3D

    SciTech Connect (OSTI)

    George L Mesina; David Aumiller; Francis Buschman

    2014-07-01T23:59:59.000Z

    Computer programs that analyze light water reactor safety solve complex systems of governing, closure and special process equations to model the underlying physics. In addition, these programs incorporate many other features and are quite large. RELAP5-3D[1] has over 300,000 lines of coding for physics, input, output, data management, user-interaction, and post-processing. For software quality assurance, the code must be verified and validated before being released to users. Verification ensures that a program is built right by checking that it meets its design specifications. Recently, there has been an increased importance on the development of automated verification processes that compare coding against its documented algorithms and equations and compares its calculations against analytical solutions and the method of manufactured solutions[2]. For the first time, the ability exists to ensure that the data transfer operations associated with timestep advancement/repeating and writing/reading a solution to a file have no unintended consequences. To ensure that the code performs as intended over its extensive list of applications, an automated and highly accurate verification method has been modified and applied to RELAP5-3D. Furthermore, mathematical analysis of the adequacy of the checks used in the comparisons is provided.

  3. Guidelines for the verification and validation of expert system software and conventional software: User`s manual. Volume 7

    SciTech Connect (OSTI)

    Mirsky, S.M.; Hayes, J.E.; Miller, L.A. [Science Applications International Corp., McLean, VA (United States)

    1995-03-01T23:59:59.000Z

    This report provides a step-by-step guide, or user manual, for personnel responsible for the planning and execution of the verification and validation (V&V), and developmental testing, of expert systems, conventional software systems, and various other types of artificial intelligence systems. While the guide was developed primarily for applications in the utility industry, it applies well to all industries. The user manual has three sections. In Section 1 the user assesses the stringency of V&V needed for the system under consideration, identifies the development stage the system is in, and identifies the component(s) of the system to be tested next. These three pieces of information determine which Guideline Package of V&V methods is most appropriate for those conditions. The V&V Guideline Packages are provided in Section 2. Each package consists of an ordered set of V&V techniques to be applied to the system, guides on choosing the review/evaluation team, measurement criteria, and references to a book or report which describes the application of the method. Section 3 presents details of 11 of the most important (or least well-explained in the literature) methods to assist the user in applying these techniques accurately.

  4. UW MEDICINE ANNUAL ADDRESS 2014 UW MEDICINE'S ROLE IN

    E-Print Network [OSTI]

    Borenstein, Elhanan

    Care Center Progress in strategic initiatives #12;UW MEDICINE ANNUAL ADDRESS 2014 UW AdvancingUW MEDICINE ANNUAL ADDRESS 2014 UW MEDICINE'S ROLE IN IMPROVING HEALTH: 2014 Paul G. Ramsey, M.D. CEO, UW Medicine Executive Vice President for Medical Affairs and Dean of the School of Medicine

  5. Keynote Address National Seminar on Alternative Energy Sources

    E-Print Network [OSTI]

    Banerjee, Rangan

    Keynote Address National Seminar on Alternative Energy Sources Prof. Rangan Banerjee Energy Systems that there is a real need for alternative energy sources. What do we understand by Alternative Energy Sources? In order Consumption 1997-98 Keynote address at Two days National Seminar on Alternative Energy Sources, 27-28 Aug

  6. Synonymous Address Compaction for Energy Reduction in Data TLB

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Synonymous Address Compaction for Energy Reduction in Data TLB Chinnakrishnan S. Ballapuram chinnak and Computer Engineering College of Computing Georgia Institute of Technology, Atlanta, GA 30332 ABSTRACT-cycle compaction of address translation requests in order to save energy in the data TLB. Our results show

  7. Addressing Nitrate in California's Drinking Water California Nitrate Project,

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    Control Board Report to the Legislature With a Focus on Tulare Lake Basin and Salinas Valley Groundwater Addressing Nitrate in California's Drinking Water With a Focus on Tulare Lake Basin and Salinas Valley: Addressing Nitrate in California's Drinking Water with a Focus on Tulare Lake Basin and Salinas Valley

  8. 1/30/2004 1 Reliable Return Address Stack

    E-Print Network [OSTI]

    Kaeli, David R.

    or if the function entry address is not available yet 1/30/2004 8 A R entry return RAS O entry exit APT Program Check for direct recursion Push onto RAS APT table: Record entry/exit address pairs of called entries ­ Multithreading ­ Speculative execution ­ Non-LIFO function calls 1/30/2004 7 Solution: Reliable

  9. US and UK release joint report on nuclear arms control verification...

    National Nuclear Security Administration (NNSA)

    release joint report on nuclear arms control verification | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile...

  10. INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT

    SciTech Connect (OSTI)

    W.C. Adams

    2010-05-24T23:59:59.000Z

    INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT, MIAMISBURG, OHIO DCN: 0468-SR-02-0

  11. REVISED INDEPENDENT VERIFICATION SURVEY OF A AND B RADIOACTIVE WASTE TRANSFER LINES TRENCH BROOKHAVEN NATIONAL LABORATORY

    SciTech Connect (OSTI)

    P.C. Weaver

    2010-02-10T23:59:59.000Z

    REVISED INDEPENDENT VERIFICATION SURVEY OF THE A AND B RADIOACTIVE WASTE TRANSFER LINES TRENCH, BROOKHAVEN NATIONAL LABORATORY 5062-SR-01-1

  12. INDEPENDENT VERIFICATION SURVEY REPORT OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT

    SciTech Connect (OSTI)

    W.C. Adams

    2010-07-21T23:59:59.000Z

    INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT, MIAMISBURG, OHIO DCN: 0468-SR-03-0

  13. Test of a Multilayer Dose-Verification Gaseous Detector with Raster Scan Mode Proton Beams

    E-Print Network [OSTI]

    Lee, Kyong Sei; Han, Youngyih; Hong, Byungsik; Kang, Minho; Kim, Sang Yeol; Lee, Seunkyung; Park, Sung Keun

    2015-01-01T23:59:59.000Z

    A multilayer gaseous detector has been developed for the fast dose-verification measurements of raster-scan-mode therapeutic beams in particle therapy.

  14. Finite-State Verification for High Performance Computing George S. Avrunin

    E-Print Network [OSTI]

    Avrunin, George S.

    Finite-State Verification for High Performance Computing George S. Avrunin Department (top500.org) reveals that high performance computing has become practically synonymous with parallel

  15. Formal Verification of the Island Tunnel Controller using Multiway Decision Graphs

    E-Print Network [OSTI]

    Tahar, Sofiène

    experiments on the ITC example including combinational verification, invariant checking and behavioral enumeration. This algorithm verifies whether an invariant holds in all reachable states of an abstract state

  16. ADDRESS: STATE: ZIP: Please complete the appropriate section of this form along with your check made payable to UC Regents.

    E-Print Network [OSTI]

    Thomases, Becca

    @ucdavis.edu or telephone: (530) 752-5182 No tickets will be sent. You will receive a reminder via e-mail prior to the event

  17. REPORT OF THE WORKSHOP ON NUCLEAR FACILITY DESIGN INFORMATION EXAMINATION AND VERIFICATION FOR SAFEGUARDS

    SciTech Connect (OSTI)

    Richard Metcalf; Robert Bean

    2009-10-01T23:59:59.000Z

    Executive Summary The International Atomic Energy Agency (IAEA) implements nuclear safeguards and verifies countries are compliant with their international nuclear safeguards agreements. One of the key provisions in the safeguards agreement is the requirement that the country provide nuclear facility design and operating information to the IAEA relevant to safeguarding the facility, and at a very early stage. , This provides the opportunity for the IAEA to verify the safeguards-relevant features of the facility and to periodically ensure that those features have not changed. The national authorities (State System of Accounting for and Control of Nuclear Material - SSAC) provide the design information for all facilities within a country to the IAEA. The design information is conveyed using the IAEA’s Design Information Questionnaire (DIQ) and specifies: (1) Identification of the facility’s general character, purpose, capacity, and location; (2) Description of the facility’s layout and nuclear material form, location, and flow; (3) Description of the features relating to nuclear material accounting, containment, and surveillance; and (4) Description of existing and proposed procedures for nuclear material accounting and control, with identification of nuclear material balance areas. The DIQ is updated as required by written addendum. IAEA safeguards inspectors examine and verify this information in design information examination (DIE) and design information verification (DIV) activities to confirm that the facility has been constructed or is being operated as declared by the facility operator and national authorities, and to develop a suitable safeguards approach. Under the Next Generation Safeguards Initiative (NGSI), the National Nuclear Security Administrations (NNSA) Office of Non-Proliferation and International Security identified the need for more effective and efficient verification of design information by the IAEA for improving international safeguards in the future. Consequently, the NNSA Office of International Regimes and Agreements (NA-243) sponsored a team of U.S. Department of Energy National Laboratory nuclear safeguards experts and technologists to conduct a workshop on methods and technologies for improving this activity, under the ASA-100 Advanced Safeguards Approaches Project. The workshop focused on reviewing and discussing the fundamental safeguards needs, and presented technology and/or methods that could potentially address those needs more effectively and efficiently. Conclusions and Recommendations for technology to enhance the performance of DIV inspections are presented by the workshop team.

  18. Garbage Collection in a Very Large Address Space

    E-Print Network [OSTI]

    Bishop, Peter B.

    The address space is broken into areas that can be garbage collected separately. An area is analogous to a file on current systems. Each process has a local computation area for its stack and temporary storage that is ...

  19. Phi Beta Kappa Initiation Address Wednesday June 4, 2014

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Phi Beta Kappa Initiation Address Wednesday June 4, 2014 Good of the College of William and Mary (where, I understand, Phi Beta Kappa was founded), and also a Phi Beta Kappa member. So I got some insider information

  20. Biographical Sketch: Constantino Lagoa Address: Electrical Engineering Department

    E-Print Network [OSTI]

    Lagoa, Constantino

    Biographical Sketch: Constantino Lagoa Address: Electrical Engineering Department Pennsylvania State University Room 205 Electrical Engineering West University Park, PA 16802 Office Phone: Dept ­ Present Professor of Electrical Engineering Pennsylvania State University, University Park, Pennsylvania

  1. The State of the Ames Laboratory Address 2011

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01T23:59:59.000Z

    Alex King, director of The Ames Laboratory, discusses the budget situation, improvements at Ames Lab and infrastructure improvements during the State of the Lab address on Tuesday, May 24, 2011.

  2. addressing dnfsb recommendation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    e-learning services, to deal with learners affective traits in educational scenarios. Olga C. Santos; Jesus G. Boticario 2012-01-01 24 Company Name Street Address Physics...

  3. Y-12 Lease Summary Address* (Description) Square Footage Lease...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Y-12 Lease Summary Address* (Description) Square Footage Lease Term Expiration Date Onsite Leases 602 Scarboro Rd (New Hope Center) 137,758 square feet Five years 05042012 301...

  4. United Indigenous Voices Address Sustainability: Climate Change and Traditional Places

    Broader source: Energy.gov [DOE]

    At the First Stewards Symposium, over 300 industry and policy leaders from around the nation will discuss four main themes generated from the 2012 First Stewards Symposium that address issues...

  5. RadixVM: Scalable address spaces for multithreaded applications

    E-Print Network [OSTI]

    Clements, Austin T.

    RadixVM is a new virtual memory system design that enables fully concurrent operations on shared address spaces for multithreaded processes on cache-coherent multicore computers. Today, most operating systems serialize ...

  6. The State of the Ames Laboratory Address 2011

    SciTech Connect (OSTI)

    King, Alex

    2011-01-01T23:59:59.000Z

    Alex King, director of The Ames Laboratory, discusses the budget situation, improvements at Ames Lab and infrastructure improvements during the State of the Lab address on Tuesday, May 24, 2011.

  7. addressing health literacy: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Index 1 INCREASING K-12 HEALTH EDUCATION TO IMPROVE HEALTH LITERACY Addressing a National Health Care Problem by Exploring a Root Cause for Health Illiteracy CiteSeer Summary:...

  8. air pollution address: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Addressing Global Warming, Air Pollution Health Damage, and Long-Term Energy Needs Simultaneously Renewable Energy...

  9. Independent verification of plutonium decontamination on Johnston Atoll (1992--1996)

    SciTech Connect (OSTI)

    Wilson-Nichols, M.J.; Wilson, J.E.; McDowell-Boyer, L.M.; Davidson, J.R.; Egidi, P.V.; Coleman, R.L.

    1998-05-01T23:59:59.000Z

    The Field Command, Defense Special Weapons Agency (FCDSWA) (formerly FCDNA) contracted Oak Ridge National Laboratory (ORNL) Environmental Technology Section (ETS) to conduct an independent verification (IV) of the Johnston Atoll (JA) Plutonium Decontamination Project by an interagency agreement with the US Department of Energy in 1992. The main island is contaminated with the transuranic elements plutonium and americium, and soil decontamination activities have been ongoing since 1984. FCDSWA has selected a remedy that employs a system of sorting contaminated particles from the coral/soil matrix, allowing uncontaminated soil to be reused. The objective of IV is to evaluate the effectiveness of remedial action. The IV contractor`s task is to determine whether the remedial action contractor has effectively reduced contamination to levels within established criteria and whether the supporting documentation describing the remedial action is adequate. ORNL conducted four interrelated tasks from 1992 through 1996 to accomplish the IV mission. This document is a compilation and summary of those activities, in addition to a comprehensive review of the history of the project.

  10. A Flexible simulation and verification framework for next generation hybrid pixel readout chips in High Energy Physics

    E-Print Network [OSTI]

    Marconi, Sara

    A Flexible simulation and verification framework for next generation hybrid pixel readout chips in High Energy Physics

  11. DEVELOPMENT OF A PORTAL MONITOR FOR UF6 CYLINDER VERIFICATION

    SciTech Connect (OSTI)

    Smith, Leon E.; Curtis, Michael M.; Shaver, Mark W.; Benz, Jacob M.; Misner, Alex C.; Mace, Emily K.; Jordan, David V.; Noss, Daniel; Ford, Herbert

    2009-10-06T23:59:59.000Z

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s operations. As additional enrichment plans come online to support the expansion of nuclear power, reducing person-days of inspection will take on greater importance. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100% product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Automated Cylinder Enrichment Verification System (ACEVS) would be located at key measurement points and will positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. Given the potential for reduced inspector presence, the operational and manpower-reduction benefits of the portal concept are clear. However, it is necessary to assess whether the cylinder portal concept can meet, or potentially improve upon, today’s U-235 enrichment assay performance. PNNL’s ACEVS concept utilizes sensors that could be operated in an unattended mode: moderated He-3 neutron detectors and large NaI(Tl) scintillators for gamma-ray spectroscopy. The medium-resolution NaI(Tl) scintillators are a sacrifice in energy resolution but do provide high collection efficiency for signatures above 1 MeV. The He-3/NaI sensor combination allows the exploitation of additional, more-penetrating signatures than those currently utilized: Neutrons produced from F-19(?,n) reactions (spawned primarily from U-234 alpha emission) and high-energy gamma rays (extending up to 10 MeV) induced by neutrons interacting in the steel cylinder. These signatures are indirect measures of U-235 that require a relatively stable U-234/U-235 ratio in the product material in order to be useful. The hypothesis of this work is that the U-234/U-235 ratio is sufficiently constant, for the specific facility where the automated system is installed, to rely on neutron and high-energy gamma-ray signatures for indirect measurement of U-235. Further, these highly penetrating signatures can be combined with a modified form of NaI-based 185-keV enrichment measurements to meet target uncertainties for the verification of product cylinders, with the additional benefits of full-volume assay of the cylinder and 100% product-cylinder verification (as opposed to today’s sampling-based approach). This paper focuses on the enrichment measurement aspects of the ACEVS concept: neutron and high-energy gamma-ray signatures, the radiation sensors designed to collect those signatures, and proof-of-principle cylinder measurements and analysis. Preliminary analysis indicates that an automated cylinder verification approach has the potential to meet target uncertainty values for 30B products cylinders (5%), assuming ore-based enrichment feed and a facility-specific calibration. Also described is the additional work needed to more definitively assess the concept’s viability, particularly through a better understanding of the U-234/U-235 ratio variability in modern enrichment plants.

  12. Formal Verification of CHP Specifications with CADP, Illustration on an Asynchronous Network-on-Chip

    E-Print Network [OSTI]

    Joseph Fourier Grenoble-I, Université

    Formal Verification of CHP Specifications with CADP, Illustration on an Asynchronous Network of the Presentation · Introduction · Translation from CHP to LOTOS · CADP toolbox overview · Verification of ANOC Context & Objective process calculus CHP Petri nets process calculus LOTOS (CEA/Leti) translation

  13. Department of Computer Science & Engineering Scheduling Design and Verification for Open Soft Real-time Systems

    E-Print Network [OSTI]

    Smart, William

    Soft Real-time Systems Authors: Robert Glaubius, Terry Tidwell,William D. Smart, and Christopher Gill and verification approach for open soft real-time systems, that can use different decision models, e.g., a Markov of scheduling policies for open soft real-time systems. #12;Scheduling Design and Verification for Open Soft

  14. Guidelines for Participation in the ETV ESTE Verification Test of Lead Paint Test Kits

    E-Print Network [OSTI]

    Guidelines for Participation in the ETV ESTE Verification Test of Lead Paint Test Kits Revised 09/24/2009 The following guidelines have been set to establish the eligibility of individual test kits for participation in the ETV ESTE verification test of lead paint test kits. Test kits must conform to the following guidelines

  15. Using Sparse Representation for Fish Recognition and Verification in Real World Observation

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    Using Sparse Representation for Fish Recognition and Verification in Real World Observation Yi, Hsinchu, Taiwan Abstract - The purpose of this paper is to present an innovated fish recognition and verification method suited for the real world automatic underwater fish observation. Based on the fish

  16. Property Verification for Access Control Models via Model Checking1 Vincent C. Hu1

    E-Print Network [OSTI]

    Young, R. Michael

    Property Verification for Access Control Models via Model Checking1 Vincent C. Hu1 , D. Richard. In this paper, we propose a new general approach for property verification for access control models via model checking. The approach defines a standardized structure for access control models, providing for both

  17. Comparisonbased File Server Verification YuenLin Tan # , Terrence Wong, John D. Strunk, Gregory R. Ganger

    E-Print Network [OSTI]

    Comparison­based File Server Verification Yuen­Lin Tan # , Terrence Wong, John D. Strunk, Gregory R. Ganger Carnegie Mellon University Abstract Comparison­based server verification involves testing a server by comparing its responses to those of a refer­ ence server. An intermediary, called a ``server Tee,'' in

  18. Coverage Metrics for Verification of Concurrent SystemC Designs Using Mutation Testing

    E-Print Network [OSTI]

    Sen, Alper

    Coverage Metrics for Verification of Concurrent SystemC Designs Using Mutation Testing Alper Sen Department of Computer Engineering Bogazici University Istanbul, Turkey Email: alper.sen@boun.edu.tr Magdy S is not adequate for a concurrent program. A major problem with design verification of concurrent systems

  19. A Verification Framework for FBD based Software in Nuclear Power Plants Junbeom Yoo

    E-Print Network [OSTI]

    A Verification Framework for FBD based Software in Nuclear Power Plants Junbeom Yoo Div, conducted using a nuclear power plant shutdown system being developed in Korea, demonstrated in nuclear power plant's reactor protection systems. The software verification framework uses two different

  20. An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration

    E-Print Network [OSTI]

    Hilley, George

    An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration J. L the success of geologic carbon sequestration projects. To detect subtle CO2 leakage signals, we present), An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration, Geophys. Res

  1. Formal Verification Integration Approach for Faiez Zalila, Xavier Cregut, and Marc Pantel

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    critical systems. In this context, model validation and verification (V&V) activities are key features) for the verification of safety critical embedded systems has produced very good results and raised the inter- est the benefits of these power- ful methods. More precisely, we propose a language to formally express system

  2. Query Based UML Modeling Validation and Verification of the System Model and

    E-Print Network [OSTI]

    Austin, Mark

    1 Query Based UML Modeling Validation and Verification of the System Model and Behavior. UML/SysML was designed to provide simple but powerful constructs for modeling a wide range of systems for a Hydraulic Crane Denny Mathew ENPM 643 System Validation and Verification Instructor: Dr. Mark Austin Fall

  3. A Formal Verification Methodology for Checking Data Integrity Yasushi Umezawa, Takeshi Shimizu

    E-Print Network [OSTI]

    Boyer, Edmond

    and complexity of system on chip (SoC) designs. Powerful formal verification methods have been playing, model checking for complex designs may be beyond the power of available tools and computing resourceA Formal Verification Methodology for Checking Data Integrity Yasushi Umezawa, Takeshi Shimizu

  4. A Brief Account of Runtime Verification Martin Leucker and Christian Schallhart

    E-Print Network [OSTI]

    Leucker, Martin

    to well-known verification techniques like model checking and testing is provided, and applications-skid system must speed with exactly the right velocity to stabi- lize the car. Moreover, for a power plant;verification is particularly challenging as the overall behavior of such systems depends heavily

  5. Foundations of Software Technology and Theoretical Computer Science (2009) Submission Deductive Verification of Continuous

    E-Print Network [OSTI]

    Tiwari, Ashish

    2009-01-01T23:59:59.000Z

    state transition systems is a powerful modeling formalism, it is inadequate for modeling systems Verification of Continuous Dynamical Systems Ankur Taly1 , Ashish Tiwari2 1 Computer Science Department inference rules for safety verification of polynomial continuous dynamical systems. We present two different

  6. Lifecycle Verification of the NASA Ames K9 Rover Executive Dimitra Giannakopoulou1, 3

    E-Print Network [OSTI]

    Pasareanu, Corina

    , it shows that when verification proceeds hand-in-hand with software development throughout the lifecycle phases of software development, i.e. at design and implementation phases of the software lifecycle. · Use-hand with later phases of software development. Figure 1. Compositional verification throughout the software

  7. Commissioning and Verification Procedures for the Automated Roller Shade System at

    E-Print Network [OSTI]

    Commissioning and Verification Procedures for the Automated Roller Shade System at The New York for verification testing of a newly installed automated roller shade system. The automated roller shade system has-available system works prior to building occupancy. A high dynamic range luminance measurement tool, developed

  8. Automatic Conversion Software for the Safety Verification of Goal-based Control Programs

    E-Print Network [OSTI]

    Murray, Richard M.

    , an automatic software algorithm for converting goal network control programs into linear hybrid systemsAutomatic Conversion Software for the Safety Verification of Goal-based Control Programs Julia M. B. Braman and Richard M. Murray Abstract-- Fault tolerance and safety verification of control systems

  9. Automatic Conversion Software for the Safety Verification of Goal-Based Control Programs

    E-Print Network [OSTI]

    Murray, Richard M.

    Automatic Conversion Software for the Safety Verification of Goal-Based Control Programs Julia M. B tolerance and safety verification of control systems are essential for the success of autonomous robotic systems. A control architecture called Mission Data System (MDS), developed at the Jet Propulsion

  10. Verification of Workflow Nets W.M.P. van der Aalst

    E-Print Network [OSTI]

    van der Aalst, Wil

    Verification of Workflow Nets W.M.P. van der Aalst Eindhoven University of Technology, P.O. Box 513 we focus on a class of Petri nets suitable for the representation, validation and verification of these proce- dures. We will show that the correctness of a procedure represented by such a Petri net can

  11. Assessing Quality of Policy Properties in Verification of Access Control Policies

    E-Print Network [OSTI]

    Young, R. Michael

    Assessing Quality of Policy Properties in Verification of Access Control Policies Evan Martin Tao, which are often manually specified. Policy verification is an important tech- nique for high assurance and hardware resources, especially for distributed systems. It controls which principals such as users

  12. And-Invert-Graphs (AIGs) for Equivalence Verification, SAT Modulo Theory (SMT) Solvers, and the Motivation

    E-Print Network [OSTI]

    Kalla, Priyank

    And-Invert-Graphs (AIGs) for Equivalence Verification, SAT Modulo Theory (SMT) Solvers-learning Key idea: identify internal structural equivalences P. Kalla (Univ. of Utah) AIGs, SMT, Algebra of transformations Verification = reverse these transformations? Kind of... P. Kalla (Univ. of Utah) AIGs, SMT

  13. Verification of hourly forecasts of wind turbine power output

    SciTech Connect (OSTI)

    Wegley, H.L.

    1984-08-01T23:59:59.000Z

    A verification of hourly average wind speed forecasts in terms of hourly average power output of a MOD-2 was performed for four sites. Site-specific probabilistic transformation models were developed to transform the forecast and observed hourly average speeds to the percent probability of exceedance of an hourly average power output. (This transformation model also appears to have value in predicting annual energy production for use in wind energy feasibility studies.) The transformed forecasts were verified in a deterministic sense (i.e., as continuous values) and in a probabilistic sense (based upon the probability of power output falling in a specified category). Since the smoothing effects of time averaging are very pronounced, the 90% probability of exceedance was built into the transformation models. Semiobjective and objective (model output statistics) forecasts were made compared for the four sites. The verification results indicate that the correct category can be forecast an average of 75% of the time over a 24-hour period. Accuracy generally decreases with projection time out to approx. 18 hours and then may increase due to the fairly regular diurnal wind patterns that occur at many sites. The ability to forecast the correct power output category increases with increasing power output because occurrences of high hourly average power output (near rated) are relatively rare and are generally not forecast. The semiobjective forecasts proved superior to model output statistics in forecasting high values of power output and in the shorter time frames (1 to 6 hours). However, model output statistics were slightly more accurate at other power output levels and times. Noticeable differences were observed between deterministic and probabilistic (categorical) forecast verification results.

  14. A Runtime Verification Framework for Control System Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Fuller, Jason C.; Daily, Jeffrey A.; Makhmalbaf, Atefe; Callahan, Charles D.

    2014-08-02T23:59:59.000Z

    n a standard workflow for the validation of a control system, the control system is implemented as an extension to a simulator. Such simulators are complex software systems, and engineers may unknowingly violate constraints a simulator places on extensions. As such, errors may be introduced in the implementation of either the control system or the simulator leading to invalid simulation results. This paper presents a novel runtime verification approach for verifying control system implementations within simulators. The major contribution of the approach is the two-tier specification process. In the first tier, engineers model constraints using a domain-specific language tailored to modeling a controller’s response to changes in its input. The language is high-level and effectively hides the implementation details of the simulator, allowing engineers to specify design-level constraints independent of low-level simulator interfaces. In the second tier, simulator developers provide mapping rules for mapping design-level constraints to the implementation of the simulator. Using the rules, an automated tool transforms the design-level specifications into simulator-specific runtime verification specifications and generates monitoring code which is injected into the implementation of the simulator. During simulation, these monitors observe the input and output variables of the control system and report changes to the verifier. The verifier checks whether these changes follow the constraints of the control system. We describe application of this approach to the verification of the constraints of an HVAC control system implemented with the power grid simulator GridLAB-D.

  15. Employment Verification Form The University of Florida Human Resource Services uses The Work Number to provide employment

    E-Print Network [OSTI]

    Mazzotti, Frank

    Rev. 2/14 Employment Verification Form The University of Florida Human Resource Services uses The Work Number to provide employment verifications for current and former employees who terminated-800-367-5690 to obtain employment verification. For more information regarding The Work Number, or UF employment

  16. FINAL REPORT –INDEPENDENT VERIFICATION SURVEY SUMMARY AND RESULTS FOR THE ARGONNE NATIONAL LABORATORY BUILDING 330 PROJECT FOOTPRINT, ARGONNE, ILLINOIS

    SciTech Connect (OSTI)

    ERIKA N. BAILEY

    2012-02-29T23:59:59.000Z

    ORISE conducted onsite verification activities of the Building 330 project footprint during the period of June 6 through June 7, 2011. The verification activities included technical reviews of project documents, visual inspections, radiation surface scans, and sampling and analysis. The draft verification report was issued in July 2011 with findings and recommendations. The contractor performed additional evaluations and remediation.

  17. Guaranteed Verification of Finite Element Solutions of Heat Conduction

    E-Print Network [OSTI]

    Wang, Delin

    2012-07-16T23:59:59.000Z

    Engineering iii ABSTRACT Guaranteed Verification of Finite Element Solutions of Heat Conduction. (May 2011) Delin Wang, B.E., Qingdao University of Science & Technology, China; M.S., Jilin University, China; M.E., Texas A&M University Chair of Advisory... level and ? ky kx is the characteristic thickness of the boundary layer. . . . . 37 3.5 Model problem with interface layer. The relative value of the energy norm of the error ErelU = ||eSp?h ||U / ||uEX||U? 100% versus #15; for n = 1, 2, 3...

  18. Digital data storage systems, computers, and data verification methods

    DOE Patents [OSTI]

    Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A.

    2005-12-27T23:59:59.000Z

    Digital data storage systems, computers, and data verification methods are provided. According to a first aspect of the invention, a computer includes an interface adapted to couple with a dynamic database; and processing circuitry configured to provide a first hash from digital data stored within a portion of the dynamic database at an initial moment in time, to provide a second hash from digital data stored within the portion of the dynamic database at a subsequent moment in time, and to compare the first hash and the second hash.

  19. Cleanup Verification Package for the 116-K-2 Effluent Trench

    SciTech Connect (OSTI)

    J. M. Capron

    2006-04-04T23:59:59.000Z

    This cleanup verification package documents completion of remedial action for the 116-K-2 effluent trench, also referred to as the 116-K-2 mile-long trench and the 116-K-2 site. During its period of operation, the 116-K-2 site was used to dispose of cooling water effluent from the 105-KE and 105-KW Reactors by percolation into the soil. This site also received mixed liquid wastes from the 105-KW and 105-KE fuel storage basins, reactor floor drains, and miscellaneous decontamination activities.

  20. Cleanup Verification Package for the 118-F-1 Burial Ground

    SciTech Connect (OSTI)

    E. J. Farris and H. M. Sulloway

    2008-01-10T23:59:59.000Z

    This cleanup verification package documents completion of remedial action for the 118-F-1 Burial Ground on the Hanford Site. This burial ground is a combination of two locations formerly called Minor Construction Burial Ground No. 2 and Solid Waste Burial Ground No. 2. This waste site received radioactive equipment and other miscellaneous waste from 105-F Reactor operations, including dummy elements and irradiated process tubing; gun barrel tips, steel sleeves, and metal chips removed from the reactor; filter boxes containing reactor graphite chips; and miscellaneous construction solid waste.

  1. Design verification and cold-flow modeling test report

    SciTech Connect (OSTI)

    Not Available

    1993-07-01T23:59:59.000Z

    This report presents a compilation of the following three test reports prepared by TRW for Alaska Industrial Development and Export Authority (AIDEA) as part of the Healy Clean Coal Project, Phase 1 Design of the TRW Combustor and Auxiliary Systems, which is co-sponsored by the Department of Energy under the Clean Coal Technology 3 Program: (1) Design Verification Test Report, dated April 1993, (2) Combustor Cold Flow Model Report, dated August 28, 1992, (3) Coal Feed System Cold Flow Model Report, October 28, 1992. In this compilation, these three reports are included in one volume consisting of three parts, and TRW proprietary information has been excluded.

  2. An Integrated Design and Verification Methodology for Reconfigurable Multimedia Systems

    E-Print Network [OSTI]

    Borgatti, M; Rossi, U; Lambert, J -L; Moussa, I; Fummi, F; Pravadelli, G

    2011-01-01T23:59:59.000Z

    Recently a lot of multimedia applications are emerging on portable appliances. They require both the flexibility of upgradeable devices (traditionally software based) and a powerful computing engine (typically hardware). In this context, programmable HW and dynamic reconfiguration allow novel approaches to the migration of algorithms from SW to HW. Thus, in the frame of the Symbad project, we propose an industrial design flow for reconfigurable SoC's. The goal of Symbad consists of developing a system level design platform for hardware and software SoC systems including formal and semi-formal verification techniques.

  3. ICDF Complex Waste Profile and Verification Sample Guidance

    SciTech Connect (OSTI)

    W. M. Heileson

    2006-10-01T23:59:59.000Z

    This guidance document will assist waste generators who characterize waste streams destined for disposal at the Idaho Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) Disposal Facility (ICDF) Complex. The purpose of this document is to develop a conservative but appropriate way to (1) characterize waste for entry into the ICDF; (2) ensure compliance with the waste acceptance criteria; and (3) facilitate disposal at the ICDF landfill or evaporation pond. In addition, this document will establish the waste verification process used by ICDF personnel to ensure that untreated waste meets applicable ICDF acceptance limits

  4. Reactor physics verification of the MCNP6 unstructured mesh capability

    SciTech Connect (OSTI)

    Burke, T. P. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States); Kiedrowski, B. C.; Martz, R. L. [X-Computational Physics Division, Monte Carlo Codes Group, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Martin, W. R. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States)

    2013-07-01T23:59:59.000Z

    The Monte Carlo software package MCNP6 has the ability to transport particles on unstructured meshes generated from the Computed-Aided Engineering software Abaqus. Verification is performed using benchmarks with features relevant to reactor physics - Big Ten and the C5G7 computational benchmark. Various meshing strategies are tested and results are compared to reference solutions. Computational performance results are also given. The conclusions show MCNP6 is capable of producing accurate calculations for reactor physics geometries and the computational requirements for small lattice benchmarks are reasonable on modern computing platforms. (authors)

  5. Transforming PLC Programs into Formal Models for Verification Purposes

    E-Print Network [OSTI]

    Darvas, D; Blanco, E

    2013-01-01T23:59:59.000Z

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  6. SECTION J, APPENDIX A - SOW

    National Nuclear Security Administration (NNSA)

    and improve the industrial competitiveness and national security of the United States. Section J, Appendix A, Page 19 (Replaced Mod 002; Modified Mod 016; Replaced Mod...

  7. SECTION J, APPENDIX A - SOW

    National Nuclear Security Administration (NNSA)

    and improve the industrial competitiveness and national security of the United States. Section J, Appendix A, Page 17 Request for Proposal No. DE-SOL-0007749 CHAPTER...

  8. Verification as a Foundation for Validation of a Nuclear Fuel Performance Code

    SciTech Connect (OSTI)

    J. D. Hales; S. R. Novascone; B. W. Spencer; R. L. Williamson; G. Pastore; D. M. Perez

    2014-09-01T23:59:59.000Z

    Complex multiphysics simulations such as nuclear fuel performance analysis are composed of many submodels used to describe specific phenomena. These phenomena include, as examples, the relationship between stress and strain, heat transfer across a gas gap, and mechanical contact. These submodels work in concert to simulate real-world events, like the behavior of a fuel rod in a reactor. If a simulation tool is able to represent real-world behavior, the tool is said to be validated. While much emphasis is rightly placed on validation, model verification may be undervalued. Verification involves showing that a model performs as intended, that it computes results consistent with its mathematical description. This paper explains the differences between verification and validation and shows how validation should be preceded by verification. Specific verification problems, including several specific to nuclear fuel analysis, are given. Validation results are also presented.

  9. Continuous Verification of Large Embedded Software using SMT-Based Bounded Model Checking

    E-Print Network [OSTI]

    Cordeiro, Lucas; Marques-Silva, Joao

    2009-01-01T23:59:59.000Z

    The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall product quality. In this context, SAT-based bounded model checking has been successfully applied to discover subtle errors, but for larger applications, it often suffers from the state space explosion problem. This paper describes a new approach called continuous verification to detect design errors as quickly as possible by looking at the Software Configuration Management (SCM) system and by combining dynamic and static verification to reduce the state space to be explored. We also give a set of encodings that provide accurate support for program verification and use different background theories in order to improve scalability and precision in a completely automatic way. A case study from the telecommunications domain shows that the proposed approach improves the error-detection capability and reduces the overall verification time by...

  10. Review of Evaluation, Measurement and Verification Approaches Used to Estimate the Load Impacts and Effectiveness of Energy Efficiency Programs

    SciTech Connect (OSTI)

    Messenger, Mike; Bharvirkar, Ranjit; Golemboski, Bill; Goldman, Charles A.; Schiller, Steven R.

    2010-04-14T23:59:59.000Z

    Public and private funding for end-use energy efficiency actions is expected to increase significantly in the United States over the next decade. For example, Barbose et al (2009) estimate that spending on ratepayer-funded energy efficiency programs in the U.S. could increase from $3.1 billion in 2008 to $7.5 and 12.4 billion by 2020 under their medium and high scenarios. This increase in spending could yield annual electric energy savings ranging from 0.58% - 0.93% of total U.S. retail sales in 2020, up from 0.34% of retail sales in 2008. Interest in and support for energy efficiency has broadened among national and state policymakers. Prominent examples include {approx}$18 billion in new funding for energy efficiency programs (e.g., State Energy Program, Weatherization, and Energy Efficiency and Conservation Block Grants) in the 2009 American Recovery and Reinvestment Act (ARRA). Increased funding for energy efficiency should result in more benefits as well as more scrutiny of these results. As energy efficiency becomes a more prominent component of the U.S. national energy strategy and policies, assessing the effectiveness and energy saving impacts of energy efficiency programs is likely to become increasingly important for policymakers and private and public funders of efficiency actions. Thus, it is critical that evaluation, measurement, and verification (EM&V) is carried out effectively and efficiently, which implies that: (1) Effective program evaluation, measurement, and verification (EM&V) methodologies and tools are available to key stakeholders (e.g., regulatory agencies, program administrators, consumers, and evaluation consultants); and (2) Capacity (people and infrastructure resources) is available to conduct EM&V activities and report results in ways that support program improvement and provide data that reliably compares achieved results against goals and similar programs in other jurisdictions (benchmarking). The National Action Plan for Energy Efficiency (2007) presented commonly used definitions for EM&V in the context of energy efficiency programs: (1) Evaluation (E) - The performance of studies and activities aimed at determining the effects and effectiveness of EE programs; (2) Measurement and Verification (M&V) - Data collection, monitoring, and analysis associated with the calculation of gross energy and demand savings from individual measures, sites or projects. M&V can be a subset of program evaluation; and (3) Evaluation, Measurement, and Verification (EM&V) - This term is frequently seen in evaluation literature. EM&V is a catchall acronym for determining both the effectiveness of program designs and estimates of load impacts at the portfolio, program and project level. This report is a scoping study that assesses current practices and methods in the evaluation, measurement and verification (EM&V) of ratepayer-funded energy efficiency programs, with a focus on methods and practices currently used for determining whether projected (ex-ante) energy and demand savings have been achieved (ex-post). M&V practices for privately-funded energy efficiency projects (e.g., ESCO projects) or programs where the primary focus is greenhouse gas reductions were not part of the scope of this study. We identify and discuss key purposes and uses of current evaluations of end-use energy efficiency programs, methods used to evaluate these programs, processes used to determine those methods; and key issues that need to be addressed now and in the future, based on discussions with regulatory agencies, policymakers, program administrators, and evaluation practitioners in 14 states and national experts in the evaluation field. We also explore how EM&V may evolve in a future in which efficiency funding increases significantly, innovative mechanisms for rewarding program performance are adopted, the role of efficiency in greenhouse gas mitigation is more closely linked, and programs are increasingly funded from multiple sources often with multiple program administrators and in

  11. Measurement and verification for solar water heating performance contracts

    SciTech Connect (OSTI)

    Walker, A.; Azerbegi, R.J.

    1999-07-01T23:59:59.000Z

    Solar water heating is a hardware intensive and therefore capital intensive, energy conservation measure. Energy Savings Performance Contracting (ESPC) offers a solution to the financing barrier by using third-party funds to install a system, and then paying the financier back out of the energy cost savings over the term of the contract. Measurement and Verification (M and V) of system performance is key to this kind of contract, and for Federal government ESPC projects, measurement and verification of energy cost savings is required by statute. The design of an M and V program has very important implications for customers and project developers alike. This paper presents detailed discussion of solar water heating M and V options developed for the US Department of Energy Federal Energy Management Program (FEMP), but with general application for all solar water heating performance contracting arrangements, public and private. The options described in the paper are: stipulation with inspection; metering; utility bill analysis; and renormalized computer models. In addition to contrasting the cost, benefits and appropriate application of each option, this paper discusses issues common to all options, such as the statistical design of M and V programs. The paper concludes with recommended options based on the size and type of project, the cost of the M and V program, and the allocation of risk between the contracting parties.

  12. TRU waste certification and TRUPACT-2 payload verification

    SciTech Connect (OSTI)

    Hunter, E.K. (USDOE Albuquerque Operations Office, Carlsbad, NM (USA). Waste Isolation Pilot Plant Project Office); Johnson, J.E. (Westinghouse Electric Corp., Carlsbad, NM (USA). Waste Isolation Div.)

    1990-01-01T23:59:59.000Z

    The Waste Isolation Pilot Plant (WIPP) established a policy that requires each waste shipper to verify that all waste shipments meet the requirements of the Waste Acceptance Criteria (WAC) prior to being shipped. This verification provides assurance that transuranic (TRU) wastes meet the criteria while still retained in a facility where discrepancies can be immediately corrected. Each Department of Energy (DOE) TRU waste facility planning to ship waste to the Waste Isolation Pilot Plant (WIPP) is required to develop and implement a specific program including Quality Assurance (QA) provisions to verify that waste is in full compliance with WIPP's WAC. This program is audited by a composite DOE and contractor audit team prior to granting the facility permission to certify waste. During interaction with the Nuclear Regulatory Commission (NRC) on payload verification for shipping in TRUPACT-II, a similar system was established by DOE. The TRUPACT-II Safety Analysis Report (SAR) contains the technical requirements and physical and chemical limits that payloads must meet (like the WAC). All shippers must plan and implement a payload control program including independent QA provisions. A similar composite audit team will conduct preshipment audits, frequent subsequent audits, and operations inspections to verify that all TRU waste shipments in TRUPACT-II meet the requirements of the Certificate of Compliance issued by the NRC which invokes the SAR requirements. 1 fig.

  13. An evaluation of the management system verification pilot at Hanford

    SciTech Connect (OSTI)

    BRIGGS, C.R.

    1998-11-12T23:59:59.000Z

    The Chemical Management System (CMS), currently under development at Hanford, was used as the ''test program'' for pilot testing the value added aspects of the Chemical Manufacturers Association's (CMA) Management Systems Verification (MSV) process. The MSV process, which was developed by CMA's member chemical companies specifically as a tool to assist in the continuous improvement of environment, safety and health (ESH) performance, represents a commercial sector ''best practice'' for evaluating ESH management systems. The primary purpose of Hanford's MSV Pilot was to evaluate the applicability and utility of the MSV process in the Department of Energy (DOE) environment. However, because the Integrated Safety Management System (ISMS) is the framework for ESH management at Hanford and at all DOE sites, the pilot specifically considered the MSV process in the context of a possible future adjunct to Integrated Safety Management System Verification (ISMSV) efforts at Hanford and elsewhere within the DOE complex. The pilot involved the conduct of two-hour interviews with four separate panels of individuals with functional responsibilities related to the CMS including the Department of Energy Richland Operations (DOE-RL), Fluor Daniel Hanford (FDH) and FDH's major subcontractors (MSCS). A semi-structured interview process was employed by the team of three ''verifiers'' who directed open-ended questions to the panels regarding the development, integration and effectiveness of management systems necessary to ensure the sustainability of the CMS effort. An ''MSV Pilot Effectiveness Survey'' also was completed by each panel participant immediately following the interview.

  14. Section 3.3 Equivalence Relations1 Section 3.3 Equivalence RelationSection 3.3 Equivalence RelationSection 3.3 Equivalence RelationSection 3.3 Equivalence Relationssss

    E-Print Network [OSTI]

    Farlow, Jerry

    Section 3.3 Equivalence Relations1 Section 3.3 Equivalence RelationSection 3.3 Equivalence RelationSection 3.3 Equivalence RelationSection 3.3 Equivalence Relationssss Purpose of SectionPurpose of SectionPurpose of SectionPurpose of Section To introduce the concept of an equivalence relationequivalence

  15. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    SciTech Connect (OSTI)

    Luke, S J

    2011-12-20T23:59:59.000Z

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the genetic information associated with the various pathogens. In addition, it has been determined that a suitable information barrier could be applied to this technology when the verification regime has been defined. Finally, the report posits a path forward for additional development of information barriers in a biological weapons verification regime. This path forward has shown that a new analysis approach coined as Information Loss Analysis might need to be pursued so that a numerical understanding of how information can be lost in specific measurement systems can be achieved.

  16. R&D for computational cognitive and social models : foundations for model evaluation through verification and validation (final LDRD report).

    SciTech Connect (OSTI)

    Slepoy, Alexander; Mitchell, Scott A.; Backus, George A.; McNamara, Laura A.; Trucano, Timothy Guy

    2008-09-01T23:59:59.000Z

    Sandia National Laboratories is investing in projects that aim to develop computational modeling and simulation applications that explore human cognitive and social phenomena. While some of these modeling and simulation projects are explicitly research oriented, others are intended to support or provide insight for people involved in high consequence decision-making. This raises the issue of how to evaluate computational modeling and simulation applications in both research and applied settings where human behavior is the focus of the model: when is a simulation 'good enough' for the goals its designers want to achieve? In this report, we discuss two years' worth of review and assessment of the ASC program's approach to computational model verification and validation, uncertainty quantification, and decision making. We present a framework that extends the principles of the ASC approach into the area of computational social and cognitive modeling and simulation. In doing so, we argue that the potential for evaluation is a function of how the modeling and simulation software will be used in a particular setting. In making this argument, we move from strict, engineering and physics oriented approaches to V&V to a broader project of model evaluation, which asserts that the systematic, rigorous, and transparent accumulation of evidence about a model's performance under conditions of uncertainty is a reasonable and necessary goal for model evaluation, regardless of discipline. How to achieve the accumulation of evidence in areas outside physics and engineering is a significant research challenge, but one that requires addressing as modeling and simulation tools move out of research laboratories and into the hands of decision makers. This report provides an assessment of our thinking on ASC Verification and Validation, and argues for further extending V&V research in the physical and engineering sciences toward a broader program of model evaluation in situations of high consequence decision-making.

  17. Wind versus Biofuels for Addressing Climate, Health, and Energy

    SciTech Connect (OSTI)

    Jacobson, Mark Z.

    2007-01-29T23:59:59.000Z

    The favored approach today for addressing global warming is to promote a variety of options: biofuels, wind, solar thermal, solar photovoltaic, geothermal, hydroelectric, and nuclear energy and to improve efficiency. However, by far, most emphasis has been on biofuels. It is shown here, though, that current-technology biofuels cannot address global warming and may slightly increase death and illness due to ozone-related air pollution. Future biofuels may theoretically slow global warming, but only temporarily and with the cost of increased air pollution mortality. In both cases, the land required renders biofuels an impractical solution. Recent measurements and statistical analyses of U.S. and world wind power carried out at Stanford University suggest that wind combined with other options can substantially address global warming, air pollution mortality, and energy needs simultaneously.

  18. Wind vs. Biofuels: Addressing Climate, Health and Energy

    SciTech Connect (OSTI)

    Professor Mark Jacobson

    2007-01-29T23:59:59.000Z

    The favored approach today for addressing global warming is to promote a variety of options: biofuels, wind, solar thermal, solar photovoltaic, geothermal, hydroelectric, and nuclear energy and to improve efficiency. However, by far, most emphasis has been on biofuels. It is shown here, though, that current-technology biofuels cannot address global warming and may slightly increase death and illness due to ozone-related air pollution. Future biofuels may theoretically slow global warming, but only temporarily and with the cost of increased air pollution mortality. In both cases, the land required renders biofuels an impractical solution. Recent measurements and statistical analyses of U.S. and world wind power carried out at Stanford University suggest that wind combined with other options can substantially address global warming, air pollution mortality, and energy needs simultaneously.

  19. MOX Cross-Section Libraries for ORIGEN-ARP

    SciTech Connect (OSTI)

    Gauld, I.C.

    2003-07-01T23:59:59.000Z

    The use of mixed-oxide (MOX) fuel in commercial nuclear power reactors operated in Europe has expanded rapidly over the past decade. The predicted characteristics of MOX fuel such as the nuclide inventories, thermal power from decay heat, and radiation sources are required for design and safety evaluations, and can provide valuable information for non-destructive safeguards verification activities. This report describes the development of computational methods and cross-section libraries suitable for the analysis of irradiated MOX fuel with the widely-used and recognized ORIGEN-ARP isotope generation and depletion code of the SCALE (Standardized Computer Analyses for Licensing Evaluation) code system. The MOX libraries are designed to be used with the Automatic Rapid Processing (ARP) module of SCALE that interpolates appropriate values of the cross sections from a database of parameterized cross-section libraries to create a problem-dependent library for the burnup analysis. The methods in ORIGEN-ARP, originally designed for uranium-based fuels only, have been significantly upgraded to handle the larger number of interpolation parameters associated with MOX fuels. The new methods have been incorporated in a new version of the ARP code that can generate libraries for low-enriched uranium (LEU) and MOX fuel types. The MOX data libraries and interpolation algorithms in ORIGEN-ARP have been verified using a database of declared isotopic concentrations for 1042 European MOX fuel assemblies. The methods and data are validated using a numerical MOX fuel benchmark established by the Organization for Economic Cooperation and Development (OECD) Working Group on burnup credit and nuclide assay measurements for irradiated MOX fuel performed as part of the Belgonucleaire ARIANE International Program.

  20. Travel directions to the Sterrekundig Instituut Utrecht (SIU) Street Address

    E-Print Network [OSTI]

    Rutten, Rob

    Travel directions to the Sterrekundig Instituut Utrecht (SIU) Street Address Sterrekundig Instituut Utrecht Buijs Ballotlaboratorium Princetonplein 5 De Uithof Utrecht Telephone: 030­2535200 within Holland, a grocery store ("food market"), a large 24-hour Burger King, etc. Buy a paper railroad ticket to Utrecht

  1. Preferred mailiNg address Title (Mr/Ms/etc)

    E-Print Network [OSTI]

    Tobar, Michael

    payable to the university of Western australia Please debit my Amex Diners Cardholder's name Card number Banking Corporation Address: 109 St George's Terrace, Perth, Western Australia 6000 Account Name: The University of Western Australia ­ Donations BSB: 036-054 Account Number: 285958 SWIFT Code: WPACAU2S Transfer

  2. Arts and Sciences Annual Faculty Address March 3, 2008

    E-Print Network [OSTI]

    1 Arts and Sciences Annual Faculty Address March 3, 2008 Carol Folt, Dean of the Faculty (Note ­ everywhere, you experience a campus exploding with energy, optimism and ambition. Record numbers of talented intolerance, global political, economic and environmental instability are prevalent. The outlook for millions

  3. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema (OSTI)

    Eric Isaccs

    2010-01-08T23:59:59.000Z

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  4. ADL Logging Architecture JIGI determines all server addresses from

    E-Print Network [OSTI]

    Janée, Greg

    ADL Logging Architecture JIGI logging server JIGI determines all server addresses from from the authentication server) JIGI user authentication server Note: JIGI authentication is logically; if the former, server adds sequence numbers to preserve record order (ODBC or other) middleware logging server

  5. Nathan L. B. Bangs ADDRESS Institute for Geophysics

    E-Print Network [OSTI]

    Yang, Zong-Liang

    Nathan L. B. Bangs ADDRESS Institute for Geophysics The University of Texas Pickle Research Campus@utig.ig.utexas.edu EDUCATION B.A. Williams College, 1983, Geology and Physics M.A. Columbia University, 1986, Marine Geophysics M. Phil. Columbia University, 1987, Marine Geophysics Ph.D. Columbia University, 1991, Marine

  6. NYC Commercial Addressing a Sustainability Challenge Through Spatial Analysis

    E-Print Network [OSTI]

    NYC Commercial Food Waste Addressing a Sustainability Challenge Through Spatial Analysis #12;Client. Introduction 15 1.1 Background 15 1.2 Commercial Waste 15 · 1.2.1 Overview 15 · 1.2.2 Putrescible or Organic Waste 16 · 1.2.3 Sustainability Challenge of Food Waste 17 1.3 Food Waste As National Issue 18 1.4 New

  7. Addressing Nitrate in California's Drinking Water California Nitrate Project,

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    Control Board Report to the Legislature With a Focus on Tulare Lake Basin and Salinas Valley Groundwater Report 6 Addressing Nitrate in California's Drinking Water With a Focus on Tulare Lake Basin and Salinas and Salinas Valley Groundwater. Report for the State Water Resources Control Board Report to the Legislature

  8. Strategies to Address Global Warming Is Sundance Kid a Criminal?

    E-Print Network [OSTI]

    Hansen, James E.

    Strategies to Address Global Warming & Is Sundance Kid a Criminal? Jim Hansen In my opinion, it is still feasible to solve the global warming problem before we pass tipping points that would guarantee ppm yields global warming about 2°C (3.6°F) above the preindustrial level. Such a level of atmospheric

  9. Michael A. Santoro Title and Address: Contact Information

    E-Print Network [OSTI]

    Lin, Xiaodong

    of intellectual property, competitor information gathering, personal privacy law, and trade secrecy. ResearchMichael A. Santoro Title and Address: Contact Information: Professor Department of Management, Rutgers Flex Program MBA Program (2013) 2010 With Ronald J. Strauss, Best Paper in Ethics Award

  10. Optimal Filtering of Source Address Prefixes: Models and Algorithms

    E-Print Network [OSTI]

    Markopoulou, Athina

    , malicious code prop- agation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking this framework, we study four practical cases of source address/prefix filtering, which correspond to different, malicious code propagation, spam, and distributed denial-of-service (DDoS) attacks? These activities cause

  11. Independent Verification Final Summary Report for the David Witherspoon, Inc. 1630 Site Knoxville, Tennessee

    SciTech Connect (OSTI)

    P.C. Weaver

    2009-04-29T23:59:59.000Z

    The primary objective of the independent verification was to determine if BJC performed the appropriate actions to meet the specified “hot spot” cleanup criteria of 500 picocuries per gram (pCi/g) uranium-238 (U-238) in surface soil. Specific tasks performed by the independent verification team (IVT) to satisfy this objective included: 1) performing radiological walkover surveys, and 2) collecting soil samples for independent analyses. The independent verification (IV) efforts were designed to evaluate radioactive contaminants (specifically U-238) in the exposed surfaces below one foot of the original site grade, given that the top one foot layer of soil on the site was removed in its entirety.

  12. Letter Report - Verification Survey of Final Grids at the David Witherspoon, Inc. 1630 Site Knoxville, Tennessee

    SciTech Connect (OSTI)

    P.C. Weaver

    2009-02-17T23:59:59.000Z

    Conduct verification surveys of grids at the DWI 1630 Site in Knoxville, Tennessee. The independent verification team (IVT) from ORISE, conducted verification activities in whole and partial grids, as completed by BJC. ORISE site activities included gamma surface scans and soil sampling within 33 grids; G11 through G14; H11 through H15; X14, X15, X19, and X21; J13 through J15 and J17 through J21; K7 through K9 and K13 through K15; L13 through L15; and M14 through M16

  13. First-order finite satisfiability vs tree automata in safety verification

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2011-01-01T23:59:59.000Z

    In this paper we deal with verification of safety properties of term-rewriting systems. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel produced during successful verification provides with a concise description of the system invariant sufficient to demonstrate a specific safety property. We show the relative completeness of this approach with respect to the tree automata completion technique. On a set of examples taken from the literature we demonstrate the efficiency of finite model finding approach as well as its explanatory power.

  14. INDEPENDENT VERIFICATION OF THE BUILDING 3550 SLAB AT OAK RIDGE NATIONAL LABORATORY OAK RIDGE, TENNESSEE

    SciTech Connect (OSTI)

    Weaver, Phyllis C.

    2012-05-08T23:59:59.000Z

    The Oak Ridge Institute for Science and Education (ORISE) has completed the independent verification survey of the Building 3550 Slab. The results of this effort are provided. The objective of this verification survey is to provide independent review and field assessment of remediation actions conducted by Safety and Ecology Corporation (SEC) to document that the final radiological condition of the slab meets the release guidelines. Verification survey activities on the Building 3550 Slab that included scans, measurements, and the collection of smears. Scans for alpha, alpha plus beta, and gamma activity identified several areas that were investigated.

  15. Shell Element Verification & Regression Problems for DYNA3D

    SciTech Connect (OSTI)

    Zywicz, E

    2008-02-01T23:59:59.000Z

    A series of quasi-static regression/verification problems were developed for the triangular and quadrilateral shell element formulations contained in Lawrence Livermore National Laboratory's explicit finite element program DYNA3D. Each regression problem imposes both displacement- and force-type boundary conditions to probe the five independent nodal degrees of freedom employed in the targeted formulation. When applicable, the finite element results are compared with small-strain linear-elastic closed-form reference solutions to verify select aspects of the formulations implementation. Although all problems in the suite depict the same geometry, material behavior, and loading conditions, each problem represents a unique combination of shell formulation, stabilization method, and integration rule. Collectively, the thirty-six new regression problems in the test suite cover nine different shell formulations, three hourglass stabilization methods, and three families of through-thickness integration rules.

  16. An Information Theoretic Location Verification System for Wireless Networks

    E-Print Network [OSTI]

    Yan, Shihao; Nevat, Ido; Peters, Gareth W

    2012-01-01T23:59:59.000Z

    As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No "malicious decision" to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, wh...

  17. Battery Technology Life Verification Test Manual Revision 1

    SciTech Connect (OSTI)

    Jon P. Christophersen

    2012-12-01T23:59:59.000Z

    The purpose of this Technology Life Verification Test (TLVT) Manual is to help guide developers in their effort to successfully commercialize advanced energy storage devices such as battery and ultracapacitor technologies. The experimental design and data analysis discussed herein are focused on automotive applications based on the United States Advanced Battery Consortium (USABC) electric vehicle, hybrid electric vehicle, and plug-in hybrid electric vehicle (EV, HEV, and PHEV, respectively) performance targets. However, the methodology can be equally applied to other applications as well. This manual supersedes the February 2005 version of the TLVT Manual (Reference 1). It includes criteria for statistically-based life test matrix designs as well as requirements for test data analysis and reporting. Calendar life modeling and estimation techniques, including a user’s guide to the corresponding software tool is now provided in the Battery Life Estimator (BLE) Manual (Reference 2).

  18. Guidelines on Airflow and Refrigerant Charge Verification and Diagnostics

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question "HVAC proper installation energy savings: over-promising or under-delivering?"

  19. SECTION 1: Registration Before you register

    E-Print Network [OSTI]

    Amin, S. Massoud

    ............................. 8 Special registration instructions Senior Citizen Education Program .....................................................................17 Name & address change updates....................................17 Privacy release

  20. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    SciTech Connect (OSTI)

    Betsill, J.D. [Sandia National Labs., Albuquerque, NM (United States); Gruebel, R.D. [Tech Reps., Inc., Albuquerque, NM (United States)

    1995-09-01T23:59:59.000Z

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums.

  1. VALIDATION AND VERIFICATION OF CMST-CP REMOTE SURVEILLANCE SENSORS

    SciTech Connect (OSTI)

    M.A. Ebadian, Ph.D.

    1999-01-01T23:59:59.000Z

    In its original form, this project was intended to utilize the capabilities of the Analytical Laboratory at Florida International University's Hemispheric Center for Environmental Technology (FIU-HCET) to carry out validation and verification of data obtained in the field for purposes of characterization, monitoring, and sensing in relation to closure and post-closure of various sites throughout the DOE complex. To do this, technologies were to be identified that had already been deployed and had produced field data. The role of the FIU-HCET Analytical Laboratory was considered first as part of a round robin team with other laboratories or, alternatively, to act as an objective third-party laboratory in evaluating validation data by others. Shortly after the onset of the project, FIU-HCET determined that specific deployed technologies were not readily identifiable. Thus, the direction of the project was changed to one in which the FKJ-HCET Analytical Laboratory would investigate DOE needs that require validation. These needs were examined primarily on the Internet, as listed by each specific site. In addition, needs having validation implications for regulatory agencies, such as the EPA, were also investigated. Furthermore, contact was made with laboratories with which the FIU-HCET Analytical Laboratory could act in a round robin or third-party capacity. Included in this report are potentially deployable technologies that would lend themselves to validation and verification of field data. FIU-HCET intends to monitor the deployment of these technologies with a view toward carrying out the validation activities originally proposed.

  2. Measurement techniques for the verification of excess weapons materials

    SciTech Connect (OSTI)

    Tape, J.W.; Eccleston, G.W.; Yates, M.A.

    1998-12-01T23:59:59.000Z

    The end of the superpower arms race has resulted in an unprecedented reduction in stockpiles of deployed nuclear weapons. Numerous proposals have been put forward and actions have been taken to ensure the irreversibility of nuclear arms reductions, including unilateral initiatives such as those made by President Clinton in September 1993 to place fissile materials no longer needed for a deterrent under international inspection, and bilateral and multilateral measures currently being negotiated. For the technologist, there is a unique opportunity to develop the technical means to monitor nuclear materials that have been declared excess to nuclear weapons programs, to provide confidence that reductions are taking place and that the released materials are not being used again for nuclear explosive programs. However, because of the sensitive nature of these materials, a fundamental conflict exists between the desire to know that the bulk materials or weapon components in fact represent evidence of warhead reductions, and treaty commitments and national laws that require the protection of weapons design information. This conflict presents a unique challenge to technologists. The flow of excess weapons materials, from deployed warheads through storage, disassembly, component storage, conversion to bulk forms, and disposition, will be described in general terms. Measurement approaches based on the detection of passive or induced radiation will be discussed along with the requirement to protect sensitive information from release to unauthorized parties. Possible uses of measurement methods to assist in the verification of arms reductions will be described. The concept of measuring attributes of items rather than quantitative mass-based inventory verification will be discussed along with associated information-barrier concepts required to protect sensitive information.

  3. The new geospatial tools: global transparency enhancing safeguards verification

    SciTech Connect (OSTI)

    Pabian, Frank Vincent [Los Alamos National Laboratory

    2010-09-16T23:59:59.000Z

    This paper focuses on the importance and potential role of the new, freely available, geospatial tools for enhancing IAEA safeguards and how, together with commercial satellite imagery, they can be used to promote 'all-source synergy'. As additional 'open sources', these new geospatial tools have heralded a new era of 'global transparency' and they can be used to substantially augment existing information-driven safeguards gathering techniques, procedures, and analyses in the remote detection of undeclared facilities, as well as support ongoing monitoring and verification of various treaty (e.g., NPT, FMCT) relevant activities and programs. As an illustration of how these new geospatial tools may be applied, an original exemplar case study provides how it is possible to derive value-added follow-up information on some recent public media reporting of a former clandestine underground plutonium production complex (now being converted to a 'Tourist Attraction' given the site's abandonment by China in the early 1980s). That open source media reporting, when combined with subsequent commentary found in various Internet-based Blogs and Wikis, led to independent verification of the reporting with additional ground truth via 'crowdsourcing' (tourist photos as found on 'social networking' venues like Google Earth's Panoramio layer and Twitter). Confirmation of the precise geospatial location of the site (along with a more complete facility characterization incorporating 3-D Modeling and visualization) was only made possible following the acquisition of higher resolution commercial satellite imagery that could be correlated with the reporting, ground photos, and an interior diagram, through original imagery analysis of the overhead imagery.

  4. Verification of the CENTRM Module for Adaptation of the SCALE Code to NGNP Prismatic and PBR Core Designs

    SciTech Connect (OSTI)

    Ganapol, Barry; Maldonado, Ivan

    2014-01-23T23:59:59.000Z

    The generation of multigroup cross sections lies at the heart of the very high temperature reactor (VHTR) core design, whether the prismatic (block) or pebble-bed type. The design process, generally performed in three steps, is quite involved and its execution is crucial to proper reactor physics analyses. The primary purpose of this project is to develop the CENTRM cross-section processing module of the SCALE code package for application to prismatic or pebble-bed core designs. The team will include a detailed outline of the entire processing procedure for application of CENTRM in a final report complete with demonstration. In addition, they will conduct a thorough verification of the CENTRM code, which has yet to be performed. The tasks for this project are to: Thoroughly test the panel algorithm for neutron slowing down; Develop the panel algorithm for multi-materials; Establish a multigroup convergence 1D transport acceleration algorithm in the panel formalism; Verify CENTRM in 1D plane geometry; Create and test the corresponding transport/panel algorithm in spherical and cylindrical geometries; and, Apply the verified CENTRM code to current VHTR core design configurations for an infinite lattice, including assessing effectiveness of Dancoff corrections to simulate TRISO particle heterogeneity.

  5. Energy Efficiency and Conservation Loan Program Webinar Series: Evaluation, Monitoring, & Verification

    Broader source: Energy.gov [DOE]

    This webinar will cover the basics of Evaluation, Monitoring, & Verification (EM&V). Attendees will learn key concepts, an overview of the full process, and EM&V framework.

  6. Application of functional learning to ATPG and design verification for combinational circuits

    E-Print Network [OSTI]

    Mukherjee, Rajarshim

    1994-01-01T23:59:59.000Z

    to detect faults and in detecting redundant faults. Learning techniques have also been effectively applied to the problem of design verification for combinational circuits. This paper presents Functional Learning, a new method of learning, based...

  7. Better Buildings Alliance, Advanced Rooftop Unit Campaign: Rooftop Unit Measurement and Verification (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-09-01T23:59:59.000Z

    This document provides facility managers and building owners an introduction to measurement and verification (M&V) methods to estimate energy and cost savings of rooftop units replacement or retrofit projects to estimate paybacks or to justify future projects.

  8. Independent Verification Survey Report for the Operable Unit-1 Miamisburg Closure Project, Miamisburg, OH

    SciTech Connect (OSTI)

    Weaver, P.

    2008-03-17T23:59:59.000Z

    The objectives of the independent verification survey were to confirm that remedial actions have been effective in meeting established release criteria and that documentation accurately and adequately describes the current radiological and chemical conditions of the MCP site.

  9. High accuracy verification of a correlated-photon-based method for determining photon-

    E-Print Network [OSTI]

    Migdall, Alan

    with Correlated Visible Photons: Technique Verification and Measurement Uncertainty," Metrologia 32, 479­483 (1995," Metrologia 37, 625­628 (2000). #77187 - $15.00 USD Received 22 November 2006; revised 26 January 2007

  10. Computer-Aided Verification: How to Trust a Machine with Your Life

    E-Print Network [OSTI]

    Pace, Gordon J.

    are used to control all sorts of devices -- from washing machines and microwave ovens to braking systems is formidable. The formal verification of a five-line algorithm can easily run into pages of dense mathematical

  11. Formal Verification of an ARM processor Vishnu A. Patankar Alok Jain Randal E. Bryant

    E-Print Network [OSTI]

    Bryant, Randal E.

    1 Formal Verification of an ARM processor Vishnu A. Patankar Alok Jain Randal E. Bryant Department Email: vishnup@ece.cmu.edu Email: alokj@cadence.com Email: randy.bryant@cs.cmu.edu Abstract This paper

  12. Verification of Floating-Point Adders Yirng-An Chen and Randal E. Bryant

    E-Print Network [OSTI]

    Bryant, Randal E.

    Verification of Floating-Point Adders ¡ Yirng-An Chen and Randal E. Bryant yachen+@cs.cmu.edu, bryant+@cs.cmu.edu Computer Science Dept., Carnegie Mellon Univ., Pittsburgh, PA 15213 Abstract

  13. Formal Verification of Infinite State Systems Using Boolean Methods Randal E. Bryant

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods Randal E. Bryant Carnegie Mellon University School of Computer Science Pittsburgh, PA 15213 USA Randy.Bryant@cs.cmu.edu Abstract

  14. Formal Verification of Infinite State Systems Using Boolean Methods # Randal E. Bryant

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods # Randal E. Bryant Carnegie Mellon University School of Computer Science Pittsburgh, PA 15213 USA Randy.Bryant@cs.cmu.edu Abstract

  15. Analysis of Path Planning Algorithms : a Formal Verification-based Approach Arash Khabbaz Saberi1

    E-Print Network [OSTI]

    Groote, Jan Friso

    Analysis of Path Planning Algorithms : a Formal Verification-based Approach Arash Khabbaz Saberi1, The Netherlands a.khabbaz.saberi@student.tue.nl, j.f.groote@tue.nl, s.keshishzadeh@tue.nl Abstract

  16. U.S. EPA Environmental Technology Verification (ETV) Program Advanced Monitoring Systems (AMS) Center

    E-Print Network [OSTI]

    Carbon Dioxide from Sequestration Applications. These technology categories have been priorities evaluation, Nebraska Department of Environmental Quality (NDEQ) for microcystins, and EPA Region 7 for carbon sequestration. Climate change technology verification ideas Dr. McKernan also presented several ideas

  17. M&V Guidelines: Measurement and Verification for Federal Energy Projects

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  18. Under consideration for publication in Formal Aspects of Computing Concurrent Software Verification with

    E-Print Network [OSTI]

    Ouaknine, Joël

    , Oxford, UK Abstract. We present a framework for model checking concurrent software systems which powerful verification techniques, counterexample-guided abstraction refinement and compositional reasoning with hardware and communication proto- cols, model checking is increasingly used to verify software systems

  19. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOE Patents [OSTI]

    Foo Kune, Denis (Saint Paul, MN); Mahadevan, Karthikeyan (Mountain View, CA)

    2011-01-25T23:59:59.000Z

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  20. Robust audio-visual person verification using Web-camera video

    E-Print Network [OSTI]

    Schultz, Daniel (Daniel T.)

    2006-01-01T23:59:59.000Z

    This thesis examines the challenge of robust audio-visual person verification using data recorded in multiple environments with various lighting conditions, irregular visual backgrounds, and diverse background noise. ...

  1. Scalable SMT-Based Verification of GPU Kernel Functions School of Computing, University of Utah

    E-Print Network [OSTI]

    Capecchi, Mario R.

    Scalable SMT-Based Verification of GPU Kernel Functions Guodong Li School of Computing, University Satisfiability Modulo Theo- ries (SMT) tools, detecting bugs such as data races, in- correctly synchronized Satisfiabil- ity Modulo Theories (SMT [2

  2. Regional Field Verification -- Operational Results from Four Small Wind Turbines in the Pacific Northwest: Preprint

    SciTech Connect (OSTI)

    Sinclair, K.; Raker, J.

    2006-08-01T23:59:59.000Z

    This paper describes four small wind turbines installed in the Pacific Northwest under DOE/NREL's Regional Field Verification Program between 2003 and 2004 and summarizes operational data from each site.

  3. An example of verification, validation, and reporting of indoor environment CFD analyses (RP-1133)

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    through an example of indoor environment modeling (an office with mechanical displacement ventilation similar procedure. The emphasis of the verification and validation is problem dependent. The computational ventilation systems and the development of control strategies require detailed knowledge of airflow

  4. The independent verification process in decommissioning, decontamination, and reutilization activities - description, benefits, and lessons learned

    SciTech Connect (OSTI)

    Egidi, P.V.

    1997-06-01T23:59:59.000Z

    Oak Ridge National Laboratory Environmental Technology Section has been performing Independent Verification (IV) activities for U.S. DOE sites since 1986. DOE has successfully used IV in the Uranium Mill Tailings Remedial Action Program, Decontamination and Decommissioning projects, and Formerly Utilized Sites Remedial Action Projects/Surplus Facilities Management Program. Projects that have undergone IV range from small residential properties to large, industrial sites. The IV process provides a third-party review conducted by an independent organization. The purpose is to verify accuracy and completeness of contractor field measurements and final documentation, evaluate the credibility of procedures, and independently assess post-cleanup conditions versus decommissioning project plans and release criteria. Document reviews of plans, dose models, procedures, and reports are some IV activities undertaken. Independent measurements are also collected during field visits to confirm the contractor`s findings. Corrective actions for discrepancies are suggested if necessary. Finally, archival and reporting of the final site environmental conditions for project closeout and certification are completed. The IV contractor reports to DOE headquarters and acts as a quality assurance feedback mechanism. An IV also provides additional assurance that projects are planned, carried out, and documented properly. Decommissioning projects benefit from the IV process by: (1) cost and time savings from early identification of potential problems, (2) assurance that cleanup meets regulatory guidelines, and (3) technical reviews and consultation with experts in field instrumentation, sampling strategy, etc. Some lessons learned from the IV process include avoiding: (1) improper survey techniques, (2) reporting data in units not comparable with guideline values, (3) premature release of surfaces, (4) poor decommissioning project planning, (5) misapplication of release guidelines. 20 refs.

  5. Plan for addressing issues relating to oil shale plant siting

    SciTech Connect (OSTI)

    Noridin, J. S.; Donovan, R.; Trudell, L.; Dean, J.; Blevins, A.; Harrington, L. W.; James, R.; Berdan, G.

    1987-09-01T23:59:59.000Z

    The Western Research Institute plan for addressing oil shale plant siting methodology calls for identifying the available resources such as oil shale, water, topography and transportation, and human resources. Restrictions on development are addressed: land ownership, land use, water rights, environment, socioeconomics, culture, health and safety, and other institutional restrictions. Descriptions of the technologies for development of oil shale resources are included. The impacts of oil shale development on the environment, socioeconomic structure, water availability, and other conditions are discussed. Finally, the Western Research Institute plan proposes to integrate these topics to develop a flow chart for oil shale plant siting. Western Research Institute has (1) identified relative topics for shale oil plant siting, (2) surveyed both published and unpublished information, and (3) identified data gaps and research needs. 910 refs., 3 figs., 30 tabs.

  6. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  7. Sandia seeks to address two of the most

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiationImplementingnpitcheResearch Briefs The annuallyNationalseeks to address two of

  8. Effective Implementation of "IPMVP Option C - Whole Building Measurement" Measurement and Verification Plans

    E-Print Network [OSTI]

    Porter, T.; Weaver, K.; Vaughn, K.

    2005-01-01T23:59:59.000Z

    was the energy service company (ESCO) chosen by HHSC to implement the ESPC. The M&V plan is based on the International Performance Measurement and Verification Protocol (IPMVP) Option C “Whole Building Measurement” and provides the methodology.../05-47 1 INTRODUCTION This document describes the Measurement and Verification (M&V) methodology for Phase One of the Texas Health and Human Services Commission (HHSC) energy savings performance contracting (ESPC) project. TAC-Tour Andover Controls...

  9. NEW APPROACH TO ADDRESSING GAS GENERATION IN RADIOACTIVE MATERIAL PACKAGING

    SciTech Connect (OSTI)

    Watkins, R; Leduc, D; Askew, N

    2009-06-25T23:59:59.000Z

    Safety Analysis Reports for Packaging (SARP) document why the transportation of radioactive material is safe in Type A(F) and Type B shipping containers. The content evaluation of certain actinide materials require that the gas generation characteristics be addressed. Most packages used to transport actinides impose extremely restrictive limits on moisture content and oxide stabilization to control or prevent flammable gas generation. These requirements prevent some users from using a shipping container even though the material to be shipped is fully compliant with the remaining content envelope including isotopic distribution. To avoid these restrictions, gas generation issues have to be addressed on a case by case basis rather than a one size fits all approach. In addition, SARP applicants and review groups may not have the knowledge and experience with actinide chemistry and other factors affecting gas generation, which facility experts in actinide material processing have obtained in the last sixty years. This paper will address a proposal to create a Gas Generation Evaluation Committee to evaluate gas generation issues associated with Safety Analysis Reports for Packaging material contents. The committee charter could include reviews of both SARP approved contents and new contents not previously evaluated in a SARP.

  10. Section H: Special Contract Requirements

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection 3161 SECTION

  11. LEGAL BUSINESS NAME AND DBA NAME (as applicable) PERSON OR SOLE PROPRIETOR -ENTER FULL NAME HERE (Last, First) (REQUIRED) PERMANENT BUSINESS Address-(number & Street or P.O. Box) (REQUIRED) PERMANENT REMITTANCE Address (if different from Business Address)

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    LEGAL BUSINESS NAME AND DBA NAME (as applicable) PERSON OR SOLE PROPRIETOR -ENTER FULL NAME HERE (Last, First) (REQUIRED) PERMANENT BUSINESS Address- (number & Street or P.O. Box) (REQUIRED) PERMANENT REMITTANCE Address (if different from Business Address) (OPTIONAL) CAMPUS MAIL STOP (Complete ONLY after

  12. INDEPENDENT VERIFICATION SURVEY REPORT FOR ZONE 1 OF THE EAST TENNESSEE TECHNOLOGY PARK IN OAK RIDGE, TENNESSEE

    SciTech Connect (OSTI)

    King, David A.

    2012-08-16T23:59:59.000Z

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs).

  13. TomoTherapy MLC verification using exit detector data

    SciTech Connect (OSTI)

    Chen Quan; Westerly, David; Fang Zhenyu; Sheng, Ke; Chen Yu [TomoTherapy Inc., 1240 Deming Way, Madison, Wisconsin 53717 (United States); Department of Radiation Oncology, University of Colorado School of Medicine, Aurora, Colorado 80045 (United States); Xinghua Cancer Hospital, Xinghua, Jiangsu 225700 (China); Department of Radiation Oncology, University of California-Los Angeles, Los Angeles, California 90095 (United States); TomoTherapy Inc., 1240 Deming Way, Madison, Wisconsin 53717 (United States)

    2012-01-15T23:59:59.000Z

    Purpose: Treatment delivery verification (DV) is important in the field of intensity modulated radiation therapy (IMRT). While IMRT and image guided radiation therapy (IGRT), allow us to create more conformal plans and enables the use of tighter margins, an erroneously executed plan can have detrimental effects on the treatment outcome. The purpose of this study is to develop a DV technique to verify TomoTherapy's multileaf collimator (MLC) using the onboard mega-voltage CT detectors. Methods: The proposed DV method uses temporal changes in the MVCT detector signal to predict actual leaf open times delivered on the treatment machine. Penumbra and scattered radiation effects may produce confounding results when determining leaf open times from the raw detector data. To reduce the impact of the effects, an iterative, Richardson-Lucy (R-L) deconvolution algorithm is applied. Optical sensors installed on each MLC leaf are used to verify the accuracy of the DV technique. The robustness of the DV technique is examined by introducing different attenuation materials in the beam. Additionally, the DV technique has been used to investigate several clinical plans which failed to pass delivery quality assurance (DQA) and was successful in identifying MLC timing discrepancies as the root cause. Results: The leaf open time extracted from the exit detector showed good agreement with the optical sensors under a variety of conditions. Detector-measured leaf open times agreed with optical sensor data to within 0.2 ms, and 99% of the results agreed within 8.5 ms. These results changed little when attenuation was added in the beam. For the clinical plans failing DQA, the dose calculated from reconstructed leaf open times played an instrumental role in discovering the root-cause of the problem. Throughout the retrospective study, it is found that the reconstructed dose always agrees with measured doses to within 1%. Conclusions: The exit detectors in the TomoTherapy treatment systems can provide valuable information about MLC behavior during delivery. A technique to estimate the TomoTherapy binary MLC leaf open time from exit detector signals is described. This technique is shown to be both robust and accurate for delivery verification.

  14. Hazardous Materials Verification and Limited Characterization Report on Sodium and Caustic Residuals in Materials and Fuel Complex Facilities MFC-799/799A

    SciTech Connect (OSTI)

    Gary Mecham

    2010-08-01T23:59:59.000Z

    This report is a companion to the Facilities Condition and Hazard Assessment for Materials and Fuel Complex Sodium Processing Facilities MFC-799/799A and Nuclear Calibration Laboratory MFC-770C (referred to as the Facilities Condition and Hazards Assessment). This report specifically responds to the requirement of Section 9.2, Item 6, of the Facilities Condition and Hazards Assessment to provide an updated assessment and verification of the residual hazardous materials remaining in the Sodium Processing Facilities processing system. The hazardous materials of concern are sodium and sodium hydroxide (caustic). The information supplied in this report supports the end-point objectives identified in the Transition Plan for Multiple Facilities at the Materials and Fuels Complex, Advanced Test Reactor, Central Facilities Area, and Power Burst Facility, as well as the deactivation and decommissioning critical decision milestone 1, as specified in U.S. Department of Energy Guide 413.3-8, “Environmental Management Cleanup Projects.” Using a tailored approach and based on information obtained through a combination of process knowledge, emergency management hazardous assessment documentation, and visual inspection, this report provides sufficient detail regarding the quantity of hazardous materials for the purposes of facility transfer; it also provides that further characterization/verification of these materials is unnecessary.

  15. Robust Dynamical Decoupling Sequences for Individual Nuclear Spin Addressing

    E-Print Network [OSTI]

    J. Casanova; J. F. Haase; Z. -Y. Wang; M. B. Plenio

    2015-06-11T23:59:59.000Z

    We propose the use of non-equally spaced decoupling pulses for high-resolution selective addressing of nuclear spins by a quantum sensor. The analytical model of the basic operating principle is supplemented by detailed numerical studies that demonstrate the high degree of selectivity and the robustness against static and dynamic control field errors of this scheme. We exemplify our protocol with an NV center-based sensor to demonstrate that it enables the identification of individual nuclear spins that form part of a large spin ensemble.

  16. Content-addressable memory based enforcement of configurable policies

    SciTech Connect (OSTI)

    Berg, Michael J

    2014-05-06T23:59:59.000Z

    A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.

  17. Addressing Policy and Logistical Challenges to Smart Grid Implementation

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartmentDepartment of2 ofEmergencyAcrobat PDFMakerAdamAddressing

  18. Addressing Unconscious Bias in the ADR Process | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystemsProgram Overview 20151 (March 2004)Operating3ActionAdAddressing

  19. Addressing Failures in Exascale Computing | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic InputRudolph A. Marcus andAchievements of structural genomicsAddressing

  20. OPT Employment and Current Physical Address Reporting Office of International Programs

    E-Print Network [OSTI]

    OPT Employment and Current Physical Address Reporting Office of International Programs employer Name of Employer_______________________________________________ Street Address _________________________________ Employment start date _________________ If you are unemployed Dates of unemployment