National Library of Energy BETA

Sample records for verification sections address

  1. Software verification and validation for commercial statistical packages utilized by the statistical consulting section of SRTC

    SciTech Connect (OSTI)

    Edwards, T.B.

    2000-03-22

    The purpose of this report is to provide software verification and validation for the statistical packages used by the Statistical Consulting Section (SCS) of the Savannah River Technology Center. The need for this verification and validation stems from the requirements of the Quality Assurance programs that are frequently applicable to the work conducted by SCS. The IBM Personal Computer 300PL and 300XL are both Pentium II based desktops. Therefore the software verification and validation in this report is valid interchangeably between both platforms. As new computing platforms, statistical packages, or revisions to existing packages are reevaluated using these new tools, this report is to be revised to address their verification and validation.

  2. Software Verification and Validation for Commercial Statistical Packages Utilized by the Statistical Consulting Section of SRTC

    SciTech Connect (OSTI)

    Edwards, T.B.

    2001-01-16

    The purpose of this report is to provide software verification and validation (v and v) for the statistical packages utilized by the Statistical Consulting Section (SCS) of the Savannah River Technology Center (SRTC). The need for this v and v stems from the requirements of the Quality Assurance (QA) programs that are frequently applicable to the work conducted by SCS. This document is designed to comply with software QA requirements specified in the 1Q Manual Quality Assurance Procedure 20-1, Revision 6. Revision 1 of this QA plan adds JMP Version 4 to the family of (commercially-available) statistical tools utilized by SCS. JMP Version 3.2.2 is maintained as a support option due to features unique to this version of JMP that have not as yet been incorporated into Version 4. SCS documents that include JMP output should provide a clear indication of the version or versions of JMP that were used. The IBM Personal Computer 300PL and 300XL are both Pentium II based desktops. Therefore, th e software verification and validation in this report is valid interchangeably between both platforms. As new computing platforms, statistical packages, or revisions to existing packages are introduced into the Statistical Consulting Section, the appropriate problems from this report are to be re-evaluated, and this report is to be revised to address their verification and validation.

  3. Address:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden DocumentationAccommodationsRegister / Vol. 72, No.Resources |AdditiveAddress:

  4. Verification of the MCNP (TM) Perturbation Correction Feature for Cross-Section Dependent Tallies

    SciTech Connect (OSTI)

    A. K. Hess; G. W. McKinney; J. S. Hendricks; L. L. Carter

    1998-10-01

    The Monte Carlo N-Particle Transport Code MCNP version 4B perturbation capability has been extended to cross-section dependent tallies and to the track-length estimate of Iqff in criticality problems. We present the complete theory of the MCNP perturbation capability including the correction to MCNP4B which enables cross-section dependent perturbation tallies. We also present the MCNP interface as an upgrade to the MCNP4B manual. Finally, we present test results demonstrating the validity of the perturbation capability in MCNP, particularly cross-section dependent problems.

  5. Verification of Allowable Stresses In ASME Section III Subsection NH For Grade 91 Steel & Alloy 800H

    SciTech Connect (OSTI)

    R. W. Swindeman; M. J. Swindeman; B. W. Roberts; B. E. Thurgood; D. L. Marriott

    2007-11-30

    The database for the creep-rupture of 9Cr-1Mo-V (Grade 91) steel was collected and reviewed to determine if it met the needs for recommending time-dependent strength values, S{sub t}, for coverage in ASME Section III Subsection NH (ASME III-NH) to 650 C (1200 F) and 600,000 hours. The accumulated database included over 300 tests for 1% total strain, nearly 400 tests for tertiary creep, and nearly 1700 tests to rupture. Procedures for analyzing creep and rupture data for ASME III-NH were reviewed and compared to the procedures used to develop the current allowable stress values for Gr 91 for ASME II-D. The criteria in ASME III-NH for estimating S{sub t} included the average strength for 1% total strain for times to 600,000 hours, 80% of the minimum strength for tertiary creep for times to 600,000 hours, and 67% of the minimum rupture strength values for times to 600,000 hours. Time-temperature-stress parametric formulations were selected to correlate the data and make predictions of the long-time strength. It was found that the stress corresponding to 1% total strain and the initiation of tertiary creep were not the controlling criteria over the temperature-time range of concern. It was found that small adjustments to the current values in III-NH could be introduced but that the existing values were conservative and could be retained. The existing database was found to be adequate to extend the coverage to 600,000 hours for temperatures below 650 C (1200 F).

  6. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  7. Verification and validation benchmarks.

    SciTech Connect (OSTI)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

  8. Technical challenges for dismantlement verification

    SciTech Connect (OSTI)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-11-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion.

  9. Incremental Partitioning-Based Vectorless Power Grid Verification

    E-Print Network [OSTI]

    Najm, Farid N.

    Incremental Partitioning-Based Vectorless Power Grid Verification Dionysios Kouroussis Department performance of a chip, design verification of the power grid is of critical importance. This paper builds the efficient verification of local power grid sections or blocks, enabling incremen- tal design analysis

  10. Monitoring and verification R&D

    SciTech Connect (OSTI)

    Pilat, Joseph F; Budlong - Sylvester, Kory W; Fearey, Bryan L

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  11. Verification Testing Test Driven Development Testing with JUnit Verification

    E-Print Network [OSTI]

    Peters, Dennis

    Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

  12. M&V Guidelines: Measurement and Verification for Federal Energy...

    Energy Savers [EERE]

    and Verification Protocol (IPMVP) Concepts and Options for Determining Energy and Water Savings Volume 1, April 2007. M&V Guidelines 3.0 FEMP ii Contents Section Page Section...

  13. Fuel Retrieval System Design Verification Report

    SciTech Connect (OSTI)

    GROTH, B.D.

    2000-04-11

    The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway. Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR). A Design Verification Status Questionnaire, Table 1, is included which addresses Corrective Action SNF-EG-MA-EG-20000060, Item No.9 (Miller 2000).

  14. ORISE: Independent verification

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (DOE) cleanup projects and the only verification contractor for the U.S. Nuclear Regulatory Commission (NRC), we validate that soil, water and structures are within established...

  15. Nuclear Data Verification and Standardization

    SciTech Connect (OSTI)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  16. Orc Verification Jayadev Misra

    E-Print Network [OSTI]

    Misra, Jayadev

    Orc Verification Jayadev Misra Department of Computer Science University of Texas at Austin http://orc.csres.utexas.edu WG 2.3, St. Petersburg June 5, 2013 #12;Orc Verification has been a disaster · Concurrency everywhere events but temporal ordering · Basic orc has no mutable variables, but sites do · Full functional

  17. PETER DAVID JOHNSON Home Address: Work Address

    E-Print Network [OSTI]

    Johnson, Peter D.

    for the Advancement of Science 2009 Outstanding Referee, Journals of the American Physical Society 2011 APS Oliver E1 PETER DAVID JOHNSON Home Address: Work Address: 4 Terrell Lane CMPMSD Stony Brook Physics 510B NY 11790 Brookhaven National Laboratory USA Upton NY 11973 Education 1972 B.Sc. Physics, Imperial College

  18. Voltage verification unit

    DOE Patents [OSTI]

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  19. HARVARD UNIVERSITY VENDOR JUSTIFICATION/PRICE VERIFICATION FORM TUB AND ORG NAME: ___________________________ACCT.CODE:________________________________________________________DATE:_______

    E-Print Network [OSTI]

    Xie, Xiaoliang Sunney

    HARVARD UNIVERSITY VENDOR JUSTIFICATION/PRICE VERIFICATION FORM TUB AND ORG NAME (please check one) The Federal Government requires vendor selection justification and price verification, blanket orders) complete Section B and Section C. GGRRAANNTTSS $2,500-$9,999 OMB A-110 requires price

  20. them. Such objects introduce many difficulties that have not been addressed in this work, including incomplete cross-sections and non-parallel surface cuts of primitives, especially at joints. More

    E-Print Network [OSTI]

    Southern California, University of

    the axis pierces the cross-section plane, not necessarily at its center) and the values si (i = 1..n) (call, including incomplete cross-sections and non-parallel surface cuts of primitives, especially at joints. More cross-section, the orientation of the axis, the coordinates (xs, ys, zs)t of its origin (point where

  1. Taylor Expansion Diagrams: A Canonical Representation for Verification of Data Flow Designs

    E-Print Network [OSTI]

    Ciesielski, Maciej

    series expansion that allows to model word-level signals as alge- braic symbols. This power increase in the size and complexity of digital systems has made it essential to address verification issues verification meth- ods, such as theorem proving, property and model checking, equiv- alence checking, etc

  2. Results of the independent radiological verification survey at the former Bridgeport Brass Company Facility, Seymour, Connecticut (SSC001)

    SciTech Connect (OSTI)

    Foley, R.D.; Rice, D.E.; Allred, J.F.; Brown, K.S.

    1995-03-01

    At the request of the USDOE, a team from ORNL conducted an independent radiological verification survey at the former Bridgeport Brass Company Facility, Seymour, Connecticut, from September 1992 to March 1993. Purpose of the survey was to determine whether residual levels of radioactivity inside the Ruffert Building and selected adjacent areas were rmediated to levels below DOE guidelines for FUSRAP sites. The property was contaminated with radioactive residues of {sup 238}U from uranium processing experiments conducted by Reactive Metals, Inc., from 1962 to 1964 for the Atomic Energy Commission. A previous radiological survey did not characterize the entire floor space because equipment which could not be moved at the time made it inaccessible for radiological surveys. During the remediation process, additional areas of elevated radioactivity were discovered under stationary equipment, which required additional remediation and further verification. Results of the independent radiological verification survey confirm that, with the exception of the drain system inside the building, residual uranium contamination has been remediated to levels below DOE guidelines for unrestricted release of property at FUSRAP sites inside and outside the Ruffert Building. However, certain sections of the drain system retain uranium contamination above DOE surface guideline levels. These sections of pipe are addressed in separate, referenced documentation.

  3. On Incremental Quantitative Verification for Probabilistic Systems

    E-Print Network [OSTI]

    Oxford, University of

    . Quantitative verification is an automated method to establish quantitative properties of a system model, non- probabilistic verification, which, in addition to exhaustive exploration of a system modelOn Incremental Quantitative Verification for Probabilistic Systems Marta Kwiatkowska, David Parker

  4. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. (2014)

    E-Print Network [OSTI]

    2014-01-01

    SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. (2014) Published online. INTRODUCTION As software evolves, engineers regression test it to validate new features and detect whether new in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/stvr.1562 Directed test suite augmentation

  5. Organics Verification Study for Sinclair and Dyes Inlets, Washington

    SciTech Connect (OSTI)

    Kohn, Nancy P.; Brandenberger, Jill M.; Niewolny, Laurie A.; Johnston, Robert K.

    2006-09-28

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. Because significant cleanup and source control activities have been conducted in the inlets since the data supporting the 1998 303(d) listings were collected, two verification studies were performed to address the 303(d) segments that were listed for metal and organic contaminants in marine sediment. The Metals Verification Study (MVS) was conducted in 2003; the final report, Metals Verification Study for Sinclair and Dyes Inlets, Washington, was published in March 2004 (Kohn et al. 2004). This report describes the Organics Verification Study that was conducted in 2005. The study approach was similar to the MVS in that many surface sediment samples were screened for the major classes of organic contaminants, and then the screening results and other available data were used to select a subset of samples for quantitative chemical analysis. Because the MVS was designed to obtain representative data on concentrations of contaminants in surface sediment throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, aliquots of the 160 MVS sediment samples were used in the analysis for the Organics Verification Study. However, unlike metals screening methods, organics screening methods are not specific to individual organic compounds, and are not available for some target organics. Therefore, only the quantitative analytical results were used in the organics verification evaluation. The results of the Organics Verification Study showed that sediment quality outside of Sinclair Inlet is unlikely to be impaired because of organic contaminants. Similar to the results for metals, in Sinclair Inlet, the distribution of residual organic contaminants is generally limited to nearshore areas already within the actively managed Puget Sound Naval Shipyard and Intermediate Maintenance Facility Superfund Site, where further source-control actions and monitoring are under way.

  6. Software Verification and Validation Procedure

    SciTech Connect (OSTI)

    Olund, Thomas S.

    2008-09-15

    This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

  7. Model Verification and Validation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7 AssessmentBusinessAlternativeModel Verification and

  8. Addressing Water Contamination

    E-Print Network [OSTI]

    Loewith, Robbie

    Addressing Water Contamination without Using Chemicals For more information contact WIPO at: World challenge Farmers and gardeners apply pesticides to their crops. Contaminated waters are released when-off contaminates local water supplies and pollutes the environment. As a consequence a range of pesticides may

  9. Comments for A Conference on Verification in the 21st Century

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification is information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.

  10. Runtime verification for stochastic systems

    E-Print Network [OSTI]

    Wilcox, Cristina M

    2010-01-01

    We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

  11. Design for manufacturability Design verification

    E-Print Network [OSTI]

    Patel, Chintan

    ITRS Design #12;Design · Design for manufacturability · Design verification #12;Design for Manufacturability · Architecture challenges · Logic and circuit challenges · Layout and physical design challenges · Expected to be the source of multiple DFM challenges · Invest in variability reduction or design

  12. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    SciTech Connect (OSTI)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  13. SECTION A: STUDENT INFORMATION ______________________________________________________________________ 93#____________________________________

    E-Print Network [OSTI]

    Lewis, Robert Michael

    , as Amended, you have the right to withhold the disclosure of "Directory Information." a. Student's name bSECTION A: STUDENT INFORMATION # __________________@_________________________ (______)______________ ________/________/_________ Email Address Phone # Effective Date of this Request SECTION B: ADDITIONAL INFORMATION The items listed

  14. Monitoring, Verification and Reporting: Improving Compliance...

    Open Energy Info (EERE)

    GHG inventory, Policiesdeployment programs Resource Type: Guidemanual Website: www.iea.orgpaperspathwaysmonitoring.pdf Monitoring, Verification and Reporting: Improving...

  15. Verification = Specification + Deduction + Computation + Abstraction Logical foundations

    E-Print Network [OSTI]

    Jouannaud, Jean-Pierre

    of powerful, secure, interactive tools #12;Verification Given a system to be analyzed, 1. elaborate a model, interactive tools #12;Verification Given a system to be analyzed, 1. elaborate a model of the system. 2. Test;Verification Given a system to be analyzed, 1. elaborate a model of the system. 2. Test some liveness property

  16. Symbolic Verification of Timed Asynchronous Hardware Protocols

    E-Print Network [OSTI]

    Stevens, Ken

    of system level verification by applying symbolic model checking techniques to help mitigate the state constraints into verification models to prove timed behavioral correctness of systems employing timed protocol to model timing in asynchronous hardware protocols ­ a novel mapping of tim- ing into the verification flow

  17. Incremental Power Grid Verification ECE Department

    E-Print Network [OSTI]

    Najm, Farid N.

    Incremental Power Grid Verification Abhishek ECE Department University of Toronto Toronto, Ontario, Canada f.najm@utoronto.ca ABSTRACT Verification of the on-die power grid is a key step in the design General Terms Performance, Algorithms, Verification Keywords Power Grid, voltage drop 1. INTRODUCTION

  18. Analysis-Based Verification: A Programmer-Oriented Approach to the Assurance of

    E-Print Network [OSTI]

    . This thesis advances the idea of focused analysis-based verification as a scalable and adoptable approach, and field validation on diverse commercial and open source code bases. Building on prior work in semantic.D. using the "green stamp method," namely by saving envelopes addressed to him as `Dr. Floyd'. After co

  19. Renewable Energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G. H.

    1999-04-14

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M&V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M&V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M&V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  20. Renewable energy and the International Performance Measurement and Verification Protocol

    SciTech Connect (OSTI)

    Walker, A.; Thompson, A.; Mills, D.; Kats, G.H.

    1999-07-01

    The Renewables Subcommittee for the International Performance Measurement and Verification Protocol (IPMVP) is developing a section of the IPMVP treating the special issues related to performance measurement of renewable energy systems. An industry consensus framework for measuring project benefits is important in realizing the promise of renewable energy. This work represents a voluntary, consensus-building process among sponsoring organizations from 21 countries and several disciplines. Measurement and Verification (M and V) can provide a common tool for standardization to support performance-based contracting, financing, and emissions trading. M and V can ensure that savings and generation requirements in energy projects will be achieved accurately and objectively. The protocol defines procedures that are consistently applicable to similar projects, internationally accepted, and reliable. Actual M and V project results can demonstrate success and provide developers, investors, lenders, and customers with more confidence in the value of future projects.

  1. Modeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    -parallel poset verification is a powerful methodology for proving the design correctness of complex systemsModeling and Verification of a Distributed Transmission Protocol Lubomir Ivanov Department verification methodologies has evolved in two directions: powerful, general techniques capable of accurately

  2. An on-line human signature verification system 

    E-Print Network [OSTI]

    Simsek, Burc A

    2000-01-01

    A study on human signature verification is presented. A literature survey of current and past methodologies for on-line signature verification is followed by a new approach to the problem of on-line signature verification. ...

  3. Verification and Validation of Hybrid Systems

    E-Print Network [OSTI]

    Jin, Xiaoqing

    2013-01-01

    Mathur. Foundations of software testing. Pearson Education,decision coverage to software testing. Software Engineeringmodel checkers: a survey. Software Testing, Verification and

  4. Input apparatus for dynamic signature verification systems

    DOE Patents [OSTI]

    EerNisse, Errol P. (Albuquerque, NM); Land, Cecil E. (Albuquerque, NM); Snelling, Jay B. (Albuquerque, NM)

    1978-01-01

    The disclosure relates to signature verification input apparatus comprising a writing instrument and platen containing piezoelectric transducers which generate signals in response to writing pressures.

  5. Guide to good practices for independent verification

    SciTech Connect (OSTI)

    NONE

    1998-12-01

    This Guide to Good Practices is written to enhance understanding of, and provide direction for, Independent Verification, Chapter X of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. The practices in this guide should be considered when planning or reviewing independent verification activities. Contractors are advised to adopt procedures that meet the intent of DOE Order 5480.19. Independent Verification is an element of an effective Conduct of Operations program. The complexity and array of activities performed in DOE facilities dictate the necessity for coordinated independent verification activities to promote safe and efficient operations.

  6. Alternative Breaks Emergency Contact & Verification of Medical

    E-Print Network [OSTI]

    Tipple, Brett

    Alternative Breaks Emergency Contact & Verification of Medical Insurance Form Participant Name is STRONGLY RECCOMENDED, it is not required for participation in Alternative Breaks. *Please note: All

  7. Numerical Verification of Bounce Harmonic Resonances in Neoclassical...

    Office of Scientific and Technical Information (OSTI)

    Numerical Verification of Bounce Harmonic Resonances in Neoclassical Toroidal Viscosity for Tokamaks Citation Details In-Document Search Title: Numerical Verification of Bounce...

  8. Fast 3D Scanning for Biometric Identification and Verification

    E-Print Network [OSTI]

    McShea, Daniel W.

    Fast 3D Scanning for Biometric Identification and Verification June 2011 Authors Anselmo., & Chen, A. (2011). Fast 3D Scanning for Biometric Identification and Verification. (Prepared by RTI

  9. CARB Verification of Catalyzed Diesel Particulate Filters for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets 2005...

  10. Numerical Verification of Bounce Harmonic Resonances in Neoclassical

    Office of Scientific and Technical Information (OSTI)

    for Tokamaks Kimin Kim, Jong-Kyu Park and Allen H. Boozer 70 PLASMA PHYSICS AND FUSION TECHNOLOGY Tokamaks, Numerical Verification Tokamaks, Numerical Verification This...

  11. "Hardware Verification for Arithmetic Circuits" Michael Shliselberg, Jordan Kaplan

    E-Print Network [OSTI]

    Mountziaris, T. J.

    "Hardware Verification for Arithmetic Circuits" Michael Shliselberg, Jordan Kaplan Professor Maciej Ciesielski Our research pertains to finding either new or more efficient methods of hardware verification

  12. Address (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand DaltonSolar Energy LLC JumpInformationAddingFrance)Address (Smart

  13. Monitoring and Commissioning Verification Algorithms for CHP Systems

    SciTech Connect (OSTI)

    Brambley, Michael R.; Katipamula, Srinivas; Jiang, Wei

    2008-03-31

    This document provides the algorithms for CHP system performance monitoring and commissioning verification (CxV). It starts by presenting system-level and component-level performance metrics, followed by descriptions of algorithms for performance monitoring and commissioning verification, using the metric presented earlier. Verification of commissioning is accomplished essentially by comparing actual measured performance to benchmarks for performance provided by the system integrator and/or component manufacturers. The results of these comparisons are then automatically interpreted to provide conclusions regarding whether the CHP system and its components have been properly commissioned and where problems are found, guidance is provided for corrections. A discussion of uncertainty handling is then provided, which is followed by a description of how simulations models can be used to generate data for testing the algorithms. A model is described for simulating a CHP system consisting of a micro-turbine, an exhaust-gas heat recovery unit that produces hot water, a absorption chiller and a cooling tower. The process for using this model for generating data for testing the algorithms for a selected set of faults is described. The next section applies the algorithms developed to CHP laboratory and field data to illustrate their use. The report then concludes with a discussion of the need for laboratory testing of the algorithms on a physical CHP systems and identification of the recommended next steps.

  14. The monitoring and verification of nuclear weapons

    SciTech Connect (OSTI)

    Garwin, Richard L., E-mail: RLG2@us.ibm.com [IBM Fellow Emeritus, IBM Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, NY 10598 (United States)

    2014-05-09

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

  15. Addressing Deferred Maintenance, Infrastructure Costs, and Excess...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities at Portsmouth and Paducah Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities...

  16. University of South Carolina Citizenship Status Verification RETURN THE ORIGINAL OF THIS

    E-Print Network [OSTI]

    University of South Carolina Citizenship Status Verification RETURN THE ORIGINAL OF THIS FORM/SSN: __________ Pursuant to section 59-101-430 of the South Carolina Code of Laws, as amended in 2008, the University of South Carolina has adopted a general enrollment policy effective January 1, 2009. To attend a public

  17. University of South Carolina Citizenship Status Verification Student Name: Last four digits of ID/SSN

    E-Print Network [OSTI]

    University of South Carolina Citizenship Status Verification Student Name: Last four digits of ID/SSN: Pursuant to section 59-101-430 of the South Carolina Code of Laws, as amended in 2008, the University of South Carolina has adopted a general enrollment policy effective January 1, 2009. To attend a public

  18. DEPARTMENT OF DEPARTMENTAL MANAGEMENT ADDRESS

    E-Print Network [OSTI]

    Knowles, David William

    in this department. And the Advanced Energy Initiative, which proposes to significantly increase our national investment in alternative fuel and clean energy technologies. It's about a 22 percent increase up to a levelU.S. DEPARTMENT OF ENERGY DEPARTMENTAL MANAGEMENT ADDRESS WITH SECRETARY OF ENERGY SAMUEL W. BODMAN

  19. Incrementally Deployable Source Address Validity

    E-Print Network [OSTI]

    Lowd, Daniel

    ID-SAVE: Incrementally Deployable Source Address Validity Enforcement Toby Ehrenkranz ://netsec.cs.uoregon.edu #12;Ehrenkranz WiP ID-SAVE What's The Problem? While routers know which direction a packet should are unreliable ID-SAVE attacks this root cause! 1 #12;Ehrenkranz WiP ID-SAVE ID-SAVE Basics Create and maintain

  20. State of the Lab Address

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  1. State of the Lab Address

    SciTech Connect (OSTI)

    King, Alex

    2010-01-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  2. SECTION I

    National Nuclear Security Administration (NNSA)

    Section I, Page 53 (1) An unmanufactured construction material mined or produced in the United States; (2) A construction material manufactured in the United States, if- (i) The...

  3. Section B

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    124 B-i PART I - THE SCHEDULE SECTION B - SUPPLIES OR SERVICES AND PRICESCOSTS TABLE OF CONTENTS B.1 TYPE OF CONTRACT - ITEMS BEING ACQUIRED ......

  4. Reuse of Verification Results Conditional Model Checking, Precision Reuse,

    E-Print Network [OSTI]

    Beyer, Dirk

    further verification runs of the system; information about the level of abstraction in the abstract modelReuse of Verification Results Conditional Model Checking, Precision Reuse, and Verification checker which parts of the system should be verified; thus, later verification runs can use the output

  5. The KivApproach to Software Verification ? Wolfgang Reif

    E-Print Network [OSTI]

    Reif, Wolfgang

    systems, a powerful proof component, and an evolutionary verification model supporting incremen­ tal error approach to the design and verification of large sequential systems. It is based on structured alge­ braic correction and verification. We present the design methodology for modular systems, a feasible verification

  6. AN INVESTIGATION INTO SUBSPACE RAPID SPEAKER ADAPTATION FOR VERIFICATION

    E-Print Network [OSTI]

    Chen, Tsuhan

    verification. 1. INTRODUCTION The rapid adaptation of speaker models for the purposes of speaker verification topic, with current state of the art speaker verification sys- tems based on hidden Markov models (HMMsAN INVESTIGATION INTO SUBSPACE RAPID SPEAKER ADAPTATION FOR VERIFICATION Simon Lucey and Tsuhan

  7. Verification: What works and what does not? Stephen A. Edwards

    E-Print Network [OSTI]

    Verification: What works and what does not? Stephen A. Edwards Columbia University Verification: What works and what does not? ­ p. 1/5 #12;Verification at Columbia · Luca Carloni et al. model detection. I want to verify my implementation obeys the semantics. Verification: What works and what does

  8. verification

    National Nuclear Security Administration (NNSA)

    %2A en NGSI Safeguards by Design http:www.nnsa.energy.govaboutusourprogramsdnnnissafeguardssbd

  9. verification

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2Anational lab8/%2A en6/%2A en NNSA/%2A

  10. Section CC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ID GFSI GFSI Due Contract Section GF0028 DOE-RL will approve and execute all real estate actions to acquire, utilize, and dispose of real property assets. As required...

  11. Section J

    Energy Savers [EERE]

    M-1 Section J Appendix M Key Design, Licensing and Site Management M&O Milestone Chart Activity Planned Date Develop and Submit CD-2 (25%-30%) 082009 Submission of Construction...

  12. Section J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1ResearchUniversityPreparedAwardsAchievementSectionSectionL-1

  13. Proof Planning for Automating Hardware Verification 

    E-Print Network [OSTI]

    Cantu-Ortiz, Francisco Javier

    In this thesis we investigate the applicability of proof planning to automate the verification of hardware systems. Proof planning is a meta-level reasoning technique which captures patterns of proof common to a family of theorems. It contributes...

  14. Correct Hardware Design and Verification Methods

    E-Print Network [OSTI]

    Margaria, T.; Melham, T.F.

    Margaria,T. Melham,T.F. Correct Hardware Design and Verification Methods: 11th IFIP WG10.5 Advanced Research Working Conference, CHARME 2001: UK Springer Verlag

  15. Addressing the workforce pipeline challenge

    SciTech Connect (OSTI)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  16. Addresses and Phone Numbers | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional Knowledge KiosksAbout AwardedAcronyms ThisNationalAddresses and

  17. Recommendations to Address Power Reliability Concerns Raised...

    Office of Environmental Management (EM)

    to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns...

  18. Symbiosis: Addressing Biomass Production Challenges and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening...

  19. Interagency Collaboration to Address Environmental Impacts of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Interagency Collaboration to Address Environmental Impacts of Shale Gas Drilling Interagency Collaboration to Address Environmental Impacts of Shale Gas Drilling April 23, 2013 -...

  20. Final Report on Internet Addressable Lightswitch

    SciTech Connect (OSTI)

    Rubinstein, Francis; Pettler, Peter

    2001-08-27

    This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be economi cally installed even in existing buildings that were not wired for dual-level lighting.

  1. Development of a Consensus Standard for Verification and Validation of Nuclear System Thermal-Fluids Software

    SciTech Connect (OSTI)

    Edwin A. Harvego; Richard R. Schultz; Ryan L. Crane

    2011-12-01

    With the resurgence of nuclear power and increased interest in advanced nuclear reactors as an option to supply abundant energy without the associated greenhouse gas emissions of the more conventional fossil fuel energy sources, there is a need to establish internationally recognized standards for the verification and validation (V&V) of software used to calculate the thermal-hydraulic behavior of advanced reactor designs for both normal operation and hypothetical accident conditions. To address this need, ASME (American Society of Mechanical Engineers) Standards and Certification has established the V&V 30 Committee, under the jurisdiction of the V&V Standards Committee, to develop a consensus standard for verification and validation of software used for design and analysis of advanced reactor systems. The initial focus of this committee will be on the V&V of system analysis and computational fluid dynamics (CFD) software for nuclear applications. To limit the scope of the effort, the committee will further limit its focus to software to be used in the licensing of High-Temperature Gas-Cooled Reactors. In this framework, the Standard should conform to Nuclear Regulatory Commission (NRC) and other regulatory practices, procedures and methods for licensing of nuclear power plants as embodied in the United States (U.S.) Code of Federal Regulations and other pertinent documents such as Regulatory Guide 1.203, 'Transient and Accident Analysis Methods' and NUREG-0800, 'NRC Standard Review Plan'. In addition, the Standard should be consistent with applicable sections of ASME NQA-1-2008 'Quality Assurance Requirements for Nuclear Facility Applications (QA)'. This paper describes the general requirements for the proposed V&V 30 Standard, which includes; (a) applicable NRC and other regulatory requirements for defining the operational and accident domain of a nuclear system that must be considered if the system is to be licensed, (b) the corresponding calculation domain of the software that should encompass the nuclear operational and accident domain to be used to study the system behavior for licensing purposes, (c) the definition of the scaled experimental data set required to provide the basis for validating the software, (d) the ensemble of experimental data sets required to populate the validation matrix for the software in question, and (e) the practices and procedures to be used when applying a validation standard. Although this initial effort will focus on software for licensing of High-Temperature Gas-Cooled Reactors, it is anticipated that the practices and procedures developed for this Standard can eventually be extended to other nuclear and non-nuclear applications.

  2. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2007; 17:137157

    E-Print Network [OSTI]

    Memon, Atif M.

    -oracle creation, coverage evaluation, and regression testing is recast in terms of this model by defining event to define test coverage criteria for GUIs [17], graph-traversal to obtain smoke test cases for GUIsSOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2007; 17

  3. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2006; 16:332

    E-Print Network [OSTI]

    Belli, Fevzi

    a holistic view of fault modelling that is carried out as a complementary step to system modelling, enablingSOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2006; 16:3­32 Published-based modelling, analysis and testing of user interactions: approach and case study Fevzi Belli1,,, Christof J

  4. Addressing Failures in Exascale Computing

    SciTech Connect (OSTI)

    Snir, Marc [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Wisniewski, Robert [Intel Corporation] [Intel Corporation; Abraham, Jacob [unknown] [unknown; Adve, Sarita [University of Illinois, Urbana-Champaign] [University of Illinois, Urbana-Champaign; Bagchi, Saurabh [Purdue University] [Purdue University; Balaji, Pavan [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Belak, J. [Lawrence Livermore National Laboratory (LLNL)] [Lawrence Livermore National Laboratory (LLNL); Bose, Pradip [IBM T. J. Watson Research Center] [IBM T. J. Watson Research Center; Cappello, Franck [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Carlson, Bill [unknown] [unknown; Chien, Andrew [University of Chicago] [University of Chicago; Coteus, Paul [IBM T. J. Watson Research Center] [IBM T. J. Watson Research Center; DeBardeleben, Nathan [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL); Diniz, Pedro [University of Southern California] [University of Southern California; Engelmann, Christian [ORNL] [ORNL; Erez, Mattan [University of Texas at Austin] [University of Texas at Austin; Fazzari, Saverio [Booz Allen Hamilton] [Booz Allen Hamilton; Geist, Al [ORNL] [ORNL; Gupta, Rinku [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Johnson, Fred [Science Applications International Corporation (SAIC), Oak Ridge, TN] [Science Applications International Corporation (SAIC), Oak Ridge, TN; Krishnamoorthy, Sriram [Pacific Northwest National Laboratory (PNNL)] [Pacific Northwest National Laboratory (PNNL); Leyffer, Sven [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Liberty, Dean [AMD] [AMD; Mitra, Subhasish [Stanford University] [Stanford University; Munson, Todd [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Schreiber, Rob [HP Labs] [HP Labs; Stearley, Jon [Sandia National Laboratories (SNL)] [Sandia National Laboratories (SNL); Van Hensbergen, Eric [ARM] [ARM

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  5. Addressing failures in exascale computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  6. North Korea's nuclear weapons program:verification priorities and new challenges.

    SciTech Connect (OSTI)

    Moon, Duk-ho

    2003-12-01

    A comprehensive settlement of the North Korean nuclear issue may involve military, economic, political, and diplomatic components, many of which will require verification to ensure reciprocal implementation. This paper sets out potential verification methodologies that might address a wide range of objectives. The inspection requirements set by the International Atomic Energy Agency form the foundation, first as defined at the time of the Agreed Framework in 1994, and now as modified by the events since revelation of the North Korean uranium enrichment program in October 2002. In addition, refreezing the reprocessing facility and 5 MWe reactor, taking possession of possible weapons components and destroying weaponization capabilities add many new verification tasks. The paper also considers several measures for the short-term freezing of the North's nuclear weapon program during the process of negotiations, should that process be protracted. New inspection technologies and monitoring tools are applicable to North Korean facilities and may offer improved approaches over those envisioned just a few years ago. These are noted, and potential bilateral and regional verification regimes are examined.

  7. SECTION J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION J APPENDIX A ADVANCE UNDERSTANDING ON HUMAN

  8. SECTION J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION J APPENDIX A ADVANCE UNDERSTANDING ON HUMAND-1

  9. SECTION J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION J APPENDIX A ADVANCE UNDERSTANDING ON HUMAND-1

  10. ECE/CS 584: Fall 2012 Embedded System Verification

    E-Print Network [OSTI]

    Liberzon, Daniel

    powerful software tools (model checkers, SMT solvers, & theorem provers) for designing & analyzing systems · Real-time and hybrid system models, stability verification: Multiple Lyapunov functions, slow switchingECE/CS 584: Fall 2012 Embedded System Verification URL: http

  11. Using Measurement and Verification to Manage Risk in Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Measurement and Verification to Manage Risk in Federal Energy- and Water-Saving Projects Using Measurement and Verification to Manage Risk in Federal Energy- and Water-Saving...

  12. Vehicle Modeling and Verification of CNG-Powered Transit Buses

    E-Print Network [OSTI]

    Hedrick, J. K.; Ni, A.

    2004-01-01

    Modeling and Verification of CNG-Powered Transit BusesModeling and Verification of CNG-Powered Transit Buses.Modeling and Veri?cation of CNG-Powered Transit Buses J.K.

  13. Compiler verification meets cross-language linking via data abstraction

    E-Print Network [OSTI]

    Wang, Peng

    Many real programs are written in multiple different programming languages, and supporting this pattern creates challenges for formal compiler verification. We describe our Coq verification of a compiler for a high-level ...

  14. Logic verification using recursive learning, ATPG and transformations 

    E-Print Network [OSTI]

    Paul, Debjyoti

    1996-01-01

    We describe a new approach for formal verification of combinational logic circuits using Recursive learning, ATPG and Transformations. A logic verification tool, VeriLAT, was implemented based on this approach. Experimental results on the ISCAS85...

  15. MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP

    E-Print Network [OSTI]

    MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS Thesis Approved by: Dr.................................................................................................................... 16 MODELING OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS

  16. Verification of full functional correctness for imperative linked data structures

    E-Print Network [OSTI]

    Zee, Karen K

    2010-01-01

    We present the verification of full functional correctness for a collection of imperative linked data structures implemented in Java. A key technique that makes this verification possible is a novel, integrated proof ...

  17. Address conversion unit for multiprocessor system

    SciTech Connect (OSTI)

    Fava, T.F.; Lary, R.F.; Blackledge, R.

    1987-03-03

    An address conversion unit is described for use in one processor in a multi-processor data processing system including a common memory, the processors and common memory being interconnected by a common bus including means for transferring address signals defining a common address space. The processor includes private bus means including means for transferring signals including address signals defining a private address space. A processor unit means is connected to the private bus means and includes means for transmitting and receiving signals including address signals over the private bus means for engaging in data transfers thereover. The address conversion unit is connected to the private bus means and common bus means for receiving address signals over the private bus means from the processor unit means in the private address space. The unit comprises: A. pointer storage means for storing a pointer identifying a portion of the common bus memory space; B. pointer generation means connected to receive a common bus address and for generating a pointer in response thereto for storage in the pointer storage means; and C. common bus address generation means connected to the private bus and the pointer storage means for receiving an address from the processor unit means and for generating a common bus address in response thereto. The common bus address is used to initiate transfers between the processor unit means and the common memory over the common bus.

  18. Section Number:

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clause entitled, "Laws,

  19. SECTION J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION J APPENDIX A ADVANCE UNDERSTANDING ON HUMAND-1 J-F-1

  20. SECTION J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION J APPENDIX A ADVANCE UNDERSTANDING ON HUMAND-1J-1

  1. SECTION J

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION J APPENDIX A ADVANCE UNDERSTANDING ON HUMAND-1J-1K-1

  2. AN ADVANCED BINARY ENCODED MATRIX REPRESENTATION FOR RULEBASE VERIFICATION

    E-Print Network [OSTI]

    Coenen, Frans

    reaching; consider the event where a KBS fails to apply an emergency shut down procedure. The verification

  3. Fuel Retrieval System (FRS) Design Verification

    SciTech Connect (OSTI)

    YANOCHKO, R.M.

    2000-01-27

    This document was prepared as part of an independent review to explain design verification activities already completed, and to define the remaining design verification actions for the Fuel Retrieval System. The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR).

  4. MODELING AND VERIFICATION OF A PIPELINED CPU Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    of complex hardware and software systems. Several powerful verification methods, such as Symbolic ModelMODELING AND VERIFICATION OF A PIPELINED CPU Lubomir Ivanov Department of Computer Science, Iona interleavings of events in a system. In [8] we introduced a new partial order verification method, referred

  5. Applied Verification: The Ptolemy Approach Chihhong Patrick Cheng

    E-Print Network [OSTI]

    stronger claims regarding the correctness of the system. Theoretically, modeling and verification should face when doing formal verifi- cation. Existing theories and practices in verification are powerful, but when applying formal techniques, the use of detailed mathematical model descriptions in verification

  6. Competition on Software Verification University of Passau, Germany

    E-Print Network [OSTI]

    Beyer, Dirk

    and Analysis of Systems (TACAS). 1 Introduction The area of verification, in particular model checking, has). Several new and powerful software-verification tools became available, but they have not been comparedCompetition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract

  7. AUTOMATED REGRESSION TESTING AND VERIFICATION OF COMPLEX CODE

    E-Print Network [OSTI]

    Roychoudhury, Abhik

    AUTOMATED REGRESSION TESTING AND VERIFICATION OF COMPLEX CODE CHANGES DOCTORAL THESIS MARCEL B¨OHME NATIONAL UNIVERSITY OF SINGAPORE 2014 #12;AUTOMATED REGRESSION TESTING AND VERIFICATION OF COMPLEX CODE : Automated Regression Testing and Verification of Complex Code Changes Abstract How can we check software

  8. LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL PAGI OF

    E-Print Network [OSTI]

    Rathbun, Julie A.

    ATM 1109 LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL PAGI OF VACUUM TEST DATE 9 SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL VACUUM TEST LIST OF TABLES AND FIGURES;Figure 4.9 5. 1 5.2 5.3-5.4 5.5 5.6 5.7-5.8 LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION

  9. Power Grid Voltage Integrity Verification Department of ECE

    E-Print Network [OSTI]

    Najm, Farid N.

    Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i of the circuit attached to the grid, thereby precluding early verification of the grid. We propose a power grid

  10. Changing Your Outlook Address Book Information

    E-Print Network [OSTI]

    Sanyal, Suman

    Changing Your Outlook Address Book Information Changes in Customer Services now allow users to update portions of their own Outlook Address Book information. To update your entry, fol- low

  11. Addressing the needs of mobile users

    E-Print Network [OSTI]

    Sohn, Timothy Youngjin

    2008-01-01

    of mobile information needs . . Pie chart of when needs wereaddressed . . Pie chart of how needs were addressed . . .Pie chart of why needs were addressed later Pie chart of why

  12. Running out of 32-bit Addresses Not all that many unique addresses

    E-Print Network [OSTI]

    the number of blocks in the compressed address ­ (-) subtract this number from 8 ­ (*) multiply the result in larger blocks · Solution: a larger address space ­ IPv6 has 128-bit addresses (2128 = 3.403 × 1038) ­ 1500 addresses/square foot of Earth's surface J 4 IPv6 vs. IPv4: Address Comparison · IPv4 has

  13. FINANCIAL SUPPORT VERIFICATION Dependent student

    E-Print Network [OSTI]

    Minnesota, University of

    at no or little cost. For example, free food or clothing provided by a relative or friend. In these cases, please post-consumer waste. FA933--Page 1 of 1 12/13 SECTION B. Family expenses D Birthdate (mm annual cost Child or elder care Clothing Entertainment Food Insurance (medical, life, property, auto

  14. FINANCIAL SUPPORT VERIFICATION Dependent student

    E-Print Network [OSTI]

    Minnesota, University of

    at no or little cost. For example, free food or clothing provided by a relative or friend. In these cases, please than 20 percent post-consumer waste. FA933--Page 1 of 1 5/15 SECTION B. Family expenses D Birthdate (mm annual cost Child or elder care Clothing Entertainment Food Insurance (medical, life, property, auto

  15. Metals Verification Study for Sinclair and Dyes Inlets,Washington

    SciTech Connect (OSTI)

    Kohn, Nancy P.; Miller, Martin C.; Brandenberger, Jill M.; Johnston, Robert K.

    2004-09-29

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington's 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. This Metals Verification Study was conducted to address the 303(d) segments that are listed for metal contaminants in marine sediment, because significant cleanup and source control activities have been conducted in the Inlets since the data supporting the 1998 303(d) listings were collected. The study was designed to obtain present-day sediment metals concentrations throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, with stations spatially distributed to support 303(d) listing updates and also watershed-level water quality and contaminant transport modeling efforts. A total of 160 surface sediment samples from Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage were screened for copper, lead, and zinc using X-Ray Fluorescence (XRF). 40 samples (25%) were selected for confirmatory metals analysis by ICP-MS for cadmium, silver, and arsenic in addition to copper, lead, and zinc. Regression relationships between the ICP-MS and XRF datasets were developed to estimate copper, lead, and zinc concentrations in all samples. The XRF results for copper, lead, and zinc correlated well with ICP-MS results, and predicted concentrations were calculated for all samples. The results of the Metals Verification Study show that sediment quality in Sinclair Inlet has improved markedly since implementation of cleanup and source control actions, and that the distribution of residual contaminants is limited to nearshore areas already within the actively managed Puget Sound Naval Shipyard Superfund Site where further source control actions and monitoring are under way. Outside of Sinclair Inlet, the target metals met state sediment quality standards.

  16. Automatic verification of DEVS models Gabriel Wainer

    E-Print Network [OSTI]

    Wainer, Gabriel

    Viviana Passuello Departamento de Computación Universidad de Buenos Aires Pabellón I. Ciudad Universitaria (1428) Buenos Aires. Argentina. {lmoriham, vpassuel}@dc.uba.ar Keywords: DEVS, model verification, Cell a hierarchical approach [1]. In [2] the Cell-DEVS formalism was presented, as a means to de- scribe cell spaces

  17. Indexed Predicate Discovery for Unbounded System Verification

    E-Print Network [OSTI]

    Bryant, Randal E.

    and systems with arbitrary number of identical, concurrent processes, the system model must support state of a set of identical processes can be modeled as functions mapping an integer process idenIndexed Predicate Discovery for Unbounded System Verification Shuvendu K. Lahiri and Randal E

  18. Time-Bounded Verification Joel Ouaknine1

    E-Print Network [OSTI]

    Worrell, James

    Time-Bounded Verification Jo¨el Ouaknine1 , Alexander Rabinovich2 , and James Worrell1 1 Oxford prob- lems for timed automata over time intervals of fixed, bounded length. One of our main results is that time-bounded language inclusion for timed automata is 2EXPSPACE-complete. We also investigate the satis

  19. Secure Location Verification Using Radio Broadcast

    E-Print Network [OSTI]

    Nesterenko, Mikhail

    , exploits the difference between propagation speeds of radio and sound waves to estimate the position1 Secure Location Verification Using Radio Broadcast Adnan Vora and Mikhail Nesterenko Abstract of the prover. In this paper, we propose a solution that leverages the broadcast nature of the radio signal

  20. Secure Location Verification Using Radio Broadcast

    E-Print Network [OSTI]

    Nesterenko, Mikhail

    the difference between propagation speeds of radio and sound waves to estimate the position of the proverSecure Location Verification Using Radio Broadcast Adnan Vora and Mikhail Nesterenko Computer. In this paper, we propose a solution that leverages the broadcast nature of the radio signal emitted

  1. Distributed Runtime Verification of JADE Multiagent Systems

    E-Print Network [OSTI]

    Mascardi, Viviana

    to a given global protocol is of paramount importance for most systems, and is mandatory for safety-critical of the verification activities. Reducing the log files dimension, re-implementing the monitor in a way independent in the JADE Homepage. FYPA (Find Your Path, Agent! [6, 7, 8]) is another industrial MAS developed in JADE

  2. Automatic Verification of Multiqueue Discrete Timed Automata

    E-Print Network [OSTI]

    Dang, Zhe

    become a useful model to investigate the verification of real­ time systems and have been extensively studied. The expressive power of TA has many limitations in modeling, since many real­time systems. The MQDTA model can be used to specify and verify various systems with unbounded queues, such as a real

  3. Hybrid Systems: From Verification to Falsification

    E-Print Network [OSTI]

    Kavraki, Lydia E.

    Hybrid Systems: From Verification to Falsification Erion Plaku, Lydia E. Kavraki, and Moshe Y}@cs.rice.edu Abstract. We propose HyDICE, Hybrid DIscrete Continuous Exploration, a multi-layered approach for hybrid. The discrete search uses the discrete transitions of the hybrid system and coarse-grained decompositions

  4. RELAP-7 SOFTWARE VERIFICATION AND VALIDATION PLAN

    SciTech Connect (OSTI)

    Smith, Curtis L; Choi, Yong-Joon; Zou, Ling

    2014-09-01

    This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7.

  5. 1 Verification Techniques software testing: search bugs

    E-Print Network [OSTI]

    Verschelde, Jan

    objectives and requirements of software verification Software is a product, subject to quality control. A product has (industrial) quality if it performs as specified, as expected by the user. Software testing. The profession of a software tester is just as essential as that of a software developer to achieve quality

  6. Advances in Quantitative Verification for Ubiquitous Computing

    E-Print Network [OSTI]

    Oxford, University of

    Advances in Quantitative Verification for Ubiquitous Computing Marta Kwiatkowska Department of Computer Science, University of Oxford, Oxford, OX1 3QD Abstract. Ubiquitous computing, where computers and correcting flaws in a number of ubiquitous computing applications. In this paper, we focus on three key

  7. Torque Equation (See section 4.9)

    E-Print Network [OSTI]

    McCalley, James D.

    1 Torque Equation (See section 4.9) Our goal is to combine the state-space voltage equations with the state-space torque equations. To achieve this, we need to do the following three things to the torque equation: 1. Address the difference in power bases. 2. Address the difference in speed (time) bases. 3

  8. Marker-Assisted Verification of Hybrids in Pearl Millet-Napiergrass (Pennisetum glaucum [L.] R. Br. x Pennisetum purpureum Schumach.) 

    E-Print Network [OSTI]

    Dowling, Charlie

    2012-02-14

    but towards marginal and abandoned grasslands. In order to reach the goal of producing 36 billion gallons of bioethanol production by 2022 and address the mandatory cap on corn ethanol production that was mandated by the U.S. federal government... Flow Cytometry Hybrid Verification Histograms ..................................... 35 3 PCR Products of PMN Hybrid PEGL09TX04 x PEPU09FL01 showing 10/10 Hybrids in These Progeny...

  9. High-Resolution Fast-Neutron Spectrometry for Arms Control and Treaty Verification

    SciTech Connect (OSTI)

    David L. Chichester; James T. Johnson; Edward H. Seabury

    2012-07-01

    Many nondestructive nuclear analysis techniques have been developed to support the measurement needs of arms control and treaty verification, including gross photon and neutron counting, low- and high-resolution gamma spectrometry, time-correlated neutron measurements, and photon and neutron imaging. One notable measurement technique that has not been extensively studied to date for these applications is high-resolution fast-neutron spectrometry (HRFNS). Applied for arms control and treaty verification, HRFNS has the potential to serve as a complimentary measurement approach to these other techniques by providing a means to either qualitatively or quantitatively determine the composition and thickness of non-nuclear materials surrounding neutron-emitting materials. The technique uses the normally-occurring neutrons present in arms control and treaty verification objects of interest as an internal source of neutrons for performing active-interrogation transmission measurements. Most low-Z nuclei of interest for arms control and treaty verification, including 9Be, 12C, 14N, and 16O, possess fast-neutron resonance features in their absorption cross sections in the 0.5- to 5-MeV energy range. Measuring the selective removal of source neutrons over this energy range, assuming for example a fission-spectrum starting distribution, may be used to estimate the stoichiometric composition of intervening materials between the neutron source and detector. At a simpler level, determination of the emitted fast-neutron spectrum may be used for fingerprinting 'known' assemblies for later use in template-matching tests. As with photon spectrometry, automated analysis of fast-neutron spectra may be performed to support decision making and reporting systems protected behind information barriers. This paper will report recent work at Idaho National Laboratory to explore the feasibility of using HRFNS for arms control and treaty verification applications, including simulations and experiments, using fission-spectrum neutron sources to assess neutron transmission through composite low-Z attenuators.

  10. An independent verification and validation of the Future Theater Level Model conceptual model

    SciTech Connect (OSTI)

    Hartley, D.S. III; Kruse, K.L.; Martellaro, A.J.; Packard, S.L.; Thomas, B. Jr.; Turley, V.K.

    1994-08-01

    This report describes the methodology and results of independent verification and validation performed on a combat model in its design stage. The combat model is the Future Theater Level Model (FTLM), under development by The Joint Staff/J-8. J-8 has undertaken its development to provide an analysis tool that addresses the uncertainties of combat more directly than previous models and yields more rapid study results. The methodology adopted for this verification and validation consisted of document analyses. Included were detailed examination of the FTLM design documents (at all stages of development), the FTLM Mission Needs Statement, and selected documentation for other theater level combat models. These documents were compared to assess the FTLM as to its design stage, its purpose as an analytical combat model, and its capabilities as specified in the Mission Needs Statement. The conceptual design passed those tests. The recommendations included specific modifications as well as a recommendation for continued development. The methodology is significant because independent verification and validation have not been previously reported as being performed on a combat model in its design stage. The results are significant because The Joint Staff/J-8 will be using the recommendations from this study in determining whether to proceed with develop of the model.

  11. Finite Model Finding for Parameterized Verification

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2010-01-01

    In this paper we investigate to which extent a very simple and natural "reachability as deducibility" approach, originated in the research in formal methods in security, is applicable to the automated verification of large classes of infinite state and parameterized systems. The approach is based on modeling the reachability between (parameterized) states as deducibility between suitable encodings of states by formulas of first-order predicate logic. The verification of a safety property is reduced to a pure logical problem of finding a countermodel for a first-order formula. The later task is delegated then to the generic automated finite model building procedures. In this paper we first establish the relative completeness of the finite countermodel finding method (FCM) for a class of parameterized linear arrays of finite automata. The method is shown to be at least as powerful as known methods based on monotonic abstraction and symbolic backward reachability. Further, we extend the relative completeness of ...

  12. NGSI: IAEA Verification of UF6 Cylinders

    SciTech Connect (OSTI)

    Curtis, Michael M.

    2012-06-05

    The International Atomic Energy Agency (IAEA) is often ignorant of the location of declared, uranium hexafluoride (UF6) cylinders following verification, because cylinders are not typically tracked onsite or off. This paper will assess various methods the IAEA uses to verify cylinder gross defects, and how the task could be ameliorated through the use of improved identification and monitoring. The assessment will be restricted to current verification methods together with one that has been applied on a trial basis—short-notice random inspections coupled with mailbox declarations. This paper is part of the NNSA Office of Nonproliferation and International Security’s Next Generation Safeguards Initiative (NGSI) program to investigate the concept of a global monitoring scheme that uniquely identifies and tracks UF6 cylinders.

  13. Survey of Existing Tools for Formal Verification.

    SciTech Connect (OSTI)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying %22safety and security%22 requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  14. Mechanism Design: from Partial to Probabilistic Verification IOANNIS CARAGIANNIS, University of Patras & CTI, Greece

    E-Print Network [OSTI]

    Elkind, Edith

    Mechanism Design: from Partial to Probabilistic Verification IOANNIS CARAGIANNIS, University) truthfully. We first consider the standard model of mechanism design with partial verification, where the set results, we then introduce a richer model of verification, which we term mechanism design

  15. Hanford Site Assessment & Characterization/Verification of Structures...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 Revision 0 Hanford Site Assessment & CharacterizationVerification of Structures & Conex Boxes Procedure Prepared for the U.S. Department of Energy Assistant Secretary for...

  16. NEMVP: North American energy measurement and verification protocol

    SciTech Connect (OSTI)

    1996-03-01

    This measurement and verification protocol discusses procedures that,when implemented, allow buyers, sellers, and financiers of energy projects to quantify energy conservation measure performance and savings.

  17. Measurement and Verification of Low Income Energy Efficiency...

    Open Energy Info (EERE)

    Measurement and Verification of Low Income Energy Efficiency Programs in Brazil: Methodological Challenges Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Measurement...

  18. Verification Method for SSI Problems with Extended Parameter Ranges

    Broader source: Energy.gov [DOE]

    Verification Method for SSI Problems with Extended Parameter Ranges 2014 U.S. DOE Natural Phenomena Hazards Meeting Carl J. Costantino and Associates www.cjcassoc.com

  19. Design, Installation, and Field Verification of Integrated Active...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design, Installation, and Field Verification of Integrated Active Desiccant Hybrid Rooftop Systems Combined with a Natural Gas Driven Cogeneration Package, 2008 Design,...

  20. Measurement and Verification Options for Federal Energy- and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Options for Federal Energy- and Water-Saving Projects Measurement and Verification Options for Federal Energy- and Water-Saving Projects Federal Energy Management Program...

  1. DeLib Materials Donation Form Address

    E-Print Network [OSTI]

    Chen, Tsuhan

    DeLib Materials Donation Form Name: Address: Phone Materials:____________ I, ______________________________ (signature), hereby deed this gift of library materials to the Distributed eLibrary of Weill Cornell Medical

  2. 2015 State of Indian Nations Address

    Office of Energy Efficiency and Renewable Energy (EERE)

    The President of the National Congress of American Indians will deliver his annual State of the Indian Nations address to Member of Congress, government officials, tribal leaders and citizens, and...

  3. Persian address pronouns and politeness in interaction 

    E-Print Network [OSTI]

    Nanbakhsh, Golnaz

    2011-11-23

    In this thesis, I aim to investigate the variation of Persian pronominal address system and politeness strategies in contemporary Iranian society from a quantitative and qualitative sociolinguistic perspective. I focus ...

  4. Addressing the needs of mobile users

    E-Print Network [OSTI]

    Sohn, Timothy Youngjin

    2008-01-01

    search terms o?ine on a mobile device, and then address theminput modality to a mobile device, and recognizing input cannoti?cation cues for mobile devices. In CHI ’00: CHI ’00

  5. "Exploring novel biomaterial approaches to address

    E-Print Network [OSTI]

    Zhigilei, Leonid V.

    "Exploring novel biomaterial approaches to address neurodegenerative diseases and injuries Engineering and Biomaterials Research Group Neural regeneration within the central nervous system (CNS to help effectively translate them to the clinic. We propose an innovative combination of biomaterial

  6. Integrating Formal Verification into Computer Organization and Architecture Courses

    E-Print Network [OSTI]

    Ivanov, Lubomir

    to formal verification is based on the theory of - automata [5]. Given a model of the system in terms industry and have led to the development of powerful verification tools. However, the popularity facts about a mathematical model of the system under consideration. The proofs are general enough

  7. Specification and Formal Verification of Interconnect Bus Protocols Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    and functionality of devices has brought about the need for more powerful modeling and verification tools. Classical is using first generation formal verification tools based on Symbolic Model Checking [1] and -Automata of using partial orders in modeling and verifying system behavior is in avoiding the need to study all

  8. Formal Verification of Infinite State Systems Using Boolean Methods

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods Randal E. Bryant School automated formal verification tools are based on a bit-level model of computation, where a set of Boolean state variables encodes the system state. Using powerful inference engines, such as Binary Decision

  9. Improving large-sized PLC programs verification using abstractions

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    in formal verification by model-checking. In parallel, many researches have been undertaken since several project which was funded by Alstom Power Plant Information and Control Systems, Engineering toolsImproving large-sized PLC programs verification using abstractions V. Gourcuff O. de Smet J

  10. Quantitative Verification: Models, Techniques and Tools Marta Kwiatkowska

    E-Print Network [OSTI]

    Oxford, University of

    verification is an analogous technique for establishing quantitative properties of a system modelQuantitative Verification: Models, Techniques and Tools Marta Kwiatkowska Oxford University of the state-transition graph of the model and is therefore more powerful than test- ing. Quantitative

  11. Formal Verification of Infinite State Systems Using Boolean Methods #

    E-Print Network [OSTI]

    Bryant, Randal E.

    Formal Verification of Infinite State Systems Using Boolean Methods # Randal E. Bryant School automated formal verification tools are based on a bit­level model of computation, where a set of Boolean state variables encodes the system state. Using powerful inference engines, such as Binary Decision

  12. Analytic Verification at NASA A View from the Trenches

    E-Print Network [OSTI]

    Jipsen, Peter

    Analytic Verification at NASA A View from the Trenches Willem C. Visser July 31, 1999 Autonomous software is considered a major enabling technology for NASA in order to achieve the goal of their slogan Software Engineering 2 (ASE) group at NASA Ames Research Center is developing analytic verification

  13. Scalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing

    E-Print Network [OSTI]

    Stevens, Ken

    verification ensures correctness of a system given a required set of properties. Scalability due to state exploScalable Asynchronous Hardware Protocol Verification for Compositions with Relative Timing Krishnaji Desai Kenneth S. Stevens University of Utah Electrical and Computer Engineering Department

  14. Formal property verification in a conformance testing framework

    E-Print Network [OSTI]

    Fainekos, Georgios E.

    Formal property verification in a conformance testing framework Houssam Abbas School of Electrical to develop a sequence of system models of different fidelity and complexity, each appropriate for a particular design or verification task. In such a sequence, one model is often derived from the other

  15. Automatic Verification of Multi-queue Discrete Timed Automata

    E-Print Network [OSTI]

    Dang, Zhe

    the verification of real- time systems and have been extensively studied. The expressive power of TA has many verification of many interesting properties of a MQDTA. The MQDTA model can be used to specify and verify-state model-checking, real-time systems. 1 Introduction Real-time systems are widely regarded as a natural

  16. Efficient Verification of the PCI Local Bus using Boolean Satisfiability

    E-Print Network [OSTI]

    Aloul, Fadi

    IWLS'00 Page 1 Efficient Verification of the PCI Local Bus using Boolean Satisfiability Fadi A is to study the application of Boolean Satisfiability to the verification of the PCI Local Bus. The novel such as achieving high speed testing. To demonstrate how our method works, we have modeled the PCI Local Bus

  17. Roadmap for Enhanced Languages and Methods to Aid Verification

    E-Print Network [OSTI]

    Miller, Dale

    Roadmap for Enhanced Languages and Methods to Aid Verification Gary T. Leavens, Jean-Raymond Abrial 50011-1041, USA #12;Roadmap for Enhanced Languages and Methods to Aid Verification Gary T. Leavens, Iowa, Aaron Stump, Washington University of St. Louis, USA July 21, 2006 Abstract This roadmap describes ways

  18. Efficient RC Power Grid Verification Using Node Elimination

    E-Print Network [OSTI]

    Najm, Farid N.

    Efficient RC Power Grid Verification Using Node Elimination Ankit Goyal Department of ECE to reduce the size of power grids but their fo- cus is more on simulation. In verification, we are concerned. This paper pro- poses a novel approach to systematically reduce the power grid and accurately compute

  19. Fast Vectorless Power Grid Verification Using an Approximate Inverse Technique

    E-Print Network [OSTI]

    Najm, Farid N.

    Fast Vectorless Power Grid Verification Using an Approximate Inverse Technique Nahi H. Abdul Ghani Department of ECE University of Toronto Toronto, Ontario, Canada f.najm@utoronto.ca ABSTRACT Power grid Aids General Terms Performance, Algorithms, Verification Keywords Power grid, voltage drop, approximate

  20. Software Verification in the Google App-Engine Cloud

    E-Print Network [OSTI]

    Beyer, Dirk

    University of Passau, Germany Abstract. Software verification often requires a large amount of com- puting resources. In the last years, cloud services emerged as an inexpen- sive, flexible, and energy who wish to solve sin- gle verification tasks (tutorial usage), and an API for integrating the service

  1. A Framework for Object Oriented Hardware Specification, Verification, and Synthesis*

    E-Print Network [OSTI]

    Ould Ahmedou, Mohameden

    A Framework for Object Oriented Hardware Specification, Verification, and Synthesis* T. Kuhn, T of hardware. For this purpose the object oriented language `e' is introduced along with a powerful run Object oriented hardware modeling, verification, high-level synthesis. 1. INTRODUCTION The ever

  2. Object Oriented Hardware Synthesis and Verification T. Kuhn, T. Oppold,

    E-Print Network [OSTI]

    Ould Ahmedou, Mohameden

    Object Oriented Hardware Synthesis and Verification T. Kuhn, T. Oppold, C. Schulz-Key, M of hardware from object oriented specifications is presented. Our approach utilizes the e language that has been proven to be highly efficient for the verification of hardware. The e language is similar to Java

  3. Timing verification of automotive communication architecture using quantile estimation

    E-Print Network [OSTI]

    Navet, Nicolas

    Timing verification of automotive communication architecture using quantile estimation Nicolas;1 Outline - 207/02/2014ERTSS'2014 Early-stage timing verification of wired automotive buses ­ CAN for quantiles derived by simulation 2 typical automotive use-cases #12;2 Automotive communication architectures

  4. Automated Verification of Model Transformations in the Automotive Industry

    E-Print Network [OSTI]

    Cordy, James R.

    Automated Verification of Model Transformations in the Automotive Industry Gehan M. K. Selim1 Verification, Automotive In- dustry 1 Introduction Model Driven Development (MDD) has been increasingly used of the Pays de la Loire Region (France), and by NSERC (Canada), as part of the NECSIS Automotive Partnership

  5. Nuclear Verification | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 survey includesScienceFacilityVerification

  6. Addressing Complexity In Laboratory Experiments- The Scaling Of Dilute

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand DaltonSolar Energy LLC JumpInformationAddingFrance)Address

  7. Approaches to verification of two-dimensional water quality models

    SciTech Connect (OSTI)

    Butkus, S.R. . Water Quality Dept.)

    1990-11-01

    The verification of a water quality model is the one procedure most needed by decision making evaluating a model predictions, but is often not adequate or done at all. The results of a properly conducted verification provide the decision makers with an estimate of the uncertainty associated with model predictions. Several statistical tests are available for quantifying of the performance of a model. Six methods of verification were evaluated using an application of the BETTER two-dimensional water quality model for Chickamauga reservoir. Model predictions for ten state variables were compared to observed conditions from 1989. Spatial distributions of the verification measures showed the model predictions were generally adequate, except at a few specific locations in the reservoir. The most useful statistics were the mean standard error of the residuals. Quantifiable measures of model performance should be calculated during calibration and verification of future applications of the BETTER model. 25 refs., 5 figs., 7 tabs.

  8. Verification and validation for induction heating

    SciTech Connect (OSTI)

    Lam, Kin [Los Alamos National Laboratory; Tippetts, Trevor B [Los Alamos National Laboratory; Allen, David W [NON LANL

    2008-01-01

    Truchas is a software package being developed at LANL within the Telluride project for predicting the complex physical processes in metal alloy casting. The software was designed to be massively parallel, multi-material, multi-physics, and to run on 3D, fully unstructured meshes. This work describes a Verification and Validation assessment of Truchas for simulating the induction heating phase of a casting process. We used existing data from a simple experiment involving the induction heating of a graphite cylinder, as graphite is a common material used for mold assemblies. Because we do not have complete knowledge of all the conditions and properties in this experiment (as is the case in many other experiments), we performed a parameter sensitivity study, modeled the uncertainties of the most sensitive parameters, and quantified how these uncertainties propagate to the Truchas output response. A verification analysis produced estimates of the numerical error of the Truchas solution to our computational model. The outputs from Truchas runs with randomly sampled parameter values were used for the validation study.

  9. EPA -- Addressing Children's Health through Reviews Conducted...

    Broader source: Energy.gov (indexed) [DOE]

    Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act Executive Order 13045, "Protection of Children...

  10. Shared address collectives using counter mechanisms

    DOE Patents [OSTI]

    Blocksome, Michael; Dozsa, Gabor; Gooding, Thomas M; Heidelberger, Philip; Kumar, Sameer; Mamidala, Amith R; Miller, Douglas

    2014-02-18

    A shared address space on a compute node stores data received from a network and data to transmit to the network. The shared address space includes an application buffer that can be directly operated upon by a plurality of processes, for instance, running on different cores on the compute node. A shared counter is used for one or more of signaling arrival of the data across the plurality of processes running on the compute node, signaling completion of an operation performed by one or more of the plurality of processes, obtaining reservation slots by one or more of the plurality of processes, or combinations thereof.

  11. Cheaper Adjoints by Reversing Address Computations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hascoët, L.; Utke, J.; Naumann, U.

    2008-01-01

    The reverse mode of automatic differentiation is widely used in science and engineering. A severe bottleneck for the performance of the reverse mode, however, is the necessity to recover certain intermediate values of the program in reverse order. Among these values are computed addresses, which traditionally are recovered through forward recomputation and storage in memory. We propose an alternative approach for recovery that uses inverse computation based on dependency information. Address storage constitutes a significant portion of the overall storage requirements. An example illustrates substantial gains that the proposed approach yields, and we show use cases in practical applications.

  12. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    DOE Patents [OSTI]

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  13. Compositional Reactive Semantics of SystemC and Verification with RuleBase

    E-Print Network [OSTI]

    Gupta, Rajesh

    C. Keywords: SystemC, semantics, verification, model checking 1 Introduction System-level modeling using for verification of SystemC com- ponents, providing a powerful workbench for testing and verification. 2 OverviewCompositional Reactive Semantics of SystemC and Verification with RuleBase Rudrapatna K

  14. Comment submitted by Consumers Union regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Consumers Union regarding the Energy Star Verification Testing Program

  15. State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V)

    Broader source: Energy.gov [DOE]

    State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V) Webinar.

  16. Energy Savings Performance Contracting-Savings Measurement and Verification Transcript 2-24-2011.doc

    Broader source: Energy.gov [DOE]

    Energy Savings Performance Contracting-Savings Measurement and Verification Transcript 2-24-2011.doc

  17. Developing an Evaluation Measurement and Verification Plan for Your Energy Efficiency Project/Program

    Broader source: Energy.gov [DOE]

    Developing an Evaluation Measurement and Verification Plan for Your Energy Efficiency Project/Program

  18. Verification of the Equilibrium and MHD Stability Codes within the Integrated Tokamak Modeling Task Force

    E-Print Network [OSTI]

    Verification of the Equilibrium and MHD Stability Codes within the Integrated Tokamak Modeling Task Force

  19. Seeing is Not Believing: Visual Verifications through Liveness Analysis using Mobile Devices

    E-Print Network [OSTI]

    Carbunar, Bogdan

    , including citizen journalism, smart cities, mobile authentication, and product condition verification

  20. Financing Innovation to Address Global Climate Change

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy’s Loan Programs Office (LPO) is helping address the global challenge of climate change by providing critical financing needed to deploy some of the world’s largest and most innovative clean energy and advanced technology vehicles manufacturing projects, preventing more than 25 million metric tons of CO2 emissions to date.

  1. Address: Computer Sciences Department University of Tulsa

    E-Print Network [OSTI]

    Sen, Sandip

    VITA Sandip Sen Address: Computer Sciences Department University of Tulsa 600 South College Avenue Tulsa, OK 74104-3189 Phone: 918-631-2985 FAX: 918-631-3077 e-mail: sandip@utulsa.edu URL: http, University of Tulsa, Tulsa, OK (September, 2004 ­ present) Associate Professor, Department of Mathematical

  2. An electronically addressed spatial light modulator 

    E-Print Network [OSTI]

    McKnight, Douglas J

    pixelated binary spatial light modulator operating in reflection. Each pixel contains a memory element which stores the programmed logical state of the pixel. The addressing and pixel circuits were fabricated in a 1.5m nMOS technology on a 10 mm square chip...

  3. Addressable Advertising on Digital Television Vincent Dureau

    E-Print Network [OSTI]

    Masthoff, Judith

    Addressable Advertising on Digital Television Vincent Dureau Chief Technology Officer, OpenTV 275 of digital technology is having a profound effect on television advertising. While television advertising costs are increasing, its efficiency is decreasing. The traditional models for advertising on television

  4. A. General Information A1 Address Information

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    .montana.edu/wwwcat/appopts.html A2 Source of institutional control (Check only one): A2 Public X A3 Classify your undergraduate of students for each of the following categories as of the institution's official fall reporting dateA. General Information A1 Address Information A1 Name of College/University: Montana State

  5. A. GENERAL INFORMATION A1. Address Information

    E-Print Network [OSTI]

    Kunkle, Tom

    @cofc.edu Is there a separate URL application site on the Internet? If so, pleasespecify: A2. Source of institutional control categories as of the institution's official fall reporting date or as of October 15, 2002. FULL-TIME PARTA. GENERAL INFORMATION A1. Address Information Name of College or University College of Charleston

  6. UNO Student ID Number__________________________________________________________________ Permanent Mailing Address________________________________________________________________

    E-Print Network [OSTI]

    Li, X. Rong

    UNO Graduate Other adult occupants must be either a spouse, domestic partner, or a relative that is a full-time UNO student and at least 21 years old at the time of application. If applicable, a copy.00. Personal Information Other Adult Occupant LAST FIRST MIDDLE Mailing Address: UNO Office of Student Housing

  7. Patient position verification using small IMRT fields

    SciTech Connect (OSTI)

    Bol, G. H.; Heide, U. A. van der; Nederveen, A. J.; Kotte, A. N. T. J.; Lagendijk, J. J. W. [Department of Radiotherapy, University Medical Center Utrecht, Heidelberglaan 100, 3584 CX Utrecht (Netherlands)

    2006-07-15

    A commonly used approach to quantify and minimize patient setup errors is by using electronic portal imaging devices (EPIDs). The position of the tumor can be verified indirectly by matching the bony anatomy to a reference image containing the same structures. In this paper we present two off-line methods for detecting the position of the bony anatomy automatically, even if every single portal image of each segment of an IMRT treatment beam contains insufficient matching information. Extra position verification fields will no longer be necessary, which reduces the total dose to the patient. The first method, the stack matching method (SMM), stacks the portal image of each segment of a beam to a three dimensional (3D) volume, and this volume is subsequently used during the matching phase. The second method [the averaged projection matching method (APMM)], is a simplification of the first one, since the initially created volume is reduced again to a 2D artificial image, which speeds up the matching procedure considerably, without a significant loss of accuracy. Matching is based on normalized mutual information. We demonstrate our methods by comparing them to existing matching routines, such as matching based on the largest segment. Both phantom and patient experiments show that our methods are comparable with the results obtained from standard position verification methods. The matches are verified by means of visual inspection. Furthermore, we show that when a distinct area of 40-60 cm{sup 2} of the EPID is exposed during one treatment beam, both SMM and APMM are able to deliver a good matching result.

  8. PART III - SECTION J

    National Nuclear Security Administration (NNSA)

    addressed by the Contractor as an Appendix to the Contract or in a current Contractor policy or procedure, the Contractor need only cross-reference the applicable Contract...

  9. Specification and Verification: The Spec# Experience Mike Barnett

    E-Print Network [OSTI]

    Leino, K. Rustan M.

    Specification and Verification: The Spec# Experience Mike Barnett Microsoft Research, Redmond or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 2009 Barnett, Fähndrich

  10. Combining Vision Verification with a High Level Robot Programming Language 

    E-Print Network [OSTI]

    Yin, Baolin

    1984-01-01

    This thesis describes work on using vision verification within an object level language for describing robot assembly (RAPT). The motivation for this thesis is provided by two problems. The first is how to enhance a ...

  11. Seventh International Workshop on Specification and Verification of

    E-Print Network [OSTI]

    Leavens, Gary T.

    , Brazil) Sergio Soares (UPE, Brazil) Ricardo Lima (Universidade de Pernambuco, Brazil) Paulo Borba (Federal University of Pernambuco, Brazil) Márcio Cornélio (UPE, Brazil) Total Correctness of Recursive Units and Proof Checking for Specification and Verification 59 Hampton Smith (Clemson University, USA

  12. Cleanup Verification Package for the 300-8 Waste Site

    SciTech Connect (OSTI)

    J. M. Capron

    2005-11-07

    This cleanup verification package documents completion of remedial action for the 300-8 waste site. This waste site was formerly used to stage scrap metal from the 300 Area in support of a program to recycle aluminum.

  13. Experiments in Automating Hardware Verification using Inductive Proof Planning 

    E-Print Network [OSTI]

    Cantu, Francisco; Bundy, Alan; Smaill, Alan; Basin, David

    1996-01-01

    We present a new approach to automating the verification of hardware designs based on planning techniques. A database of methods is developed that combines tactics, which construct proofs, using specifications of their ...

  14. Discriminating semi-continuous HMM for speaker verification 

    E-Print Network [OSTI]

    Forsyth, Mark; Jack, Mervyn A

    This paper describes the use of a multiple codebook SCHMM speaker verification system, which uses a novel technique for discriminative hidden Markov modelling known as discriminative observation probabilities (DOP). DOP ...

  15. Evaluation of Kernal Methods for Speaker Verification and Identification 

    E-Print Network [OSTI]

    Wan, Vincent; Renals, Steve

    Support vector machines are evaluated on speaker verification and speaker identification tasks. We compare the polynomial kernel, the Fisher kernel, a likelihood ratio kernel and the pair hidden Markov model kernel with ...

  16. A Mobile-based Face Verification System Zongying Ou, Tieming Su, Fan Ou, Jianxin Zhang, Dianting Liu

    E-Print Network [OSTI]

    Shyu, Mei-Ling

    contains two modules: Model training module and Verification module. The verification module will run putting verification module into implementation the verification model training module should run first to yield the model parameters for verification. The training module will run on a table computer since

  17. The Challenge for Arms Control Verification in the Post-New START World

    SciTech Connect (OSTI)

    Wuest, C R

    2012-05-24

    Nuclear weapon arms control treaty verification is a key aspect of any agreement between signatories to establish that the terms and conditions spelled out in the treaty are being met. Historically, arms control negotiations have focused more on the rules and protocols for reducing the numbers of warheads and delivery systems - sometimes resorting to complex and arcane procedures for counting forces - in an attempt to address perceived or real imbalances in a nation's strategic posture that could lead to instability. Verification procedures are generally defined in arms control treaties and supporting documents and tend to focus on technical means and measures designed to ensure that a country is following the terms of the treaty and that it is not liable to engage in deception or outright cheating in an attempt to circumvent the spirit and the letter of the agreement. As the Obama Administration implements the articles, terms, and conditions of the recently ratified and entered-into-force New START treaty, there are already efforts within and outside of government to move well below the specified New START levels of 1550 warheads, 700 deployed strategic delivery vehicles, and 800 deployed and nondeployed strategic launchers (Inter-Continental Ballistic Missile (ICBM) silos, Submarine-Launched Ballistic Missile (SLBM) tubes on submarines, and bombers). A number of articles and opinion pieces have appeared that advocate for significantly deeper cuts in the U.S. nuclear stockpile, with some suggesting that unilateral reductions on the part of the U.S. would help coax Russia and others to follow our lead. Papers and studies prepared for the U.S. Department of Defense and at the U.S. Air War College have also been published, suggesting that nuclear forces totaling no more than about 300 warheads would be sufficient to meet U.S. national security and deterrence needs. (Davis 2011, Schaub and Forsyth 2010) Recent articles by James M. Acton and others suggest that the prospects for maintaining U.S. security and minimizing the chances of nuclear war, while deliberately reducing stockpiles to a few hundred weapons, is possible but not without risk. While the question of the appropriate level of cuts to U.S. nuclear forces is being actively debated, a key issue continues to be whether verification procedures are strong enough to ensure that both the U.S. and Russia are fulfilling their obligations under the current New Start treaty and any future arms reduction treaties. A recent opinion piece by Henry Kissinger and Brent Scowcroft (2012) raised a number of issues with respect to governing a policy to enhance strategic stability, including: in deciding on force levels and lower numbers, verification is crucial. Particularly important is a determination of what level of uncertainty threatens the calculation of stability. At present, that level is well within the capabilities of the existing verification systems. We must be certain that projected levels maintain - and when possible, reinforce - that confidence. The strengths and weaknesses of the New START verification regime should inform and give rise to stronger regimes for future arms control agreements. These future arms control agreements will likely need to include other nuclear weapons states and so any verification regime will need to be acceptable to all parties. Currently, China is considered the most challenging party to include in any future arms control agreement and China's willingness to enter into verification regimes such as those implemented in New START may only be possible when it feels it has reached nuclear parity with the U.S. and Russia. Similarly, in keeping with its goals of reaching peer status with the U.S. and Russia, Frieman (2004) suggests that China would be more willing to accept internationally accepted and applied verification regimes rather than bilateral ones. The current verification protocols specified in the New START treaty are considered as the baseline case and are contrasted with possible alternative verification protocols that could be e

  18. Addressing the Crisis in Fundamental Physics

    E-Print Network [OSTI]

    Christopher W. Stubbs

    2007-12-18

    I present the case for fundamental physics experiments in space playing an important role in addressing the current "dark energy'' crisis. If cosmological observations continue to favor a value of the dark energy equation of state parameter w=-1, with no change over cosmic time, then we will have difficulty understanding this new fundamental physics. We will then face a very real risk of stagnation unless we detect some other experimental anomaly. The advantages of space-based experiments could prove invaluable in the search for the a more complete understanding of dark energy. This talk was delivered at the start of the Fundamental Physics Research in Space Workshop in May 2006.

  19. Simplifying EPID dosimetry for IMRT treatment verification

    SciTech Connect (OSTI)

    Pecharroman-Gallego, R.; Mans, Anton; Sonke, Jan-Jakob; Stroom, Joep C.; Olaciregui-Ruiz, Igor; Herk, Marcel van; Mijnheer, Ben J. [Department of Radiation Oncology, The Netherlands Cancer Institute-Antoni van Leeuwenhoek Hospital, Plesmanlaan 121, 1066 CX Amsterdam (Netherlands)

    2011-02-15

    Purpose: Electronic portal imaging devices (EPIDs) are increasingly used for IMRT dose verification, both pretreatment and in vivo. In this study, an earlier developed backprojection model has been modified to avoid the need for patient-specific transmission measurements and, consequently, leads to a faster procedure. Methods: Currently, the transmission, an essential ingredient of the backprojection model, is estimated from the ratio of EPID measurements with and without a phantom/patient in the beam. Thus, an additional irradiation to obtain ''open images'' under the same conditions as the actual phantom/patient irradiation is required. However, by calculating the transmission of the phantom/patient in the direction of the beam instead of using open images, this extra measurement can be avoided. This was achieved by using a model that includes the effect of beam hardening and off-axis dependence of the EPID response on photon beam spectral changes. The parameters in the model were empirically obtained by performing EPID measurements using polystyrene slab phantoms of different thickness in 6, 10, and 18 MV photon beams. A theoretical analysis to verify the sensitivity of the model with patient thickness changes was performed. The new model was finally applied for the analysis of EPID dose verification measurements of step-and-shoot IMRT treatments of head and neck, lung, breast, cervix, prostate, and rectum patients. All measurements were carried out using Elekta SL20i linear accelerators equipped with a hydrogenated amorphous silicon EPID, and the IMRT plans were made using PINNACLE software (Philips Medical Systems). Results: The results showed generally good agreement with the dose determined using the old model applying the measured transmission. The average differences between EPID-based in vivo dose at the isocenter determined using either the new model for transmission and its measured value were 2.6{+-}3.1%, 0.2{+-}3.1%, and 2.2{+-}3.9% for 47 patients treated with 6, 10, and 18 MV IMRT beams, respectively. For the same group of patients, the differences in mean {gamma} analysis (3% maximum dose, 3 mm) were 0.16{+-}0.26%, 0.21{+-}0.24%, and 0.02{+-}0.12%, respectively. For a subgroup of 11 patients, pretreatment verification was also performed, showing similar dose differences at the isocenter: -1.9{+-}0.9%, -1.4{+-}1.2%, and -0.4{+-}2.4%, with somewhat lower mean {gamma} difference values: 0.01{+-}0.09%, 0.01{+-}0.07%, and -0.09{+-}0.10%, respectively. Clinical implementation of the new model would save 450 h/yr spent in measurement of open images. Conclusions: It can be concluded that calculating instead of measuring the transmission leads to differences in the isocenter dose generally smaller than 2% (2.6% for 6 MV photon beams for in vivo dose) and yielded only slightly higher {gamma}-evaluation parameter values in planes through the isocenter. Hence, the new model is suitable for clinical implementation and measurement of open images can be omitted.

  20. James S. Bogard Mailing Address: Home Work

    E-Print Network [OSTI]

    Pennycook, Steve

    MonitoringSection.Managedpersonnelradiationdosimetry(in-vivo and in-vitro radioassay, internal dose assessment, thermoluminescent dosimetry), radiation standards this period provides a Radiation Standards and Calibration Laboratory addition for low-scatter (neutron LABORATORY, OAK RIDGE, TENNESSEE Dosimetry Applications Research (DOSAR) Program Leader. Responsible

  1. Enhanced Verification Test Suite for Physics Simulation Codes

    SciTech Connect (OSTI)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of greater sophistication or other physics regimes (e.g., energetic material response, magneto-hydrodynamics), would represent a scientifically desirable complement to the fundamental test cases discussed in this report. The authors believe that this document can be used to enhance the verification analyses undertaken at the DOE WP Laboratories and, thus, to improve the quality, credibility, and usefulness of the simulation codes that are analyzed with these problems.

  2. Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology Plenary IV: Advances in Bioenergy...

  3. Addressable morphology control of silica structures by manipulating...

    Office of Scientific and Technical Information (OSTI)

    Addressable morphology control of silica structures by manipulating the reagent addition time Citation Details In-Document Search Title: Addressable morphology control of silica...

  4. Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical...

    Office of Environmental Management (EM)

    Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Implementation Okaloosa Gas District Smart Grid RFI: Addressing Policy and...

  5. Smart Grid RFI: Addressing Policy and Logistical Challenges....

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the...

  6. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical...

    Energy Savers [EERE]

    Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company:...

  7. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...

    Office of Environmental Management (EM)

    Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation...

  8. Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical...

    Energy Savers [EERE]

    Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges Pepco Holdings,...

  9. Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy...

    Energy Savers [EERE]

    Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy and...

  10. Progress Energy draft regarding Smart Grid RFI: Addressing Policy...

    Energy Savers [EERE]

    Progress Energy draft regarding Smart Grid RFI: Addressing Policy and Logistical Challenges Progress Energy draft regarding Smart Grid RFI: Addressing Policy and Logistical...

  11. Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing Policy and...

  12. DOE NSF Partnership to Address Critical Challenges in Hydrogen...

    Office of Environmental Management (EM)

    NSF Partnership to Address Critical Challenges in Hydrogen Production from Solar Water Splitting DOE NSF Partnership to Address Critical Challenges in Hydrogen Production from...

  13. Policy Agenda for Addressing Climate Change in Bangladesh: Copenhagen...

    Open Energy Info (EERE)

    Policy Agenda for Addressing Climate Change in Bangladesh: Copenhagen and Beyond Jump to: navigation, search Name Policy Agenda for Addressing Climate Change in Bangladesh:...

  14. NBP RFI-Addressing Policy and Logistical Challenges to Smart...

    Office of Environmental Management (EM)

    NBP RFI-Addressing Policy and Logistical Challenges to Smart Grid Implementation. September 10, 2009 NBP RFI-Addressing Policy and Logistical Challenges to Smart Grid...

  15. Addressing mechanical reliability issues in Sandia MEMS devices...

    Office of Scientific and Technical Information (OSTI)

    Addressing mechanical reliability issues in Sandia MEMS devices. Citation Details In-Document Search Title: Addressing mechanical reliability issues in Sandia MEMS devices. No...

  16. Addressing Uncertainties in Design Inputs: A Case Study of Probabilist...

    Office of Environmental Management (EM)

    Addressing Uncertainties in Design Inputs: A Case Study of Probabilistic Settlement Evaluations for Soft Zone Collapse at SWPF Addressing Uncertainties in Design Inputs: A Case...

  17. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  18. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Energy Savers [EERE]

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  19. New York Independent System Operator, Smart Grid RFI: Addressing...

    Office of Environmental Management (EM)

    Independent System Operator, Smart Grid RFI: Addressing Policy and Logistical Challenges. New York Independent System Operator, Smart Grid RFI: Addressing Policy and Logistical...

  20. Exploring the Utilization of Complex Algal Communities to Address...

    Office of Environmental Management (EM)

    to Address Algal Pond Crash and Increase Annual Biomass Production for Algal Biofuels Exploring the Utilization of Complex Algal Communities to Address Algal Pond Crash...

  1. Strategies to Address Split Incentives in Multifamily Buildings...

    Office of Environmental Management (EM)

    Strategies to Address Split Incentives in Multifamily Buildings Strategies to Address Split Incentives in Multifamily Buildings Better Buildings Neighborhood Program Multifamily ...

  2. Battery Technology Life Verification Testing and Analysis

    SciTech Connect (OSTI)

    Jon P. Christophersen; Gary L. Hunt; Ira Bloom; Ed Thomas; Vince Battaglia

    2007-12-01

    A critical component to the successful commercialization of batteries for automotive applications is accurate life prediction. The Technology Life Verification Test (TLVT) Manual was developed to project battery life with a high level of statistical confidence within only one or two years of accelerated aging. The validation effort that is presently underway has led to several improvements to the original methodology. For example, a newly developed reference performance test revealed a voltage path dependence effect on resistance for lithium-ion cells. The resistance growth seems to depend on how a target condition is reached (i.e., by a charge or a discharge). Second, the methodology for assessing the level of measurement uncertainty was improved using a propagation of errors in the fundamental measurements to the derived response (e.g., resistance). This new approach provides a more realistic assessment of measurement uncertainty. Third, the methodology for allocating batteries to the test matrix has been improved. The new methodology was developed to assign batteries to the matrix such that the average of each test group would be representative of the overall population. These changes to the TLVT methodology will help to more accurately predict a battery technology’s life capability with a high degree of confidence.

  3. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    SciTech Connect (OSTI)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E.

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  4. National Energy Efficiency Evaluation, Measurement and Verification (EM&V) Standard: Scoping Study of Issues and Implementation Requirements

    E-Print Network [OSTI]

    Schiller, Steven R.

    2011-01-01

    Interval Data Energy Models: IPMVP Options B and C, Rev 1,and Verification Protocol (IPMVP): Concepts and Options forVerification Protocol (IPMVP)." San Francisco, CA. http://

  5. Order Module--DOE O 425.1D, VERIFICATION OF READINESS TO START...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5.1D, VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES Order Module--DOE O 425.1D, VERIFICATION OF READINESS TO START UP OR RESTART NUCLEAR FACILITIES "The...

  6. Independent Verification Survey Report for the Long Island Solar Farm, Brookhaven National Laboratory, Upton, New York

    SciTech Connect (OSTI)

    E.M. Harpenau

    2010-11-15

    5119-SR-01-0 INDEPENDENT VERIFICATION SURVEY REPORT FOR THE LONG ISLAND SOLAR FARM, BROOKHAVEN NATIONAL LABORATORY

  7. Comment submitted by CertainTeed Corporation regarding the Energy Star Verification Testing Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document is a comment submitted by CertainTeed Corporation regarding the Energy Star Verification Testing Program

  8. A SYSTEM DESIGN METHODOLOGY FOR REDUCING SYSTEM INTEGRATION TIME AND FACILITATING MODULAR DESIGN VERIFICATION

    E-Print Network [OSTI]

    Chow, Paul

    VERIFICATION Lesley Shannon, Blair Fort, Samir Parikh, Arun Patel, Manuel Salda~na and Paul Chow Department

  9. EECLP Webinar #2: Quality Assurance and Evaluation Monitoring Verification-- Text Version

    Broader source: Energy.gov [DOE]

    Below is the text version of the EECLP Webinar 2: Quality Assurance and Evaluation Monitoring Verification, presented in December 2014.

  10. Comment submitted by A. O. Smith Corporation regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by A. O. Smith Corporation regarding the Energy Star Verification Testing Program

  11. Comment submitted by the Alliance for Water Efficiency (AWE) regarding the Energy Star Verification Testing Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document is a comment submitted by the Alliance for Water Efficiency (AWE) regarding the Energy Star Verification Testing Program

  12. Comment submitted by Energizer Battery Manufacturing, Inc. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Energizer Battery Manufacturing, Inc. regarding the Energy Star Verification Testing Program

  13. Comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

  14. Comment submitted by Hobart/ITW Food Equipment Group regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by Hobart/ITW Food Equipment Group regarding the Energy Star Verification Testing Program

  15. Comment submitted by InterMetro Industries Corp. regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by InterMetro Industries Corp. regarding the Energy Star Verification Testing Program

  16. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  17. Formal verification of complex properties on PLC programs

    E-Print Network [OSTI]

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.

  18. Guidelines for Participation in the ETV ESTE Verification Test of Lead Paint Test Kits

    E-Print Network [OSTI]

    Guidelines for Participation in the ETV ESTE Verification Test of Lead Paint Test Kits Revised 09 in the ETV ESTE verification test of lead paint test kits. Test kits must conform to the following guidelines as part of the ETV verification test of lead paint test kits. Testing is scheduled to start by November

  19. The KeY Platform for Verification and Analysis of Java Programs

    E-Print Network [OSTI]

    Mostowski, Wojciech

    pure functional verification. We use the current release of the KeY system as an example to explain and prove this claim. 1 Overview Motivation. Over the last decades the reach and power of verification of real world systems. The basic technologies of deductive program verification have matured. State

  20. A Reachability-Based Method for Large-Signal Behavior Verification of DC-DC Converters

    E-Print Network [OSTI]

    Liberzon, Daniel

    -loop, large-signal system behavior verification, and iv) switching detail modeling. In open-loop, large´inguez-Garc´ia, Member, IEEE Abstract--A method for large-signal behavior verification of power electronics DC behavior verification, lengthy time-domain simula- tions are conducted to analyze the system response

  1. A knowledge-based verification method for dynamic access control policies

    E-Print Network [OSTI]

    Ryan, Mark

    . This abstraction of knowledge results in a simpler model, which makes the verification efficient, and is powerful may be a prior knowledge, or gained by exploring the system. In both cases, a verification method proposes a dynamic access control model supporting knowledge- based verification through reasoning about

  2. Real-time system verification techniques based on abstraction/deduction and model checking

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Real-time system verification techniques based on abstraction/deduction and model checking Eun in or- der to obtain a powerful and highly automatic verification environment for real-time systems. One-Young.Kang@loria.fr Abstract. Our research focuses on verification techniques for real-time systems based on predicate

  3. ISIS 9.0 | Enrollment Verification 1 Created: 02.12.13

    E-Print Network [OSTI]

    Capogna, Luca

    ISIS 9.0 | Enrollment Verification 1 Created: 02.12.13 Student Center ­ Enrollment Verification ISIS 9.0 Enrollment Verification in Student Center Students may choose to print/view an unofficial copy. Instructions for both follow. 1. Log in to your ISIS Student Center. 2. Click the other academic drop-down menu

  4. Component-based hardware/software co-verification for building trustworthy embedded systems q

    E-Print Network [OSTI]

    Xie, Fei

    -based approach to hardware/software co-verification of embedded systems using model checking. Embedded systemsComponent-based hardware/software co-verification for building trustworthy embedded systems q Fei systems require extensive verification. The close interactions between hardware and software of embedded

  5. A Verification Framework for FBD based Software in Nuclear Power Plants Junbeom Yoo

    E-Print Network [OSTI]

    Jee, Eunkyoung

    power reactor. Formal verification techniques such as model checking 1 Goal of KNICS consortium project in nuclear power plant's reactor protection systems. The software verification framework uses two differentA Verification Framework for FBD based Software in Nuclear Power Plants Junbeom Yoo Div

  6. Hierarchical Verification of the Implementation of The IEEE754 TableDriven FloatingPoint Exponential

    E-Print Network [OSTI]

    Tahar, Sofiène

    verification system allows its use for the verification task over the whole design path of the circuitHierarchical Verification of the Implementation of The IEEE­754 Table­Driven Floating­Point Exponential Function using HOL Amr T. Abdel­Hamid 1 , Sofiâ?? ene Tahar 1 , John Harrison 2 1 Electrical

  7. An Efficient Dual Algorithm for Vectorless Power Grid Verification under Linear Current Constraints

    E-Print Network [OSTI]

    Wang, Jia

    An Efficient Dual Algorithm for Vectorless Power Grid Verification under Linear Current Constraints, Chicago, IL 60616, USA ABSTRACT Vectorless power grid verification makes it possible to eval- uate worst, the vectorless power grid verification problem can be formulated and solved as a linear programming (LP) problem

  8. Modular Full-System Verification of Hardware Muralidaran Vijayaraghavan and Joonwon Choi

    E-Print Network [OSTI]

    Modular Full-System Verification of Hardware Muralidaran Vijayaraghavan and Joonwon Choi 1 of full-system verification for hardware designs. What does a full-system verification for a hardware of how to give a hardware specification and its implementation, and what the respective semantics are

  9. Finite countermodels for safety verification of parameterized tree systems

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2011-01-01

    In this paper we deal with verification of safety properties of parameterized systems with a tree topology. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel method is shown is at least as powerful as regular tree model checking and as the methods based on monotonic abstraction and backwards symbolic reachability. The practical efficiency of the method is illustrated on a set of examples taken from the literature.

  10. International comparison of product certification and verification methods for appliances

    SciTech Connect (OSTI)

    Zhou, Nan; Romankiewicz, John; Fridley, David; Zheng, Nina

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  11. International Comparison of Product Certification and Verification Methods for Appliances

    SciTech Connect (OSTI)

    Zhou, Nan; Romankiewicz, John; Fridley, David; Zheng, Nina

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  12. 14655 Section D

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    D Contract No. DE-AC06-05RL14655 A000 PART I - THE SCHEDULE SECTION D PACKAGING AND MARKING TABLE OF CONTENTS D.1 PACKAGING......

  13. Special Section on RFID

    E-Print Network [OSTI]

    Engels, Daniel W.

    The eight articles in this special section describe state-of-the-art technologies and tools and one application of RFID.

  14. Lesson 35, Section 6

    E-Print Network [OSTI]

    Lesson 34, Section 6.5. Application Problems Using Rational Equations. Define a Variable; Develop A Plan; Write an Equation; Solve and Answer the Question.

  15. MACCS2 development and verification efforts

    SciTech Connect (OSTI)

    Young, M.; Chanin, D.

    1997-03-01

    MACCS2 represents a major enhancement of the capabilities of its predecessor MACCS, the MELCOR Accident Consequence Code System. MACCS, released in 1987, was developed to estimate the potential impacts to the surrounding public of severe accidents at nuclear power plants. The principal phenomena considered in MACCS/MACCS2 are atmospheric transport and deposition under time-variant meteorology, short-term and long-term mitigative actions and exposure pathways, deterministic and stochastic health effects, and economic costs. MACCS2 was developed as a general-purpose analytical tool applicable to diverse reactor and nonreactor facilities. The MACCS2 package includes three primary enhancements: (1) a more flexible emergency response model, (2) an expanded library of radionuclides, and (3) a semidynamic food-chain model. In addition, errors that had been identified in MACCS version1.5.11.1 were corrected, including an error that prevented the code from providing intermediate-phase results. MACCS2 version 1.10 beta test was released to the beta-test group in May, 1995. In addition, the University of New Mexico (UNM) has completed an independent verification study of the code package. Since the beta-test release of MACCS2 version 1.10, a number of minor errors have been identified and corrected, and a number of enhancements have been added to the code package. The code enhancements added since the beta-test release of version 1.10 include: (1) an option to allow the user to input the {sigma}{sub y} and {sigma}{sub z} plume expansion parameters in a table-lookup form for incremental downwind distances, (2) an option to define different initial dimensions for up to four segments of a release, (3) an enhancement to the COMIDA2 food-chain model preprocessor to allow the user to supply externally calculated tables of tritium food-chain dose per unit deposition on farmland to support analyses of tritium releases, and (4) the capability to calculate direction-dependent doses.

  16. ICRCCM Phase 2: Verification and calibration of radiation codes in climate models

    SciTech Connect (OSTI)

    Ellingson, R.G.; Wiscombe, W.J.; Murcray, D.; Smith, W.; Strauch, R.

    1992-01-01

    Following the finding by the InterComparison of Radiation Codes used in Climate Models (ICRCCM) of large differences among fluxes predicted by sophisticated radiation models that could not be sorted out because of the lack of a set of accurate atmospheric spectral radiation data measured simultaneously with the important radiative properties of the atmosphere, our team of scientists proposed to remedy the situation by carrying out a comprehensive program of measurement and analysis called SPECTRE (Spectral Radiance Experiment). The data collected during SPECTRE form the test bed for the second phase of ICRCCM, namely verification and calibration of radiation codes used in climate models. This should lead to more accurate radiation models for use in parameterizing climate models, which in turn play a key role in the prediction of trace-gas greenhouse effects. This report summarizes the activities of our group during the project's Third year to meet our stated objectives. The report is divided into three sections entitled: SPECTRE Activities, ICRCCM Activities, and summary information. The section on SPECTRE activities summarizes the field portion of the project during 1991, and the data reduction/analysis performed by the various participants. The section on ICRCCM activities summarizes our initial attempts to select data for distribution to ICRCCM participants and at comparison of observations with calculations as will be done by the ICRCCM participants. The Summary Information section lists data concerning publications, presentations, graduate students supported, and post-doctoral appointments during the project.

  17. Sectional device handling tool

    DOE Patents [OSTI]

    Candee, Clark B. (Monroeville, PA)

    1988-07-12

    Apparatus for remotely handling a device in an irradiated underwater environment includes a plurality of tubular sections interconnected end-to-end to form a handling structure, the bottom section being adapted for connection to the device. A support section is connected to the top tubular section and is adapted to be suspended from an overhead crane. Each section is flanged at its opposite ends. Axially retractable bolts in each bottom flange are threadedly engageable with holes in the top flange of an adjacent section, each bolt being biased to its retracted position and retained in place on the bottom flange. Guide pins on each top flange cooperate with mating holes on adjacent bottom flanges to guide movement of the parts to the proper interconnection orientation. Each section carries two hydraulic line segments provided with quick-connect/disconnect fittings at their opposite ends for connection to the segments of adjacent tubular sections upon interconnection thereof to form control lines which are connectable to the device and to an associated control console.

  18. Ames Laboratory to Lead New Research Effort to Address Shortages...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ames Laboratory to Lead New Research Effort to Address Shortages in Rare Earth and Other Critical Materials Ames Laboratory to Lead New Research Effort to Address Shortages in Rare...

  19. The Legacy of the Gettysburg Address, 1863-1965 

    E-Print Network [OSTI]

    Peatman, Jared Elliott

    2011-10-21

    My project examines the legacy of the Gettysburg Address from 1863 to 1965. After an introduction and a chapter setting the stage, each succeeding chapter surveys the meaning of the Gettysburg Address at key moments: the initial reception...

  20. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Energy Savers [EERE]

    DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by...

  1. ECE 667 -Synthesis & Verification -Lecture 9 ECE 697B (667)

    E-Print Network [OSTI]

    Kalla, Priyank

    ,...} foreach gi { Vgi= foreach fj { if(fj contains all literals of gi) { vij=fj - literals of gi Vgi=Vgi vij } } } H = iVgi R = F - GH return (H,R); } ECE 667 - Synthesis & Verification - Lecture 9 10 Example

  2. VERIFICATION AND DIAGNOSIS OF TESTING PREORDER 4.1. Introduction

    E-Print Network [OSTI]

    von Bochmann, Gregor

    specifications are testing equivalent: first the two specifications are transformed into acceptance graphs, which92], although similar to the testing equivalence and the testing preorder defined in [Brin87CHAPTER 4 VERIFICATION AND DIAGNOSIS OF TESTING PREORDER 4.1. Introduction In protocol engineering

  3. Texture Classification and Verification Using Bispectral Estimates at All

    E-Print Network [OSTI]

    Sidorov, Nikita

    Texture Classification and Verification Using Bispectral Estimates at All the Frequencies and Statistics Group School of Mathematics, The University of Manchester #12;1 Texture Classification 3220 Email: jingsong.yuan@manchester.ac.uk Abstract Digitized texture images can often be considered

  4. Curriculum Model Checking: Declarative Representation and Verification of Properties

    E-Print Network [OSTI]

    Torino, Università di

    Curriculum Model Checking: Declarative Representation and Verification of Properties Matteo Baldoni-10149 Torino (Italy) baldoni@di.unito.it,elisa.mrng@gmail.com Abstract. When a curriculum is proposed, it is important to verify at least three aspects: that the curriculum allows the achievement of the user

  5. Ris-R-1331(EN) Simulation and Verification of Transient

    E-Print Network [OSTI]

    Risø-R-1331(EN) Simulation and Verification of Transient Events in Large Wind Power Installations-Jensen and Hans Nielsen Risø National Laboratory, Roskilde October 2003 #12;Abstract Models for wind power model 16 3.3.4 Control and protection system 17 3.4 Simulation outputs and data analyses 17 4 Simulation

  6. A Proof System for Compositional Verification of Probabilistic Concurrent Processes

    E-Print Network [OSTI]

    Simpson, Alex

    A Proof System for Compositional Verification of Probabilistic Concurrent Processes Matteo Mio1 established itself as a powerful and widely applicable method for verifying properties of systems, with its-state systems. Moreover, even in the finite-state case, the applicability of model checking is limited

  7. Formal Verification of a Microprocessor Control Lubomir Ivanov

    E-Print Network [OSTI]

    Ivanov, Lubomir

    to the modeling and formal verification of the MESI cache coherence protocol for a system of n write-back cache a powerful alternative for dealing with these problems. In this paper we present a mathematical model on a mathematical model of the system under consideration, attempts to prove or disprove facts about the system

  8. Fast Verification of Wind Turbine Power Summary of Project Results

    E-Print Network [OSTI]

    Fast Verification of Wind Turbine Power Curves: Summary of Project Results by: Cameron Brown ­ s in the FastWind project. Several methods of estimating the power curve uncertainty were developed, it was found to be sensitive to the coherence of high frequency wind speed and power measurements

  9. BRNS Workshop Verification of Digital and Hybrid Systems

    E-Print Network [OSTI]

    Shyamasundar, R.K.

    BRNS Workshop Verification of Digital and Hybrid Systems 7­11, January 1999, TIFR, Mumbai Advisory.K. Shyamasundar (TIFR, Chairman) K.C. Bhattacharjee (VSSC, Trivandrum) U. Chandra (BARC, Mumbai) V. Chandru (IISc., Bangalore) S.D. Dhodapkar (BARC, Mumbai) K. Karunakar (ADA, Bangalore) P.K. Pandya (TIFR, Mumbai) N. Raja

  10. NASA/TP2004213015 Formal Verification of a Conflict

    E-Print Network [OSTI]

    Muñoz, César A.

    NASA/TP­2004­213015 Formal Verification of a Conflict Resolution and Recovery Algorithm Jeffrey~noz National Institute of Aerospace, Hampton, Virginia April 2004 #12;The NASA STI Program Office . . . in Profile Since its founding, NASA has been dedicated to the advancement of aeronautics and space science

  11. LVT: A Layered Verification Technique for Distributed Computing Systems

    E-Print Network [OSTI]

    Olsson, Ron

    LVT: A Layered Verification Technique for Distributed Computing Systems Cui Zhang ? , Brian R of distributed computing systems with multiple component layers. Each lower layer in such a system provides languages as interfaces of systems, LVT treats each layer in a distributed computing system as a distributed

  12. Automatic Synthesis of Computation Interference Constraints for Relative Timing Verification

    E-Print Network [OSTI]

    Stevens, Ken

    unit delays to solve this problem [6]. This technique simplifies pre-layout verification but over in terms of efficiency and quality. I. INTRODUCTION Timing is an inherent quality and correctness aspect exponentials. Several approaches have been taken to mitigate this complexity. In the world of asynchronous

  13. Timed Verification of the Generic Architecture of a Memory Circuit

    E-Print Network [OSTI]

    Encrenaz-Tiphène, Emmanuelle

    #cient linear constraints relating the delays of the internal gates of the circuit to the exter­ nal delays on the reachability analysis of a timed model of the circuit (with additional abstract interpretation techniques [10Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata

  14. Experimental Verification of Morphological Instability in Freezing Aqueous Colloidal Suspensions

    E-Print Network [OSTI]

    Wettlaufer, John S.

    Experimental Verification of Morphological Instability in Freezing Aqueous Colloidal Suspensions S; published 9 June 2008) We describe an experimental test of a new theory of the unidirectional freezing of aqueous colloidal suspensions. At low freezing speeds a planar ice lens completely rejects the particles

  15. Compiler Correctness and Implementation Verification: The Verifix Approach

    E-Print Network [OSTI]

    Pfeifer, Holger

    Compiler Correctness and Implementation Verification: The Verifix Approach Wolfgang Goerigk \\Lambda \\Lambda Hans Langmaack \\Lambda Holger Pfeifer x Harald Ruess x Wolf Zimmermann z Abstract Compiler the correctness of the compiling specification and the correctness of the compiler implementation. We will discuss

  16. Verification in Loosely Synchronous Queue-Connected Discrete Timed Automata

    E-Print Network [OSTI]

    Dang, Zhe

    , the expressive power of timed automata has many limitations in modeling, since many real-time systems are simply. We look at a model of a queue system that consists of the following components: 1. Two discrete timed model for investigating verification problems of real-time sys- tems (see [1, 30] for surveys). However

  17. Verification in Loosely Synchronous QueueConnected Discrete Timed Automata ?

    E-Print Network [OSTI]

    Dang, Zhe

    , the expressive power of timed automata has many limitations in modeling, since many real­time systems are simply. We look at a model of a queue system that consists of the following components: 1. Two discrete timed model for investigating verification problems of real­time sys­ tems (see [1, 30] for surveys). However

  18. Signaling P Systems and Verification Problems , Oscar H. Ibarra

    E-Print Network [OSTI]

    Dang, Zhe

    of quantum and DNA computing). It turns out that P systems are a powerful model: even with only one membraneSignaling P Systems and Verification Problems Cheng Li ¡ , Zhe Dang ¡£¢¤¢ , Oscar H. Ibarra.O.C. Abstract. We introduce a new model of membrane computing system (or P system), called signaling P system

  19. ForPeerReview Verification of Mountain Weather Information Service

    E-Print Network [OSTI]

    Birch, Cathryn

    ForPeerReview Verification of Mountain Weather Information Service forecasts for three upland areas in the UK Journal: Weather Manuscript ID: WEA-13-0098.R1 Wiley - Manuscript type: Research Article Date and Environment Birch, Cathryn; University of Leeds, School of Earth and Environment Monk, Geoffrey; The Weather

  20. Project W-030 flammable gas verification monitoring test

    SciTech Connect (OSTI)

    BARKER, S.A.

    1999-02-24

    This document describes the verification monitoring campaign used to document the ability of the new ventilation system to mitigate flammable gas accumulation under steady state tank conditions. This document reports the results of the monitoring campaign. The ventilation system configuration, process data, and data analysis are presented.

  1. DEGAS 2 Verification Test with Fluid Neutral Momentum Transport Reference

    E-Print Network [OSTI]

    Budny, Robert

    DEGAS 2 Verification Test with Fluid Neutral Momentum Transport Reference Problem D. P. Stotler, PPPL 1 Background The "Fluid Neutral Momentum Transport Reference Problem" [1] was used to verify the original DEGAS [2] Monte Carlo neutral transport code. The resulting benchmark was subsequently employed

  2. Formal Development and Verification of a Distributed Railway Control System

    E-Print Network [OSTI]

    Peleska, Jan - Fachbereich 3

    Formal Development and Verification of a Distributed Railway Control System Anne E. Haxthausen 1@informatik.uni­bremen.de Abstract. In this article we introduce the concept for a distributed rail­ way control system and present the sys­ tem model into a domain model describing the physical system in absence of control

  3. APPENDIX A: VERIFICATION CODES A1.0 MODFLOW2000

    E-Print Network [OSTI]

    be developed, reviewed, and maintained for the MODFLOW software: Software Quality Assurance (QA) Plan A1 APPENDIX A: VERIFICATION CODES A1.0 MODFLOW2000 The MODFLOW ground water software has been and transport simulator, the MODFLOW and related software is suited to the simulation of a wide variety

  4. Cleanup Verification Package for the 118-F-6 Burial Ground

    SciTech Connect (OSTI)

    H. M. Sulloway

    2008-10-02

    This cleanup verification package documents completion of remedial action for the 118-F-6 Burial Ground located in the 100-FR-2 Operable Unit of the 100-F Area on the Hanford Site. The trenches received waste from the 100-F Experimental Animal Farm, including animal manure, animal carcasses, laboratory waste, plastic, cardboard, metal, and concrete debris as well as a railroad tank car.

  5. The Method of Generated Solutions for Numerical Verification of ICE

    E-Print Network [OSTI]

    for verifying numerical code. The exact solution to the set of equations is derived using mathematical methodsThe Method of Generated Solutions for Numerical Verification of ICE Code Amjidanutpan Ramanujam, Christopher Sikorski, Todd Harman* UUCS­07­006 School of Computing University of Utah Salt Lake City, UT 84112

  6. The Method of Generated Solutions for Numerical Verification of ICE

    E-Print Network [OSTI]

    for verifying numerical code. The exact solution to the set of equations is derived using mathematical methodsThe Method of Generated Solutions for Numerical Verification of ICE Code Amjidanutpan Ramanujam, Christopher Sikorski, Todd Harman* UUCS-07-006 School of Computing University of Utah Salt Lake City, UT 84112

  7. Verification of Cryptographic Protocols Implemented in Java Card

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ¢¡¤£ Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  8. Early Power Grid Verification Under Circuit Current Uncertainties

    E-Print Network [OSTI]

    Najm, Farid N.

    Early Power Grid Verification Under Circuit Current Uncertainties Imad A. Ferzli Department of ECE Eindhoven, The Netherlands lars@magma-da.com ABSTRACT As power grid safety becomes increasingly important in modern integrated circuits, so does the need to start power grid verifica- tion early in the design cycle

  9. c 2013 Zhenqi Huang ON SIMULATION BASED VERIFICATION OF NONLINEAR

    E-Print Network [OSTI]

    Liberzon, Daniel

    navigation benchmarks, room heating benchmarks, non-linear satellite systems and engine hybrid control safety verification of hybrid systems typically involves computing precise reach sets of such systems of a class of deterministic hybrid system. The algo- rithm first constructs a cover of the initial set

  10. MAINTENANCE, UPGRADE AND VERIFICATION OF OPERATIONAL FORECASTS OF

    E-Print Network [OSTI]

    MAINTENANCE, UPGRADE AND VERIFICATION OF OPERATIONAL FORECASTS OF CLOUD COVER AND WATER VAPOUR Purchase Order 58311/ODG/99/8362/GWI/LET #12;i PREFACE Starting in August 1998, operational forecasts satellite imagery from the Co-operative Institute for Research in the Atmosphere (CIRA) and upper

  11. 2015.06.04-06 Verification Techniques for COTSq

    E-Print Network [OSTI]

    power plants PLC(Programmable Logic Controller) has been used to implement I&Cs for decades - SW;ISET 2015 2015.06.04-06 Deagu Formal Verification Techniques which can be used for COTS SW Dedication of Commercialused for COTS SW Dedication of Commercial FPGA Tools used to Develop Safety-Critical Control Software

  12. The KivApproach to Software Verification ? Wolfgang Reif

    E-Print Network [OSTI]

    Reif, Wolfgang

    approach to the design and verification of large sequential systems. It is based on structured alge­ braic Interactive Verifier), and supports the entire design process starting from formal specifications and ending with verified code. Its main characteristics are a strict de­ compositional design discipline for modular

  13. Department of Computing CSP||B modelling for railway verification

    E-Print Network [OSTI]

    Doran, Simon J.

    University of Surrey Department of Computing Computing Sciences Report CS-12-03 CSP||B modelling Schneider Helen Treharne March 30th 2012 #12;CSP||B modelling for railway verification: the double junction work in verifying railway systems through CSP k B modelling and analysis. In particular we consider

  14. Swarm Verification1 Gerard J. Holzmann, Rajeev Joshi, Alex Groce

    E-Print Network [OSTI]

    Joshi, Rajeev

    Swarm Verification1 Gerard J. Holzmann, Rajeev Joshi, Alex Groce Jet Propulsion Laboratory was carried out at the Jet propulsion Laboratory, California Institute of Technology, under a contract generation. Curiously, although the raw speed of CPUs has stalled at roughly 2002 levels, the size of RAM

  15. Individually addressable cathodes with integrated focusing stack or detectors

    DOE Patents [OSTI]

    Thomas, Clarence E.; Baylor, Larry R.; Voelkl, Edgar; Simpson, Michael L.; Paulus, Michael J.; Lowndes, Douglas; Whealton, John; Whitson, John C.; Wilgen, John B.

    2005-07-12

    Systems and method are described for addressable field emission array (AFEA) chips. A plurality of individually addressable cathodes are integrated with an electrostatic focusing stack and/or a plurality of detectors on the addressable field emission array. The systems and methods provide advantages including the avoidance of space-charge blow-up.

  16. A Study Addressing Three Components of the National Bilingual Research Agenda for English Language Learners on High Stakes Assessment 

    E-Print Network [OSTI]

    Kujawa, Nadine; Cavazos, Gloria; Meyer, Doris; Rodriguez, Linda; Lara-Alecio, Rafael; Galloway, Martha; Irby, Beverly J.

    2010-10-22

    Office of Bilingual Education and Minority Language Affairs U.S. Department of Education Field-Initiated Research Report August, 2001 A Study Addressing Three Components of the National Bilingual Research Agenda for English Language... Addressing Three Components of the National Bilingual Research Agenda for English Language Learners on High Stakes Assessment i FIELD-INITIATED RESEARCH REPORT August, 2001 SECTION I INTRODUCTION The Title VII OBEMLA-sponsored field...

  17. Measurement of electron neutrino CCQE-like cross-section in MINERvA

    E-Print Network [OSTI]

    Jeremy Wolcott; for the MINERvA collaboration

    2015-01-21

    The electron-neutrino charged-current quasi-elastic (CCQE) cross-section on nuclei is an important input parameter to appearance-type neutrino oscillation experiments. Current experiments typically work from the muon neutrino cross-section and apply corrections from theoretical arguments to obtain a prediction for the electron neutrino cross-section, but to date there has been no experimental verification of the estimates for this channel at an energy scale appropriate to such experiments. We present a preliminary result from the MINERvA experiment on the first measurement of an exclusive reaction in few-GeV electron neutrino interactions, namely, the cross-section for a CCQE-like process. The result is given both as differential cross-sections vs. the electron energy, electron angle, and $Q^{2}$, as well as a total cross-section vs. neutrino energy.

  18. The Work Number -CSU Employment Verification Colorado State University (CSU) utilizes The Work Number for employment and salary verification. The Work

    E-Print Network [OSTI]

    Number for employment and salary verification. The Work Number allows verifications to be completed your consent before requesting income or salary information. In some instances, you may be asked to provide a Salary Key to verify your income (see explanation below). For enhanced security, you might

  19. The demands of the university teaching, addressed to students ...

    E-Print Network [OSTI]

    2015-04-02

    The demands of the university teaching, addressed to students (including those said to be “advanced”) with a modest (and frequently less than mod-.

  20. Smart Grid RFI: Addressing Policy and Logistical Challenges,...

    Office of Environmental Management (EM)

    Challenges, Comments from the Edison Electric Institute Smart Grid RFI: Addressing Policy and Logistical Challenges, Comments from the Edison Electric Institute The Edison Electric...

  1. Smart Grid RFI: Addressing Policy and Logistical Challenges....

    Office of Environmental Management (EM)

    Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save...

  2. Addressing Uncertainty in Desigh Inputs: A Case Study of Probabilisti...

    Office of Environmental Management (EM)

    Addressing Uncertainties in Design Inputs: A Case Study of Probabilistic Settlement Evaluations for Soft Zone Collapse at SWPF Tom Houston, Greg Mertz, Carl Costantino, Michael...

  3. Ambient Corporation's Reply comments to DOE RFI: Addressing Policy...

    Broader source: Energy.gov (indexed) [DOE]

    communications will play ineneabling utilities to deploy cost-effective long-term smart grid benefits. Ambient Corporation's Reply comments to DOE RFI: Addressing Policy and...

  4. Assistant Secretary Patricia Hoffman to Deliver Keynote Address...

    Energy Savers [EERE]

    Assistant Secretary Patricia Hoffman to Deliver Keynote Address at IEEE PES Conference on Innovative Smart Grid Technologies Assistant Secretary Patricia Hoffman to Deliver Keynote...

  5. Addressing Biomass Supply Chain Challenges With AFEX™ Technology

    Broader source: Energy.gov [DOE]

    Plenary IV: Advances in Bioenergy Feedstocks—From Field to Fuel Addressing Biomass Supply Chain Challenges With AFEX™ Technology Allen Julian, Chief Business Officer, MBI

  6. Africa - Technical Potential of Solar Energy to Address Energy...

    Open Energy Info (EERE)

    Africa - Technical Potential of Solar Energy to Address Energy Poverty and Avoid GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Technical Potential of...

  7. New partnership uses advanced computer science modeling to address...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    partnership uses advanced computer science modeling to address climate change | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing...

  8. New Project is the ACME of Addressing Climate Change

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    complete climate and Earth system model to address the most challenging and demanding climate change issues. Eight Department of Energy (DOE) national laboratories, including...

  9. The INL Seismic Risk Assessment Project: Requirements for Addressing...

    Office of Environmental Management (EM)

    The INL Seismic Risk Assessment Project: Requirements for Addressing DOE Order 420.1C & A Proposed Generic Methodology The INL Seismic Risk Assessment Project: Requirements for...

  10. Addressing Policy and Logistical Challenges to Smart Grid Implementati...

    Office of Environmental Management (EM)

    Grid Implementation: Comments by the Office of the Ohio Consumers' Counsel Addressing Policy and Logistical Challenges to Smart Grid Implementation: Comments by the Office of the...

  11. Addressing Policy and Logistical Challenges to Smart Grid Implementati...

    Office of Environmental Management (EM)

    Implementation: Federal Register Notice Volume 75, No. 180 - Sep. 17, 2010 Addressing Policy and Logistical Challenges to Smart Grid Implementation: Federal Register Notice Volume...

  12. Addressing Policy and Logistical Challenges to smart grid Implementati...

    Office of Environmental Management (EM)

    smart grid Implementation: eMeter Response to Department of Energy RFI Addressing Policy and Logistical Challenges to smart grid Implementation: eMeter Response to Department of...

  13. Smart Grid RFI: Addressing Policy and Logistical Challenges

    Office of Environmental Management (EM)

    via smartgridpolicy@hq.doe.gov Smart Grid Request for Information: Addressing Policy and Logistical Challenges Comments of the Alliance to Save Energy The Alliance to Save...

  14. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

  15. Guide to verification and validation of the SCALE-4 criticality safety software

    SciTech Connect (OSTI)

    Emmett, M.B.; Jordan, W.C.

    1996-12-01

    Whenever a decision is made to newly install the SCALE nuclear criticality safety software on a computer system, the user should run a set of verification and validation (V&V) test cases to demonstrate that the software is properly installed and functioning correctly. This report is intended to serve as a guide for this V&V in that it specifies test cases to run and gives expected results. The report describes the V&V that has been performed for the nuclear criticality safety software in a version of SCALE-4. The verification problems specified by the code developers have been run, and the results compare favorably with those in the SCALE 4.2 baseline. The results reported in this document are from the SCALE 4.2P version which was run on an IBM RS/6000 workstation. These results verify that the SCALE-4 nuclear criticality safety software has been correctly installed and is functioning properly. A validation has been performed for KENO V.a utilizing the CSAS25 criticality sequence and the SCALE 27-group cross-section library for {sup 233}U, {sup 235}U, and {sup 239}Pu fissile, systems in a broad range of geometries and fissile fuel forms. The experimental models used for the validation were taken from three previous validations of KENO V.a. A statistical analysis of the calculated results was used to determine the average calculational bias and a subcritical k{sub eff} criteria for each class of systems validated. Included the statistical analysis is a means of estimating the margin of subcriticality in k{sub eff}. This validation demonstrates that KENO V.a and the 27-group library may be used for nuclear criticality safety computations provided the system being analyzed falls within the range of the experiments used in the validation.

  16. Verification and Validation Strategy for LWRS Tools

    SciTech Connect (OSTI)

    Carl M. Stoots; Richard R. Schultz; Hans D. Gougar; Thomas K Larson; Michael Corradini; Laura Swiler; David Pointer; Jess Gehin

    2012-09-01

    One intension of the Department of Energy (DOE) Light Water Reactor Sustainability (LWRS) program is to create advanced computational tools for safety assessment that enable more accurate representation of a nuclear power plant safety margin. These tools are to be used to study the unique issues posed by lifetime extension and relicensing of the existing operating fleet of nuclear power plants well beyond their first license extension period. The extent to which new computational models / codes such as RELAP-7 can be used for reactor licensing / relicensing activities depends mainly upon the thoroughness with which they have been verified and validated (V&V). This document outlines the LWRS program strategy by which RELAP-7 code V&V planning is to be accomplished. From the perspective of developing and applying thermal-hydraulic and reactivity-specific models to reactor systems, the US Nuclear Regulatory Commission (NRC) Regulatory Guide 1.203 gives key guidance to numeric model developers and those tasked with the validation of numeric models. By creating Regulatory Guide 1.203 the NRC defined a framework for development, assessment, and approval of transient and accident analysis methods. As a result, this methodology is very relevant and is recommended as the path forward for RELAP-7 V&V. However, the unique issues posed by lifetime extension will require considerations in addition to those addressed in Regulatory Guide 1.203. Some of these include prioritization of which plants / designs should be studied first, coupling modern supporting experiments to the stringent needs of new high fidelity models / codes, and scaling of aging effects.

  17. Code Verification of the HIGRAD Computational Fluid Dynamics Solver

    SciTech Connect (OSTI)

    Van Buren, Kendra L. [Los Alamos National Laboratory; Canfield, Jesse M. [Los Alamos National Laboratory; Hemez, Francois M. [Los Alamos National Laboratory; Sauer, Jeremy A. [Los Alamos National Laboratory

    2012-05-04

    The purpose of this report is to outline code and solution verification activities applied to HIGRAD, a Computational Fluid Dynamics (CFD) solver of the compressible Navier-Stokes equations developed at the Los Alamos National Laboratory, and used to simulate various phenomena such as the propagation of wildfires and atmospheric hydrodynamics. Code verification efforts, as described in this report, are an important first step to establish the credibility of numerical simulations. They provide evidence that the mathematical formulation is properly implemented without significant mistakes that would adversely impact the application of interest. Highly accurate analytical solutions are derived for four code verification test problems that exercise different aspects of the code. These test problems are referred to as: (i) the quiet start, (ii) the passive advection, (iii) the passive diffusion, and (iv) the piston-like problem. These problems are simulated using HIGRAD with different levels of mesh discretization and the numerical solutions are compared to their analytical counterparts. In addition, the rates of convergence are estimated to verify the numerical performance of the solver. The first three test problems produce numerical approximations as expected. The fourth test problem (piston-like) indicates the extent to which the code is able to simulate a 'mild' discontinuity, which is a condition that would typically be better handled by a Lagrangian formulation. The current investigation concludes that the numerical implementation of the solver performs as expected. The quality of solutions is sufficient to provide credible simulations of fluid flows around wind turbines. The main caveat associated to these findings is the low coverage provided by these four problems, and somewhat limited verification activities. A more comprehensive evaluation of HIGRAD may be beneficial for future studies.

  18. Cleanup Verification Package for the 618-3 Burial Ground

    SciTech Connect (OSTI)

    M. J. Appel

    2006-09-12

    This cleanup verification package documents completion of remedial action for the 618-3 Solid Waste Burial Ground, also referred to as Burial Ground Number 3 and the Dry Waste Burial Ground Number 3. During its period of operation, the 618-3 site was used to dispose of uranium-contaminated construction debris from the 311 Building and construction/demolition debris from remodeling of the 313, 303-J and 303-K Buildings.

  19. A comparison of adjoint and data-centric verification techniques.

    SciTech Connect (OSTI)

    Wildey, Timothy Michael; Cyr, Eric Christopher; Shadid, John Nicolas; Pawlowski, Roger Patrick; Smith, Thomas Michael

    2013-03-01

    This document summarizes the results from a level 3 milestone study within the CASL VUQ effort. We compare the adjoint-based a posteriori error estimation approach with a recent variant of a data-centric verification technique. We provide a brief overview of each technique and then we discuss their relative advantages and disadvantages. We use Drekar::CFD to produce numerical results for steady-state Navier Stokes and SARANS approximations. 3

  20. Assignment 5 Verification of ANSI-C with PVS

    E-Print Network [OSTI]

    Clarke, Edmund M.

    15-820-a Assignment 5 Verification of ANSI-C with PVS Due Apr. 30, 2003 1 Find the Minimum 1. Write a function in ANSI­C that finds the minumum number in an array. The size of the array is passed as a parameter. 2. Translate your ANSI­C code into PVS language, as described in the class. You may assume

  1. Enrichment Assay Methods Development for the Integrated Cylinder Verification System

    SciTech Connect (OSTI)

    Smith, Leon E.; Misner, Alex C.; Hatchell, Brian K.; Curtis, Michael M.

    2009-10-22

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility's entire product-cylinder inventory. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100 percent product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The three main objectives of this FY09 project are summarized here and described in more detail in the report: (1) Develop a preliminary design for a prototype NDA system, (2) Refine PNNL's MCNP models of the NDA system, and (3) Procure and test key pulse-processing components. Progress against these tasks to date, and next steps, are discussed.

  2. AUTOMATED, HIGHLY ACCURATE VERIFICATION OF RELAP5-3D

    SciTech Connect (OSTI)

    George L Mesina; David Aumiller; Francis Buschman

    2014-07-01

    Computer programs that analyze light water reactor safety solve complex systems of governing, closure and special process equations to model the underlying physics. In addition, these programs incorporate many other features and are quite large. RELAP5-3D[1] has over 300,000 lines of coding for physics, input, output, data management, user-interaction, and post-processing. For software quality assurance, the code must be verified and validated before being released to users. Verification ensures that a program is built right by checking that it meets its design specifications. Recently, there has been an increased importance on the development of automated verification processes that compare coding against its documented algorithms and equations and compares its calculations against analytical solutions and the method of manufactured solutions[2]. For the first time, the ability exists to ensure that the data transfer operations associated with timestep advancement/repeating and writing/reading a solution to a file have no unintended consequences. To ensure that the code performs as intended over its extensive list of applications, an automated and highly accurate verification method has been modified and applied to RELAP5-3D. Furthermore, mathematical analysis of the adequacy of the checks used in the comparisons is provided.

  3. Keynote Address National Seminar on Alternative Energy Sources

    E-Print Network [OSTI]

    Banerjee, Rangan

    Keynote Address National Seminar on Alternative Energy Sources Prof. Rangan Banerjee Energy Systems that there is a real need for alternative energy sources. What do we understand by Alternative Energy Sources? In order Consumption 1997-98 Keynote address at Two days National Seminar on Alternative Energy Sources, 27-28 Aug

  4. Addressing the Level of Florida's Electricity Prices Theodore Kury1

    E-Print Network [OSTI]

    Jawitz, James W.

    for 2 Edison Electric Institute, "Typical Bills and Average Rates Report." The report is reproduced Addressing the Level of Florida's Electricity Prices Theodore Kury1 Public tenet of this step of the plan is to "address Florida's relatively expensive electricity costs so

  5. Common Data Set 2010-11 A1 Address Information

    E-Print Network [OSTI]

    Farritor, Shane

    Associate A5 Terminal Associate http://admissions.unl.edu/apply/index.aspx Source of institutional control for each of the following categories as of the institution's official fall reporting date or as of OctoberCommon Data Set 2010-11 A1 Address Information A1 Name of College/University: A1 Mailing Address: A

  6. Method for the electro-addressable functionalization of electrode arrays

    DOE Patents [OSTI]

    Harper, Jason C.; Polsky, Ronen; Dirk, Shawn M.; Wheeler, David R.; Arango, Dulce C.; Brozik, Susan M.

    2015-12-15

    A method for preparing an electrochemical biosensor uses bias-assisted assembly of unreactive -onium molecules on an electrode array followed by post-assembly electro-addressable conversion of the unreactive group to a chemical or biological recognition group. Electro-addressable functionalization of electrode arrays enables the multi-target electrochemical sensing of biological and chemical analytes.

  7. DOE Order Self Study Modules - DOE O 425.1D, Verification of...

    Office of Environmental Management (EM)

    NNSA line management regarding the verification of readiness to start up or restart nuclear facilities, activities, or operations? Note: If you think that you can complete the...

  8. INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT

    SciTech Connect (OSTI)

    W.C. Adams

    2010-05-24

    INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT, MIAMISBURG, OHIO DCN: 0468-SR-02-0

  9. INDEPENDENT VERIFICATION SURVEY REPORT OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT

    SciTech Connect (OSTI)

    W.C. Adams

    2010-07-21

    INDEPENDENT VERIFICATION SURVEY REPORT FOR THE OPERABLE UNIT-1 LANDFILL TRENCHES, MIAMISBURG CLOSURE PROJECT, MIAMISBURG, OHIO DCN: 0468-SR-03-0

  10. Round-Robin Verification and Final Development of the IEC 62788...

    Office of Scientific and Technical Information (OSTI)

    Verification and Final Development of the IEC 62788-1-5 Encapsulation Size Change Test; NREL (National Renewable Energy Laboratory) Citation Details In-Document Search Title:...

  11. Round-Robin Verification and Final Development of the IEC 62788...

    Office of Scientific and Technical Information (OSTI)

    Development of the IEC 62788-1-5 Encapsulation Size Change Test; NREL (National Renewable Energy Laboratory) Citation Details In-Document Search Title: Round-Robin Verification...

  12. Spying on Components: A Runtime Verification Technique Mike Barnett and Wolfram Schulte

    E-Print Network [OSTI]

    Leavens, Gary T.

    Spying on Components: A Runtime Verification Technique Mike Barnett and Wolfram Schulte Microsoft, USA Copyright 2001 M. Barnett and W. Schulte. Machines (ASMs) [16], it allows the writing

  13. EFFICIENT MODELING AND VERIFICATION OF ANALOG/MIXED-SIGNAL CIRCUITS USING

    E-Print Network [OSTI]

    Myers, Chris J.

    finite groups of equivalent states for verification. Difference bound matrices (DBMs), a restricted form using DBMs is very efficient at the cost of exactness. This dissertation presents algorithms

  14. Finite-State Verification for High Performance Computing George S. Avrunin

    E-Print Network [OSTI]

    Avrunin, George S.

    Finite-State Verification for High Performance Computing George S. Avrunin Department (top500.org) reveals that high performance computing has become practically synonymous with parallel

  15. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  16. Measurement & verification reality check: A yawning gap between theory and practice

    E-Print Network [OSTI]

    2002-01-01

    Energy-Efficient Economy. [IPMVP] International PerformanceVerification Protocol (IPMVP), provides standard measurementThe success of the IPMVP as a market transformation tool has

  17. DEMAND SIDE ENERGY MANAGEMENT AND CONSERVATION PROGRAM Measurement and Verification Program

    E-Print Network [OSTI]

    Hofmann, Hans A.

    DEMAND SIDE ENERGY MANAGEMENT AND CONSERVATION PROGRAM Measurement and Verification Program 4&V deliverables requested here meet the Federal Energy Management Program (FEMP) intent for a "Post- Installation

  18. Section D - G

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward SECTION B SUPPLIES ANDC

  19. Section I: Contract Clause

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward SECTION B SUPPLIES

  20. IP address management : augmenting Sandia's capabilities through open source tools.

    SciTech Connect (OSTI)

    Nayar, R. Daniel

    2005-08-01

    Internet Protocol (IP) address management is an increasingly growing concern at Sandia National Laboratories (SNL) and the networking community as a whole. The current state of the available IP addresses indicates that they are nearly exhausted. Currently SNL doesn't have the justification to obtain more IP address space from Internet Assigned Numbers Authority (IANA). There must exist a local entity to manage and allocate IP assignments efficiently. Ongoing efforts at Sandia have been in the form of a multifunctional database application notably known as Network Information System (NWIS). NWIS is a database responsible for a multitude of network administrative services including IP address management. This study will explore the feasibility of augmenting NWIS's IP management capabilities utilizing open source tools. Modifications of existing capabilities to better allocate available IP address space are studied.

  1. Section L, Paragraph L-4

    National Nuclear Security Administration (NNSA)

    D SECTION L ATTACHMENT D CROSS REFERENCE MATRIX Section L Section M Offeror's Proposal Criterion 1: PAST PERFORMANCE L-15 (a) M-3 (a) Criterion 2: SITE ORGANIZATION AND...

  2. This letter is to inform AHAM that DOE is adopting a new policy regarding DOE ENERGY STAR verification testing of models that are part of the AHAM verification program.

    Office of Energy Efficiency and Renewable Energy (EERE)

    This letter is to inform AHAM that DOE is adopting a new policy regarding DOE ENERGY STAR verification testing of models that are part of the AHAM verification program.

  3. PART III - SECTION J

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster SessionPrograms |Y-12 reduces water usageE SECTION

  4. SECTION J, APPENDIX B - PEP

    National Nuclear Security Administration (NNSA)

    SECTION J APPENDIX B PERFORMANCE EVALUATION PLAN Replaced by Mods 002, 016, 020, 029, 0084 Intentionally left blank for Internet posting purposes. Section J, Appendix B, Page 1...

  5. Section 1: Contact Information Section 2: Employment History

    E-Print Network [OSTI]

    Section 1: Contact Information Section 2: Employment History Section 3: Educational History Section 4: Additional Required Information Employment Application The Ernest Orlando Lawrence Berkeley! Specific information about current job opportunities at LBNL may be found at http://cjo.lbl.gov/. Please

  6. Finance President's Council Section Page 6 Motion: 199610.30

    E-Print Network [OSTI]

    Bolch, Tobias

    Finance President's Council Section Page 6 Motion: 199610.30 UNIVERSITY OF NORTHERN BRITISH by the Finance Department. 1. Cheque Requisition Procedure Complete the Cheque Requisition form in full as indicated (form available from the Finance department). This includes the name of the payee, address, amount

  7. REPORT OF THE WORKSHOP ON NUCLEAR FACILITY DESIGN INFORMATION EXAMINATION AND VERIFICATION FOR SAFEGUARDS

    SciTech Connect (OSTI)

    Richard Metcalf; Robert Bean

    2009-10-01

    Executive Summary The International Atomic Energy Agency (IAEA) implements nuclear safeguards and verifies countries are compliant with their international nuclear safeguards agreements. One of the key provisions in the safeguards agreement is the requirement that the country provide nuclear facility design and operating information to the IAEA relevant to safeguarding the facility, and at a very early stage. , This provides the opportunity for the IAEA to verify the safeguards-relevant features of the facility and to periodically ensure that those features have not changed. The national authorities (State System of Accounting for and Control of Nuclear Material - SSAC) provide the design information for all facilities within a country to the IAEA. The design information is conveyed using the IAEA’s Design Information Questionnaire (DIQ) and specifies: (1) Identification of the facility’s general character, purpose, capacity, and location; (2) Description of the facility’s layout and nuclear material form, location, and flow; (3) Description of the features relating to nuclear material accounting, containment, and surveillance; and (4) Description of existing and proposed procedures for nuclear material accounting and control, with identification of nuclear material balance areas. The DIQ is updated as required by written addendum. IAEA safeguards inspectors examine and verify this information in design information examination (DIE) and design information verification (DIV) activities to confirm that the facility has been constructed or is being operated as declared by the facility operator and national authorities, and to develop a suitable safeguards approach. Under the Next Generation Safeguards Initiative (NGSI), the National Nuclear Security Administrations (NNSA) Office of Non-Proliferation and International Security identified the need for more effective and efficient verification of design information by the IAEA for improving international safeguards in the future. Consequently, the NNSA Office of International Regimes and Agreements (NA-243) sponsored a team of U.S. Department of Energy National Laboratory nuclear safeguards experts and technologists to conduct a workshop on methods and technologies for improving this activity, under the ASA-100 Advanced Safeguards Approaches Project. The workshop focused on reviewing and discussing the fundamental safeguards needs, and presented technology and/or methods that could potentially address those needs more effectively and efficiently. Conclusions and Recommendations for technology to enhance the performance of DIV inspections are presented by the workshop team.

  8. DEVELOPMENT OF A PORTAL MONITOR FOR UF6 CYLINDER VERIFICATION

    SciTech Connect (OSTI)

    Smith, Leon E.; Curtis, Michael M.; Shaver, Mark W.; Benz, Jacob M.; Misner, Alex C.; Mace, Emily K.; Jordan, David V.; Noss, Daniel; Ford, Herbert

    2009-10-06

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s operations. As additional enrichment plans come online to support the expansion of nuclear power, reducing person-days of inspection will take on greater importance. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100% product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Automated Cylinder Enrichment Verification System (ACEVS) would be located at key measurement points and will positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. Given the potential for reduced inspector presence, the operational and manpower-reduction benefits of the portal concept are clear. However, it is necessary to assess whether the cylinder portal concept can meet, or potentially improve upon, today’s U-235 enrichment assay performance. PNNL’s ACEVS concept utilizes sensors that could be operated in an unattended mode: moderated He-3 neutron detectors and large NaI(Tl) scintillators for gamma-ray spectroscopy. The medium-resolution NaI(Tl) scintillators are a sacrifice in energy resolution but do provide high collection efficiency for signatures above 1 MeV. The He-3/NaI sensor combination allows the exploitation of additional, more-penetrating signatures than those currently utilized: Neutrons produced from F-19(?,n) reactions (spawned primarily from U-234 alpha emission) and high-energy gamma rays (extending up to 10 MeV) induced by neutrons interacting in the steel cylinder. These signatures are indirect measures of U-235 that require a relatively stable U-234/U-235 ratio in the product material in order to be useful. The hypothesis of this work is that the U-234/U-235 ratio is sufficiently constant, for the specific facility where the automated system is installed, to rely on neutron and high-energy gamma-ray signatures for indirect measurement of U-235. Further, these highly penetrating signatures can be combined with a modified form of NaI-based 185-keV enrichment measurements to meet target uncertainties for the verification of product cylinders, with the additional benefits of full-volume assay of the cylinder and 100% product-cylinder verification (as opposed to today’s sampling-based approach). This paper focuses on the enrichment measurement aspects of the ACEVS concept: neutron and high-energy gamma-ray signatures, the radiation sensors designed to collect those signatures, and proof-of-principle cylinder measurements and analysis. Preliminary analysis indicates that an automated cylinder verification approach has the potential to meet target uncertainty values for 30B products cylinders (5%), assuming ore-based enrichment feed and a facility-specific calibration. Also described is the additional work needed to more definitively assess the concept’s viability, particularly through a better understanding of the U-234/U-235 ratio variability in modern enrichment plants.

  9. New York Independent System Operator, Smart Grid RFI: Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Response of New York State Smart Grid Addressing Policy and Logistical Challenges SmartGrid Consortium: Smart Grid Roadmap for the State of New York 2009 Smart Grid System...

  10. Biographical Sketch: Constantino Lagoa Address: Electrical Engineering Department

    E-Print Network [OSTI]

    Lagoa, Constantino

    Biographical Sketch: Constantino Lagoa Address: Electrical Engineering Department Pennsylvania State University Room 205 Electrical Engineering West University Park, PA 16802 Office Phone: Dept ­ Present Professor of Electrical Engineering Pennsylvania State University, University Park, Pennsylvania

  11. Email Address: (For Example: Bachelor of Science in Architecture)

    E-Print Network [OSTI]

    Li, Mo

    Email Address: (For Example: Bachelor of Science in Architecture) Date Degree Received: Did you receive Honor, High Honor, Highest Honor? Undergraduate Degrees: Enter your degree designator: Duplicate Diploma Request Form Georgia Institute of Technology PERSONAL INFORMATION Legal Name: PRINT FULL

  12. The State of the Ames Laboratory Address 2011

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01

    Alex King, director of The Ames Laboratory, discusses the budget situation, improvements at Ames Lab and infrastructure improvements during the State of the Lab address on Tuesday, May 24, 2011.

  13. United Indigenous Voices Address Sustainability: Climate Change and Traditional Places

    Office of Energy Efficiency and Renewable Energy (EERE)

    At the First Stewards Symposium, over 300 industry and policy leaders from around the nation will discuss four main themes generated from the 2012 First Stewards Symposium that address issues...

  14. Mailing Address: Center for Energy and Environmental Policy

    E-Print Network [OSTI]

    Delaware, University of

    justice, conservation and renewable energy options, integrated resource planning, and technology-Electric..................................................................................... 20 2. A Comparative Analysis of Solar and Non-Solar Energy Costs#12;ii Mailing Address: John Byrne Director Center for Energy and Environmental Policy University

  15. Custodian's campus addressCustodian's department Custodian's name Custodian's phone #

    E-Print Network [OSTI]

    Tipple, Brett

    , then write the vendor number here. If a taxpayer ID is required, then attach IRS Form W-9. All information. Fill in this space if the taxpayer ID is not on the invoice, or when there is not an address

  16. Applying Multi-Physics Requirements and Loads in FEM Analysis and Testing – The JET KL11 Endoscope Design Verification Process

    E-Print Network [OSTI]

    Applying Multi-Physics Requirements and Loads in FEM Analysis and Testing – The JET KL11 Endoscope Design Verification Process

  17. A Runtime Verification Framework for Control System Simulation

    SciTech Connect (OSTI)

    Ciraci, Selim; Fuller, Jason C.; Daily, Jeffrey A.; Makhmalbaf, Atefe; Callahan, Charles D.

    2014-08-02

    n a standard workflow for the validation of a control system, the control system is implemented as an extension to a simulator. Such simulators are complex software systems, and engineers may unknowingly violate constraints a simulator places on extensions. As such, errors may be introduced in the implementation of either the control system or the simulator leading to invalid simulation results. This paper presents a novel runtime verification approach for verifying control system implementations within simulators. The major contribution of the approach is the two-tier specification process. In the first tier, engineers model constraints using a domain-specific language tailored to modeling a controller’s response to changes in its input. The language is high-level and effectively hides the implementation details of the simulator, allowing engineers to specify design-level constraints independent of low-level simulator interfaces. In the second tier, simulator developers provide mapping rules for mapping design-level constraints to the implementation of the simulator. Using the rules, an automated tool transforms the design-level specifications into simulator-specific runtime verification specifications and generates monitoring code which is injected into the implementation of the simulator. During simulation, these monitors observe the input and output variables of the control system and report changes to the verifier. The verifier checks whether these changes follow the constraints of the control system. We describe application of this approach to the verification of the constraints of an HVAC control system implemented with the power grid simulator GridLAB-D.

  18. DEEP NEURAL NETWORKS FOR SMALL FOOTPRINT TEXT-DEPENDENT SPEAKER VERIFICATION

    E-Print Network [OSTI]

    Cortes, Corinna

    DEEP NEURAL NETWORKS FOR SMALL FOOTPRINT TEXT-DEPENDENT SPEAKER VERIFICATION Ehsan Variani1 , Xin the use of deep neural networks (DNNs) for a small footprint text-dependent speaker verification task% relative in equal error rate (EER) for clean and noisy conditions respectively. Index Terms-- Deep neural

  19. Verification of Relational Data-Centric Dynamic Systems with External Services

    E-Print Network [OSTI]

    Calvanese, Diego

    Verification of Relational Data-Centric Dynamic Systems with External Services Babak Bagheri Hariri@cs.ucsd.edu ABSTRACT Data-centric dynamic systems are systems where both the process controlling the dynamics processes. In this paper we study verification of (first-order) µ-calculus variants over relational data-centric

  20. A Brief Account of Runtime Verification Martin Leucker and Christian Schallhart

    E-Print Network [OSTI]

    Leucker, Martin

    to well-known verification techniques like model checking and testing is provided, and applications-skid system must speed with exactly the right velocity to stabi- lize the car. Moreover, for a power plant;verification is particularly challenging as the overall behavior of such systems depends heavily

  1. A Formal Verification Methodology for Checking Data Integrity Yasushi Umezawa, Takeshi Shimizu

    E-Print Network [OSTI]

    Boyer, Edmond

    and complexity of system on chip (SoC) designs. Powerful formal verification methods have been playing, model checking for complex designs may be beyond the power of available tools and computing resourceA Formal Verification Methodology for Checking Data Integrity Yasushi Umezawa, Takeshi Shimizu

  2. Foundations of Software Technology and Theoretical Computer Science (2009) Submission Deductive Verification of Continuous

    E-Print Network [OSTI]

    Tiwari, Ashish

    2009-01-01

    state transition systems is a powerful modeling formalism, it is inadequate for modeling systems Verification of Continuous Dynamical Systems Ankur Taly1 , Ashish Tiwari2 1 Computer Science Department inference rules for safety verification of polynomial continuous dynamical systems. We present two different

  3. Formal Verification Integration Approach for Faiez Zalila, Xavier Cregut, and Marc Pantel

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    critical systems. In this context, model validation and verification (V&V) activities are key features) for the verification of safety critical embedded systems has produced very good results and raised the inter- est the benefits of these power- ful methods. More precisely, we propose a language to formally express system

  4. Query Based UML Modeling Validation and Verification of the System Model and

    E-Print Network [OSTI]

    Austin, Mark

    1 Query Based UML Modeling Validation and Verification of the System Model and Behavior. UML/SysML was designed to provide simple but powerful constructs for modeling a wide range of systems for a Hydraulic Crane Denny Mathew ENPM 643 System Validation and Verification Instructor: Dr. Mark Austin Fall

  5. An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration

    E-Print Network [OSTI]

    Hilley, George

    An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration J. L the success of geologic carbon sequestration projects. To detect subtle CO2 leakage signals, we present), An improved strategy to detect CO2 leakage for verification of geologic carbon sequestration, Geophys. Res

  6. Modeling and Verification of Leaders Agreement in the IntrusionTolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion­Tolerant Enclaves Using PVS Mohamed issue in formal verification. It arises the problem of how much power should be given to a Byzantine Layouni 1 , Jozef Hooman 2 , and Sofiâ?? ene Tahar 1 1 Department of Electrical and Computer Engineering

  7. Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS

    E-Print Network [OSTI]

    Tahar, Sofiène

    Modeling and Verification of Leaders Agreement in the Intrusion-Tolerant Enclaves Using PVS Mohamed]. Modeling Byzantine behavior has been always a big issue in formal verification. It arises the problem of how much power should be given to a Byzantine fault and how general the model should be to

  8. Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement

    E-Print Network [OSTI]

    Clarke, Edmund M.

    verification, abstraction transforms the inherently infinite state system into a finite-state model [7Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement Edmund Clarke1 generated by the model checker. For hybrid systems, analysis of the counterexample requires the computation

  9. Verification of Hybrid Systems Based on CounterexampleGuided Abstraction Refinement ?

    E-Print Network [OSTI]

    Theobald, Michael

    verification, abstraction transforms the inherently infinite state system into a finite­state model [7, 8Verification of Hybrid Systems Based on Counterexample­Guided Abstraction Refinement ? Edmund that eliminates a counterexample generated by the model checker. For hybrid systems, analy­ sis

  10. On the Formal Verification of Embedded Software Using Multiway Decision Graphs

    E-Print Network [OSTI]

    Tahar, Sofiène

    . Recently attention has been given to the verification of embedded systems using formal methods and Claesen [10] suggested a methodology for modeling both the software and hardware of an embedded system1 On the Formal Verification of Embedded Software Using Multiway Decision Graphs Subhashini

  11. FORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY MODELING

    E-Print Network [OSTI]

    Xu, Haiping

    that DRBD provides a powerful tool for system reliability modeling, and our proposed verification approachFORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY-scale computer-based systems. KEY WORDS Reliability modeling, dynamic reliability block diagrams (DRBD), Object

  12. A New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol

    E-Print Network [OSTI]

    Barak, Boaz

    accountable delivery platforms, i.e., missile silos, submarines, and bombers. The next round of nuclear armsA New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol Alex Glaser, Boaz-control agreements. This article presents a concept for a new approach to nuclear warhead verification that minimizes

  13. Formal Verification of an ARM processor Vishnu A. Patankar Alok Jain Randal E. Bryant

    E-Print Network [OSTI]

    Bryant, Randal E.

    1 Formal Verification of an ARM processor Vishnu A. Patankar Alok Jain Randal E. Bryant Department presents a detailed description of the application of a formal verification methodology to an ARM processor. The processor, a hybrid between the ARM7 and the StrongARM processors, uses features such as a 5-stage

  14. HOW TO: Complete Form I-9 Verification for Off-Site Employees 1 Background info

    E-Print Network [OSTI]

    HOW TO: Complete Form I-9 Verification for Off-Site Employees 1 Background info: By law, the university must have a valid Form I-9 on file for employees. The Form I-9 form must be completed within 3 location to complete their Form I-9 ­ Employment Eligibility Verification. The form has three parts

  15. A Load Balancing Mechanism with Verification Daniel Grosu and Anthony T. Chronopoulos

    E-Print Network [OSTI]

    Chronopoulos, Anthony T.

    A Load Balancing Mechanism with Verification £ Daniel Grosu and Anthony T. Chronopoulos Department mechanisms with verification for heteroge- neous distributed systems. We derive a compensation and bonus type mechanism that solves the load balancing prob- lem in distributed systems in which computers are charac

  16. A Static PatternIndependent Technique for Power Grid Voltage Integrity Verification #

    E-Print Network [OSTI]

    Najm, Farid N.

    A Static Pattern­Independent Technique for Power Grid Voltage Integrity Verification # Dionysios Design verification must include the power grid. Checking that the voltage on the power grid does) the obviously large size of the power grids for modern high­performance chips, and ii) the di#culty of setting

  17. Handling Inductance in Early Power Grid Verification Nahi H. Abdul Ghani

    E-Print Network [OSTI]

    Najm, Farid N.

    Handling Inductance in Early Power Grid Verification Nahi H. Abdul Ghani Department of ECE design verification, one should check if the voltage drop on the power grid exceeds some critical thresh, the currents drawn by the logic beneath the power grid are described by means of current constraints

  18. A geometric approach for early power grid verification using current constraints

    E-Print Network [OSTI]

    Najm, Farid N.

    A geometric approach for early power grid verification using current constraints Imad A. Ferzli Automation Eindhoven, The Netherlands lars@magma-da.com ABSTRACT The verification of power grids in modern programs as there are power grid nodes, to an- other involving a user-limited number of solutions of one

  19. A Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification

    E-Print Network [OSTI]

    Najm, Farid N.

    by the circuit off the grid. The current waveforms of these current sources may be determined by a priorA Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification Dionysios Design verification must include the power grid. Checking that the voltage on the power grid does

  20. A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification

    E-Print Network [OSTI]

    Belaïd, Abdel

    A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature to grid schemes. Different grid-segmentation schemes have been used in off-line signature verification.belaid@loria.fr Abstract--One of the main challenges in off-line signature verification systems is to make them robust

  1. Management Services for Performance Verification in Broadband Multi-Service Networks

    E-Print Network [OSTI]

    Griffin, David

    Management Services for Performance Verification in Broadband Multi-Service Networks Panos Georgatsos1 , David Griffin2 Abstract This paper presents a practical management system for performance monitoring and network performance verification to support the larger goals of performance management systems

  2. WICT PROCEEDINGS, DECEMBER 2008 1 Meta-Functional Languages for Hardware Design and Verification

    E-Print Network [OSTI]

    Pace, Gordon J.

    WICT PROCEEDINGS, DECEMBER 2008 1 Meta-Functional Languages for Hardware Design and Verification of embedding hardware description lan- guages in general-purpose languages has been widely explored in the literature and has been shown to aid hardware design and verification. In this paper we ex- plore the use

  3. Using Sparse Representation for Fish Recognition and Verification in Real World Observation

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    Using Sparse Representation for Fish Recognition and Verification in Real World Observation Yi, Hsinchu, Taiwan Abstract - The purpose of this paper is to present an innovated fish recognition and verification method suited for the real world automatic underwater fish observation. Based on the fish

  4. MODELING AND VERIFICATION OF REAL-TIME AND CYBER-PHYSICAL SYSTEMS

    E-Print Network [OSTI]

    Gupta, Gopal

    MODELING AND VERIFICATION OF REAL-TIME AND CYBER-PHYSICAL SYSTEMS by Neda Saeedloei APPROVED Copyright 2011 Neda Saeedloei All Rights Reserved #12;To my mother. #12;MODELING AND VERIFICATION OF REAL-TIME AND CYBER-PHYSICAL SYSTEMS by NEDA SAEEDLOEI, B.S., M.S. DISSERTATION Presented to the Faculty

  5. Reactor physics verification of the MCNP6 unstructured mesh capability

    SciTech Connect (OSTI)

    Burke, T. P. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States); Kiedrowski, B. C.; Martz, R. L. [X-Computational Physics Division, Monte Carlo Codes Group, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Martin, W. R. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States)

    2013-07-01

    The Monte Carlo software package MCNP6 has the ability to transport particles on unstructured meshes generated from the Computed-Aided Engineering software Abaqus. Verification is performed using benchmarks with features relevant to reactor physics - Big Ten and the C5G7 computational benchmark. Various meshing strategies are tested and results are compared to reference solutions. Computational performance results are also given. The conclusions show MCNP6 is capable of producing accurate calculations for reactor physics geometries and the computational requirements for small lattice benchmarks are reasonable on modern computing platforms. (authors)

  6. ICDF Complex Waste Profile and Verification Sample Guidance

    SciTech Connect (OSTI)

    W. M. Heileson

    2006-10-01

    This guidance document will assist waste generators who characterize waste streams destined for disposal at the Idaho Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) Disposal Facility (ICDF) Complex. The purpose of this document is to develop a conservative but appropriate way to (1) characterize waste for entry into the ICDF; (2) ensure compliance with the waste acceptance criteria; and (3) facilitate disposal at the ICDF landfill or evaporation pond. In addition, this document will establish the waste verification process used by ICDF personnel to ensure that untreated waste meets applicable ICDF acceptance limits

  7. Cleanup Verification Package for the 116-K-2 Effluent Trench

    SciTech Connect (OSTI)

    J. M. Capron

    2006-04-04

    This cleanup verification package documents completion of remedial action for the 116-K-2 effluent trench, also referred to as the 116-K-2 mile-long trench and the 116-K-2 site. During its period of operation, the 116-K-2 site was used to dispose of cooling water effluent from the 105-KE and 105-KW Reactors by percolation into the soil. This site also received mixed liquid wastes from the 105-KW and 105-KE fuel storage basins, reactor floor drains, and miscellaneous decontamination activities.

  8. Transforming PLC Programs into Formal Models for Verification Purposes

    E-Print Network [OSTI]

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  9. Digital data storage systems, computers, and data verification methods

    DOE Patents [OSTI]

    Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A.

    2005-12-27

    Digital data storage systems, computers, and data verification methods are provided. According to a first aspect of the invention, a computer includes an interface adapted to couple with a dynamic database; and processing circuitry configured to provide a first hash from digital data stored within a portion of the dynamic database at an initial moment in time, to provide a second hash from digital data stored within the portion of the dynamic database at a subsequent moment in time, and to compare the first hash and the second hash.

  10. Sandia National Laboratories: Advanced Simulation Computing: Verification &

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcoming Release of the UniversityValidation Verification &

  11. Formal Specification and Verification of a Dataflow Processor Array \\Lambday Thomas A. Henzinger Xiaojun Liu Shaz Qadeer Sriram K. Rajamani

    E-Print Network [OSTI]

    Henzinger, Thomas A.

    and verification of the VGI parallel DSP chip [1], which contains 64 compute processors with ¸30K gates in each verification tools. However, the check can be decomposed using assume­guarantee reasoning. For VGI to decompose the verification problem of the VGI chip into smaller proof obliga­ tions that were discharged

  12. Developing Embedded/Real-Time and Cyber-Physical Systems: Functional Reactive Programming, RTL-based Formal Verification, Response Time

    E-Print Network [OSTI]

    Cheng, Albert M. K.

    , specification, modeling, scheduling, and formal verification of real- time, embedded, and cyber-physical systems-based Formal Verification, Response Time Analysis, and Power-Aware Scheduling Albert M. K. Cheng Real reactive programming, RTL (real-time logic)-based formal verification, response time analysis, and power

  13. FINAL REPORT –INDEPENDENT VERIFICATION SURVEY SUMMARY AND RESULTS FOR THE ARGONNE NATIONAL LABORATORY BUILDING 330 PROJECT FOOTPRINT, ARGONNE, ILLINOIS

    SciTech Connect (OSTI)

    ERIKA N. BAILEY

    2012-02-29

    ORISE conducted onsite verification activities of the Building 330 project footprint during the period of June 6 through June 7, 2011. The verification activities included technical reviews of project documents, visual inspections, radiation surface scans, and sampling and analysis. The draft verification report was issued in July 2011 with findings and recommendations. The contractor performed additional evaluations and remediation.

  14. Verification as a Foundation for Validation of a Nuclear Fuel Performance Code

    SciTech Connect (OSTI)

    J. D. Hales; S. R. Novascone; B. W. Spencer; R. L. Williamson; G. Pastore; D. M. Perez

    2014-09-01

    Complex multiphysics simulations such as nuclear fuel performance analysis are composed of many submodels used to describe specific phenomena. These phenomena include, as examples, the relationship between stress and strain, heat transfer across a gas gap, and mechanical contact. These submodels work in concert to simulate real-world events, like the behavior of a fuel rod in a reactor. If a simulation tool is able to represent real-world behavior, the tool is said to be validated. While much emphasis is rightly placed on validation, model verification may be undervalued. Verification involves showing that a model performs as intended, that it computes results consistent with its mathematical description. This paper explains the differences between verification and validation and shows how validation should be preceded by verification. Specific verification problems, including several specific to nuclear fuel analysis, are given. Validation results are also presented.

  15. M&V Guidelines: Measurement and Verification for Federal Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    staff. The persistence of the changes can be addressed through checking performance benchmarks, conducting periodic tune-ups, or a more aggressive commissioning approach. This...

  16. Review of Evaluation, Measurement and Verification Approaches Used to Estimate the Load Impacts and Effectiveness of Energy Efficiency Programs

    SciTech Connect (OSTI)

    Messenger, Mike; Bharvirkar, Ranjit; Golemboski, Bill; Goldman, Charles A.; Schiller, Steven R.

    2010-04-14

    Public and private funding for end-use energy efficiency actions is expected to increase significantly in the United States over the next decade. For example, Barbose et al (2009) estimate that spending on ratepayer-funded energy efficiency programs in the U.S. could increase from $3.1 billion in 2008 to $7.5 and 12.4 billion by 2020 under their medium and high scenarios. This increase in spending could yield annual electric energy savings ranging from 0.58% - 0.93% of total U.S. retail sales in 2020, up from 0.34% of retail sales in 2008. Interest in and support for energy efficiency has broadened among national and state policymakers. Prominent examples include {approx}$18 billion in new funding for energy efficiency programs (e.g., State Energy Program, Weatherization, and Energy Efficiency and Conservation Block Grants) in the 2009 American Recovery and Reinvestment Act (ARRA). Increased funding for energy efficiency should result in more benefits as well as more scrutiny of these results. As energy efficiency becomes a more prominent component of the U.S. national energy strategy and policies, assessing the effectiveness and energy saving impacts of energy efficiency programs is likely to become increasingly important for policymakers and private and public funders of efficiency actions. Thus, it is critical that evaluation, measurement, and verification (EM&V) is carried out effectively and efficiently, which implies that: (1) Effective program evaluation, measurement, and verification (EM&V) methodologies and tools are available to key stakeholders (e.g., regulatory agencies, program administrators, consumers, and evaluation consultants); and (2) Capacity (people and infrastructure resources) is available to conduct EM&V activities and report results in ways that support program improvement and provide data that reliably compares achieved results against goals and similar programs in other jurisdictions (benchmarking). The National Action Plan for Energy Efficiency (2007) presented commonly used definitions for EM&V in the context of energy efficiency programs: (1) Evaluation (E) - The performance of studies and activities aimed at determining the effects and effectiveness of EE programs; (2) Measurement and Verification (M&V) - Data collection, monitoring, and analysis associated with the calculation of gross energy and demand savings from individual measures, sites or projects. M&V can be a subset of program evaluation; and (3) Evaluation, Measurement, and Verification (EM&V) - This term is frequently seen in evaluation literature. EM&V is a catchall acronym for determining both the effectiveness of program designs and estimates of load impacts at the portfolio, program and project level. This report is a scoping study that assesses current practices and methods in the evaluation, measurement and verification (EM&V) of ratepayer-funded energy efficiency programs, with a focus on methods and practices currently used for determining whether projected (ex-ante) energy and demand savings have been achieved (ex-post). M&V practices for privately-funded energy efficiency projects (e.g., ESCO projects) or programs where the primary focus is greenhouse gas reductions were not part of the scope of this study. We identify and discuss key purposes and uses of current evaluations of end-use energy efficiency programs, methods used to evaluate these programs, processes used to determine those methods; and key issues that need to be addressed now and in the future, based on discussions with regulatory agencies, policymakers, program administrators, and evaluation practitioners in 14 states and national experts in the evaluation field. We also explore how EM&V may evolve in a future in which efficiency funding increases significantly, innovative mechanisms for rewarding program performance are adopted, the role of efficiency in greenhouse gas mitigation is more closely linked, and programs are increasingly funded from multiple sources often with multiple program administrators and in

  17. Office of Environmental Health and Safety Chemical and Biological Safety Section

    E-Print Network [OSTI]

    Hammack, Richard

    including industrial hygienists, biosafety professionals, laboratory safety professionals, hazardous waste each section manages an extensive and comprehensive array of programs, this information paper addresses management professionals, and lead and asbestos management professionals. As our name and professional

  18. Neutron spectrometry for UF6 enrichment verification in storage cylinders

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mengesha, Wondwosen; Kiff, Scott D.

    2015-01-29

    Verification of declared UF6 enrichment and mass in storage cylinders is of great interest in nuclear material nonproliferation. Nondestructive assay (NDA) techniques are commonly used for safeguards inspections to ensure accountancy of declared nuclear materials. Common NDA techniques used include gamma-ray spectrometry and both passive and active neutron measurements. In the present study, neutron spectrometry was investigated for verification of UF6 enrichment in 30B storage cylinders based on an unattended and passive measurement approach. MCNP5 and Geant4 simulated neutron spectra, for selected UF6 enrichments and filling profiles, were used in the investigation. The simulated neutron spectra were analyzed using principalmore »component analysis (PCA). The PCA technique is a well-established technique and has a wide area of application including feature analysis, outlier detection, and gamma-ray spectral analysis. Results obtained demonstrate that neutron spectrometry supported by spectral feature analysis has potential for assaying UF6 enrichment in storage cylinders. The results from the present study also showed that difficulties associated with the UF6 filling profile and observed in other unattended passive neutron measurements can possibly be overcome using the approach presented.« less

  19. Standard practices for verification of speed for material testing machines

    E-Print Network [OSTI]

    American Society for Testing and Materials. Philadelphia

    2011-01-01

    1.1 These practices cover procedures and requirements for the calibration and verification of testing machine speed by means of standard calibration devices. This practice is not intended to be complete purchase specifications for testing machines. 1.2 These practices apply to the verification of the speed application and measuring systems associated with the testing machine, such as a scale, dial, marked or unmarked recorder chart, digital display, setting, etc. In all cases the buyer/owner/user must designate the speed-measuring system(s) to be verified. 1.3 These practices give guidance, recommendations, and examples, specific to electro-mechanical testing machines. The practice may also be used to verify actuator speed for hydraulic testing machines. 1.4 This standard cannot be used to verify cycle counting or frequency related to cyclic fatigue testing applications. 1.5 Since conversion factors are not required in this practice, either SI units (mm/min), or English [in/min], can be used as the standa...

  20. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    SciTech Connect (OSTI)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the genetic information associated with the various pathogens. In addition, it has been determined that a suitable information barrier could be applied to this technology when the verification regime has been defined. Finally, the report posits a path forward for additional development of information barriers in a biological weapons verification regime. This path forward has shown that a new analysis approach coined as Information Loss Analysis might need to be pursued so that a numerical understanding of how information can be lost in specific measurement systems can be achieved.

  1. Wind vs. Biofuels: Addressing Climate, Health and Energy

    SciTech Connect (OSTI)

    Professor Mark Jacobson

    2007-01-29

    The favored approach today for addressing global warming is to promote a variety of options: biofuels, wind, solar thermal, solar photovoltaic, geothermal, hydroelectric, and nuclear energy and to improve efficiency. However, by far, most emphasis has been on biofuels. It is shown here, though, that current-technology biofuels cannot address global warming and may slightly increase death and illness due to ozone-related air pollution. Future biofuels may theoretically slow global warming, but only temporarily and with the cost of increased air pollution mortality. In both cases, the land required renders biofuels an impractical solution. Recent measurements and statistical analyses of U.S. and world wind power carried out at Stanford University suggest that wind combined with other options can substantially address global warming, air pollution mortality, and energy needs simultaneously.

  2. Wind versus Biofuels for Addressing Climate, Health, and Energy

    SciTech Connect (OSTI)

    Jacobson, Mark Z.

    2007-01-29

    The favored approach today for addressing global warming is to promote a variety of options: biofuels, wind, solar thermal, solar photovoltaic, geothermal, hydroelectric, and nuclear energy and to improve efficiency. However, by far, most emphasis has been on biofuels. It is shown here, though, that current-technology biofuels cannot address global warming and may slightly increase death and illness due to ozone-related air pollution. Future biofuels may theoretically slow global warming, but only temporarily and with the cost of increased air pollution mortality. In both cases, the land required renders biofuels an impractical solution. Recent measurements and statistical analyses of U.S. and world wind power carried out at Stanford University suggest that wind combined with other options can substantially address global warming, air pollution mortality, and energy needs simultaneously.

  3. R&D for computational cognitive and social models : foundations for model evaluation through verification and validation (final LDRD report).

    SciTech Connect (OSTI)

    Slepoy, Alexander; Mitchell, Scott A.; Backus, George A.; McNamara, Laura A.; Trucano, Timothy Guy

    2008-09-01

    Sandia National Laboratories is investing in projects that aim to develop computational modeling and simulation applications that explore human cognitive and social phenomena. While some of these modeling and simulation projects are explicitly research oriented, others are intended to support or provide insight for people involved in high consequence decision-making. This raises the issue of how to evaluate computational modeling and simulation applications in both research and applied settings where human behavior is the focus of the model: when is a simulation 'good enough' for the goals its designers want to achieve? In this report, we discuss two years' worth of review and assessment of the ASC program's approach to computational model verification and validation, uncertainty quantification, and decision making. We present a framework that extends the principles of the ASC approach into the area of computational social and cognitive modeling and simulation. In doing so, we argue that the potential for evaluation is a function of how the modeling and simulation software will be used in a particular setting. In making this argument, we move from strict, engineering and physics oriented approaches to V&V to a broader project of model evaluation, which asserts that the systematic, rigorous, and transparent accumulation of evidence about a model's performance under conditions of uncertainty is a reasonable and necessary goal for model evaluation, regardless of discipline. How to achieve the accumulation of evidence in areas outside physics and engineering is a significant research challenge, but one that requires addressing as modeling and simulation tools move out of research laboratories and into the hands of decision makers. This report provides an assessment of our thinking on ASC Verification and Validation, and argues for further extending V&V research in the physical and engineering sciences toward a broader program of model evaluation in situations of high consequence decision-making.

  4. Nuclear Proliferation Using Laser Isotope Separation -- Verification Options

    SciTech Connect (OSTI)

    Erickson, S A

    2001-10-15

    Two levels of nonproliferation verification exist. Signatories of the basic agreements under the Nuclear Non-proliferation Treaty (NPT) agree to open their nuclear sites to inspection by the IAEA. A more detailed and intrusive level was developed following the determination that Iraq had begun a nuclear weapons development program that was not detected by the original level of verification methods. This level, referred to as 93+2 and detailed in model protocol INFCIRC/540, allows the IAEA to do environmental monitoring of non-declared facilities that are suspected of containing proliferation activity, and possibly further inspections, as well as allowing more detailed inspections of declared sites. 56 countries have signed a Strengthened Safeguards Systems Additional Protocol as of 16 July 2001. These additional inspections can be done on the instigation of the IAEA itself, or after requests by other parties to the NPT, based on information that they have collected. Since information able to cause suspicion of proliferation could arrive at any country, it is important that countries have procedures in place that will assist them in making decisions related to these inspections. Furthermore, IAEA inspection resources are limited, and therefore care needs to be taken to make best use of these resources. Most of the nonproliferation verification inspections may be concentrated on establishing that diversion of nuclear materials is not occurring, but some fraction will be related to determining if undeclared sites have nuclear materials production taking place within them. Of these, most suspicions will likely be related to the major existing technologies for uranium enrichment and reprocessing for plutonium extraction, as it would seem most likely that nations attempting proliferation would use tested means of producing nuclear materials. However, as technology continues to advance and new methods of enrichment and reprocessing are developed, inspection-related procedures will need to be adapted to keep up with them. In order to make 93+2 inspections more useful, a systematic way of finding clues to nuclear proliferation would be useful. Also, to cope with the possible use of newer technology for proliferation, the list of clues might need to be expanded. This paper discusses the development and recognition of such clues. It concentrates on laser isotope separation (LIS) as a new proliferation technology, and uses Uranium Atomic Vapor Laser Isotope Separation (U-AVLIS) as an example of LIS that is well known.

  5. First-order finite satisfiability vs tree automata in safety verification

    E-Print Network [OSTI]

    Lisitsa, Alexei

    2011-01-01

    In this paper we deal with verification of safety properties of term-rewriting systems. The verification problem is translated to a purely logical problem of finding a finite countermodel for a first-order formula, which further resolved by a generic finite model finding procedure. A finite countermodel produced during successful verification provides with a concise description of the system invariant sufficient to demonstrate a specific safety property. We show the relative completeness of this approach with respect to the tree automata completion technique. On a set of examples taken from the literature we demonstrate the efficiency of finite model finding approach as well as its explanatory power.

  6. Strategies to Address Global Warming Is Sundance Kid a Criminal?

    E-Print Network [OSTI]

    Hansen, James E.

    Strategies to Address Global Warming & Is Sundance Kid a Criminal? Jim Hansen In my opinion, it is still feasible to solve the global warming problem before we pass tipping points that would guarantee ppm yields global warming about 2°C (3.6°F) above the preindustrial level. Such a level of atmospheric

  7. Address Lot Description 981 MADISON DR A PARKING LOT

    E-Print Network [OSTI]

    Arnold, Elizabeth A.

    Address Lot Description 981 MADISON DR A PARKING LOT 156 BLUESTONE DR A PARKING LOT EXTENDED 810 MADISON DR B PARKING LOT 897 UNIVERSITY BLVD C PARKING LOT 1170 HARRISON ST C1 PARKING LOT 1161 HARRISON ST C2 PARKING LOT 761 DUKE DRIVE C3 PARKING LOT 441 MARTIN LUTHER KING JR WAY C4 PARKING LOT 650 DUKE

  8. how new hampshire's coastal watershed communities are addressing growth

    E-Print Network [OSTI]

    New Hampshire, University of

    how new hampshire's coastal watershed communities are addressing growth Setting Goals, Redefining Boundaries #12;Amanda Stone, NROC Coordinator University of New Hampshire Cooperative Extension 36 County University of New Hampshire Cooperative Extension/ New Hampshire Sea Grant Kingman Farm University of New

  9. Nathan L. B. Bangs ADDRESS Institute for Geophysics

    E-Print Network [OSTI]

    Yang, Zong-Liang

    Nathan L. B. Bangs ADDRESS Institute for Geophysics The University of Texas Pickle Research Campus@utig.ig.utexas.edu EDUCATION B.A. Williams College, 1983, Geology and Physics M.A. Columbia University, 1986, Marine Geophysics M. Phil. Columbia University, 1987, Marine Geophysics Ph.D. Columbia University, 1991, Marine

  10. Resilience and Water Governance Addressing Fragmentation and Uncertainty in Water

    E-Print Network [OSTI]

    Control Act, commonly known as the Clean Water Act (CWA), to dean up point source discharges fromFIVE Resilience and Water Governance Addressing Fragmentation and Uncertainty in Water Allocation and Water Quality Law BARBARA A. COSENS AND CRAIG A. STOW The U.S. EPA reports that almost half

  11. * Corresponding author address: Jrg Schweizer, WSL Institute for Snow and

    E-Print Network [OSTI]

    Jamieson, Bruce

    ___________________ * Corresponding author address: Jürg Schweizer, WSL Institute for Snow Institute for Snow and Avalanche Research SLF, Davos, Switzerland 2 Department of Geological Sciences of Calgary, Calgary AB, Canada ABSTRACT: The release of a dry-snow slab avalanche is preceded by a series

  12. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema (OSTI)

    Eric Isaccs

    2010-01-08

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  13. Saturday's Auctions Suburb Address Type Price Result Agent

    E-Print Network [OSTI]

    Peters, Richard

    Saturday's Auctions Suburb Address Type Price Result Agent Ascot Park 7 Joy St 2 br h N/A PN RW: 47 Number Reported Auctions: 30 Sold: 24 Withdrawn: N/A % Cleared: 80 % Total Sales: $11 Clearance Rate methodology please click here For a more comprehensive list of results covering all reported

  14. 31 August 2004 Comp120 Fall 2004 1 Email addresses

    E-Print Network [OSTI]

    Bishop, Gary

    1 31 August 2004 Comp120 Fall 2004 1 August 31 · Email addresses · Drop box · Questions? 31 August 2004 Comp120 Fall 2004 2 The Really Big Ideas · Just bits for data and program · Program is a sequence of "variables" (registers) 31 August 2004 Comp120 Fall 2004 3 Just Bits · Program and data have the same

  15. Commerce Office Addresses 2 Export Administration Regulations January 2001

    E-Print Network [OSTI]

    Bernstein, Daniel

    Commerce Office Addresses 2 Export Administration Regulations January 2001 OFFICES OF EXPORT Division Office of Export Enforcement P.O. Box 70 Washington, D.C. 20044 Telefax: 202/482-5889 Telephone No of Export Enforcement P.O. Box 70 Washington, DC 20044 Telefax: 202-482-0964 Telephone No: 202/482- 2252

  16. Aligning Technology Solutions to Address Over-the-Horizon Threats

    E-Print Network [OSTI]

    Aligning Technology Solutions to Address Over-the-Horizon Threats As the world's geopolitical for the U.S. Government bridging the gap between policy development and technology implementation WHAT WE-the-horizon security threats and issues Analysis results to support U.S. policymakers and the science and technology

  17. Curriculum Vitae for Richard E. Nisbett Address: Department of Psychology

    E-Print Network [OSTI]

    Lustig, Cindy

    Curriculum Vitae for Richard E. Nisbett March 2004 Address: Department of Psychology The University- Theodore M. Newcomb Distinguished University Professor, 1992- Theodore M. Newcomb Professor of Psychology Scientist, Research Center for Group Dynamics, 1978-1997. Professor of Psychology, 1976-. Associate

  18. Willie Harris Address: Soil and Water Science Department

    E-Print Network [OSTI]

    Balser, Teri C.

    .G. Harris. 1994. Quantitative thermal analysis of soil minerals. p. 360-411. In J. Ammonette and L. In M. Sumner (ed.) Handbook of soil science. Rhue, R.D., and Harris, W.G. 1999. Phosphorus sorption/desorption1 Willie Harris Address: Soil and Water Science Department 2169 McCarty Hall University of Florida

  19. I. PROBLEM ADDRESSED In recent years, global warming, depleting conventional

    E-Print Network [OSTI]

    Ramakrishnan, Naren

    such as solar panels, wind turbines or diesel generators. Typically, and more so recently dueI. PROBLEM ADDRESSED In recent years, global warming, depleting conventional sources of energy physical and operational state, including environmental sensor data (e.g. temperature), operational state

  20. Name Address Alumnae Hall 91 Alumnae Dr. EG

    E-Print Network [OSTI]

    Arnold, Elizabeth A.

    Name Address Alumnae Hall 91 Alumnae Dr. EG Anthony-Seeger Hall 821 S. Main EG Ashby Hall 50 Bluestone Dr. AUX Burruss Hall 820 Madison Dr. EG Cleveland Hall 61 E. Grace EG Converse Hall 30 Bluestone Dr. AUX Duke Hall 820 S. Main EG Mr. Chips Convenience Store 190 Bluestone Dr. AUX Frederikson Hall

  1. Pointers and Structures in C Variables that hold memory addresses

    E-Print Network [OSTI]

    1 Pointers and Structures in C Chapter 4 2 Overview · Pointers · Variables that hold memory addresses · Using pointers to do "call-by-reference" in C · Struct · Multiple values grouped together · Dereferencing to access individual elements #12;3 Exercise: Write a swap function void swap(int x, int y

  2. Using Social Networks to Harvest Email Addresses Iasonas Polakis

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    campaigns. Our blind harvest- ing technique uses names collected from the Facebook and Twitter networks available in Twitter to narrow down the search space and, by utilizing the Facebook email search functionality, we are able to successfully map 43.4% of the user profiles to their actual email address

  3. Math Learning Center Undergraduate Tutor Application LOCAL/ Bozeman address: Phone

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    Math Learning Center Undergraduate Tutor Application Name: ID# LOCAL/ Bozeman address: Phone: City Rosenstein in the Math Department. (Email: sabrina.rosenstein@montana.edu) Name of reference Please list all the college math courses you have taken and the grade received. In the space below, discuss your reasons

  4. Arts and Sciences Annual Faculty Address March 3, 2008

    E-Print Network [OSTI]

    1 Arts and Sciences Annual Faculty Address March 3, 2008 Carol Folt, Dean of the Faculty (Note ­ everywhere, you experience a campus exploding with energy, optimism and ambition. Record numbers of talented intolerance, global political, economic and environmental instability are prevalent. The outlook for millions

  5. An Information Theoretic Location Verification System for Wireless Networks

    E-Print Network [OSTI]

    Yan, Shihao; Nevat, Ido; Peters, Gareth W

    2012-01-01

    As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No "malicious decision" to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, wh...

  6. Pulsar Magnetic Field Oscillation Model and Verification Method

    E-Print Network [OSTI]

    Zhu-Xing Liang; Yi Liang

    2014-05-06

    We constructed the magnetic field oscillation model (hereafter the MO model) by analogizing the periodically reversing phenomenon of the solar magnetic field to pulsars. Almost all kinds of pulsar radiation phenomena are best explained using the MO model, especially polarization characteristics, glitch, generation rate, the geodetic precession of pulsars and the configuration of pulsar-wind nebula of the Crab. The MO model also provides satisfactory explanation for other characteristics of pulsars, e.g., interpulse, spin-down, pulse nulling, beat and pulse drift, the loss rate of the rotating energy, and the accuracy of frequency. We present eight verification methods for the MO model. In addition to pulsars, our MO model can also be used to explain the pulse emission from non-compact stars such as the ultracool dwarf TVLM 513-46546 and the magnetic chemically peculiar star CU Virginis.

  7. Shell Element Verification & Regression Problems for DYNA3D

    SciTech Connect (OSTI)

    Zywicz, E

    2008-02-01

    A series of quasi-static regression/verification problems were developed for the triangular and quadrilateral shell element formulations contained in Lawrence Livermore National Laboratory's explicit finite element program DYNA3D. Each regression problem imposes both displacement- and force-type boundary conditions to probe the five independent nodal degrees of freedom employed in the targeted formulation. When applicable, the finite element results are compared with small-strain linear-elastic closed-form reference solutions to verify select aspects of the formulations implementation. Although all problems in the suite depict the same geometry, material behavior, and loading conditions, each problem represents a unique combination of shell formulation, stabilization method, and integration rule. Collectively, the thirty-six new regression problems in the test suite cover nine different shell formulations, three hourglass stabilization methods, and three families of through-thickness integration rules.

  8. Scope and verification of a Fissile Material (Cutoff) Treaty

    SciTech Connect (OSTI)

    Hippel, Frank N. von [Program on Science and Global Security, Princeton University, 221 Nassau St., 2nd floor, Princeton, NJ 08542 (United States)

    2014-05-09

    A Fissile Material Cutoff Treaty (FMCT) would ban the production of fissile material - in practice highly-enriched uranium and separated plutonium - for weapons. It has been supported by strong majorities in the United Nations. After it comes into force, newly produced fissile materials could only be produced under international - most likely International Atomic Energy Agency - monitoring. Many non-weapon states argue that the treaty should also place under safeguards pre-existing stocks of fissile material in civilian use or declared excess for weapons so as to make nuclear-weapons reductions irreversible. This paper discusses the scope of the FMCT, the ability to detect clandestine production and verification challenges in the nuclear-weapons states.

  9. Battery Technology Life Verification Test Manual Revision 1

    SciTech Connect (OSTI)

    Jon P. Christophersen

    2012-12-01

    The purpose of this Technology Life Verification Test (TLVT) Manual is to help guide developers in their effort to successfully commercialize advanced energy storage devices such as battery and ultracapacitor technologies. The experimental design and data analysis discussed herein are focused on automotive applications based on the United States Advanced Battery Consortium (USABC) electric vehicle, hybrid electric vehicle, and plug-in hybrid electric vehicle (EV, HEV, and PHEV, respectively) performance targets. However, the methodology can be equally applied to other applications as well. This manual supersedes the February 2005 version of the TLVT Manual (Reference 1). It includes criteria for statistically-based life test matrix designs as well as requirements for test data analysis and reporting. Calendar life modeling and estimation techniques, including a user’s guide to the corresponding software tool is now provided in the Battery Life Estimator (BLE) Manual (Reference 2).

  10. ITOUGH2 V3.2 verification and validation report

    SciTech Connect (OSTI)

    Finsterle, S.

    1998-06-01

    This report describes the Verification and Validation (V and V) test cases performed to qualify ITOUGH2 V3.2. ITOUGH2 V3.2 was installed in a directory {approximately}/itough2v3.2 on a SUN ULTRA 1 workstation under UNIX Solaris 2. Instructions for installing ITOUGH2 can be found in file read.me and the user`s manual. This report is structured as follows: for each functional requirement, the corresponding design is described, which may include the mathematical model implemented in ITOUGH2 V3.2, if appropriate. Next, the author discusses the test case or sequence of test cases performed to validate each requirement, followed by a description of the test results and their compliance with the acceptance criteria. ITOUGH2 simulates fluid flow in fractures.

  11. The new geospatial tools: global transparency enhancing safeguards verification

    SciTech Connect (OSTI)

    Pabian, Frank Vincent [Los Alamos National Laboratory

    2010-09-16

    This paper focuses on the importance and potential role of the new, freely available, geospatial tools for enhancing IAEA safeguards and how, together with commercial satellite imagery, they can be used to promote 'all-source synergy'. As additional 'open sources', these new geospatial tools have heralded a new era of 'global transparency' and they can be used to substantially augment existing information-driven safeguards gathering techniques, procedures, and analyses in the remote detection of undeclared facilities, as well as support ongoing monitoring and verification of various treaty (e.g., NPT, FMCT) relevant activities and programs. As an illustration of how these new geospatial tools may be applied, an original exemplar case study provides how it is possible to derive value-added follow-up information on some recent public media reporting of a former clandestine underground plutonium production complex (now being converted to a 'Tourist Attraction' given the site's abandonment by China in the early 1980s). That open source media reporting, when combined with subsequent commentary found in various Internet-based Blogs and Wikis, led to independent verification of the reporting with additional ground truth via 'crowdsourcing' (tourist photos as found on 'social networking' venues like Google Earth's Panoramio layer and Twitter). Confirmation of the precise geospatial location of the site (along with a more complete facility characterization incorporating 3-D Modeling and visualization) was only made possible following the acquisition of higher resolution commercial satellite imagery that could be correlated with the reporting, ground photos, and an interior diagram, through original imagery analysis of the overhead imagery.

  12. Guidelines on Airflow and Refrigerant Charge Verification and Diagnostics

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question "HVAC proper installation energy savings: over-promising or under-delivering?"

  13. Scalable Analysis, Verification and Design of IC Power Delivery 

    E-Print Network [OSTI]

    Zeng, Zhiyu

    2012-02-14

    . This dissertation presents new methodologies to address these challenging problems. At first, a novel parallel partitioning-based approach which provides a flexible network partitioning scheme using locality is proposed for power grid static analysis. In addition...

  14. Under consideration for publication in Formal Aspects of Computing Concurrent Software Verification with

    E-Print Network [OSTI]

    Ouaknine, Joël

    , Oxford, UK Abstract. We present a framework for model checking concurrent software systems which powerful verification techniques, counterexample-guided abstraction refinement and compositional reasoning with hardware and communication proto- cols, model checking is increasingly used to verify software systems

  15. U.S. EPA Environmental Technology Verification (ETV) Program Advanced Monitoring Systems (AMS) Center

    E-Print Network [OSTI]

    for verification of water monitoring technologies: #12;2 Evaluation of Nitrate Sensors for Groundwater Remediation interested in testing. Oklahoma Department of Agriculture has sites for the nitrate sensor evaluation

  16. Independent Verification Survey Report for the Operable Unit-1 Miamisburg Closure Project, Miamisburg, OH

    SciTech Connect (OSTI)

    Weaver, P.

    2008-03-17

    The objectives of the independent verification survey were to confirm that remedial actions have been effective in meeting established release criteria and that documentation accurately and adequately describes the current radiological and chemical conditions of the MCP site.

  17. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOE Patents [OSTI]

    Foo Kune, Denis (Saint Paul, MN); Mahadevan, Karthikeyan (Mountain View, CA)

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  18. Revisiting the security of speaker verification systems against imposture using synthetic speech 

    E-Print Network [OSTI]

    De Leon, P. L.; Apsingekar, V. R.; Pucher, M.; Yamagishi, Junichi

    2010-01-01

    In this paper, we investigate imposture using synthetic speech. Although this problem was first examined over a decade ago, dramatic improvements in both speaker verification (SV) and speech synthesis have renewed ...

  19. Field Scale Test and Verification of CHP System at the Ritz Carlton, San Francisco, August 2007

    Broader source: Energy.gov [DOE]

    ITP Industrial Distributed Energy: National Account Energy Alliance Final Report for the Field Scale Test and Verification of a PureComfort® 240M Combined Heat and Power System at the Ritz Carlton, San Francisco

  20. A Platform Architecture for Sensor Data Processing and Verification in Buildings

    E-Print Network [OSTI]

    Ortiz, Jorge Jose

    2013-01-01

    Functionality and Metadata 6.1 Verification through Sensorinformation such as the metadata of sensors. The labels “A-of SBS using the sensor metadata (i.e. device types and

  1. A Platform Architecture for Sensor Data Processing and Verification in Buildings

    E-Print Network [OSTI]

    Ortiz, Jorge Jose

    2013-01-01

    associated metadata for each sensor in the building. TheseMetadata Verification through Sensor Data Every system that manages data in the buildingAND METADATA Building Todai KETI No. Sensors No. Types

  2. Application of functional learning to ATPG and design verification for combinational circuits 

    E-Print Network [OSTI]

    Mukherjee, Rajarshim

    1994-01-01

    to detect faults and in detecting redundant faults. Learning techniques have also been effectively applied to the problem of design verification for combinational circuits. This paper presents Functional Learning, a new method of learning, based...

  3. Memory Usage Verification for OO Programs Wei-Ngan Chin1,2

    E-Print Network [OSTI]

    Rinard, Martin

    to precisely capture these correlations. C. Hankin and I. Siveroni (Eds.): SAS 2005, LNCS 3672, pp. 70­86, 2005. c Springer-Verlag Berlin Heidelberg 2005 #12;Memory Usage Verification for OO Programs 71 ­ Heap

  4. Draft M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0)

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal, state, and local government energy managers and procurement officials and utility and energy service providers.

  5. M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 3.0)

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  6. Better Buildings Alliance, Advanced Rooftop Unit Campaign: Rooftop Unit Measurement and Verification (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-09-01

    This document provides facility managers and building owners an introduction to measurement and verification (M&V) methods to estimate energy and cost savings of rooftop units replacement or retrofit projects to estimate paybacks or to justify future projects.

  7. Investigating Correlated Neutrons from Pulsed Photonuclear Interrogation for Treaty Verification Applications 

    E-Print Network [OSTI]

    Stewart, Scott

    2013-06-03

    support future U.S. verification missions. A technology employing pulses of high-energy photons from an electron linear accelerator is one technique under consideration. High-energy photons are advantageous as an interrogation source because they penetrate...

  8. Conditions Affecting the Relationship between Power and Identity Verification in Power Imbalanced Dyads 

    E-Print Network [OSTI]

    Davis, Jennifer 1983-

    2012-12-10

    In the present study, I look at the relationship between power and identity verification and the conditions under which this relationship can be disrupted. Specifically, I look at the role of information in disrupting power differences within...

  9. POSTER: Secure Path Verification using Mobility-Differentiated ToA

    E-Print Network [OSTI]

    Lenders, Vincent

    POSTER: Secure Path Verification using Mobility-Differentiated ToA Matthias Schäfer Vincent Lenders@cs.uni-kl.de vincent.lenders@armasuisse.ch jschmitt@cs.uni-kl.de ABSTRACT In this poster, we generalize the problem

  10. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  11. Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProject Develops Student-StakeholdersProtocol for Addressing Induced Seismicity

  12. SECTION J, APPENDIX A - SOW

    National Nuclear Security Administration (NNSA)

    and improve the industrial competitiveness and national security of the United States. Section J, Appendix A, Page 19 (Replaced Mod 002; Modified Mod 016; Replaced Mod...

  13. SECTION J, APPENDIX A - SOW

    National Nuclear Security Administration (NNSA)

    and improve the industrial competitiveness and national security of the United States. Section J, Appendix A, Page 17 Request for Proposal No. DE-SOL-0007749 CHAPTER...

  14. PART III-SECTION J

    National Nuclear Security Administration (NNSA)

    During Transition. The Contractor shall invoice for reimbursement of Transition Plan costs in accordance with Section G, G-7, Invoicing for Transition Costs, paragraph (b)....

  15. NEW APPROACH TO ADDRESSING GAS GENERATION IN RADIOACTIVE MATERIAL PACKAGING

    SciTech Connect (OSTI)

    Watkins, R; Leduc, D; Askew, N

    2009-06-25

    Safety Analysis Reports for Packaging (SARP) document why the transportation of radioactive material is safe in Type A(F) and Type B shipping containers. The content evaluation of certain actinide materials require that the gas generation characteristics be addressed. Most packages used to transport actinides impose extremely restrictive limits on moisture content and oxide stabilization to control or prevent flammable gas generation. These requirements prevent some users from using a shipping container even though the material to be shipped is fully compliant with the remaining content envelope including isotopic distribution. To avoid these restrictions, gas generation issues have to be addressed on a case by case basis rather than a one size fits all approach. In addition, SARP applicants and review groups may not have the knowledge and experience with actinide chemistry and other factors affecting gas generation, which facility experts in actinide material processing have obtained in the last sixty years. This paper will address a proposal to create a Gas Generation Evaluation Committee to evaluate gas generation issues associated with Safety Analysis Reports for Packaging material contents. The committee charter could include reviews of both SARP approved contents and new contents not previously evaluated in a SARP.

  16. Regional Seminars to Address Current Nuclear Export Control Issues

    SciTech Connect (OSTI)

    Killinger, Mark H.

    2002-07-01

    The control of nuclear-related exports, a critical component of the nonproliferation regime, is facing several opportunities and challenges. As countries sign and ratify the International Atomic Energy Agency's (IAEA) safeguards Additional Protocol (AP), they will begin to report far more export information, including exports of a list of items similar to the Nuclear Supplier Group's Trigger List that existed when the AP was developed in the mid-1990s. This positive development contrasts with challenges such as globalization, transshipments, and tracking of end-uses. Pacific Northwest National Laboratory is proposing that the US Department of Energy (DOE) develop regional seminars that address these types of issues related to export/import controls. The DOE seminars would be designed to supplement regional seminars sponsored by the IAEA and member states on topics related to the Additional Protocol (referred to as "IAEA seminars"). The topic of nuclear export/import controls is not thoroughly addressed in the IAEA seminars. The proposed DOE seminars would therefore have two objectives: familiarizing countries with the export/import provisions of the Additional Protocol, and addressing challenges such as those noted above. The seminars would be directed particularly at countries that have not ratified the AP, and at regions where export-related problems are particularly prevalent. The intent is to encourage governments to implement more effective nuclear export control systems that meet the challenges of the 21st century.

  17. Table Of Contents Section: Page

    E-Print Network [OSTI]

    US Army Corps of Engineers

    EM 385-1-1 XX Sep 13 i Section 2 SANITATION Table Of Contents Section: Page 02.A General Water......................................................... 2-1 02.D Non-Potable Water and openings. 02.C DRINKING WATER #12;EM 385-1-1 XX Sep 13 2-2 02.C.01 An adequate supply of potable water

  18. INDEPENDENT VERIFICATION SURVEY REPORT FOR ZONE 1 OF THE EAST TENNESSEE TECHNOLOGY PARK IN OAK RIDGE, TENNESSEE

    SciTech Connect (OSTI)

    King, David A.

    2012-08-16

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs).

  19. Greening Industrial Facilities: A Sustainable Approach to Addressing Energy Concerns 

    E-Print Network [OSTI]

    Love, D.

    2008-01-01

    savings of $3.9 million related to energy reductions. xxxvi Six Sigma and Lean Manufacturing ?Six Sigma and Lean Manufacturing practices can be used to address energy efficiency and assure return on investment. For example, 3M?s Brownwood, Texas... facility recently completed a Six Sigma project that improved the operation of the thermal oxidizer, while minimizing the amount of natural gas the unit uses. The project saved $212,000 in the first year alone and also saved 6,808 million BTUs of energy...

  20. A novel electron gun with an independently addressable cathode array.

    SciTech Connect (OSTI)

    Rudys, Joseph Matthew; Reed, Kim Warren; Peña, Gary Edward; Schneider, Larry X.

    2006-08-01

    The design of a novel electron gun with an array of independently addressable cathode elements is presented. Issues relating to operation in a 6.5 Tesla axial magnetic field are discussed. Simulations with the TriComp [1] electromagnetic field code that were used to determine the space charge limited tube characteristic and to model focusing of the electron beam in the magnetic field are reviewed. Foil heating and stress calculations are discussed. The results of CYLTRAN [2] simulations yielding the energy spectrum of the electron beam and the current transmitted through the foil window are presented.

  1. Robust Dynamical Decoupling Sequences for Individual Nuclear Spin Addressing

    E-Print Network [OSTI]

    J. Casanova; J. F. Haase; Z. -Y. Wang; M. B. Plenio

    2015-06-11

    We propose the use of non-equally spaced decoupling pulses for high-resolution selective addressing of nuclear spins by a quantum sensor. The analytical model of the basic operating principle is supplemented by detailed numerical studies that demonstrate the high degree of selectivity and the robustness against static and dynamic control field errors of this scheme. We exemplify our protocol with an NV center-based sensor to demonstrate that it enables the identification of individual nuclear spins that form part of a large spin ensemble.

  2. Imulation of polymer forming processes - addressing industrial needs

    SciTech Connect (OSTI)

    Thibault, F.; DiRaddo, R. [Industrial Materials Institute-National Research Council (Canada)

    2011-05-04

    The objective of this paper is to present the development of simulation and design optimization capabilities, for polymer forming processes, in the context of addressing industrial needs. Accomplishments generated from close to twenty years of research in this field, at the National Research Council (NRC), are presented. Polymer forming processes such as extrusion blow moulding, stretch blow moulding and thermoforming have been the focus of the work, yet the research is extendable to similar polymer forming operations such as micro-blow moulding, sheet blow moulding and composites stamping. The research considers material models, process sequence integration and design optimization, derivative processes and 3D finite elements with multi-body contact.

  3. Content-addressable memory based enforcement of configurable policies

    DOE Patents [OSTI]

    Berg, Michael J

    2014-05-06

    A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.

  4. Robust Dynamical Decoupling Sequences for Individual Nuclear Spin Addressing

    E-Print Network [OSTI]

    J. Casanova; Z. -Y. Wang; J. F. Haase; M. B. Plenio

    2015-10-10

    We propose the use of non-equally spaced decoupling pulses for high-resolution selective addressing of nuclear spins by a quantum sensor. The analytical model of the basic operating principle is supplemented by detailed numerical studies that demonstrate the high degree of selectivity and the robustness against static and dynamic control field errors of this scheme. We exemplify our protocol with an NV center-based sensor to demonstrate that it enables the identification of individual nuclear spins that form part of a large spin ensemble.

  5. Keynote Address: Update on Environmental Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S. DepartmentJeanKey Meeting Takeaways from 201440PM toAddress:

  6. Moving Forward to Address Nuclear Waste Storage and Disposal | Department

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving Forward to Address Nuclear Waste Storage and

  7. Review of Evaluation, Measurement and Verification Approaches Used to Estimate the Load Impacts and Effectiveness of Energy Efficiency Programs

    SciTech Connect (OSTI)

    none,

    2012-04-01

    Provides an overview of evaluation, measurement, and verification approaches used to estimate the load impacts and effectiveness of energy efficiency programs.

  8. Comment submitted by the Air Conditioning, Heating and Refrigeration Institute (AHRI) regarding the Energy Star Verification Testing Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document is a comment submitted by the Air Conditioning, Heating and Refrigeration Institute (AHRI) regarding the Energy Star Verification Testing Program

  9. Comment submitted by the North American Association of Food Equipment Manufacturers (NAFEM) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the North American Association of Food Equipment Manufacturers (NAFEM) regarding the Energy Star Verification Testing Program

  10. Verification of the CENTRM Module for Adaptation of the SCALE Code to NGNP Prismatic and PBR Core Designs

    SciTech Connect (OSTI)

    Ganapol, Barry; Maldonado, Ivan

    2014-01-23

    The generation of multigroup cross sections lies at the heart of the very high temperature reactor (VHTR) core design, whether the prismatic (block) or pebble-bed type. The design process, generally performed in three steps, is quite involved and its execution is crucial to proper reactor physics analyses. The primary purpose of this project is to develop the CENTRM cross-section processing module of the SCALE code package for application to prismatic or pebble-bed core designs. The team will include a detailed outline of the entire processing procedure for application of CENTRM in a final report complete with demonstration. In addition, they will conduct a thorough verification of the CENTRM code, which has yet to be performed. The tasks for this project are to: Thoroughly test the panel algorithm for neutron slowing down; Develop the panel algorithm for multi-materials; Establish a multigroup convergence 1D transport acceleration algorithm in the panel formalism; Verify CENTRM in 1D plane geometry; Create and test the corresponding transport/panel algorithm in spherical and cylindrical geometries; and, Apply the verified CENTRM code to current VHTR core design configurations for an infinite lattice, including assessing effectiveness of Dancoff corrections to simulate TRISO particle heterogeneity.

  11. Cosmology from Cosmic Shear with DES Science Verification Data

    E-Print Network [OSTI]

    Abbott, T; Allam, S; Amara, A; Annis, J; Armstrong, R; Bacon, D; Banerji, M; Bauer, A H; Baxter, E; Becker, M R; Benoit-Lévy, A; Bernstein, R A; Bernstein, G M; Bertin, E; Blazek, J; Bonnett, C; Bridle, S L; Brooks, D; Bruderer, C; Buckley-Geer, E; Burke, D L; Busha, M T; Capozzi, D; Rosell, A Carnero; Kind, M Carrasco; Carretero, J; Castander, F J; Chang, C; Clampitt, J; Crocce, M; Cunha, C E; D'Andrea, C B; da Costa, L N; Das, R; DePoy, D L; Desai, S; Diehl, H T; Dietrich, J P; Dodelson, S; Doel, P; Drlica-Wagner, A; Efstathiou, G; Eifler, T F; Erickson, B; Estrada, J; Evrard, A E; Neto, A Fausti; Fernandez, E; Finley, D A; Flaugher, B; Fosalba, P; Friedrich, O; Frieman, J; Gangkofner, C; Garcia-Bellido, J; Gaztanaga, E; Gerdes, D W; Gruen, D; Gruendl, R A; Gutierrez, G; Hartley, W; Hirsch, M; Honscheid, K; Huff, E M; Jain, B; James, D J; Jarvis, M; Kacprzak, T; Kent, S; Kirk, D; Krause, E; Kravtsov, A; Kuehn, K; Kuropatkin, N; Kwan, J; Lahav, O; Leistedt, B; Li, T S; Lima, M; Lin, H; MacCrann, N; March, M; Marshall, J L; Martini, P; McMahon, R G; Melchior, P; Miller, C J; Miquel, R; Mohr, J J; Neilsen, E; Nichol, R C; Nicola, A; Nord, B; Ogando, R; Palmese, A; Peiris, H V; Plazas, A A; Refregier, A; Roe, N; Romer, A K; Roodman, A; Rowe, B; Rykoff, E S; Sabiu, C; Sadeh, I; Sako, M; Samuroff, S; Sánchez, C; Sanchez, E; Seo, H; Sevilla-Noarbe, I; Sheldon, E; Smith, R C; Soares-Santos, M; Sobreira, F; Suchyta, E; Swanson, M E C; Tarle, G; Thaler, J; Thomas, D; Troxel, M A; Vikram, V; Walker, A R; Wechsler, R H; Weller, J; Zhang, Y; Zuntz, J

    2015-01-01

    We present the first constraints on cosmology from the Dark Energy Survey (DES), using weak lensing measurements from the preliminary Science Verification (SV) data. We use 139 square degrees of SV data, which is less than 3\\% of the full DES survey area. Using cosmic shear 2-point measurements over three redshift bins we find $\\sigma_8 (\\Omega_{\\rm m}/0.3)^{0.5} = 0.81 \\pm 0.06$ (68\\% confidence), after marginalising over 7 systematics parameters and 3 other cosmological parameters. We examine the robustness of our results to the choice of data vector and systematics assumed, and find them to be stable. About $20$\\% of our error bar comes from marginalising over shear and photometric redshift calibration uncertainties. The current state-of-the-art cosmic shear measurements from CFHTLenS are mildly discrepant with the cosmological constraints from Planck CMB data; our results are consistent with both datasets. Our uncertainties are $\\sim$30\\% larger than those from CFHTLenS when we carry out a comparable anal...

  12. Weak lensing by galaxy troughs in DES Science Verification data

    E-Print Network [OSTI]

    Gruen, D; Amara, A; Bacon, D; Bonnett, C; Hartley, W; Jain, B; Jarvis, M; Kacprzak, T; Krause, E; Mana, A; Rozo, E; Rykoff, E S; Seitz, S; Sheldon, E; Troxel, M A; Vikram, V; Abbott, T; Abdalla, F B; Allam, S; Armstrong, R; Banerji, M; Bauer, A H; Becker, M R; Benoit-Levy, A; Bernstein, G M; Bernstein, R A; Bertin, E; Bridle, S L; Brooks, D; Buckley-Geer, E; Burke, D L; Capozzi, D; Rosell, A Carnero; Kind, M Carrasco; Carretero, J; Crocce, M; Cunha, C E; D'Andrea, C B; da Costa, L N; DePoy, D L; Desai, S; Diehl, H T; Dietrich, J P; Doel, P; Eifler, T F; Neto, A Fausti; Fernandez, E; Flaugher, B; Fosalba, P; Frieman, J; Gerdes, D W; Gruendl, R A; Gutierrez, G; Honscheid, K; James, D J; Kuehn, K; Kuropatkin, N; Lahav, O; Li, T S; Lima, M; Maia, M A G; March, M; Martini, P; Melchior, P; Miller, C J; Miquel, R; Mohr, J J; Nord, B; Ogando, R; Plazas, A A; Reil, K; Romer, A K; Roodman, A; Sako, M; Sanchez, E; Scarpine, V; Schubnell, M; Sevilla-Noarbe, I; Smith, R C; Soares-Santos, M; Sobreira, F; Suchyta, E; Swanson, M E C; Tarle, G; Thaler, J; Thomas, D; Walker, A R; Wechsler, R H; Weller, J; Zhang, Y; Zuntz, J

    2015-01-01

    We measure the weak lensing shear around galaxy troughs, i.e. the radial alignment of background galaxies relative to underdensities in projections of the foreground galaxy field over a wide range of redshift in Science Verification data from the Dark Energy Survey. Our detection of the shear signal is highly significant (10 to 15sigma for the smallest angular scales) for troughs with the redshift range z in [0.2,0.5] of the projected galaxy field and angular diameters of 10'...1{\\deg}. These measurements probe the connection between the galaxy, matter density, and convergence fields. By assuming galaxies are biased tracers of the matter density with Poissonian noise, we find agreement of our measurements with predictions in a fiducial LambdaCDM model. The prediction for the lensing signal on large trough scales is virtually independent of the details of the underlying model for the connection of galaxies and matter. Our comparison of the shear around troughs with that around cylinders with large galaxy count...

  13. Cosmic Shear Measurements with DES Science Verification Data

    E-Print Network [OSTI]

    Becker, M R; MacCrann, N; Krause, E; Eifler, T F; Friedrich, O; Nicola, A; Refregier, A; Amara, A; Bacon, D; Bernstein, G M; Bonnett, C; Bridle, S L; Busha, M T; Chang, C; Dodelson, S; Erickson, B; Evrard, A E; Frieman, J; Gaztanaga, E; Gruen, D; Hartley, W; Jain, B; Jarvis, M; Kacprzak, T; Kirk, D; Kravtsov, A; Leistedt, B; Rykoff, E S; Sabiu, C; Sanchez, C; Seo, H; Sheldon, E; Wechsler, R H; Zuntz, J; Abbott, T; Abdalla, F B; Allam, S; Armstrong, R; Banerji, M; Bauer, A H; Benoit-Levy, A; Bertin, E; Brooks, D; Buckley-Geer, E; Burke, D L; Capozzi, D; Rosell, A Carnero; Kind, M Carrasco; Carretero, J; Castander, F J; Crocce, M; Cunha, C E; D'Andrea, C B; da Costa, L N; DePoy, D L; Desai, S; Diehl, H T; Dietrich, J P; Doel, P; Neto, A Fausti; Fernandez, E; Finley, D A; Flaugher, B; Fosalba, P; Gerdes, D W; Gruendl, R A; Gutierrez, G; Honscheid, K; James, D J; Kuehn, K; Kuropatkin, N; Lahav, O; Li, T S; Lima, M; Maia, M A G; March, M; Martini, P; Melchior, P; Miller, C J; Miquel, R; Mohr, J J; Nichol, R C; Nord, B; Ogando, R; Plazas, A A; Reil, K; Romer, A K; Roodman, A; Sako, M; Sanchez, E; Scarpine, V; Schubnell, M; Sevilla-Noarbe, I; Smith, R C; Soares-Santos, M; Sobreira, F; Suchyta, E; Swanson, M E C; Tarle, G; Thaler, J; Thomas, D; Vikram, V; Walker, A R

    2015-01-01

    We present measurements of weak gravitational lensing cosmic shear two-point statistics using Dark Energy Survey Science Verification data. We demonstrate that our results are robust to the choice of shear measurement pipeline, either ngmix or im3shape, and robust to the choice of two-point statistic, including both real and Fourier-space statistics. Our results pass a suite of null tests including tests for B-mode contamination and direct tests for any dependence of the two-point functions on a set of 16 observing conditions and galaxy properties, such as seeing, airmass, galaxy color, galaxy magnitude, etc. We furthermore use a large suite of simulations to compute the covariance matrix of the cosmic shear measurements and assign statistical significance to our null tests. We find that our covariance matrix is consistent with the halo model prediction, indicating that it has the appropriate level of halo sample variance. We compare the same jackknife procedure applied to the data and the simulations in orde...

  14. Cosmic Shear Measurements with DES Science Verification Data

    SciTech Connect (OSTI)

    Becker, M. R.

    2015-07-20

    We present measurements of weak gravitational lensing cosmic shear two-point statistics using Dark Energy Survey Science Verification data. We demonstrate that our results are robust to the choice of shear measurement pipeline, either ngmix or im3shape, and robust to the choice of two-point statistic, including both real and Fourier-space statistics. Our results pass a suite of null tests including tests for B-mode contamination and direct tests for any dependence of the two-point functions on a set of 16 observing conditions and galaxy properties, such as seeing, airmass, galaxy color, galaxy magnitude, etc. We use a large suite of simulations to compute the covariance matrix of the cosmic shear measurements and assign statistical significance to our null tests. We find that our covariance matrix is consistent with the halo model prediction, indicating that it has the appropriate level of halo sample variance. We also compare the same jackknife procedure applied to the data and the simulations in order to search for additional sources of noise not captured by the simulations. We find no statistically significant extra sources of noise in the data. The overall detection significance with tomography for our highest source density catalog is 9.7?. Cosmological constraints from the measurements in this work are presented in a companion paper (DES et al. 2015).

  15. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  16. Enrichment Assay Methods for a UF6 Cylinder Verification Station

    SciTech Connect (OSTI)

    Smith, Leon E.; Jordan, David V.; Misner, Alex C.; Mace, Emily K.; Orton, Christopher R.

    2010-11-30

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s entire cylinder inventory. These enrichment assay methods interrogate only a small fraction of the total cylinder volume, and are time-consuming and expensive to execute for inspectors. Pacific Northwest National Laboratory (PNNL) is developing an unattended measurement system capable of automated enrichment measurements over the full volume of Type 30B and Type 48 cylinders. This Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The focus of this paper is the development of nondestructive assay (NDA) methods that combine “traditional” enrichment signatures (e.g. 185-keV emission from U-235) and more-penetrating “non-traditional” signatures (e.g. high-energy neutron-induced gamma rays spawned primarily from U-234 alpha emission) collected by medium-resolution gamma-ray spectrometers (i.e. sodium iodide or lanthanum bromide). The potential of these NDA methods for the automated assay of feed, tail and product cylinders is explored through MCNP modeling and with field measurements on a cylinder population ranging from 0.2% to 5% in U-235 enrichment.

  17. Uncertainty Estimation Improves Energy Measurement and Verification Procedures

    SciTech Connect (OSTI)

    Walter, Travis; Price, Phillip N.; Sohn, Michael D.

    2014-05-14

    Implementing energy conservation measures in buildings can reduce energy costs and environmental impacts, but such measures cost money to implement so intelligent investment strategies require the ability to quantify the energy savings by comparing actual energy used to how much energy would have been used in absence of the conservation measures (known as the baseline energy use). Methods exist for predicting baseline energy use, but a limitation of most statistical methods reported in the literature is inadequate quantification of the uncertainty in baseline energy use predictions. However, estimation of uncertainty is essential for weighing the risks of investing in retrofits. Most commercial buildings have, or soon will have, electricity meters capable of providing data at short time intervals. These data provide new opportunities to quantify uncertainty in baseline predictions, and to do so after shorter measurement durations than are traditionally used. In this paper, we show that uncertainty estimation provides greater measurement and verification (M&V) information and helps to overcome some of the difficulties with deciding how much data is needed to develop baseline models and to confirm energy savings. We also show that cross-validation is an effective method for computing uncertainty. In so doing, we extend a simple regression-based method of predicting energy use using short-interval meter data. We demonstrate the methods by predicting energy use in 17 real commercial buildings. We discuss the benefits of uncertainty estimates which can provide actionable decision making information for investing in energy conservation measures.

  18. Verification of gyrokinetic microstability codes ?with an LHD configuration

    SciTech Connect (OSTI)

    Mikkelsen, D. R.; Nunami, M.; Watanabe, T. -H.; Sugama, H.; Tanaka, K.

    2014-11-01

    We extend previous benchmarks of the GS2 and GKV-X codes to verify their algorithms for solving the gyrokinetic Vlasov-Poisson equations for plasma microturbulence. Code benchmarks are the most complete way of verifying the correctness of implementations for the solution of mathematical models for complex physical processes such as those studied here. The linear stability calculations reported here are based on the plasma conditions of an ion-ITB plasma in the LHD configuration. The plasma parameters and the magnetic geometry differ from previous benchmarks involving these codes. We find excellent agreement between the independently written pre-processors that calculate the geometrical coefficients used in the gyrokinetic equations. Grid convergence tests are used to establish the resolution and domain size needed to obtain converged linear stability results. The agreement of the frequencies, growth rates and eigenfunctions in the benchmarks reported here provides additional verification that the algorithms used by the GS2 and GKV-X codes are correctly finding the linear eigenvalues and eigenfunctions of the gyrokinetic Vlasov-Poisson equations.

  19. MOX Cross-Section Libraries for ORIGEN-ARP

    SciTech Connect (OSTI)

    Gauld, I.C.

    2003-07-01

    The use of mixed-oxide (MOX) fuel in commercial nuclear power reactors operated in Europe has expanded rapidly over the past decade. The predicted characteristics of MOX fuel such as the nuclide inventories, thermal power from decay heat, and radiation sources are required for design and safety evaluations, and can provide valuable information for non-destructive safeguards verification activities. This report describes the development of computational methods and cross-section libraries suitable for the analysis of irradiated MOX fuel with the widely-used and recognized ORIGEN-ARP isotope generation and depletion code of the SCALE (Standardized Computer Analyses for Licensing Evaluation) code system. The MOX libraries are designed to be used with the Automatic Rapid Processing (ARP) module of SCALE that interpolates appropriate values of the cross sections from a database of parameterized cross-section libraries to create a problem-dependent library for the burnup analysis. The methods in ORIGEN-ARP, originally designed for uranium-based fuels only, have been significantly upgraded to handle the larger number of interpolation parameters associated with MOX fuels. The new methods have been incorporated in a new version of the ARP code that can generate libraries for low-enriched uranium (LEU) and MOX fuel types. The MOX data libraries and interpolation algorithms in ORIGEN-ARP have been verified using a database of declared isotopic concentrations for 1042 European MOX fuel assemblies. The methods and data are validated using a numerical MOX fuel benchmark established by the Organization for Economic Cooperation and Development (OECD) Working Group on burnup credit and nuclide assay measurements for irradiated MOX fuel performed as part of the Belgonucleaire ARIANE International Program.

  20. OUR-D001 This revision supercedes all earlier revisions. rev. 5/13 Student Address

    E-Print Network [OSTI]

    Ishida, Yuko

    University of California, Davis Office of the University Registrar One Shields Avenue, 12 Mrak Hall, Davis your bill mailed? ________________________________________________________________________ Marital_______________________________________ Billing Address Address

  1. Compensated individually addressable array technology for human breast imaging

    DOE Patents [OSTI]

    Lewis, D. Kent (San Francisco, CA)

    2003-01-01

    A method of forming broad bandwidth acoustic or microwave beams which encompass array design, array excitation, source signal preprocessing, and received signal postprocessing. This technique uses several different methods to achieve improvement over conventional array systems. These methods are: 1) individually addressable array elements; 2) digital-to-analog converters for the source signals; 3) inverse filtering from source precompensation; and 4) spectral extrapolation to expand the bandwidth of the received signals. The components of the system will be used as follows: 1) The individually addressable array allows scanning around and over an object, such as a human breast, without any moving parts. The elements of the array are broad bandwidth elements and efficient radiators, as well as detectors. 2) Digital-to-analog converters as the source signal generators allow virtually any radiated field to be created in the half-space in front of the array. 3) Preprocessing allows for corrections in the system, most notably in the response of the individual elements and in the ability to increase contrast and resolution of signal propagating through the medium under investigation. 4) Postprocessing allows the received broad bandwidth signals to be expanded in a process similar to analytic continuation. Used together, the system allows for compensation to create beams of any desired shape, control the wave fields generated to correct for medium differences, and improve contract and resolution in and through the medium.

  2. Qurz 10 SOLUTIONS, SECTION ALL

    E-Print Network [OSTI]

    jony2_000

    Qurz 10 SOLUTIONS, SECTION ALL. If C is the line segment from (0, 0) to (3, 5), then fc 3x2ds :7. A16 B25 C45 D65 E.75. Solution. To parametrize the line we ...

  3. Marine Ecological Processes Online section

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    Marine Ecological Processes Online section FAS 6272 (3 credits) Fall 2014 Course Description, behavior, population dynamics, and community structure in marine and estuarine ecosystems. Prerequisite will have: · Examined how ecological processes operate in the marine environment · Compared how ecological

  4. COORDINATED IMPLEMENTATION, RESEARCH, MONITORING AND EVALUATION SECTION 3 FISH AND WILDLIFE PROGRAM 3-2 September 13, 1995

    E-Print Network [OSTI]

    3-2 September 13, 1995 #12;SECTION 3 COORDINATED IMPLEMENTATION, RESEARCH, MONITORING AND EVALUATION September 13, 1995 3-2 FISH AND WILDLIFE PROGRAM address progress, problems and issues regarding program

  5. Sections prepared for inclusion in an IAEA technical document handbook on Designing and Implementing a Physical Protection System

    SciTech Connect (OSTI)

    Snell, Mark K.

    2015-11-01

    Two major sections were drafted (each with several subsections) for the IAEA dealing with designing and implementing a Physical Protection System (PPS). Areas addressed were Search Systems and the evaluation of PPS effectiveness.

  6. Western Wind Strategy: Addressing Critical Issues for Wind Deployment

    SciTech Connect (OSTI)

    Douglas Larson; Thomas Carr

    2012-03-30

    The goal of the Western Wind Strategy project was to help remove critical barriers to wind development in the Western Interconnection. The four stated objectives of this project were to: (1) identify the barriers, particularly barriers to the operational integration of renewables and barriers identified by load-serving entities (LSEs) that will be buying wind generation, (2) communicate the barriers to state officials, (3) create a collaborative process to address those barriers with the Western states, utilities and the renewable industry, and (4) provide a role model for other regions. The project has been on the forefront of identifying and informing state policy makers and utility regulators of critical issues related to wind energy and the integration of variable generation. The project has been a critical component in the efforts of states to push forward important reforms and innovations that will enable states to meet their renewable energy goals and lower the cost to consumers of integrating variable generation.

  7. Time-dependent CET to address cavity flooding

    SciTech Connect (OSTI)

    Dion, D.R. [Pacific Gas & Electric, San Francisco, CA (United States)

    1996-12-31

    This paper addresses the issue of reactor cavity flooding as a possible part of the overall severe accident management program for a pressurized water reactor (PWR). It proposes the construction of a time-dependent containment event tree (CET) that is tailored for the issue at hand and in which the CET evolves in real time. Probabilities of containment failure are assessed at 12, 24, 36, and 48 hr after the start of an event. This is in contrast to the usual CET formulations where events are called {open_quotes}early{close_quotes} or {open_quotes}late{close_quotes} and where these adjectives are usually not precisely correlated with real time but to an event such as vessel failure. This analysis is performed for a four-loop Westinghouse reactor with a large dry containment. MAAP4 was run to support the quantification of the new CET.

  8. Implementation Guide for Use in Addressing Unreviewed Safety Question Requirements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-04-08

    This Guide, including its attachments, provides information to assist in the implementation of Title 10 Code of Federal Regulations (CFR) Section 830.203, “Unreviewed Safety Question Process,” of the Nuclear Safety Management Rules for Category 1, 2, and 3 nuclear facilities owned or operated by the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE G 424.1-1A. Admin Chg 1 dated 4-12-13.

  9. Implementation Guide for Use in Addressing Unreviewed Safety Question Requirements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-04-08

    This Guide, including its attachments, provides information to assist in the implementation of Title 10 Code of Federal Regulations (CFR) Section 830.203, “Unreviewed Safety Question Process,” of the Nuclear Safety Management Rules for Category 1, 2, and 3 nuclear facilities owned or operated by the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Admin Chg 2, dated 6-12-13, supersedes DOE G 424.1-1B Admin Chg 1.

  10. Institution Name Institution Name Address Place Zip Notes Website Region

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam:on Openei

  11. Smart Grid RFI: Addressing Policy and Logistical Challenges, Comments from

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES PursuantEnergy Small

  12. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority for an SPR Drawdown

  13. M&V Guidelines: Measurement and Verification for Federal Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    nEnergyPlus%2Bredirect%2B1 for discussion of simulation issues. 17 http:rredc.nrel.govsolarolddatansrdb1991-2005tmy3. 18 See ASHRAE Guideline 14-2015 and Section 4.2.2...

  14. Indoor airPLUS Version 1 (Rev. 01) Verification Checklist

    Broader source: Energy.gov [DOE]

    The Rev. 01 checklist has been modified to reflect only the additional Indoor airPLUS requirements and their corresponding section numbers that must be met after completing the ENERGY STAR checklists.

  15. Metastable Radioxenon Verification Laboratory (MRVL) Year-End Report

    SciTech Connect (OSTI)

    Cooper, Matthew W.; Hayes, James C.; Lidey, Lance S.

    2014-11-07

    This is the year end report that is due to the client. The MRVL system is designed to measure multiple radioxenon isotopes (135Xe, 133Xe, 133mXe and 133mXe) simultaneously. The system has 12 channels to load samples and make nuclear measurements. Although the MRVL system has demonstrated excellent stability in measurements of Xe-133 and Xe-135 over the year of evaluation prior to delivery, there has been concern about system stability over measurements performed on samples with orders of magnitude different radioactivity, and samples containing multiple isotopes. To address these concerns, a series of evaluation test have been performed at the end-user laboratory. The evaluation was performed in two separate phases. Phase 1 made measurements on isotopically pure Xe-133 from high radioactivity down to the system background levels of activity, addressing the potential count rate dependencies when activities change from extreme high to very low. The second phase performed measurements on samples containing multiple isotopes (Xe-135, Xe-133 and Xe-133m), and addressed concerns about the dependence of isotopic concentrations on the presence of additional isotopes. The MRVL showed a concentration dependence on the Xe-133 due to the amount of Xe-133m that was in the sample. The dependency is due to the decay of Xe-133m into Xe-133. This document focuses on the second phase and will address the analysis used to account for ingrowth of Xe-133 from Xe-133m.

  16. Approach to IAEA material-balance verification at the Portsmouth Gas Centrifuge Enrichment Plant

    SciTech Connect (OSTI)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1983-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP). The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistic for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of: (1) attributes and variables sample sizes for the various strata, (2) standard deviations of the relevant test statistics, and (3) the detection sensitivity which the IAEA might achieve by this verification strategy at GCEP.

  17. A feasibility study of treatment verification using EPID cine images for hypofractionated lung radiotherapy

    E-Print Network [OSTI]

    Tang, Xiaoli; Jiang, Steve

    2009-01-01

    We propose a novel approach for potential on-line treatment verification using cine EPID (Electronic Portal Imaging Device) images for hypofractionated lung radiotherapy based on a machine learning algorithm. Hypofractionated radiotherapy requires high precision. It is essential to effectively monitor the target to ensure that the tumor is within the beam aperture. We modeled the treatment verification problem as a two-class classification problem and applied an Artificial Neural Network (ANN) to classify the cine EPID images acquired during the treatment into corresponding classes with the tumor inside or outside of the beam aperture. Training samples were generated for the ANN using digitally reconstructed radiographs (DRRs) with artificially added shifts in tumor location to simulate cine EPID images with different tumor locations. Principal Component Analysis (PCA) was used to reduce the dimensionality of the training samples and cine EPID images acquired during the treatment. The proposed treatment verif...

  18. DDMF: An Efficient Decision Diagram Structure for Design Verification of Quantum Circuits under a Practical Restriction

    E-Print Network [OSTI]

    Shigeru Yamashita; Shin-ichi Minato; D. Michael Miller

    2008-09-13

    Recently much attention has been paid to quantum circuit design to prepare for the future "quantum computation era." Like the conventional logic synthesis, it should be important to verify and analyze the functionalities of generated quantum circuits. For that purpose, we propose an efficient verification method for quantum circuits under a practical restriction. Thanks to the restriction, we can introduce an efficient verification scheme based on decision diagrams called Decision Diagrams for Matrix Functions (DDMFs). Then, we show analytically the advantages of our approach based on DDMFs over the previous verification techniques. In order to introduce DDMFs, we also introduce new concepts, quantum functions and matrix functions, which may also be interesting and useful on their own for designing quantum circuits.

  19. Duke University, Department of ECE, Technical Report #2004-2, September 20, 2004 Dynamic verification enables a system to improve its availability by checking that its execution is

    E-Print Network [OSTI]

    Sorin, Daniel J.

    verification enables a system to improve its availability by checking that its execution is correct verification of sequential con- sistency (pDVSC) in multithreaded systems. The system dynamically creates verification arbitrarily small. We use full-system simulation of a multithreaded system running commercial

  20. Company Name Company Name Address Place Zip Product Website Region

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar EnergyLawler,Coal TechnologiesClioCommunityLtd JumpAntas CERANBulh es