Sample records for protocol gas verification

  1. 76 FR 50164 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ...-AQ06 Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing... correct certain portions of the Protocol Gas Verification Program and Minimum Competency Requirements for... final rule that amends the Agency's Protocol Gas Verification Program (PGVP) and the minimum competency...

  2. 2018 EPA Protocol Gas Verification Program Participants

    EPA Pesticide Factsheets

    A list of participants for 2016 EPA's Protocol Gas Verification Program (PGVP) for stationary source monitoring. The list also has vendor IDs, which are production site-specific, and are the same ones used in the PGVP for ambient air monitoring.

  3. 75 FR 39250 - Agency Information Collection Activities; Submission to OMB for Review and Approval; Comment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... Protocol Gas Verification Program; EPA ICR No. 2375.01, OMB Control Number 2060-NEW AGENCY: Environmental... Air Protocol Gas Verification Program. ICR numbers: EPA ICR No. 2375.01, OMB Control No. 2060-NEW. ICR...

  4. 76 FR 20536 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-13

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 75 [EPA-HQ-OAR-2009-0837; FRL-9280-9] RIN 2060-AQ06 Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing Correction In rule document 2011-6216 appearing on pages 17288-17325 in the issue of Monday, March 28, 2011...

  5. Environmental Technology Verification Program Materials Management and Remediation Center Generic Protocol for Verification of In Situ Chemical Oxidation

    EPA Science Inventory

    The protocol provides generic procedures for implementing a verification test for the performance of in situ chemical oxidation (ISCO), focused specifically to expand the application of ISCO at manufactured gas plants with polyaromatic hydrocarbon (PAH) contamination (MGP/PAH) an...

  6. EPA Protocol Gas Verification Program - Presented at NIST Gas Panel Meeting

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  7. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  8. Current Status of EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas reference standards are needed to calibrate and audit continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensur...

  9. Protocol Gas Verification Program Audit Reports

    EPA Pesticide Factsheets

    View the full reports from 2010 and 2013 of the PGVP audits, which tested the EPA Protocol gases that are used to calibrate continuous emission monitoring systems (CEMS), and the instruments used in EPA reference methods.

  10. Current Status of EPA Verification Program for EPA Protocol Gases

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  11. 75 FR 33391 - Amendments to the Protocol Gas Verification Program and Minimum Competency Requirements for Air...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-11

    ...Recent EPA gas audit results indicate that some gas cylinders used to calibrate continuous emission monitoring systems on stationary sources do not meet EPA's performance specification. Reviews of stack test reports in recent years indicate that some stack testers do not properly follow EPA test methods or do not correctly calculate test method results. Therefore, EPA is proposing to amend its Protocol Gas Verification Program (PGVP) and the minimum competency requirements for air emission testing (formerly air emission testing body requirements) to improve the accuracy of emissions data. EPA is also proposing to amend other sections of the Acid Rain Program continuous emission monitoring system regulations by adding and clarifying certain recordkeeping and reporting requirements, removing the provisions pertaining to mercury monitoring and reporting, removing certain requirements associated with a class-approved alternative monitoring system, disallowing the use of a particular quality assurance option in EPA Reference Method 7E, adding an incorporation by reference that was inadvertently left out of the January 24, 2008 final rule, and clarifying the language and applicability of certain provisions.

  12. Verification and accreditation schemes for climate change activities: A review of requirements for verification of greenhouse gas reductions and accreditation of verifiers—Implications for long-term carbon sequestration

    NASA Astrophysics Data System (ADS)

    Roed-Larsen, Trygve; Flach, Todd

    The purpose of this chapter is to provide a review of existing national and international requirements for verification of greenhouse gas reductions and associated accreditation of independent verifiers. The credibility of results claimed to reduce or remove anthropogenic emissions of greenhouse gases (GHG) is of utmost importance for the success of emerging schemes to reduce such emissions. Requirements include transparency, accuracy, consistency, and completeness of the GHG data. The many independent verification processes that have developed recently now make up a quite elaborate tool kit for best practices. The UN Framework Convention for Climate Change and the Kyoto Protocol specifications for project mechanisms initiated this work, but other national and international actors also work intensely with these issues. One initiative gaining wide application is that taken by the World Business Council for Sustainable Development with the World Resources Institute to develop a "GHG Protocol" to assist companies in arranging for auditable monitoring and reporting processes of their GHG activities. A set of new international standards developed by the International Organization for Standardization (ISO) provides specifications for the quantification, monitoring, and reporting of company entity and project-based activities. The ISO is also developing specifications for recognizing independent GHG verifiers. This chapter covers this background with intent of providing a common understanding of all efforts undertaken in different parts of the world to secure the reliability of GHG emission reduction and removal activities. These verification schemes may provide valuable input to current efforts of securing a comprehensive, trustworthy, and robust framework for verification activities of CO2 capture, transport, and storage.

  13. 76 FR 17287 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-28

    ...EPA is finalizing rule revisions that modify existing requirements for sources affected by the federally administered emission trading programs including the NOX Budget Trading Program, the Acid Rain Program, and the Clean Air Interstate Rule. EPA is amending its Protocol Gas Verification Program (PGVP) and the minimum competency requirements for air emission testing (formerly air emission testing body requirements) to improve the accuracy of emissions data. EPA is also amending other sections of the Acid Rain Program continuous emission monitoring system regulations by adding and clarifying certain recordkeeping and reporting requirements, removing the provisions pertaining to mercury monitoring and reporting, removing certain requirements associated with a class-approved alternative monitoring system, disallowing the use of a particular quality assurance option in EPA Reference Method 7E, adding two incorporation by references that were inadvertently left out of the January 24, 2008 final rule, adding two new definitions, revising certain compliance dates, and clarifying the language and applicability of certain provisions.

  14. Soil Gas Sample Handling: Evaluation of Water Removal and Sample Ganging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fritz, Brad G.; Abrecht, David G.; Hayes, James C.

    2016-10-31

    Soil gas sampling is currently conducted in support of Nuclear Test Ban treaty verification. Soil gas samples are collected and analyzed for isotopes of interest. Some issues that can impact sampling and analysis of these samples are excess moisture and sample processing time. Here we discuss three potential improvements to the current sampling protocol; a desiccant for water removal, use of molecular sieve to remove CO 2 from the sample during collection, and a ganging manifold to allow composite analysis of multiple samples.

  15. GENERIC VERIFICATION PROTOCOL FOR THE VERIFICATION OF PESTICIDE SPRAY DRIFT REDUCTION TECHNOLOGIES FOR ROW AND FIELD CROPS

    EPA Science Inventory

    This ETV program generic verification protocol was prepared and reviewed for the Verification of Pesticide Drift Reduction Technologies project. The protocol provides a detailed methodology for conducting and reporting results from a verification test of pesticide drift reductio...

  16. Generic Verification Protocol for Verification of Online Turbidimeters

    EPA Science Inventory

    This protocol provides generic procedures for implementing a verification test for the performance of online turbidimeters. The verification tests described in this document will be conducted under the Environmental Technology Verification (ETV) Program. Verification tests will...

  17. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  18. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  19. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  20. 76 FR 50129 - Protocol Gas Verification Program and Minimum Competency Requirements for Air Emission Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... revisions to Sec. 75.4(e)(1), oxygen (O 2 ) and moisture monitoring systems were inadvertently [[Page 50131... passed in order for readings on the certified high scale to be reported as quality-assured. This was not..., disproportionately high and adverse human health or environmental effects of their programs, policies, and activities...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS

    EPA Science Inventory

    The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.

    Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...

  2. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  3. Generic Verification Protocol for Testing Pesticide Application Spray Drift Reduction Technologies for Row and Field Crops

    EPA Pesticide Factsheets

    This generic verification protocol provides a detailed method to conduct and report results from a verification test of pesticide application technologies that can be used to evaluate these technologies for their potential to reduce spray drift.

  4. Generic Verification Protocol for Determination of Emissions from Cleaner Outdoor Wood-Fired Hydronic Heaters

    EPA Science Inventory

    This protocol describes the Environmental Technology Verification Program's considerations and requirements for verification of emissions reduction provided by cleaner outdoor wood-fired hydronic heaters. Outdoor wood-burning units provide heat and hot water for homes and other b...

  5. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    EPA Science Inventory

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    EPA Science Inventory

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  7. Generic Verification Protocol for Testing Pesticide Application Spray Drift Reduction Technologies for Row and Field Crops (Version 1.4)

    EPA Science Inventory

    This generic verification protocol provides a detailed method for conducting and reporting results from verification testing of pesticide application technologies. It can be used to evaluate technologies for their potential to reduce spray drift, hence the term “drift reduction t...

  8. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  9. Mechanical verification of a schematic Byzantine clock synchronization algorithm

    NASA Technical Reports Server (NTRS)

    Shankar, Natarajan

    1991-01-01

    Schneider generalizes a number of protocols for Byzantine fault tolerant clock synchronization and presents a uniform proof for their correctness. The authors present a machine checked proof of this schematic protocol that revises some of the details in Schneider's original analysis. The verification was carried out with the EHDM system developed at the SRI Computer Science Laboratory. The mechanically checked proofs include the verification that the egocentric mean function used in Lamport and Melliar-Smith's Interactive Convergence Algorithm satisfies the requirements of Schneider's protocol.

  10. CAPTIONALS: A computer aided testing environment for the verification and validation of communication protocols

    NASA Technical Reports Server (NTRS)

    Feng, C.; Sun, X.; Shen, Y. N.; Lombardi, Fabrizio

    1992-01-01

    This paper covers the verification and protocol validation for distributed computer and communication systems using a computer aided testing approach. Validation and verification make up the so-called process of conformance testing. Protocol applications which pass conformance testing are then checked to see whether they can operate together. This is referred to as interoperability testing. A new comprehensive approach to protocol testing is presented which address: (1) modeling for inter-layer representation for compatibility between conformance and interoperability testing; (2) computational improvement to current testing methods by using the proposed model inclusive of formulation of new qualitative and quantitative measures and time-dependent behavior; (3) analysis and evaluation of protocol behavior for interactive testing without extensive simulation.

  11. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  12. Can legality verification enhace local rights to forest resources? Piloting the policy learning protocol in the Peruvian forest context

    Treesearch

    B. Cashore; I. Visseren-Hamakers; P. Caro Torres; W. de Jong; A. Denvir; D. Humphreys; Kathleen McGinley; G. Auld; S. Lupberger; C. McDermott; S. Sax; D. Yin

    2016-01-01

    This report, “Can Legality Verification Enhance Local Rights to Forest Resources? Piloting the policy learning protocol in the Peruvian forest context,” reports on the testing of the application of the 11-step Policy Learning Protocol in Peru in 2015-16. The Protocol (Cashore et al. 2014) enables actors to draw from international policy initiatives in order to improve...

  13. GENERIC VERIFICATION PROTOCOL FOR AQUEOUS CLEANER RECYCLING TECHNOLOGIES

    EPA Science Inventory

    This generic verification protocol has been structured based on a format developed for ETV-MF projects. This document describes the intended approach and explain plans for testing with respect to areas such as test methodology, procedures, parameters, and instrumentation. Also ...

  14. Generic Protocol for the Verification of Ballast Water Treatment Technology. Version 5.1

    DTIC Science & Technology

    2010-09-01

    the Protocol ..................................................................................... 2 1.4 Verification Testing Process ...Volumes, Containers and Processing .................................................................38 Table 10. Recommendation for Water...or persistent distortion of a measurement process that causes errors in one direction. Challenge Water: Water supplied to a treatment system under

  15. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  16. Verification for measurement-only blind quantum computing

    NASA Astrophysics Data System (ADS)

    Morimae, Tomoyuki

    2014-06-01

    Blind quantum computing is a new secure quantum computing protocol where a client who does not have any sophisticated quantum technology can delegate her quantum computing to a server without leaking any privacy. It is known that a client who has only a measurement device can perform blind quantum computing [T. Morimae and K. Fujii, Phys. Rev. A 87, 050301(R) (2013), 10.1103/PhysRevA.87.050301]. It has been an open problem whether the protocol can enjoy the verification, i.e., the ability of the client to check the correctness of the computing. In this paper, we propose a protocol of verification for the measurement-only blind quantum computing.

  17. Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

    NASA Astrophysics Data System (ADS)

    Graham, Michelle; Gray, David

    As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.

  18. ENVIRONMENTAL TECHNOLOGY PROTOCOL VERIFICATION REPORT, EMISSIONS OF VOCS AND ALDEHYDES FROM COMMERCIAL FURNITURE (WITH APPENDICES)

    EPA Science Inventory

    As part of a U.S. Environmental Protection Agency Environmental Technology Verification program, the Research Triangle Institute (RTI) developed a test protocol for measuring volatile organic compounds and aldehydes in a large chamber. RTI convened stakeholders for the commercial...

  19. THE DEVELOPMENT AND INTER-LABORATORY VERIFICATION OF LC-MS LIBRARIES FOR ORGANIC CHEMICALS OF ENVIRONMENTAL CONCERN

    EPA Science Inventory

    The development, verification, and comparison study between LC-MS libraries for two manufacturers’ instruments and a verified protocol are discussed. The LC-MS library protocol was verified through an inter-laboratory study that involved Federal, State, and private laboratories. ...

  20. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    PubMed

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  1. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function

    PubMed Central

    Ding, Jie; Zhu, Feng; Wang, Ruchuan

    2018-01-01

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security. PMID:29498684

  2. Joint ETV/NOWATECH verification protocol for the Sorbisense GSW40 passive sampler

    EPA Science Inventory

    Environmental technology verification (ETV) is an independent (third party) assessment of the performance of a technology or a product for a specified application, under defined conditions and quality assurance. This verification is a joint verification with the US EPA ETV schem...

  3. Design exploration and verification platform, based on high-level modeling and FPGA prototyping, for fast and flexible digital communication in physics experiments

    NASA Astrophysics Data System (ADS)

    Magazzù, G.; Borgese, G.; Costantino, N.; Fanucci, L.; Incandela, J.; Saponara, S.

    2013-02-01

    In many research fields as high energy physics (HEP), astrophysics, nuclear medicine or space engineering with harsh operating conditions, the use of fast and flexible digital communication protocols is becoming more and more important. The possibility to have a smart and tested top-down design flow for the design of a new protocol for control/readout of front-end electronics is very useful. To this aim, and to reduce development time, costs and risks, this paper describes an innovative design/verification flow applied as example case study to a new communication protocol called FF-LYNX. After the description of the main FF-LYNX features, the paper presents: the definition of a parametric SystemC-based Integrated Simulation Environment (ISE) for high-level protocol definition and validation; the set up of figure of merits to drive the design space exploration; the use of ISE for early analysis of the achievable performances when adopting the new communication protocol and its interfaces for a new (or upgraded) physics experiment; the design of VHDL IP cores for the TX and RX protocol interfaces; their implementation on a FPGA-based emulator for functional verification and finally the modification of the FPGA-based emulator for testing the ASIC chipset which implements the rad-tolerant protocol interfaces. For every step, significant results will be shown to underline the usefulness of this design and verification approach that can be applied to any new digital protocol development for smart detectors in physics experiments.

  4. The Maximal Oxygen Uptake Verification Phase: a Light at the End of the Tunnel?

    PubMed

    Schaun, Gustavo Z

    2017-12-08

    Commonly performed during an incremental test to exhaustion, maximal oxygen uptake (V̇O 2max ) assessment has become a recurring practice in clinical and experimental settings. To validate the test, several criteria were proposed. In this context, the plateau in oxygen uptake (V̇O 2 ) is inconsistent in its frequency, reducing its usefulness as a robust method to determine "true" V̇O 2max . Moreover, secondary criteria previously suggested, such as expiratory exchange ratios or percentages of maximal heart rate, are highly dependent on protocol design and often are achieved at V̇O 2 percentages well below V̇O 2max . Thus, an alternative method termed verification phase was proposed. Currently, it is clear that the verification phase can be a practical and sensitive method to confirm V̇O 2max ; however, procedures to conduct it are not standardized across the literature and no previous research tried to summarize how it has been employed. Therefore, in this review the knowledge on the verification phase was updated, while suggestions on how it can be performed (e.g. intensity, duration, recovery) were provided according to population and protocol design. Future studies should focus to identify a verification protocol feasible for different populations and to compare square-wave and multistage verification phases. Additionally, studies assessing verification phases in different patient populations are still warranted.

  5. Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  6. Outdoor Irrigation Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  7. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION FOR INDOOR AIR PRODUCTS

    EPA Science Inventory

    The paper discusses environmental technology verification (ETV) for indoor air products. RTI is developing the framework for a verification testing program for indoor air products, as part of EPA's ETV program. RTI is establishing test protocols for products that fit into three...

  9. Generic Protocol for the Verification of Ballast Water Treatment Technology

    EPA Science Inventory

    In anticipation of the need to address performance verification and subsequent approval of new and innovative ballast water treatment technologies for shipboard installation, the U.S Coast Guard and the Environmental Protection Agency‘s Environmental Technology Verification Progr...

  10. A comparison of the use of bony anatomy and internal markers for offline verification and an evaluation of the potential benefit of online and offline verification protocols for prostate radiotherapy.

    PubMed

    McNair, Helen A; Hansen, Vibeke N; Parker, Christopher C; Evans, Phil M; Norman, Andrew; Miles, Elizabeth; Harris, Emma J; Del-Acroix, Louise; Smith, Elizabeth; Keane, Richard; Khoo, Vincent S; Thompson, Alan C; Dearnaley, David P

    2008-05-01

    To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. The systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to <1 mm. Intrafraction motion had greater impact on the effectiveness of the online protocol than the offline protocols. An offline protocol using gold markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion.

  11. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    EPA Science Inventory

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION--GENERIC VERIFICATION PROTOCOL FOR BIOLOGICAL AND AEROSOL TESTING OF GENERAL VENTILATION AIR CLEANERS

    EPA Science Inventory

    Under EPA's Environmental Technology Verification Program, Research Triangle Institute (RTI) will operate the Air Pollution Control Technology Center to verify the filtration efficiency and bioaerosol inactivation efficiency of heating, ventilation and air conditioning air cleane...

  13. Secure voice-based authentication for mobile devices: vaulted voice verification

    NASA Astrophysics Data System (ADS)

    Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.

    2013-05-01

    As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP) HIGH TRANSFER EFFICIENCE SPRAY EQUIPMENT--GENERIC VERIFICATION PROTOCOL

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program has been established to verify the performance characteristics of innovative environmental technologies and report this objective information, thus, accelerating the entrance of these new technologies into the marketplace. V...

  15. Review of Quantitative Monitoring Methodologies for Emissions Verification and Accounting for Carbon Dioxide Capture and Storage for California’s Greenhouse Gas Cap-and-Trade and Low-Carbon Fuel Standard Programs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Oldenburg, Curtis M.; Birkholzer, Jens T.

    The Cap-and-Trade and Low Carbon Fuel Standard (LCFS) programs being administered by the California Air Resources Board (CARB) include Carbon Dioxide Capture and Storage (CCS) as a potential means to reduce greenhouse gas (GHG) emissions. However, there is currently no universal standard approach that quantifies GHG emissions reductions for CCS and that is suitable for the quantitative needs of the Cap-and-Trade and LCFS programs. CCS involves emissions related to the capture (e.g., arising from increased energy needed to separate carbon dioxide (CO 2) from a flue gas and compress it for transport), transport (e.g., by pipeline), and storage of COmore » 2 (e.g., due to leakage to the atmosphere from geologic CO 2 storage sites). In this project, we reviewed and compared monitoring, verification, and accounting (MVA) protocols for CCS from around the world by focusing on protocols specific to the geologic storage part of CCS. In addition to presenting the review of these protocols, we highlight in this report those storage-related MVA protocols that we believe are particularly appropriate for CCS in California. We find that none of the existing protocols is completely appropriate for California, but various elements of all of them could be adopted and/or augmented to develop a rigorous, defensible, and practical surface leakage MVA protocol for California. The key features of a suitable surface leakage MVA plan for California are that it: (1) informs and validates the leakage risk assessment, (2) specifies use of the most effective monitoring strategies while still being flexible enough to accommodate special or site-specific conditions, (3) quantifies stored CO 2, and (4) offers defensible estimates of uncertainty in monitored properties. California’s surface leakage MVA protocol needs to be applicable to the main CO 2 storage opportunities (in California and in other states with entities participating in California’s Cap-and-Trade or LCFS programs), specifically CO 2-enhanced oil recovery (CO 2-EOR), CO 2 injection into depleted gas reservoirs (with or without CO 2-enhanced gas recovery (CO 2-EGR)), as well as deep saline storage. Regarding the elements of an effective surface leakage MVA protocol, our recommendations for California are that: (1) both CO 2 and methane (CH 4) surface leakage should be monitored, especially for enhanced recovery scenarios, (2) emissions from all sources not directly related to injection and geologic storage (e.g., from capture, or pipeline transport) should be monitored and reported under a plan separate from the surface leakage MVA plan that is included as another component of the quantification methodology (QM), (3) the primary objective of the surface leakage MVA plan should be to quantify surface leakage of CO 2 and CH 4 and its uncertainty, with consideration of best-practices and state-of-the-art approaches to monitoring including attribution assessment, (4) effort should be made to monitor CO 2 storage and migration in the subsurface to anticipate future surface leakage monitoring needs, (5) detailed descriptions of specific monitoring technologies and approaches should be provided in the MVA plan, (6) the main purpose of the CO 2 injection project (CO 2-EOR, CO 2-EGR, or pure geologic carbon sequestration (GCS)) needs to be stated up front, (7) approaches to dealing with missing data and quantifying uncertainty need to be described, and (8) post-injection monitoring should go on for a period consistent with or longer than that prescribed by the U.S. EPA.« less

  16. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOEpatents

    Foo Kune, Denis [Saint Paul, MN; Mahadevan, Karthikeyan [Mountain View, CA

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  17. Process Document, Joint Verification Protocol, and Joint Test Plan for Verification of HACH-LANGE GmbH LUMIStox 300 Bench Top Luminometer and ECLOX Handheld Luminometer for Luminescent Bacteria Test for use in Wastewater

    EPA Science Inventory

    The Danish Environmental Technology Verification program (DANETV) Water Test Centre operated by DHI, is supported by the Danish Ministry for Science, Technology and Innovation. DANETV, the United States Environmental Protection Agency Environmental Technology Verification Progra...

  18. Turf Conversion Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  19. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    EPA Science Inventory

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  20. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP) High Transfer Efficiency Spray Equipment--Generic Verification Protocol

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program has been established by the U.S. Environmental Protection Agency (EPA) to verify the performance characteristics of innovative environmental technologies across all media and report this objective information to the states, ...

  1. A Comparison of the Use of Bony Anatomy and Internal Markers for Offline Verification and an Evaluation of the Potential Benefit of Online and Offline Verification Protocols for Prostate Radiotherapy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McNair, Helen A.; Hansen, Vibeke N.; Parker, Christopher

    2008-05-01

    Purpose: To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Methods and Materials: Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. Results: Themore » systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to <1 mm. Intrafraction motion had greater impact on the effectiveness of the online protocol than the offline protocols. Conclusions: An offline protocol using gold markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion.« less

  2. 40 CFR 1065.307 - Linearity verification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... different flow rates. Use a gravimetric reference measurement (such as a scale, balance, or mass comparator... the gas-division system to divide the span gas with purified air or nitrogen. Select gas divisions... verification for gravimetric PM balances, use external calibration weights that that meet the requirements in...

  3. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  4. 40 CFR 1065.307 - Linearity verification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... different flow rates. Use a gravimetric reference measurement (such as a scale, balance, or mass comparator... the gas-division system to divide the span gas with purified air or nitrogen. Select gas divisions... PM balance, m max refers to the typical mass of a PM filter. (ii) For linearity verification of...

  5. 40 CFR 1065.342 - Sample dryer verification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...)(2) to remove water from the sample gas, verify the performance upon installation, after major... before the sample gas reaches the analyzer. For example water can negatively interfere with a CLD's NOX... time. You may run this verification on the sample dryer alone, but you must use the maximum gas flow...

  6. 40 CFR 1065.342 - Sample dryer verification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...)(2) to remove water from the sample gas, verify the performance upon installation, after major... before the sample gas reaches the analyzer. For example water can negatively interfere with a CLD's NOX... time. You may run this verification on the sample dryer alone, but you must use the maximum gas flow...

  7. GHG MITIGATION TECHNOLOGY PERFORMANCE EVALUATIONS UNDERWAY AT THE GHG TECHNOLOGY VERIFICATION CENTER

    EPA Science Inventory

    The paper outlines the verification approach and activities of the Greenhouse Gas (GHG) Technology Verification Center, one of 12 independent verification entities operating under the U.S. EPA-sponsored Environmental Technology Verification (ETV) program. (NOTE: The ETV program...

  8. 40 CFR 1065.309 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... discrete-mode testing. For this check we consider water vapor a gaseous constituent. This verification does... for water removed from the sample done in post-processing according to § 1065.659 and it does not... humidification vessel that contains water. You must humidify NO2 span gas with another moist gas stream. We...

  9. 40 CFR 1065.309 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... discrete-mode testing. For this check we consider water vapor a gaseous constituent. This verification does... for water removed from the sample done in post-processing according to § 1065.659 (40 CFR 1066.620 for... contains water. You must humidify NO2 span gas with another moist gas stream. We recommend humidifying your...

  10. 40 CFR 1065.308 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) AIR POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Calibrations and Verifications § 1065.308 Continuous..., the gas concentrations must be adjusted to account for the dilution from ambient air drawn into the... recommended when blending span gases diluted in N2 with span gases diluted in air. You may use a multi-gas...

  11. 40 CFR 1065.308 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) AIR POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Calibrations and Verifications § 1065.308 Continuous..., the gas concentrations must be adjusted to account for the dilution from ambient air drawn into the... recommended when blending span gases diluted in N2 with span gases diluted in air. You may use a multi-gas...

  12. PRISMATIC: Unified Hierarchical Probabilistic Verification Tool

    DTIC Science & Technology

    2011-09-01

    security protocols such as for anonymity and quantum cryptography ; and biological reaction pathways. PRISM is currently the leading probabilistic...a whole will only deadlock and fail with a probability ≤ p/2. The assumption allows us to partition the overall system verification problem into two ...run on any port using the standard HTTP protocol. In this way multiple instances of the PRISMATIC web service can respond to different requests when

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT PERFORMANCE OF INDUCTION MIXERS FOR DISINFECTION OF WET WEATHER FLOWS, GAS MASTRRR SERIES 32 SUBMERSIBLE CHEMICAL INDUCTION MIXERS

    EPA Science Inventory

    The Wet-Weather Flow Technologies Pilot of the EPA's Environmental Technology Verification (ETV) Program under a partnership with NSF International has verified the performance of the GAS MASTRRR Series 32 Submersible Chemical Induction Mixers used for disinfection of wet-weather...

  14. Using Colored Stochastic Petri Net (CS-PN) software for protocol specification, validation, and evaluation

    NASA Technical Reports Server (NTRS)

    Zenie, Alexandre; Luguern, Jean-Pierre

    1987-01-01

    The specification, verification, validation, and evaluation, which make up the different steps of the CS-PN software are outlined. The colored stochastic Petri net software is applied to a Wound/Wait protocol decomposable into two principal modules: request or couple (transaction, granule) treatment module and wound treatment module. Each module is specified, verified, validated, and then evaluated separately, to deduce a verification, validation and evaluation of the complete protocol. The colored stochastic Petri nets tool is shown to be a natural extension of the stochastic tool, adapted to distributed systems and protocols, because the color conveniently takes into account the numerous sites, transactions, granules and messages.

  15. 40 CFR 1065.308 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... which you sample and record gas-analyzer concentrations. (b) Measurement principles. This test verifies... appropriate frequency to prevent loss of information. This test also verifies that the measurement system... instructions. Adjust the measurement system as needed to optimize performance. Run this verification with the...

  16. A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures

    NASA Technical Reports Server (NTRS)

    Geser, Alfons; Miner, Paul S.

    2004-01-01

    This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.

  17. Experimental measurement-device-independent verification of quantum steering

    NASA Astrophysics Data System (ADS)

    Kocsis, Sacha; Hall, Michael J. W.; Bennet, Adam J.; Saunders, Dylan J.; Pryde, Geoff J.

    2015-01-01

    Bell non-locality between distant quantum systems—that is, joint correlations which violate a Bell inequality—can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  18. Experimental measurement-device-independent verification of quantum steering.

    PubMed

    Kocsis, Sacha; Hall, Michael J W; Bennet, Adam J; Saunders, Dylan J; Pryde, Geoff J

    2015-01-07

    Bell non-locality between distant quantum systems--that is, joint correlations which violate a Bell inequality--can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  19. Evaluation of a single-scan protocol for radiochromic film dosimetry.

    PubMed

    Shimohigashi, Yoshinobu; Araki, Fujio; Maruyama, Masato; Nakaguchi, Yuji; Kuwahara, Satoshi; Nagasue, Nozomu; Kai, Yudai

    2015-03-08

    The purpose of this study was to evaluate a single-scan protocol using Gafchromic EBT3 film (EBT3) by comparing it with the commonly used 24-hr measurement protocol for radiochromic film dosimetry. Radiochromic film is generally scanned 24 hr after film exposure (24-hr protocol). The single-scan protocol enables measurement results within a short time using only the verification film, one calibration film, and unirradiated film. The single-scan protocol was scanned 30 min after film irradiation. The EBT3 calibration curves were obtained with the multichannel film dosimetry method. The dose verifications for each protocol were performed with the step pattern, pyramid pattern, and clinical treatment plans for intensity-modulated radiation therapy (IMRT). The absolute dose distributions for each protocol were compared with those calculated by the treatment planning system (TPS) using gamma evaluation at 3% and 3 mm. The dose distribution for the single-scan protocol was within 2% of the 24-hr protocol dose distribution. For the step pattern, the absolute dose discrepancies between the TPS for the single-scan and 24-hr protocols were 2.0 ± 1.8 cGy and 1.4 ± 1.2 cGy at the dose plateau, respectively. The pass rates were 96.0% for the single-scan protocol and 95.9% for the 24-hr protocol. Similarly, the dose discrepancies for the pyramid pattern were 3.6 ± 3.5cGy and 2.9 ± 3.3 cGy, respectively, while the pass rates for the pyramid pattern were 95.3% and 96.4%, respectively. The average pass rates for the four IMRT plans were 96.7% ± 1.8% for the single-scan protocol and 97.3% ± 1.4% for the 24-hr protocol. Thus, the single-scan protocol measurement is useful for dose verification of IMRT, based on its accuracy and efficiency.

  20. Evaluation of a single‐scan protocol for radiochromic film dosimetry

    PubMed Central

    Araki, Fujio; Maruyama, Masato; Nakaguchi, Yuji; Kuwahara, Satoshi; Nagasue, Nozomu; Kai, Yudai

    2015-01-01

    The purpose of this study was to evaluate a single‐scan protocol using Gafchromic EBT3 film (EBT3) by comparing it with the commonly used 24‐hr measurement protocol for radiochromic film dosimetry. Radiochromic film is generally scanned 24 hr after film exposure (24‐hr protocol). The single‐scan protocol enables measurement results within a short time using only the verification film, one calibration film, and unirradiated film. The single‐scan protocol was scanned 30 min after film irradiation. The EBT3 calibration curves were obtained with the multichannel film dosimetry method. The dose verifications for each protocol were performed with the step pattern, pyramid pattern, and clinical treatment plans for intensity‐modulated radiation therapy (IMRT). The absolute dose distributions for each protocol were compared with those calculated by the treatment planning system (TPS) using gamma evaluation at 3% and 3 mm. The dose distribution for the single‐scan protocol was within 2% of the 24‐hr protocol dose distribution. For the step pattern, the absolute dose discrepancies between the TPS for the single‐scan and 24‐hr protocols were 2.0±1.8 cGy and 1.4±1.2 cGy at the dose plateau, respectively. The pass rates were 96.0% for the single‐scan protocol and 95.9% for the 24‐hr protocol. Similarly, the dose discrepancies for the pyramid pattern were 3.6±3.5 cGy and 2.9±3.3 cGy, respectively, while the pass rates for the pyramid pattern were 95.3% and 96.4%, respectively. The average pass rates for the four IMRT plans were 96.7%±1.8% for the single‐scan protocol and 97.3%±1.4% for the 24‐hr protocol. Thus, the single‐scan protocol measurement is useful for dose verification of IMRT, based on its accuracy and efficiency. PACS number: 87.55.Qr PMID:26103194

  1. 40 CFR 1065.308 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) AIR POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Calibrations and Verifications § 1065.308 Continuous... adjusted to account for the dilution from ambient air drawn into the probe. We recommend you use the final... gases diluted in air. You may use a multi-gas span gas, such as NO-CO-CO2-C3H8-CH4, to verify multiple...

  2. Development of protocols for confined extension/creep testing of geosynthetics for highway applications

    DOT National Transportation Integrated Search

    1998-03-01

    This report presents the development and verification of a testing protocol and protocol equipment for confined extension testing and confined creep testing for geosynthetic reinforcement materials. The developed data indicate that confined response ...

  3. Specification, Synthesis, and Verification of Software-based Control Protocols for Fault-Tolerant Space Systems

    DTIC Science & Technology

    2016-08-16

    Force Research Laboratory Space Vehicles Directorate AFRL /RVSV 3550 Aberdeen Ave, SE 11. SPONSOR/MONITOR’S REPORT Kirtland AFB, NM 87117-5776 NUMBER...Ft Belvoir, VA 22060-6218 1 cy AFRL /RVIL Kirtland AFB, NM 87117-5776 2 cys Official Record Copy AFRL /RVSV/Richard S. Erwin 1 cy... AFRL -RV-PS- AFRL -RV-PS- TR-2016-0112 TR-2016-0112 SPECIFICATION, SYNTHESIS, AND VERIFICATION OF SOFTWARE-BASED CONTROL PROTOCOLS FOR FAULT-TOLERANT

  4. EPA GROUP VERIFIES PERFORMANCE OF GREENHOUSE GAS EMISSIONS-MITIGATION TECHNOLOGIES

    EPA Science Inventory

    The Greenhouse Gas Technology Verification Center (the Center) is one of 12 independently operated environmental technology verification organizations established by the U.S. Environmental Protection Agency (EPA). The Center provides third-party performance data to industry and o...

  5. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  6. Methodology for the specification of communication activities within the framework of a multi-layered architecture: Toward the definition of a knowledge base

    NASA Astrophysics Data System (ADS)

    Amyay, Omar

    A method defined in terms of synthesis and verification steps is presented. The specification of the services and protocols of communication within a multilayered architecture of the Open Systems Interconnection (OSI) type is an essential issue for the design of computer networks. The aim is to obtain an operational specification of the protocol service couple of a given layer. Planning synthesis and verification steps constitute a specification trajectory. The latter is based on the progressive integration of the 'initial data' constraints and verification of the specification originating from each synthesis step, through validity constraints that characterize an admissible solution. Two types of trajectories are proposed according to the style of the initial specification of the service protocol couple: operational type and service supplier viewpoint; knowledge property oriented type and service viewpoint. Synthesis and verification activities were developed and formalized in terms of labeled transition systems, temporal logic and epistemic logic. The originality of the second specification trajectory and the use of the epistemic logic are shown. An 'artificial intelligence' approach enables a conceptual model to be defined for a knowledge base system for implementing the method proposed. It is structured in three levels of representation of the knowledge relating to the domain, the reasoning characterizing synthesis and verification activities and the planning of the steps of a specification trajectory.

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BIOQUELL, INC. CLARIS C HYDROGEN PEROXIDE GAS GENERATOR

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of the Clarus C Hydrogen Peroxide Gas Generator, a biological decontamination device manufactured by BIOQUELL, Inc. The unit was tested by evaluating its ability to decontaminate seven types...

  8. A hardware-software system for the automation of verification and calibration of oil metering units secondary equipment

    NASA Astrophysics Data System (ADS)

    Boyarnikov, A. V.; Boyarnikova, L. V.; Kozhushko, A. A.; Sekachev, A. F.

    2017-08-01

    In the article the process of verification (calibration) of oil metering units secondary equipment is considered. The purpose of the work is to increase the reliability and reduce the complexity of this process by developing a software and hardware system that provides automated verification and calibration. The hardware part of this complex carries out the commutation of the measuring channels of the verified controller and the reference channels of the calibrator in accordance with the introduced algorithm. The developed software allows controlling the commutation of channels, setting values on the calibrator, reading the measured data from the controller, calculating errors and compiling protocols. This system can be used for checking the controllers of the secondary equipment of the oil metering units in the automatic verification mode (with the open communication protocol) or in the semi-automatic verification mode (without it). The peculiar feature of the approach used is the development of a universal signal switch operating under software control, which can be configured for various verification methods (calibration), which allows to cover the entire range of controllers of metering units secondary equipment. The use of automatic verification with the help of a hardware and software system allows to shorten the verification time by 5-10 times and to increase the reliability of measurements, excluding the influence of the human factor.

  9. VERIFYING THE VOC CONTROL PERFORMANCE OF BIOREACTORS

    EPA Science Inventory

    The paper describes the verification testing approach used to collect high-quality, peer-reviewed data on the performance of bioreaction-based technologies for the control of volatile organic compounds (VOCs). The verification protocol that describes the approach for these tests ...

  10. Environmental Technology Verification Program Fact Sheet

    EPA Science Inventory

    This is a Fact Sheet for the ETV Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The program ...

  11. 40 CFR 1065.307 - Linearity verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... meter at different flow rates. Use a gravimetric reference measurement (such as a scale, balance, or... nitrogen. Select gas divisions that you typically use. Use a selected gas division as the measured value.... For linearity verification for gravimetric PM balances, use external calibration weights that that...

  12. 40 CFR 1065.307 - Linearity verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... meter at different flow rates. Use a gravimetric reference measurement (such as a scale, balance, or... nitrogen. Select gas divisions that you typically use. Use a selected gas division as the measured value.... For linearity verification for gravimetric PM balances, use external calibration weights that that...

  13. Blind quantum computation with identity authentication

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  14. 40 CFR 1065.307 - Linearity verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... measurement (such as a scale, balance, or mass comparator) at the inlet to the fuel-measurement system. Use a... nitrogen. Select gas divisions that you typically use. Use a selected gas division as the measured value.... (9) Mass. For linearity verification for gravimetric PM balances, use external calibration weights...

  15. GREENHOUSE GAS (GHG) MITIGATION AND MONITORING TECHNOLOGY PERFORMANCE: ACTIVITIES OF THE GHG TECHNOLOGY VERIFICATION CENTER

    EPA Science Inventory

    The paper discusses greenhouse gas (GHG) mitigation and monitoring technology performance activities of the GHG Technology Verification Center. The Center is a public/private partnership between Southern Research Institute and the U.S. EPA's Office of Research and Development. It...

  16. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  17. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  18. Environmental Technology Verification (ETV) Quality Program (Poster)

    EPA Science Inventory

    This is a poster created for the ETV Quality Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The...

  19. Increased cardiac output elicits higher V̇O2max in response to self-paced exercise.

    PubMed

    Astorino, Todd Anthony; McMillan, David William; Edmunds, Ross Montgomery; Sanchez, Eduardo

    2015-03-01

    Recently, a self-paced protocol demonstrated higher maximal oxygen uptake versus the traditional ramp protocol. The primary aim of the current study was to further explore potential differences in maximal oxygen uptake between the ramp and self-paced protocols using simultaneous measurement of cardiac output. Active men and women of various fitness levels (N = 30, mean age = 26.0 ± 5.0 years) completed 3 graded exercise tests separated by a minimum of 48 h. Participants initially completed progressive ramp exercise to exhaustion to determine maximal oxygen uptake followed by a verification test to confirm maximal oxygen uptake attainment. Over the next 2 sessions, they performed a self-paced and an additional ramp protocol. During exercise, gas exchange data were obtained using indirect calorimetry, and thoracic impedance was utilized to estimate hemodynamic function (stroke volume and cardiac output). One-way ANOVA with repeated measures was used to determine differences in maximal oxygen uptake and cardiac output between ramp and self-paced testing. Results demonstrated lower (p < 0.001) maximal oxygen uptake via the ramp (47.2 ± 10.2 mL·kg(-1)·min(-1)) versus the self-paced (50.2 ± 9.6 mL·kg(-1)·min(-1)) protocol, with no interaction (p = 0.06) seen for fitness level. Maximal heart rate and cardiac output (p = 0.02) were higher in the self-paced protocol versus ramp exercise. In conclusion, data show that the traditional ramp protocol may underestimate maximal oxygen uptake compared with a newly developed self-paced protocol, with a greater cardiac output potentially responsible for this outcome.

  20. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  1. New generalized Noh solutions for HEDP hydrocode verification

    NASA Astrophysics Data System (ADS)

    Velikovich, A. L.; Giuliani, J. L.; Zalesak, S. T.; Tangri, V.

    2017-10-01

    The classic Noh solution describing stagnation of a cold ideal gas in a strong accretion shock wave has been the workhorse of compressible hydrocode verification for over three decades. We describe a number of its generalizations available for HEDP code verification. First, for an ideal gas, we have obtained self-similar solutions that describe adiabatic convergence either of a finite-pressure gas into an empty cavity or of a finite-amplitude sound wave into a uniform resting gas surrounding the center or axis of symmetry. At the moment of collapse such a flow produces a uniform gas whose velocity at each point is constant and directed towards the axis or the center, i. e. the initial condition similar to the classic solution but with a finite pressure of the converging gas. After that, a constant-velocity accretion shock propagates into the incident gas whose pressure and velocity profiles are not flat, in contrast with the classic solution. Second, for an arbitrary equation of state, we demonstrate the existence of self-similar solutions of the Noh problem in cylindrical and spherical geometry. Examples of such solutions with a three-term equation of state that includes cold, thermal ion/lattice, and thermal electron contributions are presented for aluminum and copper. These analytic solutions are compared to our numerical simulation results as an example of their use for code verification. Work supported by the US DOE/NNSA.

  2. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  3. Real-Time System Verification by Kappa-Induction

    NASA Technical Reports Server (NTRS)

    Pike, Lee S.

    2005-01-01

    We report the first formal verification of a reintegration protocol for a safety-critical, fault-tolerant, real-time distributed embedded system. A reintegration protocol increases system survivability by allowing a node that has suffered a fault to regain state consistent with the operational nodes. The protocol is verified in the Symbolic Analysis Laboratory (SAL), where bounded model checking and decision procedures are used to verify infinite-state systems by k-induction. The protocol and its environment are modeled as synchronizing timeout automata. Because k-induction is exponential with respect to k, we optimize the formal model to reduce the size of k. Also, the reintegrator's event-triggered behavior is conservatively modeled as time-triggered behavior to further reduce the size of k and to make it invariant to the number of nodes modeled. A corollary is that a clique avoidance property is satisfied.

  4. Structural verification for GAS experiments

    NASA Technical Reports Server (NTRS)

    Peden, Mark Daniel

    1992-01-01

    The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion Cracking requirements and National Space Transportation System (NSTS) requirements). Different approaches to structural verifications (tests and analyses) will be outlined especially those stemming from lessons learned on load and fundamental frequency verification. In addition, fracture control will be covered for those payloads that utilize a door assembly or modify the containment provided by the standard GAS Experiment Mounting Plate (EMP). Structural hazard assessment and the preparation of structural hazard reports will be reviewed to form a summation of structural safety issues for inclusion in the safety data package.

  5. Experimental Verification of Boyle's Law and the Ideal Gas Law

    ERIC Educational Resources Information Center

    Ivanov, Dragia Trifonov

    2007-01-01

    Two new experiments are offered concerning the experimental verification of Boyle's law and the ideal gas law. To carry out the experiments, glass tubes, water, a syringe and a metal manometer are used. The pressure of the saturated water vapour is taken into consideration. For educational purposes, the experiments are characterized by their…

  6. Environmental Technology Verification Report - NATCO Group, Inc. – Paques THIOPAQ Gas Purification Technology

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the ...

  7. 40 CFR 1065.550 - Gas analyzer range verification and drift verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... with a CLD and the removed water is corrected based on measured CO2, CO, THC, and NOX concentrations... concentration subcomponents (e.g., THC and CH4 for NMHC) separately. For example, for NMHC measurements, perform drift verification on NMHC; do not verify THC and CH4 separately. (2) Drift verification requires two...

  8. U.S. EPA Environmental Technology Verification Program, the Founder of the ETV Concept

    EPA Science Inventory

    The U.S. EPA Environmental Technology Verification (ETV) Program develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The program was created in 1995 to help accelerate t...

  9. An improved authenticated key agreement protocol for telecare medicine information system.

    PubMed

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  10. THIRD PARTY TECHNOLOGY PERFORMANCE VERIFICATION DATA FROM A STAKEHOLD-DRIVEN TECHNOLOGY TESTING PROGRAM

    EPA Science Inventory

    The Greenhouse Gas (GHG) Technology Verification Center is one of 12 independently operated verification centers established by the U.S. Environmental Protection Agency. The Center provides third-party performance data to stakeholders interested in environmetnal technologies tha...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: UTC FUEL CELLS' PC25C POWER PLANT - GAS PROCESSING UNIT PERFORMANCE FOR ANAEROBIC DIGESTER GAS

    EPA Science Inventory

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system based on the UTC Fuel Cell's PC25C Fuel Cell Power Plant was evaluated. The...

  12. 40 CFR 1065.362 - Non-stoichiometric raw exhaust FID O2 interference verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... air source during testing, use zero air as the FID burner's air source for this verification. (4) Zero the FID analyzer using the zero gas used during emission testing. (5) Span the FID analyzer using a span gas that you use during emission testing. (6) Check the zero response of the FID analyzer using...

  13. Verification of a Byzantine-Fault-Tolerant Self-stabilizing Protocol for Clock Synchronization

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2008-01-01

    This paper presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system except for the presence of sufficient good nodes, thus making the weakest possible assumptions and producing the strongest results. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV). The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space.

  14. Role Delineation Refinement and Verification. The Comprehensive Report. Final Report, October 1, 1978-July 31, 1980.

    ERIC Educational Resources Information Center

    Garrett, Gary L.; Zinsmeister, Joanne T.

    This document reports research focusing on physical therapists and physical therapist assistant role delineation refinement and verification; entry-level role determinations; and translation of these roles into an examination development protocol and examination blueprint specifications. Following an introduction, section 2 describes the survey…

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: AISIN SEIKI 6.0 KW NATURAL-GAS-FIRED ENGINE COGENERATION UNIT

    EPA Science Inventory

    The U.S. EPA's Office of Research and Development operates the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative technologies through performance verification and information dissemination. Congress funds ETV in response to the belief ...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HONEYWELL POWER SYSTEMS, INC. PARALLON 75 KW TURBOGENERATOR WITH CO EMISSIONS CONTROL

    EPA Science Inventory

    The Greenhouse Gas Technology Center (GHG Center), one of six verification organizations under the Environmental Technology Verification (ETV) program, evaluated the performance of the Parallon 75 kW Turbogenerator (Turbogenerator) with carbon monoxide (CO) emissions control syst...

  17. Optimal Verification of Entangled States with Local Measurements

    NASA Astrophysics Data System (ADS)

    Pallister, Sam; Linden, Noah; Montanaro, Ashley

    2018-04-01

    Consider the task of verifying that a given quantum device, designed to produce a particular entangled state, does indeed produce that state. One natural approach would be to characterize the output state by quantum state tomography, or alternatively, to perform some kind of Bell test, tailored to the state of interest. We show here that neither approach is optimal among local verification strategies for 2-qubit states. We find the optimal strategy in this case and show that quadratically fewer total measurements are needed to verify to within a given fidelity than in published results for quantum state tomography, Bell test, or fidelity estimation protocols. We also give efficient verification protocols for any stabilizer state. Additionally, we show that requiring that the strategy be constructed from local, nonadaptive, and noncollective measurements only incurs a constant-factor penalty over a strategy without these restrictions.

  18. Shear Ram Verification Test Protocol (VTP) Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lindley, Roy A.; Braun, Joseph C.

    A blowout preventer (BOP) is a critical component used on subsea oil and gas wells during drilling, completion, and workover operations on the U. S. outer continental shelf (OCS). The purpose of the BOP is to seal oil and gas wells, and in the case of an emergency well-control event, to prevent the uncontrolled release of hydrocarbons. One of the most important components of the BOP is the hydraulically operated blind shear ram (BSR) that shears drilling-related components, such as drill pipes, casings, tubings, and wire-related tools that may have been placed in the well. In addition to shearing thesemore » components, the BSR must form a seal to keep hydrocarbons within the well bore, even when under the highest well-fluid pressures expected. The purpose of this document is for Argonne National Laboratory (ANL) to provide an independent view, based on current regulations, and best practices for testing and confirming the operability and suitability of BSRs under realistic (or actual) well conditions.« less

  19. Experimental verification of multipartite entanglement in quantum networks

    PubMed Central

    McCutcheon, W.; Pappa, A.; Bell, B. A.; McMillan, A.; Chailloux, A.; Lawson, T.; Mafu, M.; Markham, D.; Diamanti, E.; Kerenidis, I.; Rarity, J. G.; Tame, M. S.

    2016-01-01

    Multipartite entangled states are a fundamental resource for a wide range of quantum information processing tasks. In particular, in quantum networks, it is essential for the parties involved to be able to verify if entanglement is present before they carry out a given distributed task. Here we design and experimentally demonstrate a protocol that allows any party in a network to check if a source is distributing a genuinely multipartite entangled state, even in the presence of untrusted parties. The protocol remains secure against dishonest behaviour of the source and other parties, including the use of system imperfections to their advantage. We demonstrate the verification protocol in a three- and four-party setting using polarization-entangled photons, highlighting its potential for realistic photonic quantum communication and networking applications. PMID:27827361

  20. 40 CFR 1065.350 - H2O interference verification for CO2 NDIR analyzers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... verification as follows: (1) Start, operate, zero, and span the CO2 NDIR analyzer as you would before an.... (2) Create a humidified test gas by bubbling zero gas that meets the specifications in § 1065.750..., as close as possible to the inlet of the analyzer. For example, measure dewpoint, T dew, and absolute...

  1. 40 CFR 1065.350 - H2O interference verification for CO2 NDIR analyzers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... verification as follows: (1) Start, operate, zero, and span the CO2 NDIR analyzer as you would before an.... (2) Create a humidified test gas by bubbling zero gas that meets the specifications in § 1065.750..., as close as possible to the inlet of the analyzer. For example, measure dewpoint, T dew, and absolute...

  2. 40 CFR 1065.350 - H2O interference verification for CO2 NDIR analyzers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... verification as follows: (1) Start, operate, zero, and span the CO2 NDIR analyzer as you would before an.... (2) Create a humidified test gas by bubbling zero gas that meets the specifications in § 1065.750..., as close as possible to the inlet of the analyzer. For example, measure dewpoint, T dew, and absolute...

  3. 40 CFR 1065.350 - H2O interference verification for CO2 NDIR analyzers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... verification as follows: (1) Start, operate, zero, and span the CO2 NDIR analyzer as you would before an.... (2) Create a humidified test gas by bubbling zero gas that meets the specifications in § 1065.750..., as close as possible to the inlet of the analyzer. For example, measure dewpoint, T dew, and absolute...

  4. 40 CFR 1065.350 - H2O interference verification for CO2 NDIR analyzers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... verification as follows: (1) Start, operate, zero, and span the CO2 NDIR analyzer as you would before an.... (2) Create a humidified test gas by bubbling zero gas that meets the specifications in § 1065.750..., as close as possible to the inlet of the analyzer. For example, measure dewpoint, T dew, and absolute...

  5. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  6. Test/QA Plan for Verification of Cavity Ringdown Spectroscopy Systems for Ammonia Monitoring in Stack Gas

    EPA Science Inventory

    The purpose of the cavity ringdown spectroscopy (CRDS) technology test and quality assurance plan is to specify procedures for a verification test applicable to commercial cavity ringdown spectroscopy technologies. The purpose of the verification test is to evaluate the performa...

  7. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  8. A model based security testing method for protocol implementation.

    PubMed

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  9. Two years experience with quality assurance protocol for patient related Rapid Arc treatment plan verification using a two dimensional ionization chamber array

    PubMed Central

    2011-01-01

    Purpose To verify the dose distribution and number of monitor units (MU) for dynamic treatment techniques like volumetric modulated single arc radiation therapy - Rapid Arc - each patient treatment plan has to be verified prior to the first treatment. The purpose of this study was to develop a patient related treatment plan verification protocol using a two dimensional ionization chamber array (MatriXX, IBA, Schwarzenbruck, Germany). Method Measurements were done to determine the dependence between response of 2D ionization chamber array, beam direction, and field size. Also the reproducibility of the measurements was checked. For the patient related verifications the original patient Rapid Arc treatment plan was projected on CT dataset of the MatriXX and the dose distribution was calculated. After irradiation of the Rapid Arc verification plans measured and calculated 2D dose distributions were compared using the gamma evaluation method implemented in the measuring software OmniPro (version 1.5, IBA, Schwarzenbruck, Germany). Results The dependence between response of 2D ionization chamber array, field size and beam direction has shown a passing rate of 99% for field sizes between 7 cm × 7 cm and 24 cm × 24 cm for measurements of single arc. For smaller and larger field sizes than 7 cm × 7 cm and 24 cm × 24 cm the passing rate was less than 99%. The reproducibility was within a passing rate of 99% and 100%. The accuracy of the whole process including the uncertainty of the measuring system, treatment planning system, linear accelerator and isocentric laser system in the treatment room was acceptable for treatment plan verification using gamma criteria of 3% and 3 mm, 2D global gamma index. Conclusion It was possible to verify the 2D dose distribution and MU of Rapid Arc treatment plans using the MatriXX. The use of the MatriXX for Rapid Arc treatment plan verification in clinical routine is reasonable. The passing rate should be 99% than the verification protocol is able to detect clinically significant errors. PMID:21342509

  10. An Evaluation Methodology for Protocol Analysis Systems

    DTIC Science & Technology

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  11. Voltage verification unit

    DOEpatents

    Martin, Edward J [Virginia Beach, VA

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  12. Physics Simulation Software for Autonomous Propellant Loading and Gas House Autonomous System Monitoring

    NASA Technical Reports Server (NTRS)

    Regalado Reyes, Bjorn Constant

    2015-01-01

    1. Kennedy Space Center (KSC) is developing a mobile launching system with autonomous propellant loading capabilities for liquid-fueled rockets. An autonomous system will be responsible for monitoring and controlling the storage, loading and transferring of cryogenic propellants. The Physics Simulation Software will reproduce the sensor data seen during the delivery of cryogenic fluids including valve positions, pressures, temperatures and flow rates. The simulator will provide insight into the functionality of the propellant systems and demonstrate the effects of potential faults. This will provide verification of the communications protocols and the autonomous system control. 2. The High Pressure Gas Facility (HPGF) stores and distributes hydrogen, nitrogen, helium and high pressure air. The hydrogen and nitrogen are stored in cryogenic liquid state. The cryogenic fluids pose several hazards to operators and the storage and transfer equipment. Constant monitoring of pressures, temperatures and flow rates are required in order to maintain the safety of personnel and equipment during the handling and storage of these commodities. The Gas House Autonomous System Monitoring software will be responsible for constantly observing and recording sensor data, identifying and predicting faults and relaying hazard and operational information to the operators.

  13. European Train Control System: A Case Study in Formal Verification

    NASA Astrophysics Data System (ADS)

    Platzer, André; Quesel, Jan-David

    Complex physical systems have several degrees of freedom. They only work correctly when their control parameters obey corresponding constraints. Based on the informal specification of the European Train Control System (ETCS), we design a controller for its cooperation protocol. For its free parameters, we successively identify constraints that are required to ensure collision freedom. We formally prove the parameter constraints to be sharp by characterizing them equivalently in terms of reachability properties of the hybrid system dynamics. Using our deductive verification tool KeYmaera, we formally verify controllability, safety, liveness, and reactivity properties of the ETCS protocol that entail collision freedom. We prove that the ETCS protocol remains correct even in the presence of perturbation by disturbances in the dynamics. We verify that safety is preserved when a PI controlled speed supervision is used.

  14. Environmental Technology Verification Report: Pesticide spray drift reduction technologies--Evaluation of the verification protocol for low and high speed wind tunnel testing

    EPA Science Inventory

    Pesticide spray drift is defined as the movement of spray droplets through the air at the time of application or soon thereafter from the target site to any non- or off-target site, excluding pesticide movements by erosion, migration, volatility, or windblown soil particles after...

  15. Integrated Formal Analysis of Timed-Triggered Ethernet

    NASA Technical Reports Server (NTRS)

    Dutertre, Bruno; Shankar, Nstarajan; Owre, Sam

    2012-01-01

    We present new results related to the verification of the Timed-Triggered Ethernet (TTE) clock synchronization protocol. This work extends previous verification of TTE based on model checking. We identify a suboptimal design choice in a compression function used in clock synchronization, and propose an improvement. We compare the original design and the improved definition using the SAL model checker.

  16. The Challenge for Arms Control Verification in the Post-New START World

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wuest, C R

    Nuclear weapon arms control treaty verification is a key aspect of any agreement between signatories to establish that the terms and conditions spelled out in the treaty are being met. Historically, arms control negotiations have focused more on the rules and protocols for reducing the numbers of warheads and delivery systems - sometimes resorting to complex and arcane procedures for counting forces - in an attempt to address perceived or real imbalances in a nation's strategic posture that could lead to instability. Verification procedures are generally defined in arms control treaties and supporting documents and tend to focus on technicalmore » means and measures designed to ensure that a country is following the terms of the treaty and that it is not liable to engage in deception or outright cheating in an attempt to circumvent the spirit and the letter of the agreement. As the Obama Administration implements the articles, terms, and conditions of the recently ratified and entered-into-force New START treaty, there are already efforts within and outside of government to move well below the specified New START levels of 1550 warheads, 700 deployed strategic delivery vehicles, and 800 deployed and nondeployed strategic launchers (Inter-Continental Ballistic Missile (ICBM) silos, Submarine-Launched Ballistic Missile (SLBM) tubes on submarines, and bombers). A number of articles and opinion pieces have appeared that advocate for significantly deeper cuts in the U.S. nuclear stockpile, with some suggesting that unilateral reductions on the part of the U.S. would help coax Russia and others to follow our lead. Papers and studies prepared for the U.S. Department of Defense and at the U.S. Air War College have also been published, suggesting that nuclear forces totaling no more than about 300 warheads would be sufficient to meet U.S. national security and deterrence needs. (Davis 2011, Schaub and Forsyth 2010) Recent articles by James M. Acton and others suggest that the prospects for maintaining U.S. security and minimizing the chances of nuclear war, while deliberately reducing stockpiles to a few hundred weapons, is possible but not without risk. While the question of the appropriate level of cuts to U.S. nuclear forces is being actively debated, a key issue continues to be whether verification procedures are strong enough to ensure that both the U.S. and Russia are fulfilling their obligations under the current New Start treaty and any future arms reduction treaties. A recent opinion piece by Henry Kissinger and Brent Scowcroft (2012) raised a number of issues with respect to governing a policy to enhance strategic stability, including: in deciding on force levels and lower numbers, verification is crucial. Particularly important is a determination of what level of uncertainty threatens the calculation of stability. At present, that level is well within the capabilities of the existing verification systems. We must be certain that projected levels maintain - and when possible, reinforce - that confidence. The strengths and weaknesses of the New START verification regime should inform and give rise to stronger regimes for future arms control agreements. These future arms control agreements will likely need to include other nuclear weapons states and so any verification regime will need to be acceptable to all parties. Currently, China is considered the most challenging party to include in any future arms control agreement and China's willingness to enter into verification regimes such as those implemented in New START may only be possible when it feels it has reached nuclear parity with the U.S. and Russia. Similarly, in keeping with its goals of reaching peer status with the U.S. and Russia, Frieman (2004) suggests that China would be more willing to accept internationally accepted and applied verification regimes rather than bilateral ones. The current verification protocols specified in the New START treaty are considered as the baseline case and are contrasted with possible alternative verification protocols that could be effective in a post-New START era of significant reductions in U.S. and other countries nuclear stockpiles. Of particular concern is the possibility of deception and breakout when declared and observed numbers of weapons are below the level considered to pose an existential threat to the U.S. In a regime of very low stockpile numbers, 'traditional' verification protocols as currently embodied in the New START treaty might prove less than adequate. I introduce and discuss a number of issues that need to be considered in future verification protocols, many of which do not have immediate solutions and so require further study. I also discuss alternatives and enhancements to traditional verification protocols, for example, confidence building measures such as burden sharing against the common threat of weapon of mass destruction (WMD) terrorism, joint research and development.« less

  17. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    PubMed Central

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  18. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  19. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.

    PubMed

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.

  20. Computational-hydrodynamic studies of the Noh compressible flow problem using non-ideal equations of state

    NASA Astrophysics Data System (ADS)

    Honnell, Kevin; Burnett, Sarah; Yorke, Chloe'; Howard, April; Ramsey, Scott

    2017-06-01

    The Noh problem is classic verification problem in the field of compressible flows. Simple to conceptualize, it is nonetheless difficult for numerical codes to predict correctly, making it an ideal code-verification test bed. In its original incarnation, the fluid is a simple ideal gas; once validated, however, these codes are often used to study highly non-ideal fluids and solids. In this work the classic Noh problem is extended beyond the commonly-studied polytropic ideal gas to more realistic equations of state (EOS) including the stiff gas, the Nobel-Abel gas, and the Carnahan-Starling hard-sphere fluid, thus enabling verification studies to be performed on more physically-realistic fluids. Exact solutions are compared with numerical results obtained from the Lagrangian hydrocode FLAG, developed at Los Alamos. For these more realistic EOSs, the simulation errors decreased in magnitude both at the origin and at the shock, but also spread more broadly about these points compared to the ideal EOS. The overall spatial convergence rate remained first order.

  1. One-Dimensional Ablation with Pyrolysis Gas Flow Using a Full Newton's Method and Finite Control Volume Procedure

    NASA Technical Reports Server (NTRS)

    Amar, Adam J.; Blackwell, Ben F.; Edwards, Jack R.

    2007-01-01

    The development and verification of a one-dimensional material thermal response code with ablation is presented. The implicit time integrator, control volume finite element spatial discretization, and Newton's method for nonlinear iteration on the entire system of residual equations have been implemented and verified for the thermochemical ablation of internally decomposing materials. This study is a continuation of the work presented in "One-Dimensional Ablation with Pyrolysis Gas Flow Using a Full Newton's Method and Finite Control Volume Procedure" (AIAA-2006-2910), which described the derivation, implementation, and verification of the constant density solid energy equation terms and boundary conditions. The present study extends the model to decomposing materials including decomposition kinetics, pyrolysis gas flow through the porous char layer, and a mixture (solid and gas) energy equation. Verification results are presented for the thermochemical ablation of a carbon-phenolic ablator which involves the solution of the entire system of governing equations.

  2. 77 FR 6094 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-07

    ....-International Atomic Energy Agency Additional Protocol. Under the U.S.-International Atomic Energy Agency (IAEA...-related activities to the IAEA and potentially provide access to IAEA inspectors for verification purposes. The U.S.-IAEA Additional Protocol permits the United States unilaterally to declare exclusions from...

  3. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Keates, Steven

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).

  4. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  5. Security Protocol Verification and Optimization by Epistemic Model Checking

    DTIC Science & Technology

    2010-11-05

    Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the

  6. Towards durable multistakeholder-generated solutions: The pilot application of a problem-oriented policy learning protocol to legality verification and community rights in Peru

    Treesearch

    D. Humphreys; B. Cashore; I.J. Visseren-Hamakers; W. De Jong; K. McGinley; A. Denvir; P. Caro Torres; S. Lupberger

    2017-01-01

    This paper reports and reflects on the pilot application of an 11-step policy learning protocol that was developed by Cashore and Lupberger (2015) based on several years of Cashore's multi-author collaborations. The protocol was applied for the first time in Peru in 2015 and 2016 by the IUFRO Working Party on Forest Policy Learning Architectures (hereinafter...

  7. [Protocols for the diagnostic verification of lymph node toxoplasmosis].

    PubMed

    Carosi, G; Ghezzi, L G; Filice, G; Maccabruni, A; Parisi, A; Carnevale, G

    1983-05-31

    The protocol we have fixed for the diagnosis of lymphonodal toxoplasmosis includes a precise succession of tests: 1) specific repeated serological tests (I.H.A.T., I.F.A.T., IgM--I.F.A.T. on total serum and on pure IgM fraction); 2) lymphonodal biopsy for histological examination and biological test (isolation procedure in mouse). We have evaluated the effectiveness of our protocol in 20 cases that we observed during 1980.

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT ANR PIPELINE COMPANY PARAMETRIC EMISSIONS MONITORING SYSTEM (PEMS)

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of a gaseous-emissions monitoring system for large, natural-gas-fired internal combustion engines. The device tested is the Parametric Emissions Monitoring System (PEMS) manufactured by ANR ...

  9. Environmental Technology Verification Report: Taconic Energy, Inc. TEA Fuel Additive

    EPA Science Inventory

    The Greenhouse Gas Technology Center (GHG Center) is one of six verification organizations operating under EPA’s ETV program. One sector of significant interest to GHG Center stakeholders is transportation - particularly technologies that result in fuel economy improvements. Taco...

  10. 40 CFR 1066.130 - Measurement instrument calibrations and verifications.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Measurement instrument calibrations... (CONTINUED) AIR POLLUTION CONTROLS VEHICLE-TESTING PROCEDURES Equipment, Measurement Instruments, Fuel, and Analytical Gas Specifications § 1066.130 Measurement instrument calibrations and verifications. The...

  11. 77 FR 26822 - Pipeline Safety: Verification of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2012-0068] Pipeline Safety: Verification of Records AGENCY: Pipeline and Hazardous Materials... issuing an Advisory Bulletin to remind operators of gas and hazardous liquid pipeline facilities to verify...

  12. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH - PERKIN-ELMER PHOTOVAC, INC. VOYAGOR

    EPA Science Inventory

    The U.S Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. Reports document the performa...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH - SENTEX SYSTEMS, INC. SCENTOGRAPH PLUS II

    EPA Science Inventory

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. This report documents demons...

  15. YIP Formal Synthesis of Software-Based Control Protocols for Fractionated,Composable Autonomous Systems

    DTIC Science & Technology

    2016-07-08

    Systems Using Automata Theory and Barrier Certifi- cates We developed a sound but incomplete method for the computational verification of specifications...method merges ideas from automata -based model checking with those from control theory including so-called barrier certificates and optimization-based... Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems,” IEEE Transactions on Automatic Control, 2015. [J2] R

  16. A Logical Analysis of Quantum Voting Protocols

    NASA Astrophysics Data System (ADS)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  17. Test/QA plan for the validation of the verification protocol for high speed pesticide spray drift reduction technologies for row and field crops

    EPA Science Inventory

    This test/QA plan for evaluation the generic test protocol for high speed wind tunnel, representing aerial application, pesticide spray drift reduction technologies (DRT) for row and field crops is in conformance with EPA Requirements for Quality Assurance Project Plans (EPA QA/R...

  18. Test/QA plan for the validation of the verification protocol for low speed pesticide spray drift reduction technologies for row and field crops

    EPA Science Inventory

    This test/QA plan for evaluation the generic test protocol for high speed wind tunnel, representing aerial application, pesticide spray drift reduction technologies (DRT) for row and field crops is in conformance with EPA Requirements for Quality Assurance Project Plans (EPA QA/R...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, NOX CONTROL TECHNOLOGIES, CATALYTICA COMBUSTION SYSTEMS, INC., XONON FLAMELESS COMBUSTION SYSTEM

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of the Xonon Cool Combustion System manufactured by Catalytica Energy Systems, Inc., formerly Catalytica Combustion Systems, Inc., to control NOx emissions from gas turbines that operate wit...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: ECR TECHNOLOGIES, INC., EARTHLINKED GROUND-SOURCE HEAT PUMP WATER HEATING SYSTEM

    EPA Science Inventory

    EPA has created the Environmental Technology Verification program to provide high quality, peer reviewed data on technology performance. This data is expected to accelerate the acceptance and use of improved environmental protection technologies. The Greenhouse Gas Technology C...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH ELECTRONIC SENSOR TECHNOLOGY MODEL 4100

    EPA Science Inventory

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. As part of this program, the...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PHOTOACOUSTIC SPECTROPHOTOMATER INNOVA AIR TECH INSTRUMENTS MODEL 1312 MULTI-GAS MONITOR

    EPA Science Inventory

    The U.S. Environmental Protection Agency, Through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. This report documents demons...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: CONSTELLATION TECHNOLOGY CORPORATION - CT-1128 PORTABLE GAS CHROMATOGRAPH-MASS SPECTROMETER

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program, beginning as an initiative of the U.S. Environmental Protection Agency (EPA) in 1995, verifies the performance of commercially available, innovative technologies that can be used to measure environmental quality. The ETV p...

  4. Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction

    NASA Astrophysics Data System (ADS)

    Aarts, Fides; Jonsson, Bengt; Uijen, Johan

    In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets. A main idea is to adapt the framework of predicate abstraction, successfully used in formal verification. Since we are in a black-box setting, the abstraction must be supplied externally, using information about how the component manages data parameters. We have implemented our techniques by connecting the LearnLib tool for regular inference with the protocol simulator ns-2, and generated a model of the SIP component as implemented in ns-2.

  5. Verification of hypergraph states

    NASA Astrophysics Data System (ADS)

    Morimae, Tomoyuki; Takeuchi, Yuki; Hayashi, Masahito

    2017-12-01

    Hypergraph states are generalizations of graph states where controlled-Z gates on edges are replaced with generalized controlled-Z gates on hyperedges. Hypergraph states have several advantages over graph states. For example, certain hypergraph states, such as the Union Jack states, are universal resource states for measurement-based quantum computing with only Pauli measurements, while graph state measurement-based quantum computing needs non-Clifford basis measurements. Furthermore, it is impossible to classically efficiently sample measurement results on hypergraph states unless the polynomial hierarchy collapses to the third level. Although several protocols have been proposed to verify graph states with only sequential single-qubit Pauli measurements, there was no verification method for hypergraph states. In this paper, we propose a method for verifying a certain class of hypergraph states with only sequential single-qubit Pauli measurements. Importantly, no i.i.d. property of samples is assumed in our protocol: any artificial entanglement among samples cannot fool the verifier. As applications of our protocol, we consider verified blind quantum computing with hypergraph states, and quantum computational supremacy demonstrations with hypergraph states.

  6. 40 CFR 1065.370 - CLD CO2 and H2O quench verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... gas divider that blends binary span gases with zero gas as the diluent and meets the specifications in... the maximum NO concentration expected during emission testing. (6) Zero and span the CLD analyzer... divider. Connect the NO span gas to the span port of the gas divider; connect a zero gas to the diluent...

  7. 40 CFR 1065.370 - CLD CO2 and H2O quench verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... gas divider that blends binary span gases with zero gas as the diluent and meets the specifications in... the maximum NO concentration expected during emission testing. (6) Zero and span the CLD analyzer... divider. Connect the NO span gas to the span port of the gas divider; connect a zero gas to the diluent...

  8. 40 CFR 1065.370 - CLD CO2 and H2O quench verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... gas divider that blends binary span gases with zero gas as the diluent and meets the specifications in... the maximum NO concentration expected during emission testing. (6) Zero and span the CLD analyzer... divider. Connect the NO span gas to the span port of the gas divider; connect a zero gas to the diluent...

  9. 40 CFR 1065.370 - CLD CO2 and H2O quench verification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... gas divider that blends binary span gases with zero gas as the diluent and meets the specifications in... the maximum NO concentration expected during emission testing. (6) Zero and span the CLD analyzer... divider. Connect the NO span gas to the span port of the gas divider; connect a zero gas to the diluent...

  10. Supersonic gas-liquid cleaning system

    NASA Technical Reports Server (NTRS)

    Caimi, Raoul E. B.; Thaxton, Eric A.

    1994-01-01

    A system to perform cleaning and cleanliness verification is being developed to replace solvent flush methods using CFC 113 for fluid system components. The system is designed for two purposes: internal and external cleaning and verification. External cleaning is performed with the nozzle mounted at the end of a wand similar to a conventional pressure washer. Internal cleaning is performed with a variety of fixtures designed for specific applications. Internal cleaning includes tubes, pipes, flex hoses, and active fluid components such as valves and regulators. The system uses gas-liquid supersonic nozzles to generate high impingement velocities at the surface of the object to be cleaned. Compressed air or any inert gas may be used to provide the conveying medium for the liquid. The converging-diverging nozzles accelerate the gas-liquid mixture to supersonic velocities. The liquid being accelerated may be any solvent including water. This system may be used commercially to replace CFC and other solvent cleaning methods widely used to remove dust, dirt, flux, and lubricants. In addition, cleanliness verification can be performed without the solvents which are typically involved. This paper will present the technical details of the system, the results achieved during testing at KSC, and future applications for this system.

  11. Supersonic gas-liquid cleaning system

    NASA Astrophysics Data System (ADS)

    Caimi, Raoul E. B.; Thaxton, Eric A.

    1994-02-01

    A system to perform cleaning and cleanliness verification is being developed to replace solvent flush methods using CFC 113 for fluid system components. The system is designed for two purposes: internal and external cleaning and verification. External cleaning is performed with the nozzle mounted at the end of a wand similar to a conventional pressure washer. Internal cleaning is performed with a variety of fixtures designed for specific applications. Internal cleaning includes tubes, pipes, flex hoses, and active fluid components such as valves and regulators. The system uses gas-liquid supersonic nozzles to generate high impingement velocities at the surface of the object to be cleaned. Compressed air or any inert gas may be used to provide the conveying medium for the liquid. The converging-diverging nozzles accelerate the gas-liquid mixture to supersonic velocities. The liquid being accelerated may be any solvent including water. This system may be used commercially to replace CFC and other solvent cleaning methods widely used to remove dust, dirt, flux, and lubricants. In addition, cleanliness verification can be performed without the solvents which are typically involved. This paper will present the technical details of the system, the results achieved during testing at KSC, and future applications for this system.

  12. 40 CFR Appendix A - Protocol for Using an Electrochemical Analyzer to Determine Oxygen and Carbon Monoxide...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...

  13. 40 CFR Appendix A - Protocol for Using an Electrochemical Analyzer to Determine Oxygen and Carbon Monoxide...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...

  14. Comprehensive predictions of target proteins based on protein-chemical interaction using virtual screening and experimental verifications.

    PubMed

    Kobayashi, Hiroki; Harada, Hiroko; Nakamura, Masaomi; Futamura, Yushi; Ito, Akihiro; Yoshida, Minoru; Iemura, Shun-Ichiro; Shin-Ya, Kazuo; Doi, Takayuki; Takahashi, Takashi; Natsume, Tohru; Imoto, Masaya; Sakakibara, Yasubumi

    2012-04-05

    Identification of the target proteins of bioactive compounds is critical for elucidating the mode of action; however, target identification has been difficult in general, mostly due to the low sensitivity of detection using affinity chromatography followed by CBB staining and MS/MS analysis. We applied our protocol of predicting target proteins combining in silico screening and experimental verification for incednine, which inhibits the anti-apoptotic function of Bcl-xL by an unknown mechanism. One hundred eighty-two target protein candidates were computationally predicted to bind to incednine by the statistical prediction method, and the predictions were verified by in vitro binding of incednine to seven proteins, whose expression can be confirmed in our cell system.As a result, 40% accuracy of the computational predictions was achieved successfully, and we newly found 3 incednine-binding proteins. This study revealed that our proposed protocol of predicting target protein combining in silico screening and experimental verification is useful, and provides new insight into a strategy for identifying target proteins of small molecules.

  15. Using software security analysis to verify the secure socket layer (SSL) protocol

    NASA Technical Reports Server (NTRS)

    Powell, John D.

    2004-01-01

    nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.

  16. A zero-knowledge protocol for nuclear warhead verification

    NASA Astrophysics Data System (ADS)

    Glaser, Alexander; Barak, Boaz; Goldston, Robert J.

    2014-06-01

    The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring `information barriers', designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HONEYWELL POWER SYSTEMS, INC. PARALLON 75 KW TURBOGENERATOR

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of the Parallon 75kW Turbogenerator manufactured by Honeywell Power Systems, Inc., formerly AlliedSignal Power Systems, Inc. The unit uses a natural-gas-fired turbine to power an electric ge...

  18. GREENHOUSE GAS (GHG) VERIFICATION GUIDELINE SERIES: ANR Pipeline Company PARAMETRIC EMISSIONS MONITORING SYSTEM (PEMS) VERSION 1.0

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of the Parametric Emissions Monitoring System (PEMS) manufactured by ANR Pipeline Company, a subsidiary of Coastal Corporation, now El Paso Corporation. The PEMS predicts carbon doixide (CO2...

  19. Evaluation of HCFC AK 225 Alternatives for Precision Cleaning and Verification

    NASA Technical Reports Server (NTRS)

    Melton, D. M.

    1998-01-01

    Maintaining qualified cleaning and verification processes are essential in an production environment. Environmental regulations have and are continuing to impact cleaning and verification processing in component and large structures, both at the Michoud Assembly Facility and component suppliers. The goal of the effort was to assure that the cleaning and verification proceeds unimpeded and that qualified, environmentally compliant material and process replacements are implemented and perform to specifications. The approach consisted of (1) selection of a Supersonic Gas-Liquid Cleaning System; (2) selection and evaluation of three cleaning and verification solvents as candidate alternatives to HCFC 225 (Vertrel 423 (HCFC), Vertrel MCA (HFC/1,2-Dichloroethylene), and HFE 7100DE (HFE/1,2 Dichloroethylene)); and evaluation of an analytical instrumental post cleaning verification technique. This document is presented in viewgraph format.

  20. The Decremental Protocol as an Alternative Protocol to Measure Maximal Oxygen Consumption in Athletes.

    PubMed

    Taylor, Katrina; Seegmiller, Jeffrey; Vella, Chantal A

    2016-11-01

    To determine whether a decremental protocol could elicit a higher maximal oxygen consumption (VO 2 max) than an incremental protocol in trained participants. A secondary aim was to examine whether cardiac-output (Q) and stroke-volume (SV) responses differed between decremental and incremental protocols in this sample. Nineteen runners/triathletes were randomized to either the decremental or incremental group. All participants completed an initial incremental VO 2 max test on a treadmill, followed by a verification phase. The incremental group completed 2 further incremental tests. The decremental group completed a second VO 2 max test using the decremental protocol, based on their verification phase. The decremental group then completed a final incremental test. During each test, VO 2 , ventilation, and heart rate were measured, and cardiac variables were estimated with thoracic bioimpedance. Repeated-measures analysis of variance was conducted with an alpha level set at .05. There were no significant main effects for group (P = .37) or interaction (P = .10) over time (P = .45). VO 2 max was similar between the incremental (57.29 ± 8.94 mL · kg -1 · min -1 ) and decremental (60.82 ± 8.49 mL · kg -1 · min -1 ) groups over time. Furthermore, Q and SV were similar between the incremental (Q 22.72 ± 5.85 L/min, SV 119.64 ± 33.02 mL/beat) and decremental groups (Q 20.36 ± 4.59 L/min, SV 109.03 ± 24.27 mL/beat) across all 3 trials. The findings suggest that the decremental protocol does not elicit higher VO 2 max than an incremental protocol but may be used as an alternative protocol to measure VO 2 max in runners and triathletes.

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT-A AND A ENVIRONMENTAL SEALS, INC., SEAL ASSIST SYSTEM (SAS) PHASE II REPORT

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of Seal Assist System (SAS) for natural gas reciprocating compressor rod packing manufactured by A&A Environmental Seals, Inc. The SAS uses a secondary containment gland to collect natural g...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, C. LEE COOK DIVISION, DOVER CORPORATION, STATIC PAC (TM) SYSTEM, PHASE II REPORT

    EPA Science Inventory

    The Environmental Technology Verification report discusses the technology and performance of the Static Pac System, Phase II, natural gas reciprocating compressor rod packing manufactured by the C. Lee Cook Division, Dover Corporation. The Static Pac System is designed to seal th...

  3. Ocean fertilization, carbon credits and the Kyoto Protocol

    NASA Astrophysics Data System (ADS)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization are unlikely to meet the Kyoto Protocol's verification and accounting standards for trading carbon credits on the regulated market. The marketability of ocean fertilization in the voluntary carbon marketplace will likely depend on companies' efforts to minimize environmental risks and consumers' willingness to accept remaining risks.

  4. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP). High Transfer Efficiency Spray Equipment - Generic Verification Protocol (Revision 0)

    DTIC Science & Technology

    2006-09-30

    High-Pressure Waterjet • CO2 Pellet/Turbine Wheel • Ultrahigh-Pressure Waterjet 5 Process Water Reuse/Recycle • Cross-Flow Microfiltration ...documented on a process or laboratory form. Corrective action will involve taking all necessary steps to restore a measuring system to proper working order...In all cases, a nonconformance will be rectified before sample processing and analysis continues. If corrective action does not restore the

  5. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

    NASA Astrophysics Data System (ADS)

    Seedorf, Jan; Beckers, Kristian; Huici, Felipe

    The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.

  6. Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence.

    PubMed

    Vavrek, Jayson R; Henderson, Brian S; Danagoulian, Areg

    2018-04-24

    Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618-8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal from the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy "genuine" and "hoax" objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.

  7. Estimating the greenhouse gas benefits of forestry projects: A Costa Rican Case Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Busch, Christopher; Sathaye, Jayant; Sanchez Azofeifa, G. Arturo

    If the Clean Development Mechanism proposed under the Kyoto Protocol is to serve as an effective means for combating global climate change, it will depend upon reliable estimates of greenhouse gas benefits. This paper sketches the theoretical basis for estimating the greenhouse gas benefits of forestry projects and suggests lessons learned based on a case study of Costa Rica's Protected Areas Project, which is a 500,000 hectare effort to reduce deforestation and enhance reforestation. The Protected Areas Project in many senses advances the state of the art for Clean Development Mechanism-type forestry projects, as does the third-party verification work ofmore » SGS International Certification Services on the project. Nonetheless, sensitivity analysis shows that carbon benefit estimates for the project vary widely based on the imputed deforestation rate in the baseline scenario, e.g. the deforestation rate expected if the project were not implemented. This, along with a newly available national dataset that confirms other research showing a slower rate of deforestation in Costa Rica, suggests that the use of the 1979--1992 forest cover data originally as the basis for estimating carbon savings should be reconsidered. When the newly available data is substituted, carbon savings amount to 8.9 Mt (million tones) of carbon, down from the original estimate of 15.7 Mt. The primary general conclusion is that project developers should give more attention to the forecasting land use and land cover change scenarios underlying estimates of greenhouse gas benefits.« less

  8. Verification of performance specifications of a molecular test: cystic fibrosis carrier testing using the Luminex liquid bead array.

    PubMed

    Lacbawan, Felicitas L; Weck, Karen E; Kant, Jeffrey A; Feldman, Gerald L; Schrijver, Iris

    2012-01-01

    The number of clinical laboratories introducing various molecular tests to their existing test menu is continuously increasing. Prior to offering a US Food and Drug Administration-approved test, it is necessary that performance characteristics of the test, as claimed by the company, are verified before the assay is implemented in a clinical laboratory. To provide an example of the verification of a specific qualitative in vitro diagnostic test: cystic fibrosis carrier testing using the Luminex liquid bead array (Luminex Molecular Diagnostics, Inc, Toronto, Ontario). The approach used by an individual laboratory for verification of a US Food and Drug Administration-approved assay is described. Specific verification data are provided to highlight the stepwise verification approach undertaken by a clinical diagnostic laboratory. Protocols for verification of in vitro diagnostic assays may vary between laboratories. However, all laboratories must verify several specific performance specifications prior to implementation of such assays for clinical use. We provide an example of an approach used for verifying performance of an assay for cystic fibrosis carrier screening.

  9. Verification and large scale clinical evaluation of a national standard protocol for Salmonella spp./Shigella spp. screening using real-time PCR combined with guided culture.

    PubMed

    Tang, Xi-Jun; Yang, Ze; Chen, Xin-Bin; Tian, Wen-Fang; Tu, Cheng-Ning; Wang, Hai-Bo

    2018-02-01

    Salmonella spp./Shigella spp. are often associated with food poisoning and fecal-oral transmission of acute gastroenteritis that requires strict monitoring, especially among people who would handle food and water. In 2014, the National Health and Family Planning Commission of the P. R. China issued a national standard protocol (recommendatory) for the screening of Salmonella spp./Shigella spp.. However, its performance has not been fully studied. Whether it was suitable for use in our laboratory was still unknown. In the current study, the new protocol was first verified by various experiments and then its clinical performance was evaluated in about 20,000 stool samples over a three-year period. Verification results showed that the new protocol was highly specific and reproducible. Sensitivity (as defined as the lower limit of detection) of the new protocol at the PCR step was 10 3 CFU/mL and 10 1 CFU/mL for Salmonella spp. and Shigella spp., while that at the guided culture step was 10 4 CFU/mL and 10 3 CFU/mL, respectively. The large scale clinical evaluation indicated that the new protocol could increase the positivity rate by two fold and decrease the workload/median turnaround time significantly. In conclusion, the protocol was verified and evaluated and was proven to be a valuable platform for the rapid, specific, sensitive and high-throughput screening of Salmonella spp./Shigella spp. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Design of verification platform for wireless vision sensor networks

    NASA Astrophysics Data System (ADS)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  11. Verification of performance specifications for a US Food and Drug Administration-approved molecular microbiology test: Clostridium difficile cytotoxin B using the Becton, Dickinson and Company GeneOhm Cdiff assay.

    PubMed

    Schlaberg, Robert; Mitchell, Michael J; Taggart, Edward W; She, Rosemary C

    2012-01-01

    US Food and Drug Administration (FDA)-approved diagnostic tests based on molecular genetic technologies are becoming available for an increasing number of microbial pathogens. Advances in technology and lower costs have moved molecular diagnostic tests formerly performed for research purposes only into much wider use in clinical microbiology laboratories. To provide an example of laboratory studies performed to verify the performance of an FDA-approved assay for the detection of Clostridium difficile cytotoxin B compared with the manufacturer's performance standards. We describe the process and protocols used by a laboratory for verification of an FDA-approved assay, assess data from the verification studies, and implement the assay after verification. Performance data from the verification studies conducted by the laboratory were consistent with the manufacturer's performance standards and the assay was implemented into the laboratory's test menu. Verification studies are required for FDA-approved diagnostic assays prior to use in patient care. Laboratories should develop a standardized approach to verification studies that can be adapted and applied to different types of assays. We describe the verification of an FDA-approved real-time polymerase chain reaction assay for the detection of a toxin gene in a bacterial pathogen.

  12. 40 CFR 1065.309 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... change the system response. (b) Measurement principles. This procedure verifies that the updating and... gas detectors used to generate a continuously combined/compensated concentration measurement signal... verifies that the measurement system meets a minimum response time. For this procedure, ensure that all...

  13. 77 FR 28401 - Information Collection Activities: Legacy Data Verification Process (LDVP); Submitted for Office...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... and natural gas resources in a manner that is consistent with the need to make such resources... to prevent or minimize the likelihood of blowouts, loss of well control, fires, spillages, physical... the environment or to property, or endanger life or health.'' BSEE's Legacy Data Verification Process...

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Latty, Drew, E-mail: drew.latty@health.nsw.gov.au; Stuart, Kirsty E; Westmead Breast Cancer Institute, Sydney, New South Wales

    Radiation treatment to the left breast is associated with increased cardiac morbidity and mortality. The deep inspiration breath-hold technique (DIBH) can decrease radiation dose delivered to the heart and this may facilitate the treatment of the internal mammary chain nodes. The aim of this review is to critically analyse the literature available in relation to breath-hold methods, implementation, utilisation, patient compliance, planning methods and treatment verification of the DIBH technique. Despite variation in the literature regarding the DIBH delivery method, patient coaching, visual feedback mechanisms and treatment verification, all methods of DIBH delivery reduce radiation dose to the heart. Furthermore » research is required to determine optimum protocols for patient training and treatment verification to ensure the technique is delivered successfully.« less

  15. Comments for A Conference on Verification in the 21st Century

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doyle, James E.

    2012-06-12

    The author offers 5 points for the discussion of Verification and Technology: (1) Experience with the implementation of arms limitation and arms reduction agreements confirms that technology alone has never been relied upon to provide effective verification. (2) The historical practice of verification of arms control treaties between Cold War rivals may constrain the cooperative and innovative use of technology for transparency, veification and confidence building in the future. (3) An area that has been identified by many, including the US State Department and NNSA as being rich for exploration for potential uses of technology for transparency and verification ismore » information and communications technology (ICT). This includes social media, crowd-sourcing, the internet of things, and the concept of societal verification, but there are issues. (4) On the issue of the extent to which verification technologies are keeping pace with the demands of future protocols and agrements I think the more direct question is ''are they effective in supporting the objectives of the treaty or agreement?'' In this regard it is important to acknowledge that there is a verification grand challenge at our doorstep. That is ''how does one verify limitations on nuclear warheads in national stockpiles?'' (5) Finally, while recognizing the daunting political and security challenges of such an approach, multilateral engagement and cooperation at the conceptual and technical levels provides benefits for addressing future verification challenges.« less

  16. Low cost solar array project silicon materials task. Development of a process for high capacity arc heater production of silicon for solar arrays

    NASA Technical Reports Server (NTRS)

    Fey, M. G.

    1981-01-01

    The experimental verification system for the production of silicon via the arc heater-sodium reduction of SiCl4 was designed, fabricated, installed, and operated. Each of the attendant subsystems was checked out and operated to insure performance requirements. These subsystems included: the arc heaters/reactor, cooling water system, gas system, power system, Control & Instrumentation system, Na injection system, SiCl4 injection system, effluent disposal system and gas burnoff system. Prior to introducing the reactants (Na and SiCl4) to the arc heater/reactor, a series of gas only-power tests was conducted to establish the operating parameters of the three arc heaters of the system. Following the successful completion of the gas only-power tests and the readiness tests of the sodium and SiCl4 injection systems, a shakedown test of the complete experimental verification system was conducted.

  17. Verification of a Proposed Clinical Electroacoustic Test Protocol for Personal Digital Modulation Receivers Coupled to Cochlear Implant Sound Processors.

    PubMed

    Nair, Erika L; Sousa, Rhonda; Wannagot, Shannon

    Guidelines established by the AAA currently recommend behavioral testing when fitting frequency modulated (FM) systems to individuals with cochlear implants (CIs). A protocol for completing electroacoustic measures has not yet been validated for personal FM systems or digital modulation (DM) systems coupled to CI sound processors. In response, some professionals have used or altered the AAA electroacoustic verification steps for fitting FM systems to hearing aids when fitting FM systems to CI sound processors. More recently steps were outlined in a proposed protocol. The purpose of this research is to review and compare the electroacoustic test measures outlined in a 2013 article by Schafer and colleagues in the Journal of the American Academy of Audiology titled "A Proposed Electroacoustic Test Protocol for Personal FM Receivers Coupled to Cochlear Implant Sound Processors" to the AAA electroacoustic verification steps for fitting FM systems to hearing aids when fitting DM systems to CI users. Electroacoustic measures were conducted on 71 CI sound processors and Phonak Roger DM systems using a proposed protocol and an adapted AAA protocol. Phonak's recommended default receiver gain setting was used for each CI sound processor manufacturer and adjusted if necessary to achieve transparency. Electroacoustic measures were conducted on Cochlear and Advanced Bionics (AB) sound processors. In this study, 28 Cochlear Nucleus 5/CP810 sound processors, 26 Cochlear Nucleus 6/CP910 sound processors, and 17 AB Naida CI Q70 sound processors were coupled in various combinations to Phonak Roger DM dedicated receivers (25 Phonak Roger 14 receivers-Cochlear dedicated receiver-and 9 Phonak Roger 17 receivers-AB dedicated receiver) and 20 Phonak Roger Inspiro transmitters. Employing both the AAA and the Schafer et al protocols, electroacoustic measurements were conducted with the Audioscan Verifit in a clinical setting on 71 CI sound processors and Phonak Roger DM systems to determine transparency and verify FM advantage, comparing speech inputs (65 dB SPL) in an effort to achieve equal outputs. If transparency was not achieved at Phonak's recommended default receiver gain, adjustments were made to the receiver gain. The integrity of the signal was monitored with the appropriate manufacturer's monitor earphones. Using the AAA hearing aid protocol, 50 of the 71 CI sound processors achieved transparency, and 59 of the 71 CI sound processors achieved transparency when using the proposed protocol at Phonak's recommended default receiver gain. After the receiver gain was adjusted, 3 of 21 CI sound processors still did not meet transparency using the AAA protocol, and 2 of 12 CI sound processors still did not meet transparency using the Schafer et al proposed protocol. Both protocols were shown to be effective in taking reliable electroacoustic measurements and demonstrate transparency. Both protocols are felt to be clinically feasible and to address the needs of populations that are unable to reliably report regarding the integrity of their personal DM systems. American Academy of Audiology

  18. Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems

    NASA Technical Reports Server (NTRS)

    Powell, John D.; Gilliam, David

    2004-01-01

    The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.

  19. Development of Novel Treatment Plan Verification Techniques for Prostate Intensity Modulation Arc Therapy

    DTIC Science & Technology

    2010-03-01

    is to develop a novel clinical useful delivered-dose verification protocol for modern prostate VMAT using Electronic Portal Imaging Device (EPID...technique. A number of important milestones have been accomplished, which include (i) calibrated CBCT HU vs. electron density curve; (ii...prostate  VMAT  using  Electronic   Portal  Imaging  Device  (EPID)  and  onboard Cone beam Computed Tomography (CBCT).  The specific aims of this project

  20. A Practical Approach to Implementing Real-Time Semantics

    NASA Technical Reports Server (NTRS)

    Luettgen, Gerald; Bhat, Girish; Cleaveland, Rance

    1999-01-01

    This paper investigates implementations of process algebras which are suitable for modeling concurrent real-time systems. It suggests an approach for efficiently implementing real-time semantics using dynamic priorities. For this purpose a proces algebra with dynamic priority is defined, whose semantics corresponds one-to-one to traditional real-time semantics. The advantage of the dynamic-priority approach is that it drastically reduces the state-space sizes of the systems in question while preserving all properties of their functional and real-time behavior. The utility of the technique is demonstrated by a case study which deals with the formal modeling and verification of the SCSI-2 bus-protocol. The case study is carried out in the Concurrency Workbench of North Carolina, an automated verification tool in which the process algebra with dynamic priority is implemented. It turns out that the state space of the bus-protocol model is about an order of magnitude smaller than the one resulting from real-time semantics. The accuracy of the model is proved by applying model checking for verifying several mandatory properties of the bus protocol.

  1. Precision Cleaning and Verification Processes Used at Marshall Space Flight Center for Critical Hardware Applications

    NASA Technical Reports Server (NTRS)

    Caruso, Salvadore V.; Cox, Jack A.; McGee, Kathleen A.

    1998-01-01

    Marshall Space Flight Center (MSFC) of the National Aeronautics and Space Administration performs many research and development programs that require hardware and assemblies to be cleaned to levels that are compatible with fuels and oxidizers (liquid oxygen, solid propellants, etc.). Also, MSFC is responsible for developing large telescope satellites which require a variety of optical systems to be cleaned. A precision cleaning shop is operated within MSFC by the Fabrication Services Division of the Materials & Processes Laboratory. Verification of cleanliness is performed for all precision cleaned articles in the Environmental and Analytical Chemistry Branch. Since the Montreal Protocol was instituted, MSFC had to find substitutes for many materials that have been in use for many years, including cleaning agents and organic solvents. As MSFC is a research center, there is a great variety of hardware that is processed in the Precision Cleaning Shop. This entails the use of many different chemicals and solvents, depending on the nature and configuration of the hardware and softgoods being cleaned. A review of the manufacturing cleaning and verification processes, cleaning materials and solvents used at MSFC and changes that resulted from the Montreal Protocol will be presented.

  2. Precision Cleaning and Verification Processes Used at Marshall Space Flight Center for Critical Hardware Applications

    NASA Technical Reports Server (NTRS)

    Caruso, Salvadore V.

    1999-01-01

    Marshall Space Flight Center (MSFC) of the National Aeronautics and Space Administration (NASA) performs many research and development programs that require hardware and assemblies to be cleaned to levels that are compatible with fuels and oxidizers (liquid oxygen, solid propellants, etc.). Also, the Center is responsible for developing large telescope satellites which requires a variety of optical systems to be cleaned. A precision cleaning shop is operated with-in MSFC by the Fabrication Services Division of the Materials & Processes Division. Verification of cleanliness is performed for all precision cleaned articles in the Analytical Chemistry Branch. Since the Montreal Protocol was instituted, MSFC had to find substitutes for many materials that has been in use for many years, including cleaning agents and organic solvents. As MSFC is a research Center, there is a great variety of hardware that is processed in the Precision Cleaning Shop. This entails the use of many different chemicals and solvents, depending on the nature and configuration of the hardware and softgoods being cleaned. A review of the manufacturing cleaning and verification processes, cleaning materials and solvents used at MSFC and changes that resulted from the Montreal Protocol will be presented.

  3. Verifiable Secret Redistribution

    DTIC Science & Technology

    2001-10-01

    but they are not trusted with secret. Thus, we require a protocol for redistribution without reconstruction of the secret . We also require...verification that the new shareholders have valid shares (ones that can be used to reconstruct the secret ). We present a new protocol to perform non...secret to shareholders in Shamir’s (m,n) threshold scheme (one in which we require m of n shares to reconstruct the secret ), and wish to redistribute the

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, EXPLOSIVES DETECTION TECHNOLOGY, SRI INSTRUMENTS, MODEL 8610C, GAS CHROMATOGRAPH/THERMIONIC IONIZATION DETECTION

    EPA Science Inventory

    The SRI Model 86 1 OC gas chromatograph (GC) is a transportable instrument that can provide on-site analysis of soils for explosives. Coupling this transportable gas chromatograph with a thermionic ionization detector (TID) allows for the determination of explosives in soil matri...

  5. AMBIENT AMMONIA MONITORING TECHNOLOGIES

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program develops testing protocols and verifies the performance of innovative technologies that have the potential to improve the protection of human health and the environment. This abstract and poster describe the process by whic...

  6. Exploring system interconnection architectures with VIPACES: from direct connections to NOCs

    NASA Astrophysics Data System (ADS)

    Sánchez-Peña, Armando; Carballo, Pedro P.; Núñez, Antonio

    2007-05-01

    This paper presents a simple environment for the verification of AMBA 3 AXI systems in Verification IP (VIP) production called VIPACES (Verification Interface Primitives for the development of AXI Compliant Elements and Systems). These primitives are presented as a not compiled library written in SystemC where interfaces are the core of the library. The definition of interfaces instead of generic modules let the user construct custom modules improving the resources spent during the verification phase as well as easily adapting his modules to the AMBA 3 AXI protocol. This topic is the main discussion in the VIPACES library. The paper focuses on comparing and contrasting the main interconnection schemes for AMBA 3 AXI as modeled by VIPACES. For assessing these results we propose a validation scenario with a particular architecture belonging to the domain of MPEG4 video decoding, which is compound by an AXI bus connecting an IDCT and other processing resources.

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, PERFORMANCE TEST RESULTS FOR THE A AND A ENVIRONMENTAL SEALS' SEAL ASSIST SYSTEM (SAS), PHASE I--TECHNOLOGY VERIFICATION REPORT

    EPA Science Inventory

    The report presents results of tests determining the efficacy of A&A Environmental Seals, Inc's Seal Assist System (SAS) in preventing natural gas compressor station's compressor rod packing leaks from escaping into the atmosphere. The SAS consists of an Emission Containment Glan...

  8. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  9. Army medical laboratory telemedicine: role of mass spectrometry in telediagnosis for chemical and biological defense.

    PubMed

    Smith, J R; Shih, M L; Price, E O; Platoff, G E; Schlager, J J

    2001-12-01

    An army medical field laboratory presently has the capability of performing standard protocols developed at the US Army Medical Research Institute of Chemical Defense for verification of nerve agent or sulfur mustard exposure. The protocols analyze hydrolysis products of chemical warfare agents using gas chromatography/mass spectrometry. Additionally, chemical warfare agents can produce alkylated or phosphorylated proteins following human exposure that have long biological half-lives and can be used as diagnostic biomarkers of chemical agent exposure. An analytical technique known as matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF/MS) currently is being examined for its potential to analyze these biomarkers. The technique is capable of detecting large biomolecules and modifications made to them. Its fast analysis time makes MALDI-TOF/MS technology suitable for screening casualties from chemical or biological attacks. Basic operation requires minimal training and the instrument has the potential to become field-portable. The limitation of the technique is that the generated data may require considerable expertise from knowledgeable personnel for consultation to ensure correct interpretation. The interaction between research scientists and field personnel in the acquisition of data and its interpretation via advanced digital telecommunication technologies can enhance rapid diagnosis and subsequently improve patient care in remote areas. Copyright 2001 John Wiley & Sons, Ltd.

  10. Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vavrek, Jayson R.; Henderson, Brian S.; Danagoulian, Areg

    Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618–8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal frommore » the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here in this paper we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy “genuine” and “hoax” objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.« less

  11. Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence

    DOE PAGES

    Vavrek, Jayson R.; Henderson, Brian S.; Danagoulian, Areg

    2018-04-10

    Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618–8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal frommore » the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here in this paper we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy “genuine” and “hoax” objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.« less

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marleau, Peter; Brubaker, Erik; Deland, Sharon M.

    This report summarizes the discussion and conclusions reached during a table top exercise held at Sandia National Laboratories, Albuquerque on September 3, 2014 regarding a recently described approach for nuclear warhead verification based on the cryptographic concept of a zero-knowledge protocol (ZKP) presented in a recent paper authored by Glaser, Barak, and Goldston. A panel of Sandia National Laboratories researchers, whose expertise includes radiation instrumentation design and development, cryptography, and arms control verification implementation, jointly reviewed the paper and identified specific challenges to implementing the approach as well as some opportunities. It was noted that ZKP as used in cryptographymore » is a useful model for the arms control verification problem, but the direct analogy to arms control breaks down quickly. The ZKP methodology for warhead verification fits within the general class of template-based verification techniques, where a reference measurement is used to confirm that a given object is like another object that has already been accepted as a warhead by some other means. This can be a powerful verification approach, but requires independent means to trust the authenticity of the reference warhead - a standard that may be difficult to achieve, which the ZKP authors do not directly address. Despite some technical challenges, the concept of last-minute selection of the pre-loads and equipment could be a valuable component of a verification regime.« less

  13. Development of a Scalable Testbed for Mobile Olfaction Verification.

    PubMed

    Zakaria, Syed Muhammad Mamduh Syed; Visvanathan, Retnam; Kamarudin, Kamarulzaman; Yeon, Ahmad Shakaff Ali; Md Shakaff, Ali Yeon; Zakaria, Ammar; Kamarudin, Latifah Munirah

    2015-12-09

    The lack of information on ground truth gas dispersion and experiment verification information has impeded the development of mobile olfaction systems, especially for real-world conditions. In this paper, an integrated testbed for mobile gas sensing experiments is presented. The integrated 3 m × 6 m testbed was built to provide real-time ground truth information for mobile olfaction system development. The testbed consists of a 72-gas-sensor array, namely Large Gas Sensor Array (LGSA), a localization system based on cameras and a wireless communication backbone for robot communication and integration into the testbed system. Furthermore, the data collected from the testbed may be streamed into a simulation environment to expedite development. Calibration results using ethanol have shown that using a large number of gas sensor in the LGSA is feasible and can produce coherent signals when exposed to the same concentrations. The results have shown that the testbed was able to capture the time varying characteristics and the variability of gas plume in a 2 h experiment thus providing time dependent ground truth concentration maps. The authors have demonstrated the ability of the mobile olfaction testbed to monitor, verify and thus, provide insight to gas distribution mapping experiment.

  14. Development of a Scalable Testbed for Mobile Olfaction Verification

    PubMed Central

    Syed Zakaria, Syed Muhammad Mamduh; Visvanathan, Retnam; Kamarudin, Kamarulzaman; Ali Yeon, Ahmad Shakaff; Md. Shakaff, Ali Yeon; Zakaria, Ammar; Kamarudin, Latifah Munirah

    2015-01-01

    The lack of information on ground truth gas dispersion and experiment verification information has impeded the development of mobile olfaction systems, especially for real-world conditions. In this paper, an integrated testbed for mobile gas sensing experiments is presented. The integrated 3 m × 6 m testbed was built to provide real-time ground truth information for mobile olfaction system development. The testbed consists of a 72-gas-sensor array, namely Large Gas Sensor Array (LGSA), a localization system based on cameras and a wireless communication backbone for robot communication and integration into the testbed system. Furthermore, the data collected from the testbed may be streamed into a simulation environment to expedite development. Calibration results using ethanol have shown that using a large number of gas sensor in the LGSA is feasible and can produce coherent signals when exposed to the same concentrations. The results have shown that the testbed was able to capture the time varying characteristics and the variability of gas plume in a 2 h experiment thus providing time dependent ground truth concentration maps. The authors have demonstrated the ability of the mobile olfaction testbed to monitor, verify and thus, provide insight to gas distribution mapping experiment. PMID:26690175

  15. Experimental investigation of practical unforgeable quantum money

    NASA Astrophysics Data System (ADS)

    Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni

    2018-01-01

    Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.

  16. Comparison of greenhouse gas offset quantification protocols for nitrogen management in dryland wheat cropping systems in the Pacific Northwest

    USDA-ARS?s Scientific Manuscript database

    In the carbon market, greenhouse gas (GHG) offset protocols need to ensure that emission reductions are of high quality, quantifiable and real. However, lack of consistency across protocols for quantifying emission reductions compromise the credibility of offsets generated. Thus, protocol quantifica...

  17. Monitoring/Verification using DMS: TATP Example

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stephan Weeks, Kevin Kyle, Manuel Manard

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations-management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biologicalmore » materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. Fast GC is the leading field analytical method for gas phase separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.« less

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  19. An Overview and Empirical Comparison of Distance Metric Learning Methods.

    PubMed

    Moutafis, Panagiotis; Leng, Mengjun; Kakadiaris, Ioannis A

    2016-02-16

    In this paper, we first offer an overview of advances in the field of distance metric learning. Then, we empirically compare selected methods using a common experimental protocol. The number of distance metric learning algorithms proposed keeps growing due to their effectiveness and wide application. However, existing surveys are either outdated or they focus only on a few methods. As a result, there is an increasing need to summarize the obtained knowledge in a concise, yet informative manner. Moreover, existing surveys do not conduct comprehensive experimental comparisons. On the other hand, individual distance metric learning papers compare the performance of the proposed approach with only a few related methods and under different settings. This highlights the need for an experimental evaluation using a common and challenging protocol. To this end, we conduct face verification experiments, as this task poses significant challenges due to varying conditions during data acquisition. In addition, face verification is a natural application for distance metric learning because the encountered challenge is to define a distance function that: 1) accurately expresses the notion of similarity for verification; 2) is robust to noisy data; 3) generalizes well to unseen subjects; and 4) scales well with the dimensionality and number of training samples. In particular, we utilize well-tested features to assess the performance of selected methods following the experimental protocol of the state-of-the-art database labeled faces in the wild. A summary of the results is presented along with a discussion of the insights obtained and lessons learned by employing the corresponding algorithms.

  20. The Viability of Hearing Protection Device Fit-Testing at Navy and Marine Corps Accession Points

    PubMed Central

    Federman, Jeremy; Duhon, Christon

    2016-01-01

    Introduction: The viability of hearing protection device (HPD) verification (i.e., fit-testing) on a large scale was investigated to address this gap in a military accession environment. Materials and Methods: Personal Attenuation Ratings (PARs) following self-fitted (SELF-Fit) HPDs were acquired from 320 US Marine Corps training recruits (87.5% male, 12.5% female) across four test protocols (1-, 3-, 5-, and 7- frequency). SELF-Fit failures received follow-up to assess potential causes. Follow-up PARs were acquired (Experimenter fit [EXP-Fit], followed by Subject re-fit [SUB Re-Fit]). EXP-Fit was intended to provide a perception (dubbed “ear canal muscle memory”) of what a correctly fitted HPD should feel like. SUB Re-Fit was completed following EXP-Fit to determine whether a training recruit could duplicate EXP-Fit on her/his own without assistance. Results: A one-way analysis of variance (ANOVA) (N=320) showed that SELF-Fit means differed significantly between protocols (P < 0.001). Post-hoc analyses showed that the 1-freq SELF-Fit mean was significantly lower than all other protocols (P < 0.03) by 5.6 dB or more. No difference was found between the multi-frequency protocols. For recruits who were followed up with EXP-Fit (n=79), across all protocols, a significant (P < 0.001) mean improvement of 25.68 dB (10.99) was found, but PARs did not differ (P = 0.99) between EXP-Fit protocols. For recruits in the 3-freq and 5-freq protocol groups who experienced all three PAR test methods (n=33), PAR methods differed (P < 0.001) but no method by protocol interaction was found (P = 0.46). Post hoc tests showed that both EXP-Fit and SUB Re-Fit had significantly better attenuation than SELF-Fit (P < 0.001), but no difference was found between EXPFit and SUB Re-Fit (P = 0.59). For SELF-Fit, the 1-freq protocol resulted in a 35% pass rate, whereas the 3-, 5-, and 7-freq protocols resulted in >60% pass rates. Results showed that once recruits experienced how HPDs should feel when inserted correctly, they were able to properly replicate the procedure with similar results to the expert fit suggesting “ear canal muscle memory” may be a viable training strategy concomitant with HPD verification. Fit-test duration was also measured to examine the tradeoff between results accuracy and time required to complete each protocol. Discussion: Results from this study showed the critical importance of initial selection and fitting of HPDs followed by verification (i.e., fit-testing) at Navy and Marine Corps accession points. Achieving adequate protection from an HPD is fundamentally dependent on obtaining proper fit of the issued HPD as well as the quality of training recruits receive regarding HPD use. PMID:27991461

  1. PROTOCOL FOR VERIFICATION OF URBAN RUNOFF MODELS

    EPA Science Inventory

    The ETV program was created by the USEPA to accelerate the marketplace acceptance of commercial-ready environmental technologies. This objective will be achieved by conducting credible third-party performance assessments and reporting the results. Access to this data allows users...

  2. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  3. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  4. Real-time logic modelling on SpaceWire

    NASA Astrophysics Data System (ADS)

    Zhou, Qiang; Ma, Yunpeng; Fei, Haidong; Wang, Xingyou

    2017-04-01

    A SpaceWire is a standard for on-board satellite networks as the basis for future data-handling architectures. However, it cannot meet the deterministic requirement for safety/time critical application in spacecraft, where the delay of real-time (RT) message streams must be guaranteed. Therefore, SpaceWire-D is developed that provides deterministic delivery over a SpaceWire network. Formal analysis and verification of real-time systems is critical to their development and safe implementation, and is a prerequisite for obtaining their safety certification. Failure to meet specified timing constraints such as deadlines in hard real-time systems may lead to catastrophic results. In this paper, a formal verification method, Real-Time Logic (RTL), has been proposed to specify and verify timing properties of SpaceWire-D network. Based on the principal of SpaceWire-D protocol, we firstly analyze the timing properties of fundamental transactions, such as RMAP WRITE, and RMAP READ. After that, the RMAP WRITE transaction structure is modeled in Real-Time Logic (RTL) and Presburger Arithmetic representations. And then, the associated constraint graph and safety analysis is provided. Finally, it is suggested that RTL method can be useful for the protocol evaluation and provision of recommendation for further protocol evolutions.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  6. VERIFICATION TESTING OF WET-WEATHER FLOW TECHNOLOGIES

    EPA Science Inventory

    As part of the USEPA's ETV Program, the Wet-Weather Flow (WWF) Technologies Pilot Program verifies the performance of commercial-ready technologies by generating quality-assured data using test protocols developed with broad-based stakeholder input. The availability of a credible...

  7. Software Development Technologies for Reactive, Real-Time, and Hybrid Systems: Summary of Research

    NASA Technical Reports Server (NTRS)

    Manna, Zohar

    1998-01-01

    This research is directed towards the implementation of a comprehensive deductive-algorithmic environment (toolkit) for the development and verification of high assurance reactive systems, especially concurrent, real-time, and hybrid systems. For this, we have designed and implemented the STCP (Stanford Temporal Prover) verification system. Reactive systems have an ongoing interaction with their environment, and their computations are infinite sequences of states. A large number of systems can be seen as reactive systems, including hardware, concurrent programs, network protocols, and embedded systems. Temporal logic provides a convenient language for expressing properties of reactive systems. A temporal verification methodology provides procedures for proving that a given system satisfies a given temporal property. The research covered necessary theoretical foundations as well as implementation and application issues.

  8. The effectiveness of ID readers and remote age verification in enhancing compliance with the legal age limit for alcohol.

    PubMed

    Van Hoof, Joris J

    2017-04-01

    Currently, two different age verification systems (AVS) are implemented to enhance compliance with legal age limits for the sale of alcohol in the Netherlands. In this study, we tested the operational procedures and effectiveness of ID readers and remote age verification technology in supermarkets during the sale of alcohol. Following a trained alcohol purchase protocol, eight mystery shoppers (both underage and in the branch's reference age) conducted 132 alcohol purchase attempts in stores that were equipped with ID readers or remote age verification or were part of a control group. In stores equipped with an ID reader, 34% of the purchases were conducted without any mistakes (full compliance). In stores with remote age verification, full compliance was achieved in 87% of the cases. The control group reached 57% compliance, which is in line with the national average. Stores with ID readers perform worse than stores with remote age verification, and also worse than stores without any AVS. For both systems, in addition to effectiveness, public support and user friendliness need to be investigated. This study shows that remote age verification technology is a promising intervention that increases vendor compliance during the sales of age restricted products. © The Author 2016. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  9. The influence of verification jig on framework fit for nonsegmented fixed implant-supported complete denture.

    PubMed

    Ercoli, Carlo; Geminiani, Alessandro; Feng, Changyong; Lee, Heeje

    2012-05-01

    The purpose of this retrospective study was to assess if there was a difference in the likelihood of achieving passive fit when an implant-supported full-arch prosthesis framework is fabricated with or without the aid of a verification jig. This investigation was approved by the University of Rochester Research Subject Review Board (protocol #RSRB00038482). Thirty edentulous patients, 49 to 73 years old (mean 61 years old), rehabilitated with a nonsegmented fixed implant-supported complete denture were included in the study. During the restorative process, final impressions were made using the pickup impression technique and elastomeric impression materials. For 16 patients, a verification jig was made (group J), while for the remaining 14 patients, a verification jig was not used (group NJ) and the framework was fabricated directly on the master cast. During the framework try-in appointment, the fit was assessed by clinical (Sheffield test) and radiographic inspection and recorded as passive or nonpassive. When a verification jig was used (group J, n = 16), all frameworks exhibited clinically passive fit, while when a verification jig was not used (group NJ, n = 14), only two frameworks fit. This difference was statistically significant (p < .001). Within the limitations of this retrospective study, the fabrication of a verification jig ensured clinically passive fit of metal frameworks in nonsegmented fixed implant-supported complete denture. © 2011 Wiley Periodicals, Inc.

  10. A comprehensive method for preliminary design optimization of axial gas turbine stages. II - Code verification

    NASA Technical Reports Server (NTRS)

    Jenkins, R. M.

    1983-01-01

    The present effort represents an extension of previous work wherein a calculation model for performing rapid pitchline optimization of axial gas turbine geometry, including blade profiles, is developed. The model requires no specification of geometric constraints. Output includes aerodynamic performance (adiabatic efficiency), hub-tip flow-path geometry, blade chords, and estimates of blade shape. Presented herein is a verification of the aerodynamic performance portion of the model, whereby detailed turbine test-rig data, including rig geometry, is input to the model to determine whether tested performance can be predicted. An array of seven (7) NASA single-stage axial gas turbine configurations is investigated, ranging in size from 0.6 kg/s to 63.8 kg/s mass flow and in specific work output from 153 J/g to 558 J/g at design (hot) conditions; stage loading factor ranges from 1.15 to 4.66.

  11. Precision cleaning verification of fluid components by air/water impingement and total carbon analysis

    NASA Technical Reports Server (NTRS)

    Barile, Ronald G.; Fogarty, Chris; Cantrell, Chris; Melton, Gregory S.

    1994-01-01

    NASA personnel at Kennedy Space Center's Material Science Laboratory have developed new environmentally sound precision cleaning and verification techniques for systems and components found at the center. This technology is required to replace existing methods traditionally employing CFC-113. The new patent-pending technique of precision cleaning verification is for large components of cryogenic fluid systems. These are stainless steel, sand cast valve bodies with internal surface areas ranging from 0.2 to 0.9 sq m. Extrapolation of this technique to components of even larger sizes (by orders of magnitude) is planned. Currently, the verification process is completely manual. In the new technique, a high velocity, low volume water stream impacts the part to be verified. This process is referred to as Breathing Air/Water Impingement and forms the basis for the Impingement Verification System (IVS). The system is unique in that a gas stream is used to accelerate the water droplets to high speeds. Water is injected into the gas stream in a small, continuous amount. The air/water mixture is then passed through a converging/diverging nozzle where the gas is accelerated to supersonic velocities. These droplets impart sufficient energy to the precision cleaned surface to place non-volatile residue (NVR) contaminants into suspension in the water. The sample water is collected and its NVR level is determined by total organic carbon (TOC) analysis at 880 C. The TOC, in ppm carbon, is used to establish the NVR level. A correlation between the present gravimetric CFC113 NVR and the IVS NVR is found from experimental sensitivity factors measured for various contaminants. The sensitivity has the units of ppm of carbon per mg/sq ft of contaminant. In this paper, the equipment is described and data are presented showing the development of the sensitivity factors from a test set including four NVRs impinged from witness plates of 0.05 to 0.75 sq m.

  12. Precision Cleaning Verification of Fluid Components by Air/Water Impingement and Total Carbon Analysis

    NASA Technical Reports Server (NTRS)

    Barile, Ronald G.; Fogarty, Chris; Cantrell, Chris; Melton, Gregory S.

    1995-01-01

    NASA personnel at Kennedy Space Center's Material Science Laboratory have developed new environmentally sound precision cleaning and verification techniques for systems and components found at the center. This technology is required to replace existing methods traditionally employing CFC-113. The new patent-pending technique of precision cleaning verification is for large components of cryogenic fluid systems. These are stainless steel, sand cast valve bodies with internal surface areas ranging from 0.2 to 0.9 m(exp 2). Extrapolation of this technique to components of even larger sizes (by orders of magnitude) is planned. Currently, the verification process is completely manual. In the new technique, a high velocity, low volume water stream impacts the part to be verified. This process is referred to as Breathing Air/Water Impingement and forms the basis for the Impingement Verification System (IVS). The system is unique in that a gas stream is used to accelerate the water droplets to high speeds. Water is injected into the gas stream in a small, continuous amount. The air/water mixture is then passed through a converging-diverging nozzle where the gas is accelerated to supersonic velocities. These droplets impart sufficient energy to the precision cleaned surface to place non-volatile residue (NVR) contaminants into suspension in the water. The sample water is collected and its NVR level is determined by total organic carbon (TOC) analysis at 880 C. The TOC, in ppm carbon, is used to establish the NVR level. A correlation between the present gravimetric CFC-113 NVR and the IVS NVR is found from experimental sensitivity factors measured for various contaminants. The sensitivity has the units of ppm of carbon per mg-ft(exp 2) of contaminant. In this paper, the equipment is described and data are presented showing the development of the sensitivity factors from a test set including four NVR's impinged from witness plates of 0.05 to 0.75 m(exp 2).

  13. TESTING INDOOR AIR PRODUCTS: ONE APPROACH TO DEVELOPING WIDELY ACCEPTED PROTOCOLS

    EPA Science Inventory

    The paper describes an approach to developing widely acce ted products for testing indoor air products. [NOTE: Research Triangle Institute (RTI) is a partner in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification (ETV) Program with responsibil...

  14. An Alternative Approach to "Identification of Unknowns": Designing a Protocol to Verify the Identities of Nitrogen Fixing Bacteria.

    PubMed

    Martinez-Vaz, Betsy M; Denny, Roxanne; Young, Nevin D; Sadowsky, Michael J

    2015-12-01

    Microbiology courses often include a laboratory activity on the identification of unknown microbes. This activity consists of providing students with microbial cultures and running biochemical assays to identify the organisms. This approach lacks molecular techniques such as sequencing of genes encoding 16S rRNA, which is currently the method of choice for identification of unknown bacteria. A laboratory activity was developed to teach students how to identify microorganisms using 16S rRNA polymerase chain reaction (PCR) and validate microbial identities using biochemical techniques. We hypothesized that designing an experimental protocol to confirm the identity of a bacterium would improve students' knowledge of microbial identification techniques and the physiological characteristics of bacterial species. Nitrogen-fixing bacteria were isolated from the root nodules of Medicago truncatula and prepared for 16S rRNA PCR analysis. Once DNA sequencing revealed the identity of the organisms, the students designed experimental protocols to verify the identity of rhizobia. An assessment was conducted by analyzing pre- and posttest scores and by grading students' verification protocols and presentations. Posttest scores were higher than pretest scores at or below p = 0.001. Normalized learning gains (G) showed an improvement of students' knowledge of microbial identification methods (LO4, G = 0.46), biochemical properties of nitrogen-fixing bacteria (LO3, G = 0.45), and the events leading to the establishment of nitrogen-fixing symbioses (LO1&2, G = 0.51, G = 0.37). An evaluation of verification protocols also showed significant improvement with a p value of less than 0.001.

  15. Development and Verification of the Charring Ablating Thermal Protection Implicit System Solver

    NASA Technical Reports Server (NTRS)

    Amar, Adam J.; Calvert, Nathan D.; Kirk, Benjamin S.

    2010-01-01

    The development and verification of the Charring Ablating Thermal Protection Implicit System Solver is presented. This work concentrates on the derivation and verification of the stationary grid terms in the equations that govern three-dimensional heat and mass transfer for charring thermal protection systems including pyrolysis gas flow through the porous char layer. The governing equations are discretized according to the Galerkin finite element method with first and second order implicit time integrators. The governing equations are fully coupled and are solved in parallel via Newton's method, while the fully implicit linear system is solved with the Generalized Minimal Residual method. Verification results from exact solutions and the Method of Manufactured Solutions are presented to show spatial and temporal orders of accuracy as well as nonlinear convergence rates.

  16. Development and Verification of the Charring, Ablating Thermal Protection Implicit System Simulator

    NASA Technical Reports Server (NTRS)

    Amar, Adam J.; Calvert, Nathan; Kirk, Benjamin S.

    2011-01-01

    The development and verification of the Charring Ablating Thermal Protection Implicit System Solver (CATPISS) is presented. This work concentrates on the derivation and verification of the stationary grid terms in the equations that govern three-dimensional heat and mass transfer for charring thermal protection systems including pyrolysis gas flow through the porous char layer. The governing equations are discretized according to the Galerkin finite element method (FEM) with first and second order fully implicit time integrators. The governing equations are fully coupled and are solved in parallel via Newton s method, while the linear system is solved via the Generalized Minimum Residual method (GMRES). Verification results from exact solutions and Method of Manufactured Solutions (MMS) are presented to show spatial and temporal orders of accuracy as well as nonlinear convergence rates.

  17. Dosimetric evaluation of IMRT plan for homogenous and inhomogeneous medium using AAPM TG-119 protocol

    NASA Astrophysics Data System (ADS)

    Fatimah, L. A. N.; Wibowo, W. E.; Pawiro, S. A.

    2017-05-01

    The American Association of Physicists in Medicine (AAPM) TG-119 protocol has been applied for dose verification in IMRT technique. However, some criteria in the protocol need to be verified for inhomogeneous medium and small volume targets. Hence, the purpose of this study was to verify the assessment criteria of dose verification in AAPM TG-119 for inhomogeneous medium and small volume targets. The work has been conducted by dose verification for homogeneous (phantom A) and inhomogeneous phantoms (phantom B and C) on two geometrical targets: C-shape and circular targets. The targets were simulated using 7 static dMLC IMRT fields at two different depths of 5 g/cm2 and 10 g/cm2. The dose optimisation and calculation were done by using Pinnacle3 for 6 MV photons beam. The planning objectives were set according to AAPM TG-119 parameters. The plan analysis was conducted by Conformity Index and Homogeneity Index. The point dose measurements were conducted with Exradin A16, Semiflex 0.125cc, and Gafchromic EBT3. The plan results show that CI for C-shape target is in the range of 0.710-0.999 at 10 g/cm2 depth and 0.691-1.613 at 5 g/cm2. In addition, HI for C-shape and circular were in the range of 6.3%-58.7% and 5.4%-87.1% for 10 g/cm2 depth. The measurement results show that the dose measurement at inhomogeneous medium and small volume targets are much lower than the criteria in AAPM TG-119. In conclusion, the criteria in the AAPM TG-119 cannot be fully implemented for inhomogeneous medium and small volume targets.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  19. Dosimetric verification for primary focal hypermetabolism of nasopharyngeal carcinoma patients treated with dynamic intensity-modulated radiation therapy.

    PubMed

    Xin, Yong; Wang, Jia-Yang; Li, Liang; Tang, Tian-You; Liu, Gui-Hong; Wang, Jian-She; Xu, Yu-Mei; Chen, Yong; Zhang, Long-Zhen

    2012-01-01

    To make sure the feasibility with (18F)FDG PET/CT to guided dynamic intensity-modulated radiation therapy (IMRT) for nasopharyngeal carcinoma patients, by dosimetric verification before treatment. Chose 11 patients in III~IVA nasopharyngeal carcinoma treated with functional image-guided IMRT and absolute and relative dosimetric verification by Varian 23EX LA, ionization chamber, 2DICA of I'mRT Matrixx and IBA detachable phantom. Drawing outline and making treatment plan were by different imaging techniques (CT and (18F)FDG PET/CT). The dose distributions of the various regional were realized by SMART. The absolute mean errors of interest area were 2.39%±0.66 using 0.6 cc ice chamber. Results using DTA method, the average relative dose measurements within our protocol (3%, 3 mm) were 87.64% at 300 MU/min in all filed. Dosimetric verification before IMRT is obligatory and necessary. Ionization chamber and 2DICA of I'mRT Matrixx was the effective dosimetric verification tool for primary focal hyper metabolism in functional image-guided dynamic IMRT for nasopharyngeal carcinoma. Our preliminary evidence indicates that functional image-guided dynamic IMRT is feasible.

  20. Clinical Experience and Evaluation of Patient Treatment Verification With a Transit Dosimeter

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ricketts, Kate, E-mail: k.ricketts@ucl.ac.uk; Department of Radiotherapy Physics, Royal Berkshire NHS Foundation Trust, Reading; Navarro, Clara

    2016-08-01

    Purpose: To prospectively evaluate a protocol for transit dosimetry on a patient population undergoing intensity modulated radiation therapy (IMRT) and to assess the issues in clinical implementation of electronic portal imaging devices (EPIDs) for treatment verification. Methods and Materials: Fifty-eight patients were enrolled in the study. Amorphous silicon EPIDs were calibrated for dose and used to acquire images of delivered fields. Measured EPID dose maps were back-projected using the planning computed tomographic (CT) images to calculate dose at prespecified points within the patient and compared with treatment planning system dose offline using point dose difference and point γ analysis. Themore » deviation of the results was used to inform future action levels. Results: Two hundred twenty-five transit images were analyzed, composed of breast, prostate, and head and neck IMRT fields. Patient measurements demonstrated the potential of the dose verification protocol to model dose well under complex conditions: 83.8% of all delivered beams achieved the initial set tolerance level of Δ{sub D} of 0 ± 5 cGy or %Δ{sub D} of 0% ± 5%. Importantly, the protocol was also sensitive to anatomic changes and spotted that 3 patients from 20 measured prostate patients had undergone anatomic change in comparison with the planning CT. Patient data suggested an EPID-reconstructed versus treatment planning system dose difference action level of 0% ± 7% for breast fields. Asymmetric action levels were more appropriate for inversed IMRT fields, using absolute dose difference (−2 ± 5 cGy) or summed field percentage dose difference (−6% ± 7%). Conclusions: The in vivo dose verification method was easy to use and simple to implement, and it could detect patient anatomic changes that impacted dose delivery. The system required no extra dose to the patient or treatment time delay and so could be used throughout the course of treatment to identify and limit systematic and random errors in dose delivery for patient groups.« less

  1. Clinical Experience and Evaluation of Patient Treatment Verification With a Transit Dosimeter.

    PubMed

    Ricketts, Kate; Navarro, Clara; Lane, Katherine; Blowfield, Claire; Cotten, Gary; Tomala, Dee; Lord, Christine; Jones, Joanne; Adeyemi, Abiodun

    2016-08-01

    To prospectively evaluate a protocol for transit dosimetry on a patient population undergoing intensity modulated radiation therapy (IMRT) and to assess the issues in clinical implementation of electronic portal imaging devices (EPIDs) for treatment verification. Fifty-eight patients were enrolled in the study. Amorphous silicon EPIDs were calibrated for dose and used to acquire images of delivered fields. Measured EPID dose maps were back-projected using the planning computed tomographic (CT) images to calculate dose at prespecified points within the patient and compared with treatment planning system dose offline using point dose difference and point γ analysis. The deviation of the results was used to inform future action levels. Two hundred twenty-five transit images were analyzed, composed of breast, prostate, and head and neck IMRT fields. Patient measurements demonstrated the potential of the dose verification protocol to model dose well under complex conditions: 83.8% of all delivered beams achieved the initial set tolerance level of ΔD of 0 ± 5 cGy or %ΔD of 0% ± 5%. Importantly, the protocol was also sensitive to anatomic changes and spotted that 3 patients from 20 measured prostate patients had undergone anatomic change in comparison with the planning CT. Patient data suggested an EPID-reconstructed versus treatment planning system dose difference action level of 0% ± 7% for breast fields. Asymmetric action levels were more appropriate for inversed IMRT fields, using absolute dose difference (-2 ± 5 cGy) or summed field percentage dose difference (-6% ± 7%). The in vivo dose verification method was easy to use and simple to implement, and it could detect patient anatomic changes that impacted dose delivery. The system required no extra dose to the patient or treatment time delay and so could be used throughout the course of treatment to identify and limit systematic and random errors in dose delivery for patient groups. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. A mechanized process algebra for verification of device synchronization protocols

    NASA Technical Reports Server (NTRS)

    Schubert, E. Thomas

    1992-01-01

    We describe the formalization of a process algebra based on CCS within the Higher Order Logic (HOL) theorem-proving system. The representation of four types of device interactions and a correctness proof of the communication between a microprocessor and MMU is presented.

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION: DEVELOPMENT OF A PROTOCOL FOR TESTING COMMERCIALLY PRODUCED STORMWATER TREATMENT DEVICES

    EPA Science Inventory

    Over the past decade, there has been an increasing array of commercially available products for the treatment of nonpoint source pollution from urban stormwater. These products incorporate various approaches to stormwater treatment such as: in-line subsurface treatment chambers...

  4. Verification testing to confirm VO2max attainment in persons with spinal cord injury.

    PubMed

    Astorino, Todd A; Bediamol, Noelle; Cotoia, Sarah; Ines, Kenneth; Koeu, Nicolas; Menard, Natasha; Nyugen, Brianna; Olivo, Cassandra; Phillips, Gabrielle; Tirados, Ardreen; Cruz, Gabriela Velasco

    2018-01-22

    Maximal oxygen uptake (VO 2 max) is a widely used measure of cardiorespiratory fitness, aerobic function, and overall health risk. Although VO 2 max has been measured for almost 100 yr, no standardized criteria exist to verify VO 2 max attainment. Studies document that incidence of 'true' VO 2 max obtained from incremental exercise (INC) can be confirmed using a subsequent verification test (VER). In this study, we examined efficacy of VER in persons with spinal cord injury (SCI). Repeated measures, within-subjects study. University laboratory in San Diego, CA. Ten individuals (age and injury duration = 33.3 ± 10.5 yr and 6.8 ± 6.2 yr) with SCI and 10 able-bodied (AB) individuals (age = 24.1 ± 7.4 yr). Peak oxygen uptake (VO 2 peak) was determined during INC on an arm ergometer followed by VER at 105 percent of peak power output (% PPO). Gas exchange data, heart rate (HR), and blood lactate concentration (BLa) were measured during exercise. Across all participants, VO 2 peak was highly related between protocols (ICC = 0.98) and the mean difference was equal to 0.08 ± 0.11 L/min. Compared to INC, VO 2 peak from VER was not different in SCI (1.30 ± 0.45 L/min vs. 1.31 ± 0.43 L/min) but higher in AB (1.63 ± 0.40 L/min vs. 1.76 ± 0.40 L/min). Data show similar VO 2 peak between incremental and verification tests in SCI, suggesting that VER confirms VO 2 max attainment. However, in AB participants completing arm ergometry, VER is essential to validate appearance of 'true' VO 2 peak.

  5. Eastern Asian Emissions of Anthropogenic Halocarbons Deduced from Aircraft Concentration Data

    NASA Technical Reports Server (NTRS)

    Palmer, Paul I.; Jacob, Daniel J.; Mickle, Loretta, J.; Blake, Donald R.; Sachse, Glen W.; Fuelberg, Henry E.; Kiley, Christopher M.

    2003-01-01

    The Montreal Protocol restricts production of ozone-depleting halocarbons worldwide. Enforcement of the protocol has relied mainly on annual government statistics of production and consumption of these compounds (bottom-up approach). We show here that aircraft observations of ha1ocarbon:CO enhancement ratios on regional to continental scales can be used to infer halocarbon emissions, providing independent verification of the bottom-up approach. We apply this topdown approach to aircraft observations of Asian outflow &om the TRACE-P mission over the western Pacific (March-April 2001) and derive emissions from eastern Asia (China, Japan, and Korea). We derive an eastern Asian carbon tetrachloride (CCl4) source of 21.5 Gg yr(sup -1), several-fold larger than previous estimates and amounting to -30% of the global budget for this gas. Our emission estimate for CFC-11 from eastern Asia is 50% higher than inventories derived from manufacturing records. Our emission estimates for methyl chloroform (CH3CC13) and CFC-12 are in agreement with existing inventories. For halon 1211 we find only a strong local source originating from the Shanghai area. Our emission estimates for the above gases result in a approximately equal to 40% increase in the ozone depletion potential (ODP) of Asian emissions relative to previous estimates, corresponding to a approximately equal to 10% global increase in ODP.

  6. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  7. 40 CFR 1065.345 - Vacuum-side leak verification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... zero flow, or by detecting the dilution of a known concentration of span gas when it flows through the.... Measure and record the absolute pressure of the trapped gas and optionally the system absolute temperature... pressure and optionally temperature. (4) Calculate the leak flow rate based on an assumed value of zero for...

  8. 40 CFR 1065.345 - Vacuum-side leak verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... zero flow, or by detecting the dilution of a known concentration of span gas when it flows through the.... Measure and record the absolute pressure of the trapped gas and optionally the system absolute temperature... pressure and optionally temperature. (4) Calculate the leak flow rate based on an assumed value of zero for...

  9. 40 CFR 1065.305 - Verifications for accuracy, repeatability, and noise.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... prescribed by the instrument manufacturer. (2) Zero the instrument as you would before an emission test by introducing a zero signal. Depending on the instrument, this may be a zero-concentration gas, a reference... a zero gas that meets the specifications of § 1065.750. (3) Span the instrument as you would before...

  10. 40 CFR 1065.345 - Vacuum-side leak verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... zero flow, or by detecting the dilution of a known concentration of span gas when it flows through the.... Measure and record the absolute pressure of the trapped gas and optionally the system absolute temperature... pressure and optionally temperature. (4) Calculate the leak flow rate based on an assumed value of zero for...

  11. 40 CFR 1065.305 - Verifications for accuracy, repeatability, and noise.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prescribed by the instrument manufacturer. (2) Zero the instrument as you would before an emission test by introducing a zero signal. Depending on the instrument, this may be a zero-concentration gas, a reference... a zero gas that meets the specifications of § 1065.750. (3) Span the instrument as you would before...

  12. 40 CFR 1065.305 - Verifications for accuracy, repeatability, and noise.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... prescribed by the instrument manufacturer. (2) Zero the instrument as you would before an emission test by introducing a zero signal. Depending on the instrument, this may be a zero-concentration gas, a reference... a zero gas that meets the specifications of § 1065.750. (3) Span the instrument as you would before...

  13. 40 CFR 1065.345 - Vacuum-side leak verification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... zero flow, or by detecting the dilution of a known concentration of span gas when it flows through the.... Measure and record the absolute pressure of the trapped gas and optionally the system absolute temperature... pressure and optionally temperature. (4) Calculate the leak flow rate based on an assumed value of zero for...

  14. 40 CFR 1065.305 - Verifications for accuracy, repeatability, and noise.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... prescribed by the instrument manufacturer. (2) Zero the instrument as you would before an emission test by introducing a zero signal. Depending on the instrument, this may be a zero-concentration gas, a reference... a zero gas that meets the specifications of § 1065.750. (3) Span the instrument as you would before...

  15. 40 CFR 1065.305 - Verifications for accuracy, repeatability, and noise.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prescribed by the instrument manufacturer. (2) Zero the instrument as you would before an emission test by introducing a zero signal. Depending on the instrument, this may be a zero-concentration gas, a reference... a zero gas that meets the specifications of § 1065.750. (3) Span the instrument as you would before...

  16. 40 CFR 1065.345 - Vacuum-side leak verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... zero flow, or by detecting the dilution of a known concentration of span gas when it flows through the.... Measure and record the absolute pressure of the trapped gas and optionally the system absolute temperature... pressure and optionally temperature. (4) Calculate the leak flow rate based on an assumed value of zero for...

  17. Behavior in normal and reduced gravity of an enclosed liquid/gas system with nonuniform heating from above

    NASA Technical Reports Server (NTRS)

    Ross, H. D.; Schiller, D. N.; Disimile, P.; Sirignano, W. A.

    1989-01-01

    The temperature and velocity fields have been investigated for a single-phase gas system and a two-layer gas-and-liquid system enclosed in a circular cylinder being heated suddenly and nonuniformly from above. The transient response of the gas, liquid, and container walls was modelled numerically in normal and reduced gravity (10 to the -5 g). Verification of the model was accomplished via flow visualization experiments in 10 cm high by 10 cm diameter plexiglass cylinders.

  18. THE DEVELOPMENT OF A SHIP BALLAST WATER TREATMENT TECHNOLOGY VERIFICATION PROTOCOL THROUGH AN INTERAGENCY AGREEMENT PARTNERSHIP

    EPA Science Inventory

    The introduction of nonindigenous aquatic nuisance species through the discharge of shipboard ballast water into coastal areas around the world has profound negative impacts on aquatic ecosystems worldwide. Aquatic nuisance species are one of the most important environmental issu...

  19. Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models.

    DTIC Science & Technology

    1981-03-01

    NewQueueOfftcket; theorem Pendnglnvariant, Remove(Pending(s)) = NewQueueOfPacket; Since the implementation is in keeping with the specification, its salp ...another communication line. The communication lines are unreliable; messages traveling in either direction can be lost, reordered, corrupted, or

  20. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

    PubMed

    Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-03-02

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  1. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services †

    PubMed Central

    2018-01-01

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641

  2. Device independence for two-party cryptography and position verification with memoryless devices

    NASA Astrophysics Data System (ADS)

    Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie

    2018-06-01

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.

  3. Decontamination and management of human remains following incidents of hazardous chemical release.

    PubMed

    Hauschild, Veronique D; Watson, Annetta; Bock, Robert

    2012-01-01

    To provide specific guidance and resources for systematic and orderly decontamination of human remains resulting from a chemical terrorist attack or accidental chemical release. A detailed review and health-based decision criteria protocol is summarized. Protocol basis and logic are derived from analyses of compound-specific toxicological data and chemical/physical characteristics. Guidance is suitable for civilian or military settings where human remains potentially contaminated with hazardous chemicals may be present, such as sites of transportation accidents, terrorist operations, or medical examiner processing points. Guidance is developed from data-characterizing controlled experiments with laboratory animals, fabrics, and materiel. Logic and specific procedures for decontamination and management of remains, protection of mortuary affairs personnel, and decision criteria to determine when remains are sufficiently decontaminated are presented. Established procedures as well as existing materiel and available equipment for decontamination and verification provide reasonable means to mitigate chemical hazards from chemically exposed remains. Unique scenarios such as those involving supralethal concentrations of certain liquid chemical warfare agents may prove difficult to decontaminate but can be resolved in a timely manner by application of the characterized systematic approaches. Decision criteria and protocols to "clear" decontaminated remains for transport and processing are also provided. Once appropriate decontamination and verification have been accomplished, normal procedures for management of remains and release can be followed.

  4. Applying fault tree analysis to the prevention of wrong-site surgery.

    PubMed

    Abecassis, Zachary A; McElroy, Lisa M; Patel, Ronak M; Khorzad, Rebeca; Carroll, Charles; Mehrotra, Sanjay

    2015-01-01

    Wrong-site surgery (WSS) is a rare event that occurs to hundreds of patients each year. Despite national implementation of the Universal Protocol over the past decade, development of effective interventions remains a challenge. We performed a systematic review of the literature reporting root causes of WSS and used the results to perform a fault tree analysis to assess the reliability of the system in preventing WSS and identifying high-priority targets for interventions aimed at reducing WSS. Process components where a single error could result in WSS were labeled with OR gates; process aspects reinforced by verification were labeled with AND gates. The overall redundancy of the system was evaluated based on prevalence of AND gates and OR gates. In total, 37 studies described risk factors for WSS. The fault tree contains 35 faults, most of which fall into five main categories. Despite the Universal Protocol mandating patient verification, surgical site signing, and a brief time-out, a large proportion of the process relies on human transcription and verification. Fault tree analysis provides a standardized perspective of errors or faults within the system of surgical scheduling and site confirmation. It can be adapted by institutions or specialties to lead to more targeted interventions to increase redundancy and reliability within the preoperative process. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. Advanced Global Atmospheric Gases Experiment (AGAGE)

    NASA Technical Reports Server (NTRS)

    Prinn, Ronald G.; Kurylo, Michael (Technical Monitor)

    2004-01-01

    We seek funding from NASA for the third year (2005) of the four-year period January 1, 2003 - December 31, 2006 for continued support of the MIT contributions to the multi-national global atmospheric trace species measurement program entitled Advanced Global Atmospheric Gases Experiment (AGAGE). The case for real-time high-frequency measurement networks like AGAGE is very strong and the observations and their interpretation are widely recognized for their importance to ozone depletion and climate change studies and to verification issues arising from the Montreal Protocol (ozone) and Kyoto Protocol (climate). The proposed AGAGE program is distinguished by its capability to measure over the globe at high frequency almost all of the important species in the Montreal Protocol and almost all of the significant non-CO2 gases in the Kyoto Protocol.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less

  7. Loss-tolerant quantum secure positioning with weak laser sources

    NASA Astrophysics Data System (ADS)

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing

    2016-09-01

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.

  8. Verifying patient identity and site of surgery: improving compliance with protocol by audit and feedback.

    PubMed

    Garnerin, P; Arès, M; Huchet, A; Clergue, F

    2008-12-01

    The potential severity of wrong patient/procedure/site of surgery and the view that these events are avoidable, make the prevention of such errors a priority. An intervention was set up to develop a verification protocol for checking patient identity and the site of surgery with periodic audits to measure compliance while providing feedback. A nurse auditor performed the compliance audits in inpatients and outpatients during three consecutive 3-month periods and three 1-month follow-up periods; 11 audit criteria were recorded, as well as reasons for not performing a check. The nurse auditor provided feedback to the health professionals, including discussion of inadequate checks. 1,000 interactions between patients and their anaesthetist or nurse anaesthetist were observed. Between the first and second audit periods compliance with all audit criteria except "surgical site marked" noticeably improved, such as the proportion of patients whose identities were checked (62.6% to 81.4%); full compliance with protocol in patient identity checks (9.7% to 38.1%); proportion of site of surgery checks carried out (77.1% to 92.6%); and full compliance with protocol in site of surgery checks (32.2% to 52.0%). Thereafter, compliance was stable for most criteria. The reason for failure to perform checks of patient identity or site of surgery was mostly that the anaesthetist in charge had seen the patient at the preanaesthetic consultation. By combining the implementation of a verification protocol with periodic audits with feedback, the intervention changed practice and increased compliance with patient identity and site of surgery checks. The impact of the intervention was limited by communication problems between patients and professionals, and lack of collaboration with surgical services.

  9. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

    NASA Astrophysics Data System (ADS)

    Nikolopoulos, Georgios M.

    2018-01-01

    We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.

  10. Hardware Design Improvements to the Major Constituent Analyzer

    NASA Technical Reports Server (NTRS)

    Combs, Scott; Schwietert, Daniel; Anaya, Marcial; DeWolf, Shannon; Merrill, Dave; Gardner, Ben D.; Thoresen, Souzan; Granahan, John; Belcher, Paul; Matty, Chris

    2011-01-01

    The Major Constituent Analyzer (MCA) onboard the International Space Station (ISS) is designed to monitor the major constituents of the ISS's internal atmosphere. This mass spectrometer based system is an integral part of the Environmental Control and Life Support System (ECLSS) and is a primary tool for the management of ISS atmosphere composition. As a part of NASA Change Request CR10773A, several alterations to the hardware have been made to accommodate improved MCA logistics. First, the ORU 08 verification gas assembly has been modified to allow the verification gas cylinder to be installed on orbit. The verification gas is an essential MCA consumable that requires periodic replenishment. Designing the cylinder for subassembly transport reduces the size and weight of the maintained item for launch. The redesign of the ORU 08 assembly includes a redesigned housing, cylinder mounting apparatus, and pneumatic connection. The second hardware change is a redesigned wiring harness for the ORU 02 analyzer. The ORU 02 electrical connector interface was damaged in a previous on-orbit installation, and this necessitated the development of a temporary fix while a more permanent solution was developed. The new wiring harness design includes flexible cable as well as indexing fasteners and guide-pins, and provides better accessibility during the on-orbit maintenance operation. This presentation will describe the hardware improvements being implemented for MCA as well as the expected improvement to logistics and maintenance.

  11. Approximate Synchrony: An Abstraction for Distributed Almost Synchronous Systems

    DTIC Science & Technology

    2015-05-29

    finding bugs. Verification of the TSCH Protocol. Time Synchronized Channel Hopping (TSCH) is a Medium Access Control scheme that enables low power...allotted by the schedule and remain in sleep mode otherwise. In the ab- sence of precise time-synchronization, the time-slots across nodes would not be

  12. A Protocol-Analytic Study of Metacognition in Mathematical Problem Solving.

    ERIC Educational Resources Information Center

    Cai, Jinfa

    1994-01-01

    Metacognitive behaviors of subjects having high (n=2) and low (n=2) levels of mathematical experience were compared across four cognitive processes in mathematical problem solving: orientation, organization, execution, and verification. High-experience subjects engaged in self-regulation and spent more time on orientation and organization. (36…

  13. Demonstration and Verification of a Turbine Power Generation System Utilizing Renewable Fuel: Landfill Gas

    DTIC Science & Technology

    2013-09-01

    33 4.7 SAMPLING RESULTS ...34 5.0 PERFORMANCE RESULTS ...PERFORMANCE RESULTS DISCUSSION ............................................................................ 39 5.2.1 Energy: Verify Power Production

  14. An evaluation of SEASAT-A candidate ocean industry economic verification experiments

    NASA Technical Reports Server (NTRS)

    1977-01-01

    A description of the candidate economic verification experiments which could be performed with SEASAT is provided. Experiments have been identified in each of the areas of ocean-based activity that are expected to show an economic impact from the use of operational SEASAT data. Experiments have been identified in the areas of Arctic operations, the ocean fishing industry, the offshore oil and natural gas industry, as well as ice monitoring and coastal zone applications.

  15. A Roadmap for the Implementation of Continued Process Verification.

    PubMed

    Boyer, Marcus; Gampfer, Joerg; Zamamiri, Abdel; Payne, Robin

    2016-01-01

    In 2014, the members of the BioPhorum Operations Group (BPOG) produced a 100-page continued process verification case study, entitled "Continued Process Verification: An Industry Position Paper with Example Protocol". This case study captures the thought processes involved in creating a continued process verification plan for a new product in response to the U.S. Food and Drug Administration's guidance on the subject introduced in 2011. In so doing, it provided the specific example of a plan developed for a new molecular antibody product based on the "A MAb Case Study" that preceded it in 2009.This document provides a roadmap that draws on the content of the continued process verification case study to provide a step-by-step guide in a more accessible form, with reference to a process map of the product life cycle. It could be used as a basis for continued process verification implementation in a number of different scenarios: For a single product and process;For a single site;To assist in the sharing of data monitoring responsibilities among sites;To assist in establishing data monitoring agreements between a customer company and a contract manufacturing organization. The U.S. Food and Drug Administration issued guidance on the management of manufacturing processes designed to improve quality and control of drug products. This involved increased focus on regular monitoring of manufacturing processes, reporting of the results, and the taking of opportunities to improve. The guidance and practice associated with it is known as continued process verification This paper summarizes good practice in responding to continued process verification guidance, gathered from subject matter experts in the biopharmaceutical industry. © PDA, Inc. 2016.

  16. Verification, Dosimetry and Biomonitoring of Mustard Gas Exposure via Immunochemical Detection of Mustard Gas Adducts to DNA and Proteins

    DTIC Science & Technology

    1991-12-01

    radioactivity. Mustard gas appeared to be a very effective alkylating agent for. bases in DNA. Even in blood, with a variety of reactive sites, 1 out of 124...single-stranded material is required for effective competition in the ELISA test. although it contained at least as many adducts as the single-stranded DNA...DNA isolated from human white blood cells as competitor. 203 Figure 92: The effect of the concentration of mustard gas to which single-stranded calf

  17. CURRENT STATUS OF THE EPA PROTOCOL GAS PROGRAM

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. EPA has published a protocol to establish the traceability of these standards to national refer...

  18. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  19. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  20. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  1. 40 CFR 1065.309 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... for water removed from the sample done in post-processing according to § 1065.659 and it does not... initial installation (i.e., test cell commissioning) and after any modifications to the system that would... concentration is updated and recorded at an appropriate frequency to prevent loss of information. This test also...

  2. 40 CFR 1065.309 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... for water removed from the sample done in post-processing according to § 1065.659 and it does not... initial installation (i.e., test cell commissioning) and after any modifications to the system that would... concentration is updated and recorded at an appropriate frequency to prevent loss of information. This test also...

  3. 40 CFR 1065.308 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... meets a minimum response time. You may use the results of this test to determine transformation time, t... you use any analog or real-time digital filters during emission testing, you must operate those... the rise time and fall time as needed. You may also configure analog or digital filters before...

  4. Supersonic Gas-Liquid Cleaning System

    NASA Technical Reports Server (NTRS)

    Kinney, Frank

    1996-01-01

    The Supersonic Gas-Liquid Cleaning System Research Project consisted mainly of a feasibility study, including theoretical and engineering analysis, of a proof-of-concept prototype of this particular cleaning system developed by NASA-KSC. The cleaning system utilizes gas-liquid supersonic nozzles to generate high impingement velocities at the surface of the device to be cleaned. The cleaning fluid being accelerated to these high velocities may consist of any solvent or liquid, including water. Compressed air or any inert gas is used to provide the conveying medium for the liquid, as well as substantially reduce the total amount of liquid needed to perform adequate surface cleaning and cleanliness verification. This type of aqueous cleaning system is considered to be an excellent way of conducting cleaning and cleanliness verification operations as replacements for the use of CFC 113 which must be discontinued by 1995. To utilize this particular cleaning system in various cleaning applications for both the Space Program and the commercial market, it is essential that the cleaning system, especially the supersonic nozzle, be characterized for such applications. This characterization consisted of performing theoretical and engineering analysis, identifying desirable modifications/extensions to the basic concept, evaluating effects of variations in operating parameters, and optimizing hardware design for specific applications.

  5. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    PubMed

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  6. On the verification of intransitive noninterference in mulitlevel security.

    PubMed

    Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez

    2005-10-01

    We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.

  7. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    PubMed Central

    Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-01-01

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475

  8. Experimental quantum verification in the presence of temporally correlated noise

    NASA Astrophysics Data System (ADS)

    Mavadia, S.; Edmunds, C. L.; Hempel, C.; Ball, H.; Roy, F.; Stace, T. M.; Biercuk, M. J.

    2018-02-01

    Growth in the capabilities of quantum information hardware mandates access to techniques for performance verification that function under realistic laboratory conditions. Here we experimentally characterise the impact of common temporally correlated noise processes on both randomised benchmarking (RB) and gate-set tomography (GST). Our analysis highlights the role of sequence structure in enhancing or suppressing the sensitivity of quantum verification protocols to either slowly or rapidly varying noise, which we treat in the limiting cases of quasi-DC miscalibration and white noise power spectra. We perform experiments with a single trapped 171Yb+ ion-qubit and inject engineered noise (" separators="∝σ^ z ) to probe protocol performance. Experiments on RB validate predictions that measured fidelities over sequences are described by a gamma distribution varying between approximately Gaussian, and a broad, highly skewed distribution for rapidly and slowly varying noise, respectively. Similarly we find a strong gate set dependence of default experimental GST procedures in the presence of correlated errors, leading to significant deviations between estimated and calculated diamond distances in the presence of correlated σ^ z errors. Numerical simulations demonstrate that expansion of the gate set to include negative rotations can suppress these discrepancies and increase reported diamond distances by orders of magnitude for the same error processes. Similar effects do not occur for correlated σ^ x or σ^ y errors or depolarising noise processes, highlighting the impact of the critical interplay of selected gate set and the gauge optimisation process on the meaning of the reported diamond norm in correlated noise environments.

  9. Physiological response of rats to delivery of helium and xenon: implications for hyperpolarized noble gas imaging

    NASA Technical Reports Server (NTRS)

    Ramirez, M. P.; Sigaloff, K. C.; Kubatina, L. V.; Donahue, M. A.; Venkatesh, A. K.; Albert, M. S.; ALbert, M. S. (Principal Investigator)

    2000-01-01

    The physiological effects of various hyperpolarized helium and xenon MRI-compatible breathing protocols were investigated in 17 Sprague-Dawley rats, by continuous monitoring of blood oxygen saturation, heart rate, EKG, temperature and endotracheal pressure. The protocols included alternating breaths of pure noble gas and oxygen, continuous breaths of pure noble gas, breath-holds of pure noble gas for varying durations, and helium breath-holds preceded by two helium rinses. Alternate-breath protocols up to 128 breaths caused a decrease in oxygen saturation level of less than 5% for either helium or xenon, whereas 16 continuous-breaths caused a 31.5% +/- 2.3% decrease in oxygen saturation for helium and a 30.7% +/- 1. 3% decrease for xenon. Breath-hold protocols up to 25 s did not cause the oxygen saturation to fall below 90% for either of the noble gases. Oxygen saturation values below 90% are considered pathological. At 30 s of breath-hold, the blood oxygen saturation dropped precipitously to 82% +/- 0.6% for helium, and to 76.5% +/- 7. 4% for xenon. Breath-holds longer than 10 s preceded by pre-rinses caused oxygen saturation to drop below 90%. These findings demonstrate the need for standardized noble gas inhalation procedures that have been carefully tested, and for continuous physiological monitoring to ensure the safety of the subject. We find short breath-hold and alternate-breath protocols to be safe procedures for use in hyperpolarized noble gas MRI experiments. Copyright 2000 John Wiley & Sons, Ltd.

  10. Parallel production and verification of protein products using a novel high-throughput screening method.

    PubMed

    Tegel, Hanna; Yderland, Louise; Boström, Tove; Eriksson, Cecilia; Ukkonen, Kaisa; Vasala, Antti; Neubauer, Peter; Ottosson, Jenny; Hober, Sophia

    2011-08-01

    Protein production and analysis in a parallel fashion is today applied in laboratories worldwide and there is a great need to improve the techniques and systems used for this purpose. In order to save time and money, a fast and reliable screening method for analysis of protein production and also verification of the protein product is desired. Here, a micro-scale protocol for the parallel production and screening of 96 proteins in plate format is described. Protein capture was achieved using immobilized metal affinity chromatography and the product was verified using matrix-assisted laser desorption ionization time-of-flight MS. In order to obtain sufficiently high cell densities and product yield in the small-volume cultivations, the EnBase® cultivation technology was applied, which enables cultivation in as small volumes as 150 μL. Here, the efficiency of the method is demonstrated by producing 96 human, recombinant proteins, both in micro-scale and using a standard full-scale protocol and comparing the results in regard to both protein identity and sample purity. The results obtained are highly comparable to those acquired through employing standard full-scale purification protocols, thus validating this method as a successful initial screening step before protein production at a larger scale. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Energy Evaluation of a New Construction Pilot Community: Fresno, California

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burdick, A.; Poerschke, A.; Rapport, A.

    2014-06-01

    A new construction pilot community was constructed by builder-partner Wathen-Castanos Hybrid Homes (WCHH) based on a single occupied test house that was designed to achieve greater than 30% energy savings with respect to the House Simulation Protocols (Hendron, Robert; Engebrecht, Cheryn (2010). Building America House Simulation Protocols. Golden, CO: National Renewable Energy Laboratory). Builders face several key problems when implementing a whole-house systems integrated measures package (SIMP) from a single test house into multiple houses. Although a technical solution already may have been evaluated and validated in an individual test house, the potential exists for constructability failures at the communitymore » scale. This report addresses factors of implementation and scalability at the community scale and proposes methodologies by which community-scale energy evaluations can be performed based on results at the occupied test house level. Research focused on the builder and trade implementation of a SIMP and the actual utility usage in the houses at the community scale of production. Five occupants participated in this community-scale research by providing utility bills and information on occupancy and miscellaneous gas and electric appliance use for their houses. IBACOS used these utility data and background information to analyze the actual energy performance of the houses. Verification with measured data is an important component in predictive energy modeling. The actual utility bill readings were compared to projected energy consumption using BEopt with actual weather and thermostat set points for normalization.« less

  12. Building America Case Study: Low-Cost Evaluation of Energy Savings at the Community Scale, Fresno, California (Fact Sheet)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2014-10-01

    A new construction pilot community was constructed by builder-partner Wathen-Castanos Hybrid Homes (WCHH) based on a single occupied test house that was designed to achieve greater than 30% energy savings with respect to the House Simulation Protocols (Hendron, Robert; Engebrecht, Cheryn (2010). Building America House Simulation Protocols. Golden, CO: National Renewable Energy Laboratory.). Builders face several key problems when implementing a whole-house systems integrated measures package (SIMP) from a single test house into multiple houses. Although a technical solution already may have been evaluated and validated in an individual test house, the potential exists for constructability failures at the communitymore » scale. This report addresses factors of implementation and scalability at the community scale and proposes methodologies by which community-scale energy evaluations can be performed based on results at the occupied test house level. Research focused on the builder and trade implementation of a SIMP and the actual utility usage in the houses at the community scale of production. Five occupants participated in this community-scale research by providing utility bills and information on occupancy and miscellaneous gas and electric appliance use for their houses. IBACOS used these utility data and background information to analyze the actual energy performance of the houses. Verification with measured data is an important component in predictive energy modeling. The actual utility bill readings were compared to projected energy consumption using BEopt with actual weather and thermostat set points for normalization.« less

  13. Verification on spray simulation of a pintle injector for liquid rocket engine

    NASA Astrophysics Data System (ADS)

    Son, Min; Yu, Kijeong; Radhakrishnan, Kanmaniraja; Shin, Bongchul; Koo, Jaye

    2016-02-01

    The pintle injector used for a liquid rocket engine is a newly re-attracted injection system famous for its wide throttle ability with high efficiency. The pintle injector has many variations with complex inner structures due to its moving parts. In order to study the rotating flow near the injector tip, which was observed from the cold flow experiment using water and air, a numerical simulation was adopted and a verification of the numerical model was later conducted. For the verification process, three types of experimental data including velocity distributions of gas flows, spray angles and liquid distribution were all compared using simulated results. The numerical simulation was performed using a commercial simulation program with the Eulerian multiphase model and axisymmetric two dimensional grids. The maximum and minimum velocities of gas were within the acceptable range of agreement, however, the spray angles experienced up to 25% error when the momentum ratios were increased. The spray density distributions were quantitatively measured and had good agreement. As a result of this study, it was concluded that the simulation method was properly constructed to study specific flow characteristics of the pintle injector despite having the limitations of two dimensional and coarse grids.

  14. Monitoring/Verification Using DMS: TATP Example

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kevin Kyle; Stephan Weeks

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operationsmanagement systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a “smart dust” sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biologicalmore » materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15–300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.« less

  15. Verification, Dosimetry and Biomonitoring of Mustard Gas Exposure via Immunochemical Detection of Mustard Gas Adducts to DNA and Proteins.

    DTIC Science & Technology

    1990-09-01

    90% of all radioactivity. Mustard gas appeared to be a very effective alkylating agent for bases in DNA. Even in blood, with a variety of reactive...stranded than of the single-stranded material is required for effective competition in the ELISA test, probably as a result of interstrand crosslinks...first noticed by their effects on casualties. If a total ban on the use, possession and production of chemical agents will eventually materialize, the

  16. International Space Station Major Constituent Analyzer On-Orbit Performance

    NASA Technical Reports Server (NTRS)

    Gardner, Ben D.; Erwin, Philip M.; Thoresen, Souzan; Granahan, John; Matty, Chris

    2010-01-01

    The Major Constituent Analyzer is a mass spectrometer based system that measures the major atmospheric constituents on the International Space Station. A number of limited-life components require periodic changeout, including the analyzer (ORU 02) and the verification gas assembly (ORU 08). The longest lasting ORU 02 was recently replaced after a record service length of 1033 days. The comparatively high performance duration may be attributable to a reduced inlet flow rate into the analyzer, resulting in increased ion pump lifetime; however, there may be other factors as well. A recent schedule slip for delivery of replacement verification gas led to a demonstration that the calibration interval could be extended on a short-term basis. An analysis of ORU 08 performance characteristics indicates that it is possible to temporarily extend the calibration interval from 6 weeks to 12 weeks if necessary.

  17. Continuous-variable quantum homomorphic signature

    NASA Astrophysics Data System (ADS)

    Li, Ke; Shang, Tao; Liu, Jian-wei

    2017-10-01

    Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.

  18. Modeling and Analysis of Asynchronous Systems Using SAL and Hybrid SAL

    NASA Technical Reports Server (NTRS)

    Tiwari, Ashish; Dutertre, Bruno

    2013-01-01

    We present formal models and results of formal analysis of two different asynchronous systems. We first examine a mid-value select module that merges the signals coming from three different sensors that are each asynchronously sampling the same input signal. We then consider the phase locking protocol proposed by Daly, Hopkins, and McKenna. This protocol is designed to keep a set of non-faulty (asynchronous) clocks phase locked even in the presence of Byzantine-faulty clocks on the network. All models and verifications have been developed using the SAL model checking tools and the Hybrid SAL abstractor.

  19. Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.

  20. Loss-tolerant quantum secure positioning with weak laser sources

    DOE PAGES

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; ...

    2016-09-14

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less

  1. GAO’s 2011 High-Risk Series: An Update

    DTIC Science & Technology

    2011-02-17

    DOD Contract Management • DOE’s Contract Management for the National Nuclear Security Administration and Office of Environmental Management • NASA ...expertise to prevent. Historically, Interior’s Bureau of Land Management ( BLM ) managed onshore federal oil and gas activities, while the Minerals Management...neither BLM nor MMS had consistently met their statutory requirements or agency goals for oil and gas production verification inspections. Without such

  2. Evaluating Data Abstraction Assistant, a novel software application for data abstraction during systematic reviews: protocol for a randomized controlled trial.

    PubMed

    Saldanha, Ian J; Schmid, Christopher H; Lau, Joseph; Dickersin, Kay; Berlin, Jesse A; Jap, Jens; Smith, Bryant T; Carini, Simona; Chan, Wiley; De Bruijn, Berry; Wallace, Byron C; Hutfless, Susan M; Sim, Ida; Murad, M Hassan; Walsh, Sandra A; Whamond, Elizabeth J; Li, Tianjing

    2016-11-22

    Data abstraction, a critical systematic review step, is time-consuming and prone to errors. Current standards for approaches to data abstraction rest on a weak evidence base. We developed the Data Abstraction Assistant (DAA), a novel software application designed to facilitate the abstraction process by allowing users to (1) view study article PDFs juxtaposed to electronic data abstraction forms linked to a data abstraction system, (2) highlight (or "pin") the location of the text in the PDF, and (3) copy relevant text from the PDF into the form. We describe the design of a randomized controlled trial (RCT) that compares the relative effectiveness of (A) DAA-facilitated single abstraction plus verification by a second person, (B) traditional (non-DAA-facilitated) single abstraction plus verification by a second person, and (C) traditional independent dual abstraction plus adjudication to ascertain the accuracy and efficiency of abstraction. This is an online, randomized, three-arm, crossover trial. We will enroll 24 pairs of abstractors (i.e., sample size is 48 participants), each pair comprising one less and one more experienced abstractor. Pairs will be randomized to abstract data from six articles, two under each of the three approaches. Abstractors will complete pre-tested data abstraction forms using the Systematic Review Data Repository (SRDR), an online data abstraction system. The primary outcomes are (1) proportion of data items abstracted that constitute an error (compared with an answer key) and (2) total time taken to complete abstraction (by two abstractors in the pair, including verification and/or adjudication). The DAA trial uses a practical design to test a novel software application as a tool to help improve the accuracy and efficiency of the data abstraction process during systematic reviews. Findings from the DAA trial will provide much-needed evidence to strengthen current recommendations for data abstraction approaches. The trial is registered at National Information Center on Health Services Research and Health Care Technology (NICHSR) under Registration # HSRP20152269: https://wwwcf.nlm.nih.gov/hsr_project/view_hsrproj_record.cfm?NLMUNIQUE_ID=20152269&SEARCH_FOR=Tianjing%20Li . All items from the World Health Organization Trial Registration Data Set are covered at various locations in this protocol. Protocol version and date: This is version 2.0 of the protocol, dated September 6, 2016. As needed, we will communicate any protocol amendments to the Institutional Review Boards (IRBs) of Johns Hopkins Bloomberg School of Public Health (JHBSPH) and Brown University. We also will make appropriate as-needed modifications to the NICHSR website in a timely fashion.

  3. Demonstration and Verification of a Turbine Power Generation System Utilizing Renewable Fuel: Landfill Gas

    DTIC Science & Technology

    2013-09-01

    17 5.6 SAMPLING RESULTS ........................................................................................ 18 6.0 PERFORMANCE...Page ii 8.0 IMPLEMENTATION ISSUES ........................................................................................ 37 8.1 FILTRATION ...15 iv LIST OF TABLES Page Table 1. Performance results

  4. 40 CFR 1065.342 - Sample dryer verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... condensation as required in § 1065.145(d)(1)(i). We recommend that the sample system components be maintained at least 5 °C above the local humidified gas dewpoint to prevent aqueous condensation. (5) Measure...

  5. 40 CFR 1065.342 - Sample dryer verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... condensation as required in § 1065.145(d)(1)(i). We recommend that the sample system components be maintained at least 5 °C above the local humidified gas dewpoint to prevent aqueous condensation. (5) Measure...

  6. 40 CFR 1065.342 - Sample dryer verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... condensation as required in § 1065.145(d)(1)(i). We recommend that the sample system components be maintained at least 5 °C above the local humidified gas dewpoint to prevent aqueous condensation. (5) Measure...

  7. Toward Practical Verification of Outsourced Computations Using Probabilistically Checkable Proofs (PCPs)

    DTIC Science & Technology

    2010-07-12

    Germany, 1999. [8] L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy. Checking Computations in Polylogarithmic Time. In STOC, 1991. [9] A. Ben- David ...their work. J. ACM, 42(1):269–291, 1995. [12] D. Chaum , C. Crépeau, and I. Damgard. Multiparty unconditionally secure protocols. In STOC, 1988. [13

  8. Carbon footprint: current methods of estimation.

    PubMed

    Pandey, Divya; Agrawal, Madhoolika; Pandey, Jai Shanker

    2011-07-01

    Increasing greenhouse gaseous concentration in the atmosphere is perturbing the environment to cause grievous global warming and associated consequences. Following the rule that only measurable is manageable, mensuration of greenhouse gas intensiveness of different products, bodies, and processes is going on worldwide, expressed as their carbon footprints. The methodologies for carbon footprint calculations are still evolving and it is emerging as an important tool for greenhouse gas management. The concept of carbon footprinting has permeated and is being commercialized in all the areas of life and economy, but there is little coherence in definitions and calculations of carbon footprints among the studies. There are disagreements in the selection of gases, and the order of emissions to be covered in footprint calculations. Standards of greenhouse gas accounting are the common resources used in footprint calculations, although there is no mandatory provision of footprint verification. Carbon footprinting is intended to be a tool to guide the relevant emission cuts and verifications, its standardization at international level are therefore necessary. Present review describes the prevailing carbon footprinting methods and raises the related issues.

  9. Application of additive laser technologies in the gas turbine blades design process

    NASA Astrophysics Data System (ADS)

    Shevchenko, I. V.; Rogalev, A. N.; Osipov, S. K.; Bychkov, N. M.; Komarov, I. I.

    2017-11-01

    An emergence of modern innovative technologies requires delivering new and modernization existing design and production processes. It is especially relevant for designing the high-temperature turbines of gas turbine engines, development of which is characterized by a transition to higher parameters of working medium in order to improve their efficient performance. A design technique for gas turbine blades based on predictive verification of thermal and hydraulic models of their cooling systems by testing of a blade prototype fabricated using the selective laser melting technology was presented in this article. Technique was proven at the time of development of the first stage blade cooling system for the high-pressure turbine. An experimental procedure for verification of a thermal model of the blades with convective cooling systems based on the comparison of heat-flux density obtained from the numerical simulation data and results of tests in a liquid-metal thermostat was developed. The techniques makes it possible to obtain an experimentally tested blade version and to exclude its experimental adjustment after the start of mass production.

  10. A Byzantine-Fault Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2006-01-01

    Embedded distributed systems have become an integral part of safety-critical computing applications, necessitating system designs that incorporate fault tolerant clock synchronization in order to achieve ultra-reliable assurance levels. Many efficient clock synchronization protocols do not, however, address Byzantine failures, and most protocols that do tolerate Byzantine failures do not self-stabilize. Of the Byzantine self-stabilizing clock synchronization algorithms that exist in the literature, they are based on either unjustifiably strong assumptions about initial synchrony of the nodes or on the existence of a common pulse at the nodes. The Byzantine self-stabilizing clock synchronization protocol presented here does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The proposed protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period. Proofs of the correctness of the protocol as well as the results of formal verification efforts are reported.

  11. Full-Scale Wind-Tunnel Investigation of Wing-Cooling Ducts Effects of Propeller Slipstream, Special Report

    NASA Technical Reports Server (NTRS)

    Nickle, F. R.; Freeman, Arthur B.

    1939-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  12. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  13. SEASAT - A candidate ocean industry economic verification experiments

    NASA Technical Reports Server (NTRS)

    Miller, B. P.

    1976-01-01

    The economic benefits of an operational SEASAT system are discussed in the areas of marine transportation, offshore oil and natural gas exploration and development, ocean fishing, and Arctic operations. A description of the candidate economic verification experiments which could be performed with SEASAT-A is given. With the exception of the area of Arctic operations, experiments have been identified in each of the areas of ocean based activity that are expected to show an economic impact from the use of operational SEASAT data. Experiments have been identified in the areas of the offshore oil and natural gas industry, as well as ice monitoring and coastal zone applications. Emphasis has been placed on the identification and the development of those experiments which meet criteria for: (1) end user participation; (2) SEASAT-A data utility; (3) measurability of operational parameters to demonstrate economic effect; and (4) non-proprietary nature of results.

  14. SU-E-T-435: Development and Commissioning of a Complete System for In-Vivo Dosimetry and Range Verification in Proton Therapy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Samuel, D; Testa, M; Park, Y

    Purpose: In-vivo dose and beam range verification in proton therapy could play significant roles in proton treatment validation and improvements. Invivo beam range verification, in particular, could enable new treatment techniques one of which, for example, could be the use of anterior fields for prostate treatment instead of opposed lateral fields as in current practice. We have developed and commissioned an integrated system with hardware, software and workflow protocols, to provide a complete solution, simultaneously for both in-vivo dosimetry and range verification for proton therapy. Methods: The system uses a matrix of diodes, up to 12 in total, but separablemore » into three groups for flexibility in application. A special amplifier was developed to capture extremely small signals from very low proton beam current. The software was developed within iMagX, a general platform for image processing in radiation therapy applications. The range determination exploits the inherent relationship between the internal range modulation clock of the proton therapy system and the radiological depth at the point of measurement. The commissioning of the system, for in-vivo dosimetry and for range verification was separately conducted using anthropomorphic phantom. EBT films and TLDs were used for dose comparisons and range scan of the beam distal fall-off was used as ground truth for range verification. Results: For in-vivo dose measurement, the results were in agreement with TLD and EBT films and were within 3% from treatment planning calculations. For range verification, a precision of 0.5mm is achieved in homogeneous phantoms, and a precision of 2mm for anthropomorphic pelvic phantom, except at points with significant range mixing. Conclusion: We completed the commissioning of our system for in-vivo dosimetry and range verification in proton therapy. The results suggest that the system is ready for clinical trials on patient.« less

  15. The post Challenger era Get Away Special program January 1992

    NASA Technical Reports Server (NTRS)

    Prouty, Clarke

    1992-01-01

    The Get Away Special (GAS) program is described in terms of the changes that have taken place in both NASA and the GAS itself. Attention is given to the relationships developed between NASA and GAS customers in the context of programmatic and technical issues. The background of the GAS program is outlined with reference given to policy publications, the design of the Flight Verification Payload, and the first GAS payload launched. A review process is described that facilitates the management of the payloads through flight certification. The GAS Bridge was developed to carry up to 12 payloads simultaneously, and the recent period of GAS inactivity is explained. A price increase is introduced for future GAS payloads with negotiable access to optional services, and the ease and accessibility of the GAS programs for private experiments is emphasized.

  16. Dosimetric assessment of static and helical TomoTherapy in the clinical implementation of breast cancer treatments.

    PubMed

    Reynders, Truus; Tournel, Koen; De Coninck, Peter; Heymann, Steve; Vinh-Hung, Vincent; Van Parijs, Hilde; Duchateau, Michaël; Linthout, Nadine; Gevaert, Thierry; Verellen, Dirk; Storme, Guy

    2009-10-01

    Investigation of the use of TomoTherapy and TomoDirect versus conventional radiotherapy for the treatment of post-operative breast carcinoma. This study concentrates on the evaluation of the planning protocol for the TomoTherapy and TomoDirect TPS, dose verification and the implementation of in vivo dosimetry. Eight patients with different breast cancer indications (left/right tumor, axillary nodes involvement (N+)/no nodes (N0), tumorectomy/mastectomy) were enrolled. TomoTherapy, TomoDirect and conventional plans were generated for prone and supine positions leading to six or seven plans per patient. Dose prescription was 42Gy in 15 fractions over 3weeks. Dose verification of a TomoTherapy plan is performed using TLDs and EDR2 film inside a home-made wax breast phantom fixed on a rando-alderson phantom. In vivo dosimetry was performed with TLDs. It is possible to create clinically acceptable plans with TomoTherapy and TomoDirect. TLD calibration protocol with a water equivalent phantom is accurate. TLD verification with the phantom shows measured over calculated ratios within 2.2% (PTV). An overresponse of the TLDs was observed in the low dose regions (<0.1Gy). The film measurements show good agreement for high and low dose regions inside the phantom. A sharp gradient can be created to the thoracic wall. In vivo dosimetry with TLDs was clinically feasible. The TomoTherapy and TomoDirect modalities can deliver dose distributions which the radiotherapist judges to be equal to or better than conventional treatment of breast carcinoma according to the organ to be protected.

  17. Verification, Dosimetry, and Biomonitoring of Mustard Gas Exposure via Immunochemical Detection of Mustard Gas Adducts to DNA and Proteins

    DTIC Science & Technology

    1993-07-01

    be a very effective alkylating agent for bases in DNA. Even in blood, with a variety of reactive sites, I out of 124 guanine bases was alkylated to...required for effective competition in the ELISA test, although it contained at least as many adducts as the single-stranded DNA. This difference is...competitor. 203 Figure 92: The effect of the concentration of mustard gas to which single-stranded calf-thymus DNA had been exposed on the 50% inhibition

  18. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    PubMed

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turley, Jessica; Claridge Mackonis, Elizabeth

    To evaluate in-field megavoltage (MV) imaging of simultaneously integrated boost (SIB) breast fields to determine its feasibility in treatment verification for the SIB breast radiotherapy technique, and to assess whether the current-imaging protocol and treatment margins are sufficient. For nine patients undergoing SIB breast radiotherapy, in-field MV images of the SIB fields were acquired on days that regular treatment verification imaging was performed. The in-field images were matched offline according to the scar wire on digitally reconstructed radiographs. The offline image correction results were then applied to a margin recipe formula to calculate safe margins that account for random andmore » systematic uncertainties in the position of the boost volume when an offline correction protocol has been applied. After offline assessment of the acquired images, 96% were within the tolerance set in the current department-imaging protocol. Retrospectively performing the maximum position deviations on the Eclipse™ treatment planning system demonstrated that the clinical target volume (CTV) boost received a minimum dose difference of 0.4% and a maximum dose difference of 1.4% less than planned. Furthermore, applying our results to the Van Herk margin formula to ensure that 90% of patients receive 95% of the prescribed dose, the calculated CTV margins were comparable to the current departmental procedure used. Based on the in-field boost images acquired and the feasible application of these results to the margin formula the current CTV-planning target volume margins used are appropriate for the accurate treatment of the SIB boost volume without additional imaging.« less

  20. 30 CFR 250.911 - If my platform is subject to the Platform Verification Program, what must I do?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... installation for the Regional Supervisor's approval. You must include a project management timeline, Gantt... MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL AND GAS AND SULPHUR...

  1. Treadmill Adaptation and Verification of Self-Selected Walking Speed: A Protocol for Children

    ERIC Educational Resources Information Center

    Amorim, Paulo Roberto S.; Hills, Andrew; Byrne, Nuala

    2009-01-01

    Walking is a common activity of daily life and researchers have used the range 3-6 km.h[superscript -1] as reference for walking speeds habitually used for transportation. The term self-selected (i.e., individual or comfortable walking pace or speed) is commonly used in the literature and is identified as the most efficient walking speed, with…

  2. The Influence of a Dietary Protocol on Cone Beam CT-Guided Radiotherapy for Prostate Cancer Patients

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smitsmans, Monique H.P.; Pos, Floris J.; Bois, Josien de

    2008-07-15

    Purpose: To evaluate the influence of a dietary protocol on cone beam computed tomography (CBCT) image quality, which is an indirect indicator for short-term (intrafraction) prostate motion, and on interfraction motion. Image quality is affected by motion (e.g., moving gas) during imaging and influences the performance of automatic prostate localization on CBCT scans. Methods and Materials: Twenty-six patients (336 CBCT scans) followed the dietary protocol and 23 patients (240 CBCT scans) did not. Prostates were automatically localized by using three dimensional (3D) gray-value registration (GR). Feces and (moving) gas occurrence in the CBCT scans, the success rate of 3D-GR, andmore » the statistics of prostate motion data were assessed. Results: Feces, gas, and moving gas significantly decreased from 55%, 61%, and 43% of scans in the nondiet group to 31%, 47%, and 28% in the diet group (all p < 0.001). Since there is a known relation between gas and short-term prostate motion, intrafraction prostate motion probably also decreased. The success rate of 3D-GR improved from 83% to 94% (p < 0.001). A decrease in random interfraction prostate motion also was found, which was not significant after Bonferroni's correction. Significant deviations from planning CT position for rotations around the left-right axis were found in both groups. Conclusions: The dietary protocol significantly decreased the incidence of feces and (moving) gas. As a result, CBCT image quality and the success rate of 3D-GR significantly increased. A trend exists that random interfraction prostate motion decreases. Using a dietary protocol therefore is advisable, also without CBCT-based image guidance.« less

  3. Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey

    PubMed Central

    Wilkerson, J. Michael; Shenk, Jared E.; Grey, Jeremy A.; Simon Rosser, B. R.; Noor, Syed W.

    2014-01-01

    Recruiting hidden populations into online research remains challenging. In this manuscript, we report lessons learned from our efforts to recruit methamphetamine-using men who have sex with men. Between July and October 2012, we implemented a four-phase recruitment strategy to enroll a total of 343 methamphetamine-using MSM into an online survey about recent substance use, sexual behavior, and various psychosocial measures. The four phases were implemented sequentially. During phase one, we placed advertisements on mobile applications, and during phase two, we placed advertisements on traditional websites formatted for browsers. During phase three, we used e-mail to initiate snowball recruitment, and during phase four, we used social media for snowball recruitment. Advertisements on mobile devices and websites formatted for browsers proved to be expensive options and resulted in few eligible participants. Our attempts to initiate a snowball through e-mail also proved unsuccessful. The majority (n=320) of observations in our final dataset came from our use of social media. However, participant fraud was a concern, requiring us to implement a strong participant verification protocol. For maximum recruitment and cost-effectiveness, researchers should use social media for recruitment provided they employ strong participant verification protocols. PMID:25642143

  4. Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey.

    PubMed

    Wilkerson, J Michael; Shenk, Jared E; Grey, Jeremy A; Simon Rosser, B R; Noor, Syed W

    Recruiting hidden populations into online research remains challenging. In this manuscript, we report lessons learned from our efforts to recruit methamphetamine-using men who have sex with men. Between July and October 2012, we implemented a four-phase recruitment strategy to enroll a total of 343 methamphetamine-using MSM into an online survey about recent substance use, sexual behavior, and various psychosocial measures. The four phases were implemented sequentially. During phase one, we placed advertisements on mobile applications, and during phase two, we placed advertisements on traditional websites formatted for browsers. During phase three, we used e-mail to initiate snowball recruitment, and during phase four, we used social media for snowball recruitment. Advertisements on mobile devices and websites formatted for browsers proved to be expensive options and resulted in few eligible participants. Our attempts to initiate a snowball through e-mail also proved unsuccessful. The majority (n=320) of observations in our final dataset came from our use of social media. However, participant fraud was a concern, requiring us to implement a strong participant verification protocol. For maximum recruitment and cost-effectiveness, researchers should use social media for recruitment provided they employ strong participant verification protocols.

  5. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Tiessen, Alex

    Retrocommissioning (RCx) is a systematic process for optimizing energy performance in existing buildings. It specifically focuses on improving the control of energy-using equipment (e.g., heating, ventilation, and air conditioning [HVAC] equipment and lighting) and typically does not involve equipment replacement. Field results have shown proper RCx can achieve energy savings ranging from 5 percent to 20 percent, with a typical payback of two years or less (Thorne 2003). The method presented in this protocol provides direction regarding: (1) how to account for each measure's specific characteristics and (2) how to choose the most appropriate savings verification approach.

  6. Single-shot secure quantum network coding on butterfly network with free public communication

    NASA Astrophysics Data System (ADS)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  7. 40 CFR Appendix E to Part 75 - Optional NOX Emissions Estimation Protocol for Gas-Fired Peaking Units and Oil-Fired Peaking Units

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 17 2013-07-01 2013-07-01 false Optional NOX Emissions Estimation Protocol for Gas-Fired Peaking Units and Oil-Fired Peaking Units E Appendix E to Part 75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION...

  8. 40 CFR Appendix E to Part 75 - Optional NOX Emissions Estimation Protocol for Gas-Fired Peaking Units and Oil-Fired Peaking Units

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false Optional NOX Emissions Estimation Protocol for Gas-Fired Peaking Units and Oil-Fired Peaking Units E Appendix E to Part 75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION...

  9. TacSats for Surveillance, Verification and C3I

    DTIC Science & Technology

    1993-02-01

    a single significant fraction of the L.V. payload satellite of an identical total mass. and will reduce, in proportion , the Assuming the availability...power limited proportional to gas pressure; F= frequency lightsats: of the applied RF field. - small ion thrusters for drag At resonance F=Fc, and the...thrusters ir also the collision frequency proportional to required. Full thrust control, over a 30% the operating gas pressure. to 120 % range of the design

  10. 10 CFR 300.11 - Independent verification.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... DEPARTMENT OF ENERGY CLIMATE CHANGE VOLUNTARY GREENHOUSE GAS REPORTING PROGRAM: GENERAL GUIDELINES § 300.11..., Health and Safety Auditor Certification: California Climate Action Registry; Clean Development Mechanism... statements (or lack thereof) of any significant changes in entity boundaries, products, or processes; (iii...

  11. 10 CFR 300.11 - Independent verification.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... DEPARTMENT OF ENERGY CLIMATE CHANGE VOLUNTARY GREENHOUSE GAS REPORTING PROGRAM: GENERAL GUIDELINES § 300.11..., Health and Safety Auditor Certification: California Climate Action Registry; Clean Development Mechanism... statements (or lack thereof) of any significant changes in entity boundaries, products, or processes; (iii...

  12. 10 CFR 300.11 - Independent verification.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... DEPARTMENT OF ENERGY CLIMATE CHANGE VOLUNTARY GREENHOUSE GAS REPORTING PROGRAM: GENERAL GUIDELINES § 300.11..., Health and Safety Auditor Certification: California Climate Action Registry; Clean Development Mechanism... statements (or lack thereof) of any significant changes in entity boundaries, products, or processes; (iii...

  13. Remaining Sites Verification Package for the 1607-D4 Septic System, Waste Site Reclassification Form 2005-036

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    R. A. Carlson

    2006-02-23

    The 1607-D4 Septic System was a septic tank and tile field that received sanitary sewage from the 115-D/DR Gas Recirculation Facility. This septic system operated from 1944 to 1968. Decommissioning took place in 1985 and 1986 when all above-grade features were demolished and the tank backfilled. The results of verification sampling demonstrated that residual contaminant concentrations do not preclude any future uses and allow for unrestricted use of shallow zone soils. The results also showed that residual contaminant concentrations are protective of groundwater and the Columbia River.

  14. A risk analysis approach applied to field surveillance in utility meters in legal metrology

    NASA Astrophysics Data System (ADS)

    Rodrigues Filho, B. A.; Nonato, N. S.; Carvalho, A. D.

    2018-03-01

    Field surveillance represents the level of control in metrological supervision responsible for checking the conformity of measuring instruments in-service. Utility meters represent the majority of measuring instruments produced by notified bodies due to self-verification in Brazil. They play a major role in the economy once electricity, gas and water are the main inputs to industries in their production processes. Then, to optimize the resources allocated to control these devices, the present study applied a risk analysis in order to identify among the 11 manufacturers notified to self-verification, the instruments that demand field surveillance.

  15. Aerospace Payloads Leak Test Methodology

    NASA Technical Reports Server (NTRS)

    Lvovsky, Oleg; Grayson, Cynthia M.

    2010-01-01

    Pressurized and sealed aerospace payloads can leak on orbit. When dealing with toxic or hazardous materials, requirements for fluid and gas leakage rates have to be properly established, and most importantly, reliably verified using the best Nondestructive Test (NDT) method available. Such verification can be implemented through application of various leak test methods that will be the subject of this paper, with a purpose to show what approach to payload leakage rate requirement verification is taken by the National Aeronautics and Space Administration (NASA). The scope of this paper will be mostly a detailed description of 14 leak test methods recommended.

  16. Model Checking Failed Conjectures in Theorem Proving: A Case Study

    NASA Technical Reports Server (NTRS)

    Pike, Lee; Miner, Paul; Torres-Pomales, Wilfredo

    2004-01-01

    Interactive mechanical theorem proving can provide high assurance of correct design, but it can also be a slow iterative process. Much time is spent determining why a proof of a conjecture is not forthcoming. In some cases, the conjecture is false and in others, the attempted proof is insufficient. In this case study, we use the SAL family of model checkers to generate a concrete counterexample to an unproven conjecture specified in the mechanical theorem prover, PVS. The focus of our case study is the ROBUS Interactive Consistency Protocol. We combine the use of a mechanical theorem prover and a model checker to expose a subtle flaw in the protocol that occurs under a particular scenario of faults and processor states. Uncovering the flaw allows us to mend the protocol and complete its general verification in PVS.

  17. Chapter 1: Introduction. The Uniform Methods Project: Methods for Determining Energy-Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Michael; Haeri, Hossein; Reynolds, Arlis

    This chapter provides a set of model protocols for determining energy and demand savings that result from specific energy efficiency measures implemented through state and utility efficiency programs. The methods described here are approaches that are or are among the most commonly used and accepted in the energy efficiency industry for certain measures or programs. As such, they draw from the existing body of research and best practices for energy efficiency program evaluation, measurement, and verification (EM&V). These protocols were developed as part of the Uniform Methods Project (UMP), funded by the U.S. Department of Energy (DOE). The principal objectivemore » for the project was to establish easy-to-follow protocols based on commonly accepted methods for a core set of widely deployed energy efficiency measures.« less

  18. SU-E-T-14: A Feasibility Study of Using Modified AP Proton Beam for Post-Operative Pancreatic Cancer Therapy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ding, X; Witztum, A; Kenton, O

    2014-06-01

    Purpose: Due to the unpredictability of bowel gas movement, the PA beam direction is always favored for robust proton therapy in post-operative pancreatic cancer treatment. We investigate the feasibility of replacing PA beam with a modified AP beam to take the bowel gas uncertainty into account. Methods: Nine post-operative pancreatic cancer patients treated with proton therapy (5040cGy, 28 fractions) in our institution were randomly selected. The original plan uses PA and lateral direction passive-scattering proton beams. Beam weighting is about 1:1. All patients received weekly verification CTs to assess the daily variations(total 17 verification CTs). The PA direction beam wasmore » replaced by two other groups of AP direction beam. Group AP: takes 3.5% range uncertainty into account. Group APmod: compensates the bowel gas uncertainty by expanding the proximal margin to 2cm more. The 2cm margin was acquired from the average bowel diameter in from 100 adult abdominal CT scans near pancreatic region (+/- 5cm superiorly and inferiorly). Dose Volume Histograms(DVHs) of the verification CTs were acquired for robustness study. Results: Without the lateral beam, Group APmod is as robust as Group PA. In Group AP, more than 10% of iCTV D98/D95 were reduced by 4–8%. LT kidney and Liver dose robustness are not affected by the AP/PA beam direction. There is 10% of chance that RT kidney and cord will be hit by AP proton beam due to the bowel gas. Compared to Group PA, APmod plan reduced the dose to kidneys and cord max significantly, while there is no statistical significant increase in bowel mean dose. Conclusion: APmod proton beam for the target coverage could be as robust as the PA direction without sacrificing too much of bowel dose. When the AP direction beam has to be selected, a 2cm proximal margin should be considered.« less

  19. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  20. [Validation and verfication of microbiology methods].

    PubMed

    Camaró-Sala, María Luisa; Martínez-García, Rosana; Olmos-Martínez, Piedad; Catalá-Cuenca, Vicente; Ocete-Mochón, María Dolores; Gimeno-Cardona, Concepción

    2015-01-01

    Clinical microbiologists should ensure, to the maximum level allowed by the scientific and technical development, the reliability of the results. This implies that, in addition to meeting the technical criteria to ensure their validity, they must be performed with a number of conditions that allows comparable results to be obtained, regardless of the laboratory that performs the test. In this sense, the use of recognized and accepted reference methodsis the most effective tool for these guarantees. The activities related to verification and validation of analytical methods has become very important, as there is continuous development, as well as updating techniques and increasingly complex analytical equipment, and an interest of professionals to ensure quality processes and results. The definitions of validation and verification are described, along with the different types of validation/verification, and the types of methods, and the level of validation necessary depending on the degree of standardization. The situations in which validation/verification is mandatory and/or recommended is discussed, including those particularly related to validation in Microbiology. It stresses the importance of promoting the use of reference strains as controls in Microbiology and the use of standard controls, as well as the importance of participation in External Quality Assessment programs to demonstrate technical competence. The emphasis is on how to calculate some of the parameters required for validation/verification, such as the accuracy and precision. The development of these concepts can be found in the microbiological process SEIMC number 48: «Validation and verification of microbiological methods» www.seimc.org/protocols/microbiology. Copyright © 2013 Elsevier España, S.L.U. y Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  1. CarbonSat Constellation

    NASA Astrophysics Data System (ADS)

    Sun, Wei; Tobehn, Carsten; Ernst, Robert; Bovensmann, Heinrich; Buchwitz, Michael; Burrows, John P.; Notholt, John

    1 Carbon dioxide (CO2) and methane (CH4) are the most important manmade greenhouse gases (GHGs) which are driving global climate change. Currently, the CO2 measurements from the ground observing network are still the main sources of information but due to the limited number of measurement stations the coverage is limited. In addition, CO2 monitoring and trading is often based mainly on bottom-up calculations and an independent top down verification is limited due to the lack of global measurement data with local resolution. The first CO2 and CH4 mapping from SCIAMACHY on ENVISAT shows that satellites add important missing global information. Current GHG measurement satellites (GOSAT)are limited either in spatial or temporal resolution and coverage. These systems have to collect data over a year or even longer to produce global regional fluxes products. Conse-quently global, timely, higher spatial resolution and high accuracy measurement are required for: 1. A good understanding of the CO2 and CH4 sources and sinks for reliable climate predic-tion; and 2. Independent and transparent verification of accountable sources and sinks in supporting Kyoto and upcoming protocols The CarbonSat constellation idea comes out the trade off of resolution and swath width during CarbonSat mission definition studies. In response to the urgent need to support the Kyoto and upcoming protocols, a feasibility study has been carried out. The proposed solution is a constellation of five CarbonSat satellites in 614km LTAN 13:00, which is able to provide global, daily CO2 and CH4 measurement everywhere on the Earth with high spatial resolution 2 × 2 km and low uncertainty lt;2ppm (CO2) and lt;8ppb (CH4). The unique global daily measurement capability significantly increases the number of cloud free measurements, which enables more reliable services associated with reduced uncertainty, e.g. to 0.15ppm (CO2) per month in 10km and even more timely products. The CarbonSat Constellation in combination with inverse modelling techniques will be able to provide information services, such as global quarterly 1. CO2 and CH4 regional flux updates 2. CO2 emission reporting from hot spots e.g. the power plant 3. CH4 emission reporting from hot spots e.g. the pipeline/oil and gas fields. The team led by the industry partner -OHB now promotes an internationally coordinated CarbonSat constellation to provide operational services contributing to the independent iden-tification and verification of man-made & natural CO2 and CH4 emissions and claimed carbon sinks. It is proposed that the CarbonSat Constellation will be implemented through an internation-ally coordinated constellation. Each country contributes one satellite in the constellation and establishes its own ground station to provide data for national applications. A central coordi-nation will be set up for the constellation operation, data calibration and international data distribution. The proposed approach provides independence for each partner and is financially more feasible. In addition, the CarbonSat Constellation consortium could be a bridge/forum between developed countries and developing countries in establishing common understandings of and actions on the global climate change. The world wide transparency provided by this international forum is also critical in supporting Kyoto protocol and upcoming international agreement in man-made Greenhouse emission reduction. The paper will present the CarbonSat Constellation design and the proposed products/ services to verify CO2 and CH4 sources and sinks from a constellation of five CarbonSat satellites through a multilateral collaboration.

  2. Verification and validation of a reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  3. Developing a monitoring and verification plan with reference to the Australian Otway CO2 pilot project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dodds, K.; Daley, T.; Freifeld, B.

    2009-05-01

    The Australian Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC) is currently injecting 100,000 tons of CO{sub 2} in a large-scale test of storage technology in a pilot project in southeastern Australia called the CO2CRC Otway Project. The Otway Basin, with its natural CO{sub 2} accumulations and many depleted gas fields, offers an appropriate site for such a pilot project. An 80% CO{sub 2} stream is produced from a well (Buttress) near the depleted gas reservoir (Naylor) used for storage (Figure 1). The goal of this project is to demonstrate that CO{sub 2} can be safely transported, stored underground, andmore » its behavior tracked and monitored. The monitoring and verification framework has been developed to monitor for the presence and behavior of CO{sub 2} in the subsurface reservoir, near surface, and atmosphere. This monitoring framework addresses areas, identified by a rigorous risk assessment, to verify conformance to clearly identifiable performance criteria. These criteria have been agreed with the regulatory authorities to manage the project through all phases addressing responsibilities, liabilities, and to assure the public of safe storage.« less

  4. Measurement-only verifiable blind quantum computing with quantum input verification

    NASA Astrophysics Data System (ADS)

    Morimae, Tomoyuki

    2016-10-01

    Verifiable blind quantum computing is a secure delegated quantum computing where a client with a limited quantum technology delegates her quantum computing to a server who has a universal quantum computer. The client's privacy is protected (blindness), and the correctness of the computation is verifiable by the client despite her limited quantum technology (verifiability). There are mainly two types of protocols for verifiable blind quantum computing: the protocol where the client has only to generate single-qubit states and the protocol where the client needs only the ability of single-qubit measurements. The latter is called the measurement-only verifiable blind quantum computing. If the input of the client's quantum computing is a quantum state, whose classical efficient description is not known to the client, there was no way for the measurement-only client to verify the correctness of the input. Here we introduce a protocol of measurement-only verifiable blind quantum computing where the correctness of the quantum input is also verifiable.

  5. High Temperature Life Testing of 80Ni-20Cr Wire in a Simulated Mars Atmosphere for the Sample Analysis at Mars (SAM) Instrument Suit Gas Processing System (GPS) Carbon Dioxide Scrubber

    NASA Technical Reports Server (NTRS)

    Gundersen, Cynthia; Hoffman, Christopher; Munoz, Bruno; Steohenson, Timothy; Thomas, Walter

    2008-01-01

    In support of the GPS for the SAM instrument suite built by GSFC, a life test facility was developed to test the suitability of 80Ni-20Cr wire, 0.0056 inches in diameter, for use as a heater element for the carbon dioxide scrubber. The wire would be required to operate at 1000 C in order to attain the 800 C required for regeneration of the getter. The wire also would need to operate in the Mars atmosphere, which consists mostly of CO2 at pressures between 4 and 12 torr. Data on the high temperature degradation mechanism of 80Ni-20Cr in low pressure CO2, together with the effects of thermal cycling, were unknown. In addition, the influence of work hardening of the wire during assembly and the potential for catastrophic grain growth also were unknown. Verification of the wire reliability as defined by the mission goals required the construction of a test facility that would accurately simulate the duty cycles in a simulated Mars atmosphere. The experimental set-up, along with the test protocol and results will be described.

  6. Have No PHEAR: Networks Without Identifiers

    DTIC Science & Technology

    2015-12-07

    packet processing, cryptography , or other computationally intensive func- tionality is present. This prevents, e.g., SDN-based onion routing from being...client registration protocol uses public key cryptography in its identity verification handshake. An attacker could exploit this by continually...and M. K. Wright. Timing Attacks in Low-Latency Mix-Based Systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC ’04), pages 251–265

  7. Verification of the Jenkins and FIA sapling biomass equations for hardwood species in Maine

    Treesearch

    Andrew S. Nelson; Aaron R. Weiskittel; Robert G. Wagner; Michael R. Saunders

    2012-01-01

    In 2009, the Forest Inventory and Analysis Program (FIA) updated its biomass estimation protocols by switching to the component ratio method to estimate biomass of medium and large trees. Additionally, FIA switched from using regional equations to the current FIA aboveground sapling biomass equations that predict woody sapling (2.5 to 12.4 cm d.b.h.) biomass using the...

  8. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  9. Cardiac Mitochondria l Membrane Stability after Deep Hypothermia using a Xenon Clathrate Cryostasis Protocol – an Electron Microscopy Study

    PubMed Central

    Sheleg, Sergey; Hixon, Hugh; Cohen, Bruce; Lowry, David; Nedzved, Mikhail

    2008-01-01

    We investigated a new cryopreservation method using xenon, a clathrate-forming gas, under medium pressure (100psi). The objective of the study was to determine whether this cryostasis protocol could protect cardiac mitochondria at cryogenic temperatures (below 100 degrees Celsius).We analyzed transmission electron microscopy images to obtain information about changes in mitochondrial morphology induced by cryopreservation of the hearts. Our data showed absence of mitochondrial swelling, rupture of inner and outer membranes, and leakage of mitochondrial matrix into the cytoplasm after applying this cryostasis protocol. The electron microscopy results provided the first evidence that a cryostasis protocol using xenon as a clathrate-forming gas under pressure may have protective effects on intracellular membranes. This cryostasis technology may find applications in developing new approaches for long-term cryopreservation protocols. PMID:18787624

  10. Simulation of a manual electric-arc welding in a working gas pipeline. 1. Formulation of the problem

    NASA Astrophysics Data System (ADS)

    Baikov, V. I.; Gishkelyuk, I. A.; Rus', A. M.; Sidorovich, T. V.; Tonkonogov, B. A.

    2010-11-01

    Problems of mathematical simulation of the temperature stresses arising in the wall of a pipe of a cross-country gas pipeline in the process of electric-arc welding of defects in it have been considered. Mathematical models of formation of temperatures, deformations, and stresses in a gas pipe subjected to phase transformations have been developed. These models were numerically realized in the form of algorithms representing a part of an application-program package. Results of verification of the computational complex and calculation results obtained with it are presented.

  11. Verification of capillary pressure functions and relative permeability equations for gas production

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jang, Jaewon

    The understanding of multiphase fluid flow in porous media is of great importance in many fields such as enhanced oil recovery, hydrology, CO 2 sequestration, contaminants cleanup and natural gas production from hydrate bearing sediments. However, there are many unanswered questions about the key parameters that characterize gas and water flows in porous media. The characteristics of multiphase fluid flow in porous media such as water retention curve, relative permeability, preferential fluid flow patterns and fluid-particle interaction should be taken into consideration for a fundamental understanding of the behavior of pore scale systems.

  12. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  13. Terahertz-Radiation-Enhanced Emission of Fluorescence from Gas Plasma

    NASA Astrophysics Data System (ADS)

    Liu, Jingle; Zhang, X.-C.

    2009-12-01

    We report the study of femtosecond laser-induced air plasma fluorescence under the illumination of terahertz (THz) pulses. Semiclassical modeling and experimental verification indicate that time-resolved THz radiation-enhanced emission of fluorescence is dominated by the electron kinetics and the electron-impact excitation of gas molecules or ions. We demonstrate that the temporal waveform of the THz field could be retrieved from the transient enhanced fluorescence, making omnidirectional, coherent detection available for THz time-domain spectroscopy.

  14. Quantum money with nearly optimal error tolerance

    NASA Astrophysics Data System (ADS)

    Amiri, Ryan; Arrazola, Juan Miguel

    2017-06-01

    We present a family of quantum money schemes with classical verification which display a number of benefits over previous proposals. Our schemes are based on hidden matching quantum retrieval games and they tolerate noise up to 23 % , which we conjecture reaches 25 % asymptotically as the dimension of the underlying hidden matching states is increased. Furthermore, we prove that 25 % is the maximum tolerable noise for a wide class of quantum money schemes with classical verification, meaning our schemes are almost optimally noise tolerant. We use methods in semidefinite programming to prove security in a substantially different manner to previous proposals, leading to two main advantages: first, coin verification involves only a constant number of states (with respect to coin size), thereby allowing for smaller coins; second, the reusability of coins within our scheme grows linearly with the size of the coin, which is known to be optimal. Last, we suggest methods by which the coins in our protocol could be implemented using weak coherent states and verified using existing experimental techniques, even in the presence of detector inefficiencies.

  15. Real time radiotherapy verification with Cherenkov imaging: development of a system for beamlet verification

    NASA Astrophysics Data System (ADS)

    Pogue, B. W.; Krishnaswamy, V.; Jermyn, M.; Bruza, P.; Miao, T.; Ware, William; Saunders, S. L.; Andreozzi, J. M.; Gladstone, D. J.; Jarvis, L. A.

    2017-05-01

    Cherenkov imaging has been shown to allow near real time imaging of the beam entrance and exit on patient tissue, with the appropriate intensified camera and associated image processing. A dedicated system has been developed for research into full torso imaging of whole breast irradiation, where the dual camera system captures the beam shape for all beamlets used in this treatment protocol. Particularly challenging verification measurement exists in dynamic wedge, field in field, and boost delivery, and the system was designed to capture these as they are delivered. Two intensified CMOS (ICMOS) cameras were developed and mounted in a breast treatment room, and pilot studies for intensity and stability were completed. Software tools to contour the treatment area have been developed and are being tested prior to initiation of the full trial. At present, it is possible to record delivery of individual beamlets as small as a single MLC thickness, and readout at 20 frames per second is achieved. Statistical analysis of system repeatibilty and stability is presented, as well as pilot human studies.

  16. GAS eleven node thermal model (GEM)

    NASA Technical Reports Server (NTRS)

    Butler, Dan

    1988-01-01

    The Eleven Node Thermal Model (GEM) of the Get Away Special (GAS) container was originally developed based on the results of thermal tests of the GAS container. The model was then used in the thermal analysis and design of several NASA/GSFC GAS experiments, including the Flight Verification Payload, the Ultraviolet Experiment, and the Capillary Pumped Loop. The model description details the five cu ft container both with and without an insulated end cap. Mass specific heat values are also given so that transient analyses can be performed. A sample problem for each configuration is included as well so that GEM users can verify their computations. The model can be run on most personal computers with a thermal analyzer solution routine.

  17. Generation and confirmation of a (100 x 100)-dimensional entangled quantum system.

    PubMed

    Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton

    2014-04-29

    Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising.

  18. Generation and confirmation of a (100 × 100)-dimensional entangled quantum system

    PubMed Central

    Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton

    2014-01-01

    Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising. PMID:24706902

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, MARIAH ENERGY CORPORATION HEAT PLUS POWER SYSTEM

    EPA Science Inventory

    The Greenhouse Gas Technology Center (GHG Center) has recently evaluated the performance of the Heat PlusPower(TM) System (Mariah CDP System), which integrates microturbine technology with a heat recovery system. Electric power is generated with a Capstone MicroTurbine(TM) Model ...

  20. Design and Verification of Blast Densification for Highway Embankments of Liquefiable Sands

    DOT National Transportation Integrated Search

    2012-10-26

    As part of a larger effort to investigate the effects of blast densification on the properties and : behavior of compacted sand deposits, this study presents a procedure for replicating in the : laboratory the occluded gas bubbles believed to exist i...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - FIELD PORTABLE GAS CHROMATOGRAPH/MASS SPECTROMETER - VIKING INSTRUMENTS CORPORATION

    EPA Science Inventory

    The performance evaluation of innovative and alternative environmental technologies is an integral part of the U.S. Environmental Protection Agency's (EPA) mission. Early efforts focused on evaluation technologies that supported the implementation of the Clean Air and Clean Wate...

  2. An approach for verifying biogenic greenhouse gas emissions inventories with atmospheric CO 2 concentration data

    DOE PAGES

    Ogle, Stephen; Davis, Kenneth J.; Lauvaux, Thomas; ...

    2015-03-10

    Verifying national greenhouse gas (GHG) emissions inventories is a critical step to ensure that reported emissions data to the United Nations Framework Convention on Climate Change (UNFCCC) are accurate and representative of a country’s contribution to GHG concentrations in the atmosphere. Verification could include a variety of evidence, but arguably the most convincing verification would be confirmation of a change in GHG concentrations in the atmosphere that is consistent with reported emissions to the UNFCCC. We report here on a case study evaluating this option based on a prototype atmospheric CO2 measurement network deployed in the Mid-Continent Region of themore » conterminous United States. We found that the atmospheric CO2 measurement data did verify the accuracy of the emissions inventory within the confidence limits of the emissions estimates, suggesting that this technology could be further developed and deployed more widely in the future for verifying reported emissions.« less

  3. Capacity estimation and verification of quantum channels with arbitrarily correlated errors.

    PubMed

    Pfister, Corsin; Rol, M Adriaan; Mantri, Atul; Tomamichel, Marco; Wehner, Stephanie

    2018-01-02

    The central figure of merit for quantum memories and quantum communication devices is their capacity to store and transmit quantum information. Here, we present a protocol that estimates a lower bound on a channel's quantum capacity, even when there are arbitrarily correlated errors. One application of these protocols is to test the performance of quantum repeaters for transmitting quantum information. Our protocol is easy to implement and comes in two versions. The first estimates the one-shot quantum capacity by preparing and measuring in two different bases, where all involved qubits are used as test qubits. The second verifies on-the-fly that a channel's one-shot quantum capacity exceeds a minimal tolerated value while storing or communicating data. We discuss the performance using simple examples, such as the dephasing channel for which our method is asymptotically optimal. Finally, we apply our method to a superconducting qubit in experiment.

  4. EPA Traceability Protocol for Assay and Certification of Gaseous Calibration Standards

    EPA Science Inventory

    In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers o...

  5. How do we know? An assessment of integrated community case management data quality in four districts of Malawi.

    PubMed

    Yourkavitch, Jennifer; Zalisk, Kirsten; Prosnitz, Debra; Luhanga, Misheck; Nsona, Humphreys

    2016-11-01

    The World Health Organization contracted annual data quality assessments of Rapid Access Expansion (RAcE) projects to review integrated community case management (iCCM) data quality and the monitoring and evaluation (M&E) system for iCCM, and to suggest ways to improve data quality. The first RAcE data quality assessment was conducted in Malawi in January 2014 and we present findings pertaining to data from the health management information system at the community, facility and other sub-national levels because RAcE grantees rely on that for most of their monitoring data. We randomly selected 10 health facilities (10% of eligible facilities) from the four RAcE project districts, and collected quantitative data with an adapted and comprehensive tool that included an assessment of Malawi's M&E system for iCCM data and a data verification exercise that traced selected indicators through the reporting system. We rated the iCCM M&E system across five function areas based on interviews and observations, and calculated verification ratios for each data reporting level. We also conducted key informant interviews with Health Surveillance Assistants and facility, district and central Ministry of Health staff. Scores show a high-functioning M&E system for iCCM with some deficiencies in data management processes. The system lacks quality controls, including data entry verification, a protocol for addressing errors, and written procedures for data collection, entry, analysis and management. Data availability was generally high except for supervision data. The data verification process identified gaps in completeness and consistency, particularly in Health Surveillance Assistants' record keeping. Staff at all levels would like more training in data management. This data quality assessment illuminates where an otherwise strong M&E system for iCCM fails to ensure some aspects of data quality. Prioritizing data management with documented protocols, additional training and approaches to create efficient supervision practices may improve iCCM data quality. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Method for Derivatization and Detection of Chemical Weapons Convention Related Sulfur Chlorides via Electrophilic Addition with 3-Hexyne.

    PubMed

    Goud, D Raghavender; Pardasani, Deepak; Purohit, Ajay Kumar; Tak, Vijay; Dubey, Devendra Kumar

    2015-07-07

    Sulfur monochloride (S2Cl2) and sulfur dichloride (SCl2) are important precursors of the extremely toxic chemical warfare agent sulfur mustard and classified, respectively, into schedule 3.B.12 and 3.B.13 of the Chemical Weapons Convention (CWC). Hence, their detection and identification is of vital importance for verification of CWC. These chemicals are difficult to detect directly using chromatographic techniques as they decompose and do not elute. Until now, the use of gas chromatographic approaches to follow the derivatized sulfur chlorides is not reported in the literature. The electrophilic addition reaction of sulfur monochloride and sulfur dichloride toward 3-hexyne was explored for the development of a novel derivatization protocol, and the products were subjected to gas chromatography-mass spectrometric (GC-MS) analysis. Among various unsaturated reagents like alkenes and alkynes, symmetrical alkyne 3-hexyne was optimized to be the suitable derivatizing agent for these analytes. Acetonitrile was found to be the suitable solvent for the derivatization reaction. The sample preparation protocol for the identification of these analytes from hexane spiked with petrol matrix was also optimized. Liquid-liquid extraction followed by derivatization was employed for the identification of these analytes from petrol matrix. Under the established conditions, the detection and quantification limits are 2.6 μg/mL, 8.6 μg/mL for S2Cl2 and 2.3 μg/mL, 7.7 μg/mL for SCl2, respectively, in selected ion monitoring (SIM) mode. The calibration curve had a linear relationship with y = 0.022x - 0.331 and r(2) = 0.992 for the working range of 10 to 500 μg/mL for S2Cl2 and y = 0.007x - 0.064 and r(2) = 0.991 for the working range of 10 to 100 μg/mL for SCl2, respectively. The intraday RSDs were between 4.80 to 6.41%, 2.73 to 6.44% and interday RSDs were between 2.20 to 7.25% and 2.34 to 5.95% for S2Cl2 and SCl2, respectively.

  7. Model-Driven Test Generation of Distributed Systems

    NASA Technical Reports Server (NTRS)

    Easwaran, Arvind; Hall, Brendan; Schweiker, Kevin

    2012-01-01

    This report describes a novel test generation technique for distributed systems. Utilizing formal models and formal verification tools, spe cifically the Symbolic Analysis Laboratory (SAL) tool-suite from SRI, we present techniques to generate concurrent test vectors for distrib uted systems. These are initially explored within an informal test validation context and later extended to achieve full MC/DC coverage of the TTEthernet protocol operating within a system-centric context.

  8. Progress in the planar CPn SOFC system design verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elangovan, S.; Hartvigsen, J.; Khandkar, A.

    1996-04-01

    SOFCo is developing a high efficiency, modular and scaleable planar SOFC module termed the CPn design. This design has been verified in a 1.4 kW module test operated directly on pipeline natural gas. The design features multistage oxidation of fuel wherein the fuel is consumed incrementally over several stages. High efficiency is achieved by uniform current density distribution per stage, which lowers the stack resistance. Additional benefits include thermal regulation and compactness. Test results from stack modules operating in pipeline natural gas are presented.

  9. 40 CFR Appendix D to Part 75 - Optional SO2 Emissions Data Protocol for Gas-Fired and Oil-Fired Units

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false Optional SO2 Emissions Data Protocol for Gas-Fired and Oil-Fired Units D Appendix D to Part 75 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTINUOUS EMISSION MONITORING Pt. 75, App. D Appendix D to Part 75—Optional SO2 Emissions Data...

  10. Quantifying residues from postharvest fumigation of almonds and walnuts with propylene oxide

    USDA-ARS?s Scientific Manuscript database

    A novel analytical approach, involving solvent extraction with methyl tert-butyl ether (MTBE) followed by gas chromatography (GC), was developed to quantify residues that result from the postharvest fumigation of almonds and walnuts with propylene oxide (PPO). Verification and quantification of PPO,...

  11. ETV/ESTCP Demonstration Plan - Demonstration and Verification of a Turbine Power Generation System Utilizing Renewable Fuel: Landfill Gas

    EPA Science Inventory

    This Test and Quality Assurance Plan (TQAP) provides data quality objections for the success factors that were validated during this demonstration include energy production, emissions and emission reductions compared to alternative systems, economics, and operability, including r...

  12. 40 CFR 86.094-13 - Light-duty exhaust durability programs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and Heavy-Duty Engines, and for 1985 and Later Model Year New Gasoline Fueled, Natural Gas-Fueled... selection methods, durability data vehicle compliance requirements, in-use verification requirements... provisions of § 86.094-25. (3) Vehicle/component selection method. Durability data vehicles shall be selected...

  13. Model based verification and prognosis of acidification and sulphate releasing processes downstream of a former sewage field in Berlin (Germany).

    PubMed

    Horner, Christoph; Engelmann, Frank; Nützmann, Gunnar

    2009-04-15

    An ammonium contamination plume originating from sewage field management practices over several decades is affecting the water quality at the well fields of the Friedrichshagen waterworks in Berlin, Germany. Because hydraulic measures were unsuccessful due to the fixation of ammonium on the aquifer matrix by cation exchange, an in situ nitrification measure by injection of oxygen gas was chosen to protect the extraction wells. In order to assess the hydro chemical processes accompanying this in situ measure, reactive transport modelling was performed. The relevant processes are the dissolution of oxygen gas and the nitrification of ammonium which initiate secondary geochemical processes like sulphate release, acidification and hardening. The reactive transport modelling began with the deduction of a reaction network, followed by the mathematical formulation and incorporation of reactive terms into a reactive transport solver. Two model versions were set up: (1) a simplified large scale model to evaluate the long-term reaction zoning to be expected due to permanent oxygen gas injection, and (2) a verification of the monitored hydrochemistry during a first field test performed near the contamination source. The results of reactive transport modelling demonstrate that in situ injection of oxygen gas will be effective in reducing the ammonium load from the well fields, and that acidification processes near the production wells can be minimized. Finally, a line of gas injection wells extending over the whole width of the ammonium contamination plume will be constructed to protect the well fields from further ammonium load.

  14. Potential biodefense model applications for portable chlorine dioxide gas production.

    PubMed

    Stubblefield, Jeannie M; Newsome, Anthony L

    2015-01-01

    Development of decontamination methods and strategies to address potential infectious disease outbreaks and bioterrorism events are pertinent to this nation's biodefense strategies and general biosecurity. Chlorine dioxide (ClO2) gas has a history of use as a decontamination agent in response to an act of bioterrorism. However, the more widespread use of ClO2 gas to meet current and unforeseen decontamination needs has been hampered because the gas is too unstable for shipment and must be prepared at the application site. Newer technology allows for easy, onsite gas generation without the need for dedicated equipment, electricity, water, or personnel with advanced training. In a laboratory model system, 2 unique applications (personal protective equipment [PPE] and animal skin) were investigated in the context of potential development of decontamination protocols. Such protocols could serve to reduce human exposure to bacteria in a decontamination response effort. Chlorine dioxide gas was capable of reducing (2-7 logs of vegetative and spore-forming bacteria), and in some instances eliminating, culturable bacteria from difficult to clean areas on PPE facepieces. The gas was effective in eliminating naturally occurring bacteria on animal skin and also on skin inoculated with Bacillus spores. The culturable bacteria, including Bacillus spores, were eliminated in a time- and dose-dependent manner. Results of these studies suggested portable, easily used ClO2 gas generation systems have excellent potential for protocol development to contribute to biodefense strategies and decontamination responses to infectious disease outbreaks or other biothreat events.

  15. Impact of the Injection Protocol on an Impurity's Stationary State

    NASA Astrophysics Data System (ADS)

    Gamayun, Oleksandr; Lychkovskiy, Oleg; Burovski, Evgeni; Malcomson, Matthew; Cheianov, Vadim V.; Zvonarev, Mikhail B.

    2018-06-01

    We examine stationary-state properties of an impurity particle injected into a one-dimensional quantum gas. We show that the value of the impurity's end velocity lies between zero and the speed of sound in the gas and is determined by the injection protocol. This way, the impurity's constant motion is a dynamically emergent phenomenon whose description goes beyond accounting for the kinematic constraints of the Landau approach to superfluidity. We provide exact analytic results in the thermodynamic limit and perform finite-size numerical simulations to demonstrate that the predicted phenomena are within the reach of the ultracold gas experiments.

  16. Integrated Circuit Chip Improves Network Efficiency

    NASA Technical Reports Server (NTRS)

    2008-01-01

    Prior to 1999 and the development of SpaceWire, a standard for high-speed links for computer networks managed by the European Space Agency (ESA), there was no high-speed communications protocol for flight electronics. Onboard computers, processing units, and other electronics had to be designed for individual projects and then redesigned for subsequent projects, which increased development periods, costs, and risks. After adopting the SpaceWire protocol in 2000, NASA implemented the standard on the Swift mission, a gamma ray burst-alert telescope launched in November 2004. Scientists and developers on the James Webb Space Telescope further developed the network version of SpaceWire. In essence, SpaceWire enables more science missions at a lower cost, because it provides a standard interface between flight electronics components; new systems need not be custom built to accommodate individual missions, so electronics can be reused. New protocols are helping to standardize higher layers of computer communication. Goddard Space Flight Center improved on the ESA-developed SpaceWire by enabling standard protocols, which included defining quality of service and supporting plug-and-play capabilities. Goddard upgraded SpaceWire to make the routers more efficient and reliable, with features including redundant cables, simultaneous discrete broadcast pulses, prevention of network blockage, and improved verification. Redundant cables simplify management because the user does not need to worry about which connection is available, and simultaneous broadcast signals allow multiple users to broadcast low-latency side-band signal pulses across the network using the same resources for data communication. Additional features have been added to the SpaceWire switch to prevent network blockage so that more robust networks can be designed. Goddard s verification environment for the link-and-switch implementation continuously randomizes and tests different parts, constantly anticipating situations, which helps improve communications reliability. It has been tested in many different implementations for compatibility.

  17. SU-E-T-67: A Quality Assurance Procedure for VMAT Delivery Technique with Multiple Verification Metric Using TG-119 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Katsuta, Y; Kadoya, N; Shimizu, E

    2015-06-15

    Purpose: A successful VMAT plan delivery includes precise modulations of dose rate, gantry rotational and multi-leaf collimator shapes. The purpose of this research is to construct routine QA protocol which focuses on VMAT delivery technique and to obtain a baseline including dose error, fluence distribution and mechanical accuracy during VMAT. Methods: The mock prostate, head and neck (HN) cases supplied from AAPM were used in this study. A VMAT plans were generated in Monaco TPS according to TG-119 protocol. Plans were created using 6 MV and 10 MV photon beams for each case. The phantom based measurement, fluence measurement andmore » log files analysis were performed. The dose measurement was performed using 0.6 cc ion chamber, which located at isocenter. The fluence distribution were acquired using the MapCHECK2 mounted in the MapPHAN. The trajectory log files recorded inner 20 leaf pairs and gantry angle positions at every 0.25 sec interval were exported to in-house software developed by MATLAB and determined those RMS values. Results: The dose difference is expressed as a ratio of the difference between measured and planned doses. The dose difference for 6 MV was 0.91%, for 10 MV was 0.67%. In turn, the fluence distribution using gamma criteria of 2%/2 mm with a 50% minimum dose threshold for 6 MV was 98.8%, for 10 MV was 97.5%, respectively. The RMS values of MLC for 6 MV and 10 MV were 0.32 mm and 0.37 mm, of gantry were 0.33 degree and 0.31 degree. Conclusion: In this study, QA protocol to assess VMAT delivery accuracy is constructed and results acquired in this study are used as a baseline of VMAT delivery performance verification.« less

  18. Using Model Replication to Improve the Reliability of Agent-Based Models

    NASA Astrophysics Data System (ADS)

    Zhong, Wei; Kim, Yushim

    The basic presupposition of model replication activities for a computational model such as an agent-based model (ABM) is that, as a robust and reliable tool, it must be replicable in other computing settings. This assumption has recently gained attention in the community of artificial society and simulation due to the challenges of model verification and validation. Illustrating the replication of an ABM representing fraudulent behavior in a public service delivery system originally developed in the Java-based MASON toolkit for NetLogo by a different author, this paper exemplifies how model replication exercises provide unique opportunities for model verification and validation process. At the same time, it helps accumulate best practices and patterns of model replication and contributes to the agenda of developing a standard methodological protocol for agent-based social simulation.

  19. A Practical Approach to Identity on Digital Ecosystems Using Claim Verification and Trust

    NASA Astrophysics Data System (ADS)

    McLaughlin, Mark; Malone, Paul

    Central to the ethos of digital ecosystems (DEs) is that DEs should be distributed and have no central points of failure or control. This essentially mandates a decentralised system, which poses significant challenges for identity. Identity in decentralised environments must be treated very differently to identity in traditional environments, where centralised naming, authentication and authorisation can be assumed, and where identifiers can be considered global and absolute. In the absence of such guarantees we have expanded on the OPAALS identity model to produce a general implementation for the OPAALS DE that uses a combination of identity claim verification protocols and trust to give assurances in place of centralised servers. We outline how the components of this implementation function and give an illustrated workflow of how identity issues are solved on the OPAALS DE in practice.

  20. EPA Traceability Protocol for Assay and Certification of Gaseous Calibration Standards (EPA/600/R-12/531, May 2012)

    EPA Science Inventory

    In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers of...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - FIELD PORTABLE GAS CHROMATOGRAPH/MASS SPECTROMETER - BRUKER-FRANZEN ANALYTICAL SYSTENS, INC

    EPA Science Inventory

    The performance evaluation of innovative and alternative environmental technologies is an integral part of the U.S. Environmental Protection Agency's (EPA) mission. In the spirit of the technology policy, the Agency began to direct a portion of its resources toward the promotion...

  2. 40 CFR 63.8 - Monitoring requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... with conducting performance tests under § 63.7. Verification of operational status shall, at a minimum... in the relevant standard; or (B) The CMS fails a performance test audit (e.g., cylinder gas audit), relative accuracy audit, relative accuracy test audit, or linearity test audit; or (C) The COMS CD exceeds...

  3. 40 CFR 63.8 - Monitoring requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... with conducting performance tests under § 63.7. Verification of operational status shall, at a minimum... in the relevant standard; or (B) The CMS fails a performance test audit (e.g., cylinder gas audit), relative accuracy audit, relative accuracy test audit, or linearity test audit; or (C) The COMS CD exceeds...

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zou, Ling; Zhao, Haihua; Zhang, Hongbin

    Here, the one-dimensional water faucet problem is one of the classical benchmark problems originally proposed by Ransom to study the two-fluid two-phase flow model. With certain simplifications, such as massless gas phase and no wall and interfacial frictions, analytical solutions had been previously obtained for the transient liquid velocity and void fraction distribution. The water faucet problem and its analytical solutions have been widely used for the purposes of code assessment, benchmark and numerical verifications. In our previous study, the Ransom’s solutions were used for the mesh convergence study of a high-resolution spatial discretization scheme. It was found that, atmore » the steady state, an anticipated second-order spatial accuracy could not be achieved, when compared to the existing Ransom’s analytical solutions. A further investigation showed that the existing analytical solutions do not actually satisfy the commonly used two-fluid single-pressure two-phase flow equations. In this work, we present a new set of analytical solutions of the water faucet problem at the steady state, considering the gas phase density’s effect on pressure distribution. This new set of analytical solutions are used for mesh convergence studies, from which anticipated second-order of accuracy is achieved for the 2nd order spatial discretization scheme. In addition, extended Ransom’s transient solutions for the gas phase velocity and pressure are derived, with the assumption of decoupled liquid and gas pressures. Numerical verifications on the extended Ransom’s solutions are also presented.« less

  5. New analytical solutions to the two-phase water faucet problem

    DOE PAGES

    Zou, Ling; Zhao, Haihua; Zhang, Hongbin

    2016-06-17

    Here, the one-dimensional water faucet problem is one of the classical benchmark problems originally proposed by Ransom to study the two-fluid two-phase flow model. With certain simplifications, such as massless gas phase and no wall and interfacial frictions, analytical solutions had been previously obtained for the transient liquid velocity and void fraction distribution. The water faucet problem and its analytical solutions have been widely used for the purposes of code assessment, benchmark and numerical verifications. In our previous study, the Ransom’s solutions were used for the mesh convergence study of a high-resolution spatial discretization scheme. It was found that, atmore » the steady state, an anticipated second-order spatial accuracy could not be achieved, when compared to the existing Ransom’s analytical solutions. A further investigation showed that the existing analytical solutions do not actually satisfy the commonly used two-fluid single-pressure two-phase flow equations. In this work, we present a new set of analytical solutions of the water faucet problem at the steady state, considering the gas phase density’s effect on pressure distribution. This new set of analytical solutions are used for mesh convergence studies, from which anticipated second-order of accuracy is achieved for the 2nd order spatial discretization scheme. In addition, extended Ransom’s transient solutions for the gas phase velocity and pressure are derived, with the assumption of decoupled liquid and gas pressures. Numerical verifications on the extended Ransom’s solutions are also presented.« less

  6. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  7. Verifiable Secret Redistribution for Threshold Sharing Schemes

    DTIC Science & Technology

    2002-02-01

    complete verification in our protocol, old shareholders broadcast a commitment to the secret to the new shareholders. We prove that the new...of an m − 1 degree polynomial from m of n points yields a constant term in 1 the polynomial that corresponds to the secret . In Blakley’s scheme [Bla79...the intersection of m of n vector spaces yields a one-dimensional vector that corresponds to the secret . Desmedt surveys other sharing schemes

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunlop, W H

    It is my pleasure to be here to day to participate in this Conference. My thanks to the organizers for preparing such an interesting agenda on a very difficult topic. My effort in preparing my presentation was performed under the auspices of the U.S. Department of Energy by University of California, Lawrence Livermore National Laboratory under Contract W-7405-Eng-48. And as many of you know Lawrence Livermore National Laboratory is now, as of Oct 1st, under contract to the Lawrence Livermore National Security LLC. There has been a long history of how to view verification of arms control agreements. The basismore » for verification during the days of SALT was that verification would be based on each country's national technical means. For treaties dealing with strategic missiles this worked well as the individual items subject to verification were of such a size that they were visible by the National Technical Means available at the time. And it was felt that the counting of missiles and launchers could be verified by our National Technical Means. For nuclear testing treaties the use of seismic measurements developed into a capability that was reasonably robust for all but the smallest of nuclear tests. However, once we had the Threshold Test Ban Treaty, there was a significant problem in that the fidelity of the measurements were not sufficient to determine if a test was slightly above the 150 kt limit or slightly below the 150 kt limit. This led some in the US to believe that the Soviet Union was not living up to the TTBT agreement. An on-site verification protocol was negotiated in 1988 and 1989 that allowed the US to make hydrodynamic yield measurements on Soviet tests above 50 kt yield and regional seismic measurements on all tests above 35 kt of yield; and the Soviets to make the same type of measurements on US tests to ensure that they were not over 150 kt. These on-site measurements were considered reasonably intrusive. Again the measurement capability was not perfect and it was expected that occasionally there might be a verification measurement that was slightly above 150 kt. But the accuracy was much improved over the earlier seismic measurements. In fact some of this improvement was because as part of this verification protocol the US and Soviet Union provided the yields of several past tests to improve seismic calibrations. This actually helped provide a much needed calibration for the seismic measurements. It was also accepted that since nuclear tests were to a large part R&D related, it was also expected that occasionally there might be a test that was slightly above 150 kt, as you could not always predict the yield with high accuracy in advance of the test. While one could hypothesize that the Soviets could do a test at some other location than their test sites, if it were even a small fraction of 150 kt it would clearly be observed and would be a violation of the treaty. So the issue of clandestine tests of significance was easily covered for this particular treaty.« less

  9. Advanced Extra-Vehicular Activity Pressure Garment Requirements Development

    NASA Technical Reports Server (NTRS)

    Ross, Amy; Aitchison, Lindsay; Rhodes, Richard

    2015-01-01

    The NASA Johnson Space Center advanced pressure garment technology development team is addressing requirements development for exploration missions. Lessons learned from the Z-2 high fidelity prototype development have reiterated that clear low-level requirements and verification methods reduce risk to the government, improve efficiency in pressure garment design efforts, and enable the government to be a smart buyer. The expectation is to provide requirements at the specification level that are validated so that their impact on pressure garment design is understood. Additionally, the team will provide defined verification protocols for the requirements. However, in reviewing exploration space suit high level requirements there are several gaps in the team's ability to define and verify related lower level requirements. This paper addresses the efforts in requirement areas such as mobility/fit/comfort and environmental protection (dust, radiation, plasma, secondary impacts) to determine the method by which the requirements can be defined and use of those methods for verification. Gaps exist at various stages. In some cases component level work is underway, but no system level effort has begun; in other cases no effort has been initiated to close the gap. Status of on-going efforts and potential approaches to open gaps are discussed.

  10. Nuclear Engine System Simulation (NESS) version 2.0

    NASA Technical Reports Server (NTRS)

    Pelaccio, Dennis G.; Scheil, Christine M.; Petrosky, Lyman J.

    1993-01-01

    The topics are presented in viewgraph form and include the following; nuclear thermal propulsion (NTP) engine system analysis program development; nuclear thermal propulsion engine analysis capability requirements; team resources used to support NESS development; expanded liquid engine simulations (ELES) computer model; ELES verification examples; NESS program development evolution; past NTP ELES analysis code modifications and verifications; general NTP engine system features modeled by NESS; representative NTP expander, gas generator, and bleed engine system cycles modeled by NESS; NESS program overview; NESS program flow logic; enabler (NERVA type) nuclear thermal rocket engine; prismatic fuel elements and supports; reactor fuel and support element parameters; reactor parameters as a function of thrust level; internal shield sizing; and reactor thermal model.

  11. Proceedings of the Second NASA Formal Methods Symposium

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar (Editor)

    2010-01-01

    This publication contains the proceedings of the Second NASA Formal Methods Symposium sponsored by the National Aeronautics and Space Administration and held in Washington D.C. April 13-15, 2010. Topics covered include: Decision Engines for Software Analysis using Satisfiability Modulo Theories Solvers; Verification and Validation of Flight-Critical Systems; Formal Methods at Intel -- An Overview; Automatic Review of Abstract State Machines by Meta Property Verification; Hardware-independent Proofs of Numerical Programs; Slice-based Formal Specification Measures -- Mapping Coupling and Cohesion Measures to Formal Z; How Formal Methods Impels Discovery: A Short History of an Air Traffic Management Project; A Machine-Checked Proof of A State-Space Construction Algorithm; Automated Assume-Guarantee Reasoning for Omega-Regular Systems and Specifications; Modeling Regular Replacement for String Constraint Solving; Using Integer Clocks to Verify the Timing-Sync Sensor Network Protocol; Can Regulatory Bodies Expect Efficient Help from Formal Methods?; Synthesis of Greedy Algorithms Using Dominance Relations; A New Method for Incremental Testing of Finite State Machines; Verification of Faulty Message Passing Systems with Continuous State Space in PVS; Phase Two Feasibility Study for Software Safety Requirements Analysis Using Model Checking; A Prototype Embedding of Bluespec System Verilog in the PVS Theorem Prover; SimCheck: An Expressive Type System for Simulink; Coverage Metrics for Requirements-Based Testing: Evaluation of Effectiveness; Software Model Checking of ARINC-653 Flight Code with MCP; Evaluation of a Guideline by Formal Modelling of Cruise Control System in Event-B; Formal Verification of Large Software Systems; Symbolic Computation of Strongly Connected Components Using Saturation; Towards the Formal Verification of a Distributed Real-Time Automotive System; Slicing AADL Specifications for Model Checking; Model Checking with Edge-valued Decision Diagrams; and Data-flow based Model Analysis.

  12. Spot scanning proton therapy plan assessment: design and development of a dose verification application for use in routine clinical practice

    NASA Astrophysics Data System (ADS)

    Augustine, Kurt E.; Walsh, Timothy J.; Beltran, Chris J.; Stoker, Joshua B.; Mundy, Daniel W.; Parry, Mark D.; Bues, Martin; Fatyga, Mirek

    2016-04-01

    The use of radiation therapy for the treatment of cancer has been carried out clinically since the late 1800's. Early on however, it was discovered that a radiation dose sufficient to destroy cancer cells can also cause severe injury to surrounding healthy tissue. Radiation oncologists continually strive to find the perfect balance between a dose high enough to destroy the cancer and one that avoids damage to healthy organs. Spot scanning or "pencil beam" proton radiotherapy offers another option to improve on this. Unlike traditional photon therapy, proton beams stop in the target tissue, thus better sparing all organs beyond the targeted tumor. In addition, the beams are far narrower and thus can be more precisely "painted" onto the tumor, avoiding exposure to surrounding healthy tissue. To safely treat patients with proton beam radiotherapy, dose verification should be carried out for each plan prior to treatment. Proton dose verification systems are not currently commercially available so the Department of Radiation Oncology at the Mayo Clinic developed its own, called DOSeCHECK, which offers two distinct dose simulation methods: GPU-based Monte Carlo and CPU-based analytical. The three major components of the system include the web-based user interface, the Linux-based dose verification simulation engines, and the supporting services and components. The architecture integrates multiple applications, libraries, platforms, programming languages, and communication protocols and was successfully deployed in time for Mayo Clinic's first proton beam therapy patient. Having a simple, efficient application for dose verification greatly reduces staff workload and provides additional quality assurance, ultimately improving patient safety.

  13. Verification of combined thermal-hydraulic and heat conduction analysis code FLOWNET/TRUMP

    NASA Astrophysics Data System (ADS)

    Maruyama, Soh; Fujimoto, Nozomu; Kiso, Yoshihiro; Murakami, Tomoyuki; Sudo, Yukio

    1988-09-01

    This report presents the verification results of the combined thermal-hydraulic and heat conduction analysis code, FLOWNET/TRUMP which has been utilized for the core thermal hydraulic design, especially for the analysis of flow distribution among fuel block coolant channels, the determination of thermal boundary conditions for fuel block stress analysis and the estimation of fuel temperature in the case of fuel block coolant channel blockage accident in the design of the High Temperature Engineering Test Reactor(HTTR), which the Japan Atomic Energy Research Institute has been planning to construct in order to establish basic technologies for future advanced very high temperature gas-cooled reactors and to be served as an irradiation test reactor for promotion of innovative high temperature new frontier technologies. The verification of the code was done through the comparison between the analytical results and experimental results of the Helium Engineering Demonstration Loop Multi-channel Test Section(HENDEL T(sub 1-M)) with simulated fuel rods and fuel blocks.

  14. Experience with advanced instrumentation in a hot section cascade

    NASA Technical Reports Server (NTRS)

    Yeh, Frederick C.; Gladden, Herbert J.

    1989-01-01

    The Lewis Research Center gas turbine Hot Section Test Facility was developed to provide a real engine environment with known boundary conditions for the aerothermal performance evaluation and verification of computer design codes. This verification process requires experimental measurements in a hostile environment. The research instruments used in this facility are presented, and their characteristics and how they perform in this environment are discussed. The research instrumentation consisted of conventional pressure and temperature sensors, as well as thin-film thermocouples and heat flux gages. The hot gas temperature was measured by an aspirated temperature probe and by a dual-element, fast-response temperature probe. The data acquisition mode was both steady state and time dependent. These experiments were conducted over a wide range of gas Reynolds numbers, exit gas Mach numbers, and heat flux levels. This facility was capable of testing at temperatures up to 1600 K, and at pressures up to 18 atm. These corresponded to an airfoil exit Reynolds number range of 0.5 x 10(6) to 2.5 x 10(6) based on the airfoil chord of 5.55 cm. The results characterize the performance capability and the durability of the instrumentation. The challenge of making measurements in hostile environments is also discussed. The instruments exhibited more than adequate durability to achieve the measurement profile. About 70 percent of the thin-film thermocouples and the dual-element temperature probe survived several hundred thermal cycles and more than 35 hr at gas temperatures up to 1600 K. Within the experimental uncertainty, the steady-state and transient heat flux measurements were comparable and consistent over the range of Reynolds numbers tested.

  15. Experience with advanced instrumentation in a hot section cascade

    NASA Astrophysics Data System (ADS)

    Yeh, Frederick C.; Gladden, Herbert J.

    The Lewis Research Center gas turbine Hot Section Test Facility was developed to provide a real engine environment with known boundary conditions for the aerothermal performance evaluation and verification of computer design codes. This verification process requires experimental measurements in a hostile environment. The research instruments used in this facility are presented, and their characteristics and how they perform in this environment are discussed. The research instrumentation consisted of conventional pressure and temperature sensors, as well as thin-film thermocouples and heat flux gages. The hot gas temperature was measured by an aspirated temperature probe and by a dual-element, fast-response temperature probe. The data acquisition mode was both steady state and time dependent. These experiments were conducted over a wide range of gas Reynolds numbers, exit gas Mach numbers, and heat flux levels. This facility was capable of testing at temperatures up to 1600 K, and at pressures up to 18 atm. These corresponded to an airfoil exit Reynolds number range of 0.5 x 10(6) to 2.5 x 10(6) based on the airfoil chord of 5.55 cm. The results characterize the performance capability and the durability of the instrumentation. The challenge of making measurements in hostile environments is also discussed. The instruments exhibited more than adequate durability to achieve the measurement profile. About 70 percent of the thin-film thermocouples and the dual-element temperature probe survived several hundred thermal cycles and more than 35 hr at gas temperatures up to 1600 K. Within the experimental uncertainty, the steady-state and transient heat flux measurements were comparable and consistent over the range of Reynolds numbers tested.

  16. ALT-114 and ALT-118 Alternative Approaches to NIST ...

    EPA Pesticide Factsheets

    In 2016, US EPA approved two separate alternatives (ALT 114 and ALT 118) for the preparation and certification of Hydrogen Chloride (HCl) and Mercury (Hg) cylinder reference gas standards that can serve as EPA Protocol gases where EPA Protocol are required, but unavailable. The alternatives were necessary due to the unavailability of NIST reference materials (SRM, NTRM, CRM or RGM) or VSL reference materials (VSL PRM or VSL CRM), reference materials identified in EPA’s Green Book as necessary to establish the traceability of EPA protocol gases. ALT 114 and ALT 118 provides a pathway for gas vendors to prepare and certify traceable gas cylinder standards for use in certifying Hg and HCl CEMS. In this presentation, EPA will describe the mechanics and requirements of the performance-based approach, provide an update on the availability of these gas standards and also discuss the potential for producing and certifying gas standards for other compounds using this approach. This presentation discusses the importance of NIST-traceable reference gases relative to regulatory source compliance emissions monitoring. Specifically this presentation discusses 2 new approaches for making necessary reference gases available in the absence of NIST reference materials. Moreover, these approaches provide an alternative approach to rapidly make available new reference gases for additional HAPS regulatory compliance emissions measurement and monitoring.

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, C. LEE COOK DIV., DOVER CORP., STATIC PAC SYSTEM, PHASE I REPORT

    EPA Science Inventory

    The Static Pac was verified at a natural gas compressor station operated by ANR Pipeline Company. The test was carried out on two engines (8-cylinder, 2000 hp), each with two reciprocating compressors operating in parallel (4 in. rods). The evaluation focused on two shutdown proc...

  18. 76 FR 1144 - CenterPoint Energy-Mississippi River Transmission Corporation; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    ... that on December 15, 2010, CenterPoint Energy- Mississippi River Transmission Corporation (MRT), 1111... Lincoln Parish, Louisiana. MRT states that the Inventory Verification Study disclosed a difference of approximately 1.2 Bcf less cushion gas than the accounting records. MRT avers that the differences were due to...

  19. VERIFICATION OF PORTABLE OPTICAL AND THERMAL IMAGING DEVICES FOR LEAK DETECTION AT PETROLEUM REFINERIES AND CHEMICAL PLANTS

    EPA Science Inventory

    Optical and thermal imaging devices are remote sensing systems that can be used to detect leaking gas compounds such as methane and benzene. Use of these systems can reduce fugitive emission losses through early detection and repair at industrial facilities by providing an effici...

  20. ERDEC Contribution to the 1993 International Treaty Verification Round Robin Exercise 4

    DTIC Science & Technology

    1994-07-01

    COLUMN Detector: MS (Finnigan 5100) Phase: AT-5 Manufacturer: Alltech GC CONDITIONS Length: 25 m Carrier gas: Helium Inner diameter: 0.25 mm Carrier...ionized in the ion source. The resulting CH,* then chemically reacts with the analyte. The advantage of this technique is that because less energy is

  1. High Temperature Life Testing of 80Ni-20Cr Wire in a Simulated Mars Atmosphere for the Sample Analysis at Mars (SAM) Instrument Suite Gas Processing System (GPS) Carbon Dioxide Scrubber

    NASA Technical Reports Server (NTRS)

    Hoffman, Christopher; Munoz, Bruno; Gundersen, Cynthia; Thomas, Walter, III; Stephenson, Timothy

    2008-01-01

    In support of the GPS for the SAM instrument suite built by NASA/GSFC, a life test facility was developed to test the suitability of 80Ni-20Cr alloy wire, 0.0142 cm diameter, for use as a heater element for the carbon dioxide scrubber. The element would be required to operate at 1000 C in order to attain the 800 C required for regeneration of the getter. The element also would need to operate in the Mars atmosphere, which consists mostly of CO2 at pressures between 4 and 12 torr. Data on the high temperature degradation mechanism of 80Ni- 20Cr in low pressure CO2, coupled with the effects of thermal cycling, were unknown. In addition, the influence of work hardening of the wire during assembly and the potential for catastrophic grain growth also were unknown. Verification of the element reliability as defined by the mission goals required the construction of a test facility that would accurately simulate the duty cycles in a simulated Mars atmosphere. The experimental set-up, along with the test protocol and results will be described.

  2. Dosimetric changes with computed tomography automatic tube-current modulation techniques.

    PubMed

    Spampinato, Sofia; Gueli, Anna Maria; Milone, Pietro; Raffaele, Luigi Angelo

    2018-04-06

    The study is aimed at a verification of dose changes for a computed tomography automatic tube-current modulation (ATCM) technique. For this purpose, anthropomorphic phantom and Gafchromic ® XR-QA2 films were used. Radiochromic films were cut according to the shape of two thorax regions. The ATCM algorithm is based on noise index (NI) and three exam protocols with different NI were chosen, of which one was a reference. Results were compared with dose values displayed by the console and with Poisson statistics. The information obtained with radiochromic films has been normalized with respect to the NI reference value to compare dose percentage variations. Results showed that, on average, the information reported by the CT console and calculated values coincide with measurements. The study allowed verification of the dose information reported by the CT console for an ATCM technique. Although this evaluation represents an estimate, the method can be a starting point for further studies.

  3. Extravasation of a therapeutic dose of 131I-metaiodobenzylguanidine: prevention, dosimetry, and mitigation.

    PubMed

    Bonta, Dacian V; Halkar, Raghuveer K; Alazraki, Naomi

    2011-09-01

    After the extravasation of a therapeutic dose of (131)I-metaiodobenzylguanidine that produced a radiation burn to a patient's forearm, we instituted a catheter placement verification protocol. Before therapy infusion, proper placement is verified by administering 37 MBq of (99m)Tc-pertechnetate through the catheter, and monitoring activity at the administration site and on the contralateral extremity. A dosimetric model describing both high-rate and low-rate dose components was developed and predicted that the basal epidermal layer received a radiation dose consistent with the observed moist desquamation radiation skin toxicity. No extravasation incidents have occurred since the verification procedure was instituted. To protect against radiation injury from extravasation of therapeutic radionuclides, test administration of a small (99m)Tc dose with probe monitoring of comparable sites in both upper extremities appears to be an effective preventive measure.

  4. Exploring efficacy of residential energy efficiency programs in Florida

    NASA Astrophysics Data System (ADS)

    Taylor, Nicholas Wade

    Electric utilities, government agencies, and private interests in the U.S. have committed and continue to invest substantial resources in the pursuit of energy efficiency and conservation through demand-side management (DSM) programs. Program investments, and the demand for impact evaluations that accompany them, are projected to grow in coming years due to increased pressure from state-level energy regulation, costs and challenges of building additional production capacity, fuel costs and potential carbon or renewable energy regulation. This dissertation provides detailed analyses of ex-post energy savings from energy efficiency programs in three key sectors of residential buildings: new, single-family, detached homes; retrofits to existing single-family, detached homes; and retrofits to existing multifamily housing units. Each of the energy efficiency programs analyzed resulted in statistically significant energy savings at the full program group level, yet savings for individual participants and participant subgroups were highly variable. Even though savings estimates were statistically greater than zero, those energy savings did not always meet expectations. Results also show that high variability in energy savings among participant groups or subgroups can negatively impact overall program performance and can undermine marketing efforts for future participation. Design, implementation, and continued support of conservation programs based solely on deemed or projected savings is inherently counter to the pursuit of meaningful energy conservation and reductions in greenhouse gas emissions. To fully understand and optimize program impacts, consistent and robust measurement and verification protocols must be instituted in the design phase and maintained over time. Furthermore, marketing for program participation must target those who have the greatest opportunity for savings. In most utility territories it is not possible to gain access to the type of large scale datasets that would facilitate robust program analysis. Along with measuring and optimizing energy conservation programs, utilities should provide public access to historical consumption data. Open access to data, program optimization, consistent measurement and verification and transparency in reported savings are essential to reducing energy use and its associated environmental impacts.

  5. Advanced Turbine Technology Applications Project (ATTAP)

    NASA Technical Reports Server (NTRS)

    1991-01-01

    This report summarizes work performed in support of the development and demonstration of a structural ceramic technology for automotive gas turbine engines. The AGT101 regenerated gas turbine engine developed under the previous DOE/NASA Advanced Gas Turbine (AGT) program is being utilized for verification testing of the durability of next-generation ceramic components and their suitability for service at reference powertrain design conditions. Topics covered in this report include ceramic processing definition and refinement, design improvements to the test bed engine and test rigs, and design methodologies related to ceramic impact and fracture mechanisms. Appendices include reports by ATTAP subcontractors addressing the development of silicon nitride and silicon carbide families of materials and processes.

  6. Comparison of butorphanol-detomidine versus butorphanol-azaperone for the standing sedation of captive greater one-horned rhinoceroses (Rhinoceros unicornis).

    PubMed

    Bapodra, Priya; Cracknell, Jonathan; Wolfe, Barbara A

    2014-03-01

    Three adult and two subadult greater one-horned rhinoceroses (Rhinoceros unicornis) were sedated a total of nine times using two different intramuscular sedative combinations in order to compare the effectiveness of these combinations in inducing consistent standing sedation in this species. The sedation protocols compared were butorphanol tartrate (50-60 mg) and detomidine hydrochloride (20-30 mg; BD) versus butorphanol tartrate (80-120 mg) and azaperone (80-120 mg; BA). Specific doses were adjusted according to age and sex class, and based on previous experience. Parameters compared included time to achieve defined levels of sedation, time to recovery following antagonism, physiological parameters including heart rate, respiratory rate, indirect arterial blood pressure, and venous blood gas values. A hydraulic restraint chute was utilized to mechanically restrain animals during the procedures, and blood collection and ophthalmic examinations were conducted on all animals. Both protocols resulted in standing sedation for > or = 22.3 +/- 2.9 min or until antagonists were administered. The BD protocol resulted in deeper and more consistent sedation, compared to the BA protocol. Naltrexone hydrochloride (250-300 mg) and tolazoline hydrochloride (1,500-2,000 mg) were administered intramuscularly to antagonize protocol BD, whereas naltrexone alone (200-500 mg) was used to antagonize BA. Time to full antagonism, defined as normal mentation and ambulation following administration of antagonists, was prolonged in the BD protocol (132.3 +/- 17.2 min) compared with the BA protocol (7.5 +/- 2.5 min). Venous blood gas analysis did not reveal any significant blood gas deviations during sedation when compared with either conscious equine or white rhinoceros (Ceratotherium simum) venous reference ranges. In summary, both combinations resulted in adequate standing sedation for minimally invasive procedures, although BD resulted in more profound and consistent sedation.

  7. Forest Carbon Monitoring and Reporting for REDD+: What Future for Africa?

    PubMed

    Gizachew, Belachew; Duguma, Lalisa A

    2016-11-01

    A climate change mitigation mechanism for emissions reduction from reduced deforestation and forest degradation, plus forest conservation, sustainable management of forest, and enhancement of carbon stocks (REDD+), has received an international political support in the climate change negotiations. The mechanism will require, among others, an unprecedented technical capacity for monitoring, reporting and verification of carbon emissions from the forest sector. A functional monitoring, reporting and verification requires inventories of forest area, carbon stock and changes, both for the construction of forest reference emissions level and compiling the report on the actual emissions, which are essentially lacking in developing countries, particularly in Africa. The purpose of this essay is to contribute to a better understanding of the state and prospects of forest monitoring and reporting in the context of REDD+ in Africa. We argue that monitoring and reporting capacities in Africa fall short of the stringent requirements of the methodological guidance for monitoring, reporting and verification for REDD+, and this may weaken the prospects for successfully implementing REDD+ in the continent. We presented the challenges and prospects in the national forest inventory, remote sensing and reporting infrastructures. A North-South, South-South collaboration as well as governments own investments in monitoring, reporting and verification system could help Africa leapfrog in monitoring and reporting. These could be delivered through negotiations for the transfer of technology, technical capacities, and experiences that exist among developed countries that traditionally compile forest carbon reports in the context of the Kyoto protocol.

  8. USDA-ARS GRACEnet Project Protocols, Chapter 3. Chamber-based trace gas flux measurements4

    USDA-ARS?s Scientific Manuscript database

    This protocol addresses N2O, CO2 and CH4 flux measurement by soil chamber methodology. The reactivities of other gasses of interest such as NOx O3, CO, and NH3 will require different chambers and associated instrumentation. Carbon dioxide is included as an analyte with this protocol; however, when p...

  9. A method to improve the effectiveness of diode in vivo dosimetry.

    PubMed

    Alecu, R; Alecu, M; Ochran, T G

    1998-05-01

    A routine diode in vivo dosimetry program based on a combination of entrance and exit dose measurements was clinically implemented in the radiation oncology department of Grace Hospital, Detroit, in January 1995. The delivered dose has been monitored by taking weekly measurements. The calibration of the diodes and the in vivo dosimetry protocol for this new, more effective type of dose verification is presented. The problems encountered within the program are discussed along with our solutions.

  10. Concept Evaluation of Visual Cleaning Performance Indicators (VCPI) for Real Time Cleaning Verification

    DTIC Science & Technology

    2002-03-15

    Dyes Used § ORO § Food Green 3 § Alizarin § Natural Red 4 (Carminic Acid) § ORO § FG3 § ALZ § NR4 (or CAR) Panel Materials § Al2024...with Natural Red 4 (NR4) dye . Blank panels were not contaminated or labeled. The following protocol based on T.O.1-1-691 was used to clean the...Preliminary Estimate of Dye Use Level Required for the VCPI Technique ................................................................................30

  11. An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health

    PubMed Central

    Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio

    2012-01-01

    Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent—considered as a privacy rule in sensitive scenarios—has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism. PMID:22778634

  12. An event driven hybrid identity management approach to privacy enhanced e-health.

    PubMed

    Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio

    2012-01-01

    Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent--considered as a privacy rule in sensitive scenarios--has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.

  13. Research on radiation exposure from CT part of hybrid camera and diagnostic CT

    NASA Astrophysics Data System (ADS)

    Solný, Pavel; Zimák, Jaroslav

    2014-11-01

    Research on radiation exposure from CT part of hybrid camera in seven different Departments of Nuclear Medicine (DNM) was conducted. Processed data and effective dose (E) estimations led to the idea of phantom verification and comparison of absorbed doses and software estimation. Anonymous data from about 100 examinations from each DNM was gathered. Acquired data was processed and utilized by dose estimation programs (ExPACT, ImPACT, ImpactDose) with respect to the type of examination and examination procedures. Individual effective doses were calculated using enlisted programs. Preserving the same procedure in dose estimation process allows us to compare the resulting E. Some differences and disproportions during dose estimation led to the idea of estimated E verification. Consequently, two different sets of about 100 of TLD 100H detectors were calibrated for measurement inside the Aldersnon RANDO Anthropomorphic Phantom. Standard examination protocols were examined using a 2 Slice CT- part of hybrid SPECT/CT. Moreover, phantom exposure from body examining protocol for 32 Slice and 64 Slice diagnostic CT scanner was also verified. Absorbed dose (DT,R) measured using TLD detectors was compared with software estimation of equivalent dose HT values, computed by E estimation software. Though, only limited number of cavities for detectors enabled measurement within the regions of lung, liver, thyroid and spleen-pancreas region, some basic comparison is possible.

  14. Emissions of CH4 from natural gas production in the United States using aircraft-based observations (Invited)

    NASA Astrophysics Data System (ADS)

    Sweeney, C.; Ryerson, T. B.; Karion, A.; Peischl, J.; Petron, G.; Schnell, R. C.; Tsai, T.; Crosson, E.; Rella, C.; Trainer, M.; Frost, G. J.; Hardesty, R. M.; Montzka, S. A.; Dlugokencky, E. J.; Tans, P. P.

    2013-12-01

    New extraction technologies are making natural gas from shale and tight sand gas reservoirs in the United States (US) more accessible. As a result, the US has become the largest producer of natural gas in the world. This growth in natural gas production may result in increased leakage of methane, a potent greenhouse gas, offsetting the climate benefits of natural gas relative to other fossil fuels. Methane emissions from natural gas production are not well quantified because of the large variety of potential sources, the variability in production and operating practices, the uneven distribution of emitters, and a lack of verification of emission inventories with direct atmospheric measurements. Researchers at the NOAA Earth System Research Laboratory (ESRL) have used simple mass balance approaches to estimate emissions of CH4 from several natural gas and oil plays across the US. We will summarize the results of the available aircraft and ground-based atmospheric emissions estimates to better understand the spatial and temporal distribution of these emissions in the US.

  15. Emissions of CH4 from natural gas production in the United States using aircraft-based observations

    NASA Astrophysics Data System (ADS)

    Sweeney, Colm; Karion, Anna; Petron, Gabrielle; Ryerson, Thomas; Peischl, Jeff; Trainer, Michael; Rella, Chris; Hardesty, Michael; Crosson, Eric; Montzka, Stephen; Tans, Pieter; Shepson, Paul; Kort, Eric

    2014-05-01

    New extraction technologies are making natural gas from shale and tight sand gas reservoirs in the United States (US) more accessible. As a result, the US has become the largest producer of natural gas in the world. This growth in natural gas production may result in increased leakage of methane, a potent greenhouse gas, offsetting the climate benefits of natural gas relative to other fossil fuels. Methane emissions from natural gas production are not well quantified because of the large variety of potential sources, the variability in production and operating practices, the uneven distribution of emitters, and a lack of verification of emission inventories with direct atmospheric measurements. Researchers at the NOAA Earth System Research Laboratory (ESRL) have used simple mass balance approaches in combination with isotopes and light alkanes to estimate emissions of CH4 from several natural gas and oil plays across the US. We will summarize the results of the available aircraft and ground-based atmospheric emissions estimates to better understand the spatial and temporal distribution of these emissions in the US.

  16. Tank gauging apparatus and method

    NASA Technical Reports Server (NTRS)

    Morris, Brian G. (Inventor)

    1990-01-01

    An apparatus for gauging the amount of liquid in a container of liquid and gas under low or zero gravity net conditions includes an accumulator and appropriate connector apparatus for communicating gas between the accumulator and the container. In one form of the invention, gas is removed from the container and compressed into the accumulator. The pressure and temperature of the fluid in the container is measured before and after removal of the gas; the pressure and temperature of the gas in the accumulator is measured before and after compression of the gas into the accumulator from the container. These pressure and temperature measurements are used to determine the volume of gas in the container, whereby the volume of the liquid in the container can be determined from the difference between the known volume of the container and the volume of gas in the container. Gas from the accumulator may be communicated into the container in a similar process as a verification of the gauging of the liquid volume, or as an independent process for determining the volume of liquid in the container.

  17. Tank gauging apparatus and method

    NASA Technical Reports Server (NTRS)

    Morris, Brian G. (Inventor)

    1991-01-01

    Apparatus for gauging the amount of liquid in a container of liquid and gas under flow or zero gravity net conditions includes an accumulator and appropriate connector apparatus for communicating gas between the accumulator and the container. In one form of the invention, gas is removed from the container and compressed into the accumulator. The pressure and temperature of the fluid in the container is measured before and after removal of the gas; the pressure and temperature of gas in the accumulator is measured before and after compression of the gas into the accumulator from the container. These pressure and temperature measurements are used in determining the volume of gas in the container, whereby the volume of liquid in the container can be determined from the difference between the known volume of the container and the volume of gas in the container. Gas from the accumulator may be communicated into the container in a similar process as a verification of the gauging of the liquid volume, or as an independent process for determining the volume of liquid in the container.

  18. WTP Waste Feed Qualification: Hydrogen Generation Rate Measurement Apparatus Testing Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stone, M. E.; Newell, J. D.; Smith, T. E.

    The generation rate of hydrogen gas in the Hanford tank waste will be measured during the qualification of the staged tank waste for processing in the Hanford Tank Waste Treatment and Immobilization Plant. Based on a review of past practices in measurement of the hydrogen generation, an apparatus to perform this measurement has been designed and tested for use during waste feed qualification. The hydrogen generation rate measurement apparatus (HGRMA) described in this document utilized a 100 milliliter sample in a continuously-purged, continuously-stirred vessel, with measurement of hydrogen concentration in the vent gas. The vessel and lid had a combinedmore » 220 milliliters of headspace. The vent gas system included a small condenser to prevent excessive evaporative losses from the sample during the test, as well as a demister and filter to prevent particle migration from the sample to the gas chromatography system. The gas chromatograph was an on line automated instrument with a large-volume sample-injection system to allow measurement of very low hydrogen concentrations. This instrument automatically sampled the vent gas from the hydrogen generation rate measurement apparatus every five minutes and performed data regression in real time. The fabrication of the hydrogen generation rate measurement apparatus was in accordance with twenty three (23) design requirements documented in the conceptual design package, as well as seven (7) required developmental activities documented in the task plan associated with this work scope. The HGRMA was initially tested for proof of concept with physical simulants, and a remote demonstration of the system was performed in the Savannah River National Laboratory Shielded Cells Mockup Facility. Final verification testing was performed using non-radioactive simulants of the Hanford tank waste. Three different simulants were tested to bound the expected rheological properties expected during waste feed qualification testing. These simulants were tested at different temperatures using purge gas spiked with varying amounts of hydrogen to provide verification that the system could accurately measure the hydrogen in the vent gas at steady state.« less

  19. Anonymity-preserving Reputation Management System for health sector

    PubMed Central

    Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz

    2018-01-01

    In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267

  20. How can research on anthropogenic greenhouse gas flux quantification be better aligned with US climate change policy needs?

    NASA Astrophysics Data System (ADS)

    Gurney, K. R.

    2014-12-01

    Scientific research on quantification of anthropogenic greenhouse gas emissions at national and sub-national scales within the US has advanced considerably in the last decade. Large investment has been made in building systems capable of observing greenhouse gases in the atmosphere at multiple scales, measuring direct anthropogenic fluxes near sources and modeling the linkages between fluxes and observed concentrations. Much of this research has been focused at improving the "verification" component of "monitoring, reporting, and verification" and indeed, has achieved successes in recent years. However, there are opportunities for ongoing scientific research to contribute critical new information to policymakers. In order to realize this contribution, additional but complementary, research foci must be emphasized. Examples include more focus on anthropogenic emission drivers, quantification at scales relevant to human decision-making, and exploration of cost versus uncertainty in observing/modeling systems. I will review what I think are the opportunities to better align scientific research with current and emerging US climate change policymaking. I will then explore a few examples of where expansion or alteration of greenhouse gas flux quantification research focus could better align with current and emerging US climate change policymaking such as embodied in the proposed EPA rule aimed at reducing emissions from US power plants, California's ongoing emissions reduction policymaking and aspirational emission reduction efforts in multiple US cities.

  1. Gas-Liquid Supersonic Cleaning and Cleaning Verification Spray System

    NASA Technical Reports Server (NTRS)

    Parrish, Lewis M.

    2009-01-01

    NASA Kennedy Space Center (KSC) recently entered into a nonexclusive license agreement with Applied Cryogenic Solutions (ACS), Inc. (Galveston, TX) to commercialize its Gas-Liquid Supersonic Cleaning and Cleaning Verification Spray System technology. This technology, developed by KSC, is a critical component of processes being developed and commercialized by ACS to replace current mechanical and chemical cleaning and descaling methods used by numerous industries. Pilot trials on heat exchanger tubing components have shown that the ACS technology provides for: Superior cleaning in a much shorter period of time. Lower energy and labor requirements for cleaning and de-scaling uper.ninih. Significant reductions in waste volumes by not using water, acidic or basic solutions, organic solvents, or nonvolatile solid abrasives as components in the cleaning process. Improved energy efficiency in post-cleaning heat exchanger operations. The ACS process consists of a spray head containing supersonic converging/diverging nozzles, a source of liquid gas; a novel, proprietary pumping system that permits pumping liquid nitrogen, liquid air, or supercritical carbon dioxide to pressures in the range of 20,000 to 60,000 psi; and various hoses, fittings, valves, and gauges. The size and number of nozzles can be varied so the system can be built in configurations ranging from small hand-held spray heads to large multinozzle cleaners. The system also can be used to verify if a part has been adequately cleaned.

  2. Formal Logic and Flowchart for Diagnosis Validity Verification and Inclusion in Clinical Decision Support Systems

    NASA Astrophysics Data System (ADS)

    Sosa, M.; Grundel, L.; Simini, F.

    2016-04-01

    Logical reasoning is part of medical practice since its origins. Modern Medicine has included information-intensive tools to refine diagnostics and treatment protocols. We are introducing formal logic teaching in Medical School prior to Clinical Internship, to foster medical practice. Two simple examples (Acute Myocardial Infarction and Diabetes Mellitus) are given in terms of formal logic expression and truth tables. Flowcharts of both diagnostic processes help understand the procedures and to validate them logically. The particularity of medical information is that it is often accompanied by “missing data” which suggests to adapt formal logic to a “three state” logic in the future. Medical Education must include formal logic to understand complex protocols and best practices, prone to mutual interactions.

  3. Aerodynamics and performance verifications of test methods for laboratory fume cupboards.

    PubMed

    Tseng, Li-Ching; Huang, Rong Fung; Chen, Chih-Chieh; Chang, Cheng-Ping

    2007-03-01

    The laser-light-sheet-assisted smoke flow visualization technique is performed on a full-size, transparent, commercial grade chemical fume cupboard to diagnose the flow characteristics and to verify the validity of several current containment test methods. The visualized flow patterns identify the recirculation areas that would inevitably exist in the conventional fume cupboards because of the fundamental configurations and structures. The large-scale vortex structures exist around the side walls, the doorsill of the cupboard and in the vicinity of the near-wake region of the manikin. The identified recirculation areas are taken as the 'dangerous' regions where the risk of turbulent dispersion of contaminants may be high. Several existing tracer gas containment test methods (BS 7258:1994, prEN 14175-3:2003 and ANSI/ASHRAE 110:1995) are conducted to verify the effectiveness of these methods in detecting the contaminant leakage. By comparing the results of the flow visualization and the tracer gas tests, it is found that the local recirculation regions are more prone to contaminant leakage because of the complex interaction between the shear layers and the smoke movement through the mechanism of turbulent dispersion. From the point of view of aerodynamics, the present study verifies that the methodology of the prEN 14175-3:2003 protocol can produce more reliable and consistent results because it is based on the region-by-region measurement and encompasses the most area of the entire recirculation zone of the cupboard. A modified test method combined with the region-by-region approach at the presence of the manikin shows substantially different results of the containment. A better performance test method which can describe an operator's exposure and the correlation between flow characteristics and the contaminant leakage properties is therefore suggested.

  4. Thermogravimetric Analysis of Single-Wall Carbon Nanotubes

    NASA Technical Reports Server (NTRS)

    Arepalli, Sivram; Nikolaev, Pavel; Gorelik, Olga

    2010-01-01

    An improved protocol for thermogravimetric analysis (TGA) of samples of single-wall carbon nanotube (SWCNT) material has been developed to increase the degree of consistency among results so that meaningful comparisons can be made among different samples. This improved TGA protocol is suitable for incorporation into the protocol for characterization of carbon nanotube material. In most cases, TGA of carbon nanotube materials is performed in gas mixtures that contain oxygen at various concentrations. The improved protocol is summarized.

  5. Breakdown Voltage of CF3CHCl2 gas an Alternative to SF6 Gas using HV Test and Bonding Energy Methods

    NASA Astrophysics Data System (ADS)

    Juliandhy, Tedy; Haryono, T.; Suharyanto; Perdana, Indra

    2018-04-01

    For more than two decades of Sulphur Hexafluoride (SF6) gases is used as a gas insulation in high voltage equipment especially in substations. In addition to getting an advantage as an insulating gas. SF6 gas is recognized as one of the greenhouse effect gases that cause global warming. Under the Kyoto Protocol, SF6 gas is one of those gases whose use is restricted and gradually reduced to the presence of a replacement gas for SF6 gas. One of the alternative gas alternatives which have the potential of replacing SF6 gas as an insulating gas in Gas Insulated Switchgear (GIS) equipment in the substation is Dichlorotrifluoroethane (CF3CHCl2) gas. The purpose of this paper is to enable a comparison of breakdown voltage with high voltage test and method of calculating Bonding energy to Dichlorotrifluoroethane gas as substitute gas for SF6 gas. At 0.1 bar gas pressure obtained an average breakdown voltage of 18.68 kV / mm at 25oC chamber temperature and has the highest breakdown voltage at 50oC with a breakdown voltage of 19.56 kV / mm. The CF3CHCl2 gas has great potential as an insulating gas because it has more insulation ability high of SF6 gas, and is part of the gas recommended under the Kyoto Protocol. Gas CF3CHCl2 has the capacity to double the value of electronegativity greater than SF6 gas as a major requirement of gas isolation and has a value of Global Warming Potential (GWP) and Ozone Depleting lower than from SF6 gas.

  6. Verification of sub-grid filtered drag models for gas-particle fluidized beds with immersed cylinder arrays

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarkar, Avik; Sun, Xin; Sundaresan, Sankaran

    2014-04-23

    The accuracy of coarse-grid multiphase CFD simulations of fluidized beds may be improved via the inclusion of filtered constitutive models. In our previous study (Sarkar et al., Chem. Eng. Sci., 104, 399-412), we developed such a set of filtered drag relationships for beds with immersed arrays of cooling tubes. Verification of these filtered drag models is addressed in this work. Predictions from coarse-grid simulations with the sub-grid filtered corrections are compared against accurate, highly-resolved simulations of full-scale turbulent and bubbling fluidized beds. The filtered drag models offer a computationally efficient yet accurate alternative for obtaining macroscopic predictions, but the spatialmore » resolution of meso-scale clustering heterogeneities is sacrificed.« less

  7. 77 FR 50855 - Oil and Gas and Sulphur Operations on the Outer Continental Shelf-Increased Safety Measures for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-22

    ... according to the design. The third- subsea function and pressure tests party verification must include...; Requires new casing and cementing integrity tests; Establishes new requirements for subsea secondary BOP... that, for the final casing string (or liner if it is the final string), an operator must install one...

  8. Air Force Research Laboratory Technology Milestones 2007

    DTIC Science & Technology

    2007-01-01

    Propulsion Fuel Pumps and Fuel Systems Liquid Rockets and Combustion Gas Generators Micropropulsion Gears Monopropellants High-Cycle Fatigue and Its... Systems Electric Propulsion Engine Health Monitoring Systems High-Energy-Density Matter Exhaust Nozzles Injectors and Spray Measurements Fans Laser...of software models to drive development of component-based systems and lightweight domain-specific specification and verification technology. Highly

  9. EXPERIMENTAL PROTOCOL FOR DETERMINING PROTOLYSIS REACTION RATE CONSTANTS

    EPA Science Inventory

    An experimental protocol to determine photolysis rates of chemicals which photolyze relatively rapidly in the gas phase has been developed. This procedure provides a basis for evaluating the relative importance of one atmospheric reaction pathway (i.e., photolysis) for organic su...

  10. Multibreath alveolar oxygen tension imaging.

    PubMed

    Clapp, Justin; Hamedani, Hooman; Kadlecek, Stephen; Xin, Yi; Shaghaghi, Hoora; Siddiqui, Sarmad; Rossman, Milton D; Rizi, Rahim R

    2016-10-01

    This study tested the ability of a multibreath hyperpolarized HP (3) He MRI protocol to increase the accuracy of regional alveolar oxygen tension (PA O2 ) measurements by lessening the influence of gas-flow artifacts. Conventional single-breath PA O2 measurement has been susceptible to error induced by intervoxel gas flow, particularly when used to study subjects with moderate-to-severe chronic obstructive pulmonary disease (COPD). Both single-breath and multibreath PA O2 imaging schemes were implemented in seven human subjects (one healthy, three asymptomatic smokers, and three COPD). The number and location of voxels with nonphysiologic PA O2 values generated by intervoxel gas flow were compared between the two protocols. The multibreath scheme resulted in a significantly lower total percentage of nonphysiologic PA O2 values (6.0%) than the single-breath scheme (13.7%) (P = 0.006). PA O2 maps showed several patterns of gas-flow artifacts that were present in the single-breath protocol but mitigated by the multibreath approach. Multibreath imaging also allowed for the analysis of slow-filling areas that presented no signal after a single breath. A multibreath approach enhances the accuracy and completeness of noninvasive PA O2 measurement by significantly lessening the proportion of nonphysiologic values generated by intervoxel gas flow. Magn Reson Med 76:1092-1101, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  11. UTEX modeling of xenon signature sensitivity to geology and explosion cavity characteristics following an underground nuclear explosion

    NASA Astrophysics Data System (ADS)

    Lowrey, J. D.; Haas, D.

    2013-12-01

    Underground nuclear explosions (UNEs) produce anthropogenic isotopes that can potentially be used in the verification component of the Comprehensive Nuclear-Test-Ban Treaty. Several isotopes of radioactive xenon gas have been identified as radionuclides of interest within the International Monitoring System (IMS) and in an On-Site Inspection (OSI). Substantial research has been previously undertaken to characterize the geologic and atmospheric mechanisms that can drive the movement of radionuclide gas from a well-contained UNE, considering both sensitivities on gas arrival time and signature variability of xenon due to the nature of subsurface transport. This work further considers sensitivities of radioxenon gas arrival time and signatures to large variability in geologic stratification and generalized explosion cavity characteristics, as well as compares this influence to variability in the shallow surface.

  12. An investigation into the flow behavior of a single phase gas system and a two phase gas/liquid system in normal gravity with nonuniform heating from above

    NASA Technical Reports Server (NTRS)

    Disimile, Peter J.; Heist, Timothy J.

    1990-01-01

    The fluid behavior in normal gravity of a single phase gas system and a two phase gas/liquid system in an enclosed circular cylinder heated suddenly and nonuniformly from above was investigated. Flow visualization was used to obtain qualitative data on both systems. The use of thermochromatic liquid crystal particles as liquid phase flow tracers was evaluated as a possible means of simultaneously gathering both flow pattern and temperature gradient data for the two phase system. The results of the flow visualization experiments performed on both systems can be used to gain a better understanding of the behavior of such systems in a reduced gravity environment and aid in the verification of a numerical model of the system.

  13. Demonstration of measurement-only blind quantum computing

    NASA Astrophysics Data System (ADS)

    Greganti, Chiara; Roehsner, Marie-Christine; Barz, Stefanie; Morimae, Tomoyuki; Walther, Philip

    2016-01-01

    Blind quantum computing allows for secure cloud networks of quasi-classical clients and a fully fledged quantum server. Recently, a new protocol has been proposed, which requires a client to perform only measurements. We demonstrate a proof-of-principle implementation of this measurement-only blind quantum computing, exploiting a photonic setup to generate four-qubit cluster states for computation and verification. Feasible technological requirements for the client and the device-independent blindness make this scheme very applicable for future secure quantum networks.

  14. Functions of Tenascin-C and Integrin alpha9beta1 in Mediating Prostate Cancer Bone Metastasis

    DTIC Science & Technology

    2017-10-01

    additional engineered cell lines for verification and we plan to also generate stable knockout cell lines using CRISPR /Cas 9 gene editing technology...addition to the proposed study, we plan to also produce VCaP cells that are null (knockout) for alpha 9 integrin using CRISPR /Cas9 gene editing protocols...We are experienced with CRISPR -Cas knockdown and have successfully engineered cells previously. We do not expect any particular difficulty in

  15. System M: A Program Logic for Code Sandboxing and Identification

    DTIC Science & Technology

    2014-07-22

    M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. In Proc. FAST’09, 2010. [8] A. Datta, A. Derek, J. C. Mitchell...11] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A formal analysis of authentication in the TPM. In Proc. FAST’10, 2011. [12] S. Delaune, S...A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451–519, July 2003. [16] S. Gürgens, C. Rudolph, D

  16. Implementation of a Lateral TBI protocol in a Mexican Cancer Center

    NASA Astrophysics Data System (ADS)

    Mesa, Francisco; Esquivel, Carlos; Eng, Tony; Papanikolaou, Niko; Sosa, Modesto A.

    2008-08-01

    The development of a Lateral Total Body Irradiation protocol to be implemented at a High Specialty Medical Unit in Mexico as preparatory regimen for bone marrow transplant and treatment of several lymphomas is presented. This protocol was developed following AAPM specifications and has been validated for application at a cancer care center in United States. This protocol fundamentally focuses on patient care, avoiding instability and discomfort that may be encountered by other treatment regimes. In vivo dose verification with TLD-100 chips for each anatomical region of interest was utilized. TLD-100 chips were calibrated using a 6 MV photon beam for 10-120 cGy. Experimental results show TLD measurements with an error less than 1%. Standard deviations for calculated and measured doses for seven patients have been obtained. Data gathered for different levels of compensation indicate that a 3% measured tolerance level is acceptable. TLD point-dose measurements have been used to verify the dose beyond partial transmission lung blocks. Dose measurements beyond the lung block showed variation about 50% respects to prescribe dose. Midplane doses to the other anatomical sites were less than 2.5% respect of the prescribed dose.

  17. Mass spectrometer vacuum housing and pumping system

    DOEpatents

    Coutts, G.W.; Bushman, J.F.; Alger, T.W.

    1996-07-23

    A vacuum housing and pumping system is described for a portable gas chromatograph/mass spectrometer (GC/MS). The vacuum housing section of the system has minimum weight for portability while designed and constructed to utilize metal gasket sealed stainless steel to be compatible with high vacuum operation. The vacuum pumping section of the system consists of a sorption (getter) pump to remove atmospheric leakage and outgassing contaminants as well as the gas chromatograph carrier gas (hydrogen) and an ion pump to remove the argon from atmospheric leaks. The overall GC/MS system has broad application to contaminants, hazardous materials, illegal drugs, pollution monitoring, etc., as well as for use by chemical weapon treaty verification teams, due to the light weight and portability thereof. 7 figs.

  18. Mass spectrometer vacuum housing and pumping system

    DOEpatents

    Coutts, Gerald W.; Bushman, John F.; Alger, Terry W.

    1996-01-01

    A vacuum housing and pumping system for a portable gas chromatograph/mass spectrometer (GC/MS). The vacuum housing section of the system has minimum weight for portability while designed and constructed to utilize metal gasket sealed stainless steel to be compatible with high vacuum operation. The vacuum pumping section of the system consists of a sorption (getter) pump to remove atmospheric leakage and outgassing contaminants as well as the gas chromatograph carrier gas (hydrogen) and an ion pump to remove the argon from atmospheric leaks. The overall GC/MS system has broad application to contaminants, hazardous materials, illegal drugs, pollution monitoring, etc., as well as for use by chemical weapon treaty verification teams, due to the light weight and portability thereof.

  19. Use of IMS data and its potential for research through global noble gases concentration maps

    NASA Astrophysics Data System (ADS)

    Terzi, Lucrezia; Kalinowski, Martin; Gueibe, Christophe; Camps, Johan; Gheddou, Abdelhakim; Kusmierczyk-Michulec, Jolanta; Schoeppner, Michael

    2017-04-01

    The Comprehensive Nuclear-Test-Ban Treaty (CTBT) established for verification purposes a global monitoring system for atmospheric radioisotopes and noble gas radioactivity. Daily activity concentrations have been collected worldwide for over 15 years providing unique data sets with long term time series that can be used for atmospheric circulation dynamics analysis. In this study, we want to emphasize the value of worldwide noble gas data by reconstructing global xenon concentration maps and comparing these observations with ATM simulations. By creating a residual plot, we can improve our understanding of our source estimation level for each region.

  20. Quantum supremacy in constant-time measurement-based computation: A unified architecture for sampling and verification

    NASA Astrophysics Data System (ADS)

    Miller, Jacob; Sanders, Stephen; Miyake, Akimasa

    2017-12-01

    While quantum speed-up in solving certain decision problems by a fault-tolerant universal quantum computer has been promised, a timely research interest includes how far one can reduce the resource requirement to demonstrate a provable advantage in quantum devices without demanding quantum error correction, which is crucial for prolonging the coherence time of qubits. We propose a model device made of locally interacting multiple qubits, designed such that simultaneous single-qubit measurements on it can output probability distributions whose average-case sampling is classically intractable, under similar assumptions as the sampling of noninteracting bosons and instantaneous quantum circuits. Notably, in contrast to these previous unitary-based realizations, our measurement-based implementation has two distinctive features. (i) Our implementation involves no adaptation of measurement bases, leading output probability distributions to be generated in constant time, independent of the system size. Thus, it could be implemented in principle without quantum error correction. (ii) Verifying the classical intractability of our sampling is done by changing the Pauli measurement bases only at certain output qubits. Our usage of random commuting quantum circuits in place of computationally universal circuits allows a unique unification of sampling and verification, so they require the same physical resource requirements in contrast to the more demanding verification protocols seen elsewhere in the literature.

  1. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E.

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reactionmore » rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)« less

  2. Postextraction Separation, On-Board Storage, and Catalytic Conversion of Methane in Natural Gas: A Review.

    PubMed

    Saha, Dipendu; Grappe, Hippolyte A; Chakraborty, Amlan; Orkoulas, Gerassimos

    2016-10-12

    In today's perspective, natural gas has gained considerable attention, due to its low emission, indigenous availability, and improvement in the extraction technology. Upon extraction, it undergoes several purification protocols including dehydration, sweetening, and inert rejection. Although purification is a commercially established technology, several drawbacks of the current process provide an essential impetus for developing newer separation protocols, most importantly, adsorption and membrane separation. This Review summarizes the needs of natural gas separation, gives an overview of the current technology, and provides a detailed discussion of the progress in research on separation and purification of natural gas including the benefits and drawbacks of each of the processes. The transportation sector is another growing sector of natural gas utilization, and it requires an efficient and safe on-board storage system. Compressed natural gas (CNG) and liquefied natural gas (LNG) are the most common forms in which natural gas can be stored. Adsorbed natural gas (ANG) is an alternate storage system of natural gas, which is advantageous as compared to CNG and LNG in terms of safety and also in terms of temperature and pressure requirements. This Review provides a detailed discussion on ANG along with computation predictions. The catalytic conversion of methane to different useful chemicals including syngas, methanol, formaldehyde, dimethyl ether, heavier hydrocarbons, aromatics, and hydrogen is also reviewed. Finally, direct utilization of methane onto fuel cells is also discussed.

  3. MASTER ANALYTICAL SCHEME FOR ORGANIC COMPOUNDS IN WATER: PART 1. PROTOCOLS

    EPA Science Inventory

    A Master Analytical Scheme (MAS) has been developed for the analysis of volatile (gas chromatographable) organic compounds in water. In developing the MAS, it was necessary to evaluate and modify existing analysis procedures and develop new techniques to produce protocols that pr...

  4. Measurement, monitoring, and verification: make it work!

    Treesearch

    Coeli M. Hoover

    2011-01-01

    The capacity of forests to absorb and store carbon is certainly, as the authors note, an important tool in the greenhouse gas mitigation toolbox. Our understanding of what elements can make forest carbon offset projects successful has grown a great deal over time, as the global community has come to understand that forest degradation and conversion are the result of a...

  5. 40 CFR 1065.341 - CVS and batch sampler verification (propane check).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... contamination. Otherwise, zero, span, and verify contamination of the HC sampling system, as follows: (1) Select... flow rates. (2) Zero the HC analyzer using zero air introduced at the analyzer port. (3) Span the HC analyzer using C3H8 span gas introduced at the analyzer port. (4) Overflow zero air at the HC probe inlet...

  6. 40 CFR 1065.341 - CVS and batch sampler verification (propane check).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... contamination. Otherwise, zero, span, and verify contamination of the HC sampling system, as follows: (1) Select... flow rates. (2) Zero the HC analyzer using zero air introduced at the analyzer port. (3) Span the HC analyzer using C3H8 span gas introduced at the analyzer port. (4) Overflow zero air at the HC probe inlet...

  7. Using a multi-scale approach to identify and quantify oil and gas emissions: a case study for GHG emissions verification

    NASA Astrophysics Data System (ADS)

    Sweeney, C.; Kort, E. A.; Rella, C.; Conley, S. A.; Karion, A.; Lauvaux, T.; Frankenberg, C.

    2015-12-01

    Along with a boom in oil and natural gas production in the US, there has been a substantial effort to understand the true environmental impact of these operations on air and water quality, as well asnet radiation balance. This multi-institution effort funded by both governmental and non-governmental agencies has provided a case study for identification and verification of emissions using a multi-scale, top-down approach. This approach leverages a combination of remote sensing to identify areas that need specific focus and airborne in-situ measurements to quantify both regional and large- to mid-size single-point emitters. Ground-based networks of mobile and stationary measurements provide the bottom tier of measurements from which process-level information can be gathered to better understand the specific sources and temporal distribution of the emitters. The motivation for this type of approach is largely driven by recent work in the Barnett Shale region in Texas as well as the San Juan Basin in New Mexico and Colorado; these studies suggest that relatively few single-point emitters dominate the regional emissions of CH4.

  8. Verification of an altitude decompression sickness prevention protocol for Shuttle operations utilizing a 10.s psi pressure stage

    NASA Technical Reports Server (NTRS)

    Waligora, J. M.; Horrigan, D. J., Jr.; Conkin, J.; Hadley, A. T., III

    1984-01-01

    Three test series involving 173-man tess were conducted to define and verify a pre-extravehicular activity (EVA) denitrogenation procedure that would provide acceptable protection against altitude decompression sickness while minimizing the required duration of oxygen (O2) prebreathe in the suit prior to EVA. The tests also addressed the safety, in terms of incidence of decompression sickness, of conducting EVA's on consecutive days rather than on alternate days. The tests were conducted in an altitude chamber, subjects were selected as representative of the astronaut population, and EVA periods were simulated by reducing the chamber pressure to suit pressure while the subjects breathed O2 with masks and worked at EVA representative work rates. A higher than anticipated incidence of both venous bubbles (55%) and symptoms (26%) was measured following all denitrogenation protocols in this test. For the most part, symptoms were very minor and stabilized, diminished, or disappeared in the six-hour tests. Instances of clear, possible, or potential systemic symptoms were encountered only after use of the unmodified 10.2 psi protocol and not after the modified 10.2 psi protocol, the 3.5-hour O2 prebreathed protocol, or the 4.0-hour O2 prebreathe protocol. The high incidence of symptoms is ascribed to the type and duration of exercise and the sensitivity of the reporting technique to minor symptoms. Repeated EVA exposures after only 17 hours did not increase symptom or bubble incidence.

  9. Modeling a 15-min extravehicular activity prebreathe protocol using NASA's exploration atmosphere (56.5 kPa/34% O2)

    NASA Astrophysics Data System (ADS)

    Abercromby, Andrew F. J.; Conkin, Johnny; Gernhardt, Michael L.

    2015-04-01

    NASA's plans for future human exploration missions utilize a new atmosphere of 56.5 kPa (8.2 psia), 34% O2, 66% N2 to enable rapid extravehicular activity (EVA) capability with minimal gas losses; however, existing EVA prebreathe protocols to mitigate risk of decompression sickness (DCS) are not applicable to the new exploration atmosphere. We provide preliminary analysis of a 15-min prebreathe protocol and examine the potential benefits of intermittent recompression (IR) and an abbreviated N2 purge on crew time and gas consumables usage. A probabilistic model of decompression stress based on an established biophysical model of DCS risk was developed, providing significant (p<0.0001) prediction and goodness-of-fit with 84 cases of DCS in 668 human altitude exposures including a variety of pressure profiles. DCS risk for a 15-min prebreathe protocol was then estimated under different exploration EVA scenarios. Estimated DCS risk for all EVA scenarios modeled using the 15-min prebreathe protocol ranged between 6.1% and 12.1%. Supersaturation in neurological tissues (5- and 10-min half-time compartments) is prevented and tissue tensions in faster half-time compartments (≤40 min), where the majority of whole-body N2 is located, are reduced to about the levels (30.0 vs. 27.6 kPa) achieved during a standard Shuttle prebreathe protocol. IR reduced estimated DCS risk from 9.7% to 7.9% (1.8% reduction) and from 8.4% to 6.1% (2.3% reduction) for the scenarios modeled; the penalty of N2 reuptake during IR may be outweighed by the benefit of decreased bubble size. Savings of 75% of purge gas and time (0.22 kg gas and 6 min of crew time per person per EVA) are achievable by abbreviating the EVA suit purge to 20% N2 vs. 5% N2 at the expense of an increase in estimated DCS risk from 9.7% to 12.1% (2.4% increase). A 15-min prebreathe protocol appears feasible using the new exploration atmosphere. IR between EVAs may enable reductions in suit purge and prebreathe requirements, decompression stress, and/or suit operating pressures. Ground trial validation is required before operational implementation.

  10. Scientific Verification Test of Orbitec Deployable Vegetable Production System for Salad Crop Growth on ISS- Gas Exchange System design and function

    NASA Technical Reports Server (NTRS)

    Eldemire, Ashleigh

    2007-01-01

    The ability to produce and maintain salad crops during long term missions would be a great benefit to NASA; the renewable food supply would save cargo space, weight and money. The ambient conditions of previous ground controlled crop plant experiments do not reflect the microgravity and high CO2 concentrations present during orbit. It has been established that microgravity does not considerably alter plant growth. (Monje, Stutte, Chapman, 2005). To support plants in a space-craft environment efficient and effective lighting and containment units are necessary. Three lighting systems were previously evaluated for radish growth in ambient air; fluorescent lamps in an Orbitec Biomass Production System Educational (BPSE), a combination of red, blue, and green LED's in a Deployable Vegetable Production System (Veggie), and a combination of red and blue LED's in a Veggie. When mass measurements compared the entire possible growing area vs. power consumed by the respective units, the Veggies clearly exceeded the BPSE indicating that the LED units were a more resource efficient means of growing radishes under ambient conditions in comparison with fluorescent lighting. To evaluate the most productive light treatment system for a long term space mission a more closely simulated ISS environment is necessary. To induce a CO2 dense atmosphere inside the Veggie's and BPSE a gas exchange system has been developed to maintain a range of 1000-1200 ppm CO2 during a 21-day light treatment experiment. This report details the design and function of the gas exchange system. The rehabilitation, trouble shooting, maintenance and testing of the gas exchange system have been my major assignments. I have also contributed to the planting, daily measurements and harvesting of the radish crops 21-day light treatment verification test.

  11. Argon Collection And Purification For Proliferation Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Achey, R.; Hunter, D.

    2015-10-09

    In order to determine whether a seismic event was a declared/undeclared underground nuclear weapon test, environmental samples must be taken and analyzed for signatures that are unique to a nuclear explosion. These signatures are either particles or gases. Particle samples are routinely taken and analyzed under the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) verification regime as well as by individual countries. Gas samples are analyzed for signature gases, especially radioactive xenon. Underground nuclear tests also produce radioactive argon, but that signature is not well monitored. A radioactive argon signature, along with other signatures, can more conclusively determine whether an event wasmore » a nuclear test. This project has developed capabilities for collecting and purifying argon samples for ultra-low-background proportional counting. SRNL has developed a continuous gas enrichment system that produces an output stream containing 97% argon from whole air using adsorbent separation technology (the flow diagram for the system is shown in the figure). The vacuum swing adsorption (VSA) enrichment system is easily scalable to produce ten liters or more of 97% argon within twelve hours. A gas chromatographic separation using a column of modified hydrogen mordenite molecular sieve has been developed that can further purify the sample to better than 99% purity after separation from the helium carrier gas. The combination of these concentration and purification systems has the capability of being used for a field-deployable system for collecting argon samples suitable for ultra-low-background proportional counting for detecting nuclear detonations under the On-Site Inspection program of the CTBTO verification regime. The technology also has applications for the bulk argon separation from air for industrial purposes such as the semi-conductor industry.« less

  12. Experimental investigation of the impulse gas injection into liquid and the use of experimental data for verification of the HYDRA-IBRAE/LM thermohydraulic code

    NASA Astrophysics Data System (ADS)

    Lobanov, P. D.; Usov, E. V.; Butov, A. A.; Pribaturin, N. A.; Mosunova, N. A.; Strizhov, V. F.; Chukhno, V. I.; Kutlimetov, A. E.

    2017-10-01

    Experiments with impulse gas injection into model coolants, such as water or the Rose alloy, performed at the Novosibirsk Branch of the Nuclear Safety Institute, Russian Academy of Sciences, are described. The test facility and the experimental conditions are presented in details. The dependence of coolant pressure on the injected gas flow and the time of injection was determined. The purpose of these experiments was to verify the physical models of thermohydraulic codes for calculation of the processes that could occur during the rupture of tubes of a steam generator with heavy liquid metal coolant or during fuel rod failure in water-cooled reactors. The experimental results were used for verification of the HYDRA-IBRAE/LM system thermohydraulic code developed at the Nuclear Safety Institute, Russian Academy of Sciences. The models of gas bubble transportation in a vertical channel that are used in the code are described in detail. A two-phase flow pattern diagram and correlations for prediction of friction of bubbles and slugs as they float up in a vertical channel and of two-phase flow friction factor are presented. Based on the results of simulation of these experiments using the HYDRA-IBRAE/LM code, the arithmetic mean error in predicted pressures was calculated, and the predictions were analyzed considering the uncertainty in the input data, geometry of the test facility, and the error of the empirical correlation. The analysis revealed major factors having a considerable effect on the predictions. The recommendations are given on updating of the experimental results and improvement of the models used in the thermohydraulic code.

  13. Fast protocol for radiochromic film dosimetry using a cloud computing web application.

    PubMed

    Calvo-Ortega, Juan-Francisco; Pozo, Miquel; Moragues, Sandra; Casals, Joan

    2017-07-01

    To investigate the feasibility of a fast protocol for radiochromic film dosimetry to verify intensity-modulated radiotherapy (IMRT) plans. EBT3 film dosimetry was conducted in this study using the triple-channel method implemented in the cloud computing application (Radiochromic.com). We described a fast protocol for radiochromic film dosimetry to obtain measurement results within 1h. Ten IMRT plans were delivered to evaluate the feasibility of the fast protocol. The dose distribution of the verification film was derived at 15, 30, 45min using the fast protocol and also at 24h after completing the irradiation. The four dose maps obtained per plan were compared using global and local gamma index (5%/3mm) with the calculated one by the treatment planning system. Gamma passing rates obtained for 15, 30 and 45min post-exposure were compared with those obtained after 24h. Small differences respect to the 24h protocol were found in the gamma passing rates obtained for films digitized at 15min (global: 99.6%±0.9% vs. 99.7%±0.5%; local: 96.3%±3.4% vs. 96.3%±3.8%), at 30min (global: 99.5%±0.9% vs. 99.7%±0.5%; local: 96.5%±3.2% vs. 96.3±3.8%) and at 45min (global: 99.2%±1.5% vs. 99.7%±0.5%; local: 96.1%±3.8% vs. 96.3±3.8%). The fast protocol permits dosimetric results within 1h when IMRT plans are verified, with similar results as those reported by the standard 24h protocol. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  14. Electromagnetic radiations from laser interaction with gas-filled Hohlraum

    NASA Astrophysics Data System (ADS)

    Yang, Ming; Yang, Yongmei; Li, Tingshuai; Yi, Tao; Wang, Chuanke; Liu, Shenye; Jiang, Shaoen; Ding, Yongkun

    2018-01-01

    The emission of intensive electromagnetic pulse (EMP) due to laser-target interactions at the ShenGuang-III laser facility has been evaluated by probes. EMP signals measured using the small discone antennas demonstrated two variation trends including a bilateral oscillation wave and a unilateral oscillation wave. The new trend of unilateral oscillation could be attributed to the hohlraum structure and low-Z gas in the hohlraum. The EMP waveform showed multiple peaks when the gas-filled hohlraum was shot by the high-power laser. Comparing the EMP signals with the verification of stimulated Raman scattering energy and hard x-ray energy spectrum, we found that the intensity of EMP signals decreased with the increase of the hohlraum size. The current results are expected to offer preliminary information to study physical processes on laser injecting gas-filled hohlraums in the National Ignition Facility implementation.

  15. MASTER ANALYTICAL SCHEME FOR ORGANIC COMPOUNDS IN WATER. PART 2. APPENDICES TO PROTOCOLS

    EPA Science Inventory

    A Master Analytical Scheme (MAS) has been developed for the analysis of volatile (gas chromatographable) organic compounds in water. In developing the MAS, it was necessary to evaluate and modify existing analysis procedures and develop new techniques to produce protocols that pr...

  16. Limitations of Routine Verification of Nasogastric Tube Insertion Using X-Ray and Auscultation: Two Case Reports of Life-Threatening Complications.

    PubMed

    Nejo, Takahide; Oya, Soichi; Tsukasa, Tsuchiya; Yamaguchi, Naomi; Matsui, Toru

    2016-12-01

    Several bedside approaches used in combination with thoracoabdominal X-ray are widely used to avoid severe complications that have been reported during nasogastric tube management. Although confirmation by X-ray is considered the gold standard, it is not yet perfect. We present 2 cases of rare complications in which the routine verification methods could not detect all the complications related to the nasogastric tube placement. Case 1 was a 17-year-old male who presented with a brain tumor and repeatedly required nasogastric tube placement. Despite normal auscultatory and X-ray findings, the patient's condition deteriorated rapidly after resuming the enteral nutrition (EN). Computed tomography images showed the presence of hepatic portal venous gas (HPVG). Urgent upper gastrointestinal endoscopy showed esophagogastric submucosal tunneling of the tube that required an emergency open total gastrectomy. Case 2 was a 76-year-old man with long-term EN after stroke. While the last auscultatory verification was normal, he suddenly developed extensive HPVG due to gastric mucosal injury following EN, which resulted in progressive intestinal necrosis, general peritonitis, and death. These 2 cases indicated that routine verification methods consisting of auscultation and X-ray may not be completely reliable, and the awareness of the limitations of these methods should be reaffirmed because expeditious examinations and necessary interventions are critical in preventing life-threatening complications.

  17. Fifteen-minute Extravehicular Activity Prebreathe Protocol Using NASA's Exploration Atmosphere (8.2 psia/ 34% 02)

    NASA Technical Reports Server (NTRS)

    Abercromby, Andrew F. J.; Gernhardt, Michael L.; Conkin, Johnny

    2013-01-01

    A TBDM DCS probability model based on an existing biophysical model of inert gas bubble growth provides significant prediction and goodness-of-fit with 84 cases of DCS in 668 human altitude exposures. 2. Model predictions suggest that 15-minute O2 prebreathe protocols used in conjunction with suit ports and an 8.2 psi, 34% O2, 66% N2 atmosphere may enable rapid EVA capability for future exploration missions with the risk of DCS = 12%. ? EVA could begin immediately at 6.0 psi, with crewmembers decreasing suit pressure to 4.3 psi after completing the 15-minute in-suit prebreathe. 3. Model predictions suggest that intermittent recompression during exploration EVA may reduce decompression stress by 1.8% to 2.3% for 6 hours of total EVA time. Savings in gas consumables and crew time may be accumulated by abbreviating the EVA suit N2 purge to 2 minutes (20% N2) compared with 8 minutes (5% N2) at the expense of an increase in estimated decompression risk of up to 2.4% for an 8-hour EVA. ? Increased DCS risk could be offset by IR or by spending additional time at 6 psi at the beginning of the EVA. ? Savings of 0.48 lb of gas and 6 minutes per person per EVA corresponds to more than 31 hours of crew time and 1800 lb of gas and tankage under the Constellation lunar architecture. 6. Further research is needed to characterize and optimize breathing mixtures and intermittent recompression across the range of environments and operational conditions in which astronauts will live and work during future exploration missions. 7. Development of exploration prebreathe protocols will begin with definition of acceptable risk, followed by development of protocols based on models such as ours, and, ultimately, validation of protocols through ground trials before operational implementation.

  18. Can we Replace Arterial Blood Gas Analysis by Pulse Oximetry in Neonates with Respiratory Distress Syndrome, who are Treated According to INSURE Protocol?

    PubMed Central

    Niknafs, Pedram; Norouzi, Elahe; Bahman Bijari, Bahareh; Baneshi, Mohammad Reza

    2015-01-01

    Neonates with respiratory distress syndrome (RDS), who are treated according to INSURE protocol; require arterial blood gas (ABG) analysis to decide on appropriate management. We conducted this study to investigate the validity of pulse oximetry instead of frequent ABG analysis in the evaluation of these patients. From a total of 193 blood samples obtained from 30 neonates <1500 grams with RDS, 7.2% were found to have one or more of the followings: acidosis, hypercapnia, or hypoxemia. We found that pulse oximetry in the detection of hyperoxemia had a good validity to appropriately manage patients without blood gas analysis. However, the validity of pulse oximetry was not good enough to detect acidosis, hypercapnia, and hypoxemia. PMID:25999627

  19. The atmospheric inventory of Xenon and noble cases in shales The plastic bag experiment

    NASA Technical Reports Server (NTRS)

    Bernatowicz, T. J.; Podosek, F. A.; Honda, M.; Kramer, F. E.

    1984-01-01

    A novel trapped gas analysis protocol is applied to five shales in which the samples are sealed in air to eliminate the possibility of gas loss in the preanalysis laboratory vacuum exposure of a conventional protocol. The test is aimed at a determination concerning the hypothesis that atmospheric noble gases occur in the same proportion as planetary gases in meteorites, and that the factor-of-23 deficiency of air Xe relative to planetary Xe is made up by Xe stored in shales or other sedimentary rocks. The results obtained do not support the shale hypothesis.

  20. Multi-site assessment of the precision and reproducibility of multiple reaction monitoring–based measurements of proteins in plasma

    PubMed Central

    Addona, Terri A; Abbatiello, Susan E; Schilling, Birgit; Skates, Steven J; Mani, D R; Bunk, David M; Spiegelman, Clifford H; Zimmerman, Lisa J; Ham, Amy-Joan L; Keshishian, Hasmik; Hall, Steven C; Allen, Simon; Blackman, Ronald K; Borchers, Christoph H; Buck, Charles; Cardasis, Helene L; Cusack, Michael P; Dodder, Nathan G; Gibson, Bradford W; Held, Jason M; Hiltke, Tara; Jackson, Angela; Johansen, Eric B; Kinsinger, Christopher R; Li, Jing; Mesri, Mehdi; Neubert, Thomas A; Niles, Richard K; Pulsipher, Trenton C; Ransohoff, David; Rodriguez, Henry; Rudnick, Paul A; Smith, Derek; Tabb, David L; Tegeler, Tony J; Variyath, Asokan M; Vega-Montoto, Lorenzo J; Wahlander, Åsa; Waldemarson, Sofia; Wang, Mu; Whiteaker, Jeffrey R; Zhao, Lei; Anderson, N Leigh; Fisher, Susan J; Liebler, Daniel C; Paulovich, Amanda G; Regnier, Fred E; Tempst, Paul; Carr, Steven A

    2010-01-01

    Verification of candidate biomarkers relies upon specific, quantitative assays optimized for selective detection of target proteins, and is increasingly viewed as a critical step in the discovery pipeline that bridges unbiased biomarker discovery to preclinical validation. Although individual laboratories have demonstrated that multiple reaction monitoring (MRM) coupled with isotope dilution mass spectrometry can quantify candidate protein biomarkers in plasma, reproducibility and transferability of these assays between laboratories have not been demonstrated. We describe a multilaboratory study to assess reproducibility, recovery, linear dynamic range and limits of detection and quantification of multiplexed, MRM-based assays, conducted by NCI-CPTAC. Using common materials and standardized protocols, we demonstrate that these assays can be highly reproducible within and across laboratories and instrument platforms, and are sensitive to low µg/ml protein concentrations in unfractionated plasma. We provide data and benchmarks against which individual laboratories can compare their performance and evaluate new technologies for biomarker verification in plasma. PMID:19561596

  1. Specification and Verification of Web Applications in Rewriting Logic

    NASA Astrophysics Data System (ADS)

    Alpuente, María; Ballis, Demis; Romero, Daniel

    This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through a communicating protocol abstracting HTTP. The proposed framework includes a scripting language that is powerful enough to model the dynamics of complex Web applications by encompassing the main features of the most popular Web scripting languages (e.g. PHP, ASP, Java Servlets). We also provide a detailed characterization of browser actions (e.g. forward/backward navigation, page refresh, and new window/tab openings) via rewrite rules, and show how our models can be naturally model-checked by using the Linear Temporal Logic of Rewriting (LTLR), which is a Linear Temporal Logic specifically designed for model-checking rewrite theories. Our formalization is particularly suitable for verification purposes, since it allows one to perform in-depth analyses of many subtle aspects related to Web interaction. Finally, the framework has been completely implemented in Maude, and we report on some successful experiments that we conducted by using the Maude LTLR model-checker.

  2. A Multidimensional Theory of Suicide.

    PubMed

    Leenaars, Antoon A; Dieserud, Gudrun; Wenckstern, Susanne; Dyregrov, Kari; Lester, David; Lyke, Jennifer

    2018-04-05

    Theory is the foundation of science; this is true in suicidology. Over decades of studies of suicide notes, Leenaars developed a multidimensional model of suicide, with international (crosscultural) studies and independent verification. To corroborate Leenaars's theory with a psychological autopsy (PA) study, examining age and sex of the decedent, and survivor's relationship to deceased. A PA study in Norway, with 120 survivors/informants was undertaken. Leenaars' theoretical-conceptual (protocol) analysis was undertaken of the survivors' narratives and in-depth interviews combined. Substantial interjudge reliability was noted (κ = .632). Overall, there was considerable confirmatory evidence of Leenaars's intrapsychic and interpersonal factors in suicide survivors' narratives. Differences were found in the age of the decedent, but not in sex, nor in the survivor's closeness of the relationship. Older deceased people were perceived to exhibit more heightened unbearable intrapsychic pain, associated with the suicide. Leenaars's theory has corroborative verification, through the decedents' suicide notes and the survivors' narratives. However, the multidimensional model needs further testing to develop a better evidence-based way of understanding suicide.

  3. Novel protocol for highly efficient gas-phase chemical derivatization of surface amine groups using trifluoroacetic anhydride

    NASA Astrophysics Data System (ADS)

    Duchoslav, Jiri; Kehrer, Matthias; Hinterreiter, Andreas; Duchoslav, Vojtech; Unterweger, Christoph; Fürst, Christian; Steinberger, Roland; Stifter, David

    2018-06-01

    In the current work, chemical derivatization of amine (NH2) groups with trifluoroacetic anhydride (TFAA) as an analytical method to improve the information scope of X-ray photoelectron spectroscopy (XPS) is investigated. TFAA is known to successfully label hydroxyl (OH) groups. With the introduction of a newly developed gas-phase derivatization protocol conducted at ambient pressure and using a catalyst also NH2 groups can now efficiently be labelled with a high yield and without the formation of unwanted by-products. By establishing a comprehensive and self-consistent database of reference binding energies for XPS a promising approach for distinguishing hydroxyl from amine groups is presented. The protocol was verified on different polymers, including poly(allylamine), poly(ethyleneimine), poly(vinylalcohol) and chitosan, the latter one containing both types of addressed chemical groups.

  4. TH-A-BRC-03: AAPM TG218: Measurement Methods and Tolerance Levels for Patient-Specific IMRT Verification QA

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miften, M.

    2016-06-15

    AAPM TG-135U1 QA for Robotic Radiosurgery - Sonja Dieterich Since the publication of AAPM TG-135 in 2011, the technology of robotic radiosurgery has rapidly developed. AAPM TG-135U1 will provide recommendations on the clinical practice for using the IRIS collimator, fiducial-less real-time motion tracking, and Monte Carlo based treatment planning. In addition, it will summarize currently available literature about uncertainties. Learning Objectives: Understand the progression of technology since the first TG publication Learn which new QA procedures should be implemented for new technologies Be familiar with updates to clinical practice guidelines AAPM TG-178 Gamma Stereotactic Radiosurgery Dosimetry and Quality Assurance -more » Steven Goetsch Purpose: AAPM Task Group 178 Gamma Stereotactic Radiosurgery Dosimetry and Quality Assurance was formed in August, 2008. The Task Group has 12 medical physicists, two physicians and two consultants. Methods: A round robin dosimetry intercomparison of proposed ionization chambers, electrometer and dosimetry phantoms was conducted over a 15 month period in 2011 and 2012 (Med Phys 42, 11, Nov, 2015). The data obtained at 9 institutions (with ten different Elekta Gamma Knife units) was analyzed by the lead author using several protocols. Results: The most consistent results were obtained using the Elekta ABS 16cm diameter phantom, with the TG-51 protocol modified as recommended by Alfonso et al (Med Phys 35, 11, Nov 2008). A key white paper (Med Phys, in press) sponsored by Elekta Corporation, was used to obtain correction factors for the ionization chambers and phantoms used in this intercomparison. Consistent results were obtained for both Elekta Gamma Knife Model 4C and Gamma Knife Perfexion units as measured with each of two miniature ionization chambers. Conclusion: The full report gives clinical history and background of gamma stereotactic radiosurgery, clinical examples and history, quality assurance recommendations and outline of possible dosimetry protocols. The report will be reviewed by the AAPM Working Group on Recommendations for Radiotherapy External Beam Quality Assurance and then by the AAPM Science Council before publication in Medical Physics Survey of possible calibration protocols for calibration of Gamma Stereotactic Radiosurgery (GSR) devices Overview of modern Quality Assurance techniques for GSR AAPM TG-218 Tolerance Levels and Methodologies for IMRT Verification QA - Moyed Miften Patient-specific IMRT QA measurement is a process designed to identify discrepancies between calculated and delivered doses. Error tolerance limits are not well-defined or consistently applied across centers. The AAPM TG-218 report has been prepared to improve the understanding and consistency of this process by providing recommendations for methodologies and tolerance limits in patient-specific IMRT QA. Learning Objectives: Review measurement methods and methodologies for absolute dose verification Provide recommendations on delivery methods, data interpretation, the use of analysis routines and choice of tolerance limits for IMRT QA Sonja Dieterich has a research agreement with Sun Nuclear Inc. Steven Goetsch is a part-time consultant for Elekta.« less

  5. THERMTRAJ: A FORTRAN program to compute the trajectory and gas film temperatures of zero pressure balloons

    NASA Technical Reports Server (NTRS)

    Horn, W. J.; Carlson, L. A.

    1983-01-01

    A FORTRAN computer program called THERMTRAJ is presented which can be used to compute the trajectory of high altitude scientific zero pressure balloons from launch through all subsequent phases of the balloon flight. In addition, balloon gas and film temperatures can be computed at every point of the flight. The program has the ability to account for ballasting, changes in cloud cover, variable atmospheric temperature profiles, and both unconditional valving and scheduled valving of the balloon gas. The program was verified for an extensive range of balloon sizes (from 0.5 to 41.47 million cubic feet). Instructions on program usage, listing of the program source deck, input data and printed and plotted output for a verification case are included.

  6. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  7. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  8. Single-photon quantum key distribution in the presence of loss

    NASA Astrophysics Data System (ADS)

    Curty, Marcos; Moroder, Tobias

    2007-05-01

    We investigate two-way and one-way single-photon quantum key distribution (QKD) protocols in the presence of loss introduced by the quantum channel. Our analysis is based on a simple precondition for secure QKD in each case. In particular, the legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. We show that both criteria can be formulated as a convex optimization problem known as a semidefinite program, which can be efficiently solved. Moreover, we prove that the solution to the dual optimization corresponds to the evaluation of an optimal witness operator that belongs to the minimal verification set of them for the given two-way (or one-way) QKD protocol. A positive expectation value of this optimal witness operator states that no secret key can be distilled from the available measurements results. We apply such analysis to several well-known single-photon QKD protocols under losses.

  9. New Cost-Effective Method for Long-Term Groundwater Monitoring Programs

    DTIC Science & Technology

    2013-05-01

    with a small-volume, gas -tight syringe (< 1 mL) and injected directly into the field-portable GC. Alternatively, the well headspace sample can be...according to manufacturers’ protocols. Isobutylene was used as the calibration standard for the PID. The standard gas mixtures were used for 3-point...monitoring wells are being evaluated: 1) direct headspace sampling, 2) sampling tube with gas permeable membrane, and 3) gas -filled passive vapor

  10. ALT-114 and ALT-118 Alternative Approaches to NIST-Traceable Reference Gases

    EPA Science Inventory

    In 2016, US EPA approved two separate alternatives (ALT 114 and ALT 118) for the preparation and certification of Hydrogen Chloride (HCl) and Mercury (Hg) cylinder reference gas standards that can serve as EPA Protocol gases where EPA Protocol are required, but unavailable. The a...

  11. DEVELOPMENT AND APPLICATION OF PROTOCOLS FOR EVALUATION OF OIL SPILL BIOREMEDIATION (RESEARCH BRIEF)

    EPA Science Inventory

    Protocols were developed and evaluated to assess the efficacy and environmental safety of commercial oil spill bioremediation agents (CBAs). Test systems that simulate oil slicks on open water or oiled sandy beaches were used to test the effectiveness of CBAs. Gravimetric and gas...

  12. The Use of Gas Chromatography for Biogas Analysis

    NASA Astrophysics Data System (ADS)

    Andersen, Amanda; Seeley, John; Aurandt, Jennifer

    2010-04-01

    Energy from natural gas accounts for 24 percent of energy consumed in the US. Natural gas is a robust form of energy which is rich in methane content and is low in impurities. This quality suggests that it is a very clean and safe gas; it can be used in providing heat, a source for cooking, and in powering vehicles. The downside is that it is a non-renewable resource. On the contrary, methane rich gas that is produced by the breakdown of organic material in an anaerobic environment, called biogas, is a renewable energy source. This research focuses on the gas analysis portion of the creation of the anaerobic digestion and verification laboratory where content and forensic analysis of biogas is performed. Gas Chromatography is implemented as the optimal analytical tool for quantifying the components of the biogas including methane, carbon dioxide, hydrogen sulfide and siloxanes. In addition, the problems associated with the undesirable components are discussed. Anaerobic digestion of primary sludge has consistently produced about 55 percent methane; future goals of this research include studying different substrates to increase the methane yield and decrease levels of impurities in the gas.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grigg, Reid; McPherson, Brian; Lee, Rober

    The Southwest Regional Partnership on Carbon Sequestration (SWP) one of seven regional partnerships sponsored by the U.S. Department of Energy (USDOE) carried out five field pilot tests in its Phase II Carbon Sequestration Demonstration effort, to validate the most promising sequestration technologies and infrastructure concepts, including three geologic pilot tests and two terrestrial pilot programs. This field testing demonstrated the efficacy of proposed sequestration technologies to reduce or offset greenhouse gas emissions in the region. Risk mitigation, optimization of monitoring, verification, and accounting (MVA) protocols, and effective outreach and communication were additional critical goals of these field validation tests. Themore » program included geologic pilot tests located in Utah, New Mexico, Texas, and a region-wide terrestrial analysis. Each geologic sequestration test site was intended to include injection of a minimum of ~75,000 tons/year CO{sub 2}, with minimum injection duration of one year. These pilots represent medium- scale validation tests in sinks that host capacity for possible larger-scale sequestration operations in the future. These validation tests also demonstrated a broad variety of carbon sink targets and multiple value-added benefits, including testing of enhanced oil recovery and sequestration, enhanced coalbed methane production and a geologic sequestration test combined with a local terrestrial sequestration pilot. A regional terrestrial sequestration demonstration was also carried out, with a focus on improved terrestrial MVA methods and reporting approaches specific for the Southwest region.« less

  14. Technology Innovation for the CTBT, the National Laboratory Contribution

    NASA Astrophysics Data System (ADS)

    Goldstein, W. H.

    2016-12-01

    The Comprehensive Nuclear-Test-Ban Treaty (CTBT) and its Protocol are the result of a long history of scientific engagement and international technical collaboration. The U.S. Department of Energy National Laboratories have been conducting nuclear explosive test-ban research for over 50 years and have made significant contributions to this legacy. Recent examples include the RSTT (regional seismic travel time) computer code and the Smart Sampler—both of these products are the result of collaborations among Livermore, Sandia, Los Alamos, and Pacific Northwest National Laboratories. The RSTT code enables fast and accurate seismic event locations using regional data. This code solves the long-standing problem of using teleseismic and regional seismic data together to locate events. The Smart Sampler is designed for use in On-site Inspections to sample soil gases to look for noble gas fission products from a potential underground nuclear explosive test. The Smart Sampler solves the long-standing problem of collecting soil gases without contaminating the sample with gases from the atmosphere by operating only during atmospheric low-pressure events. Both these products are being evaluated by the Preparatory Commission for the CTBT Organization and the international community. In addition to R&D, the National Laboratories provide experts to support U.S. policy makers in ongoing discussions such as CTBT Working Group B, which sets policy for the development of the CTBT monitoring and verification regime.

  15. Investigation of the trajectories and length of combustible gas jet flames in a sweeping air stream

    NASA Astrophysics Data System (ADS)

    Polezhaev, Yu. V.; Mostinskii, I. L.; Lamden, D. I.; Stonik, O. G.

    2011-05-01

    The trajectories of round gas jets and jet flames introduced into a sweeping air stream are studied. The influence of various initial conditions and of the physical properties of gases on the trajectory is considered. Experimental verification of the available approximation relations for the trajectories of flames in a wide range of the values of the blowing ratio has been carried out. It is shown that the newly obtained experimental approximation of the trajectory shape differs from the existing ones by about 20%. At small values of the blowing ratio (smaller than ~4.5) the flame trajectories cease to depend on it.

  16. Research on energy efficiency design index for sea-going LNG carriers

    NASA Astrophysics Data System (ADS)

    Lin, Yan; Yu, Yanyun; Guan, Guan

    2014-12-01

    This paper describes the characteristics of liquefied natural gas (LNG) carriers briefly. The LNG carrier includes power plant selection, vapor treatment, liquid cargo tank type, etc. Two parameters—fuel substitution rate and recovery of boil of gas (BOG) volume to energy efficiency design index (EEDI) formula are added, and EEDI formula of LNG carriers is established based on ship EEDI formula. Then, based on steam turbine propulsion device of LNG carriers, mathematical models of LNG carriers' reference line value are established in this paper. By verification, the EEDI formula of LNG carriers described in this paper can provide a reference for LNG carrier EEDI calculation and green shipbuilding.

  17. Wastewater GHG Accounting Protocols as Compared to the State of GHG Science.

    PubMed

    Willis, John L; Yuan, Zhiguo; Murthy, Sudhir

    2016-08-01

    Greenhouse gas (GHG) accounting protocols have addressed emissions from wastewater conveyance and treatment using a variety of simplifying methodologies. While these methodologies vary to some degree by protocol, within each protocol they provide consistent tools for organizational entities of varying size and scope to report and verify GHG emissions. Much of the science supporting these methodologies is either limited or the protocols have failed to keep abreast of developing GHG research. This state-of-the-art review summarizes the sources of direct GHG emissions (both those covered and not covered in current protocols) from wastewater handling; provides a review of the wastewater-related methodologies in a select group of popular protocols; and discusses where research has out-paced protocol methodologies and other areas where the supporting science is relatively weak and warrants further exploration.

  18. 40 CFR 1065.341 - CVS, PFD, and batch sampler verification (propane check).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... may use the HC contamination procedure in § 1065.520(f) to verify HC contamination. Otherwise, zero... range that can measure the C3H8 concentration expected for the CVS and C3H8 flow rates. (2) Zero the HC analyzer using zero air introduced at the analyzer port. (3) Span the HC analyzer using C3H8 span gas...

  19. 40 CFR 1065.341 - CVS and batch sampler verification (propane check).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... may use the HC contamination procedure in § 1065.520(g) to verify HC contamination. Otherwise, zero... range that can measure the C3H8 concentration expected for the CVS and C3H8 flow rates. (2) Zero the HC analyzer using zero air introduced at the analyzer port. (3) Span the HC analyzer using C3H8 span gas...

  20. 40 CFR 1065.341 - CVS and batch sampler verification (propane check).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... may use the HC contamination procedure in § 1065.520(g) to verify HC contamination. Otherwise, zero... range that can measure the C3H8 concentration expected for the CVS and C3H8 flow rates. (2) Zero the HC analyzer using zero air introduced at the analyzer port. (3) Span the HC analyzer using C3H8 span gas...

  1. Environmental Technology Verification Test Report of Mobile Source Selective Catalytic Reduction, Johnson Matthey SCCRT, Version 1, Selective Catalytic Reduction Technology with a Catalyzed Continuously Regenerating Trap

    EPA Science Inventory

    The Johnson Matthey SCCRT, v.1 technology is a urea-based SCR system combined with a CCRT filter designed for on-highway light, medium, and heavy heavy-duty diesel, urban and non-urban, bus exhaust gas recirculation (EGR)-or non-EGR-equipped engines for use with commercial ultra-...

  2. Specifying real-time systems with interval logic

    NASA Technical Reports Server (NTRS)

    Rushby, John

    1988-01-01

    Pure temporal logic makes no reference to time. An interval temporal logic and an extension to that logic which includes real time constraints are described. The application of this logic by giving a specification for the well-known lift (elevator) example is demonstrated. It is shown how interval logic can be extended to include a notion of process. How the specification language and verification environment of EHDM could be enhanced to support this logic is described. A specification of the alternating bit protocol in this extended version of the specification language of EHDM is given.

  3. Middleware Trade Study for NASA Domain

    NASA Technical Reports Server (NTRS)

    Bowman, Dan

    2007-01-01

    This presentation presents preliminary results of a trade study designed to assess three distributed simulation middleware technologies for support of the NASA Constellation Distributed Space Exploration Simulation (DSES) project and Test and Verification Distributed System Integration Laboratory (DSIL). The technologies are: the High Level Architecture (HLA), the Test and Training Enabling Architecture (TENA), and an XML-based variant of Distributed Interactive Simulation (DIS-XML) coupled with the Extensible Messaging and Presence Protocol (XMPP). According to the criteria and weights determined in this study, HLA scores better than the other two for DSES as well as the DSIL

  4. Experimental Blind Quantum Computing for a Classical Client.

    PubMed

    Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C; Lu, Chao-Yang; Pan, Jian-Wei

    2017-08-04

    To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.

  5. Experimental Blind Quantum Computing for a Classical Client

    NASA Astrophysics Data System (ADS)

    Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C.; Lu, Chao-Yang; Pan, Jian-Wei

    2017-08-01

    To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.

  6. Biological weapons and bioterrorism in the first years of the twenty-first century.

    PubMed

    Leitenberg, Milton

    2002-09-01

    This paper evaluates four recent developments in biological-weapons politics and bioterrorism. First is American opposition to finalization of a verification protocol for the Biological Weapons Convention; second, a successful attempt at mass-casualty terrorism; third, an ongoing investigation into the bioterrorist capabilities of the al Qaeda network; and, fourth, a series of fatal anthrax attacks in the United States. The first of these evaluations is informed by interviews conducted between 2000 and 2002 with policy principals in the United States and elsewhere.

  7. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  8. The preparation of Drosophila embryos for live-imaging using the hanging drop protocol.

    PubMed

    Reed, Bruce H; McMillan, Stephanie C; Chaudhary, Roopali

    2009-03-13

    Green fluorescent protein (GFP)-based timelapse live-imaging is a powerful technique for studying the genetic regulation of dynamic processes such as tissue morphogenesis, cell-cell adhesion, or cell death. Drosophila embryos expressing GFP are readily imaged using either stereoscopic or confocal microscopy. A goal of any live-imaging protocol is to minimize detrimental effects such as dehydration and hypoxia. Previous protocols for preparing Drosophila embryos for live-imaging analysis have involved placing dechorionated embryos in halocarbon oil and sandwiching them between a halocarbon gas-permeable membrane and a coverslip. The introduction of compression through mounting embryos in this manner represents an undesirable complication for any biomechanical-based analysis of morphogenesis. Our method, which we call the hanging drop protocol, results in excellent viability of embryos during live imaging and does not require that embryos be compressed. Briefly, the hanging drop protocol involves the placement of embryos in a drop of halocarbon oil that is suspended from a coverslip, which is, in turn, fixed in position over a humid chamber. In addition to providing gas exchange and preventing dehydration, this arrangement takes advantage of the buoyancy of embryos in halocarbon oil to prevent them from drifting out of position during timelapse acquisition. This video describes in detail how to collect and prepare Drosophila embryos for live imaging using the hanging drop protocol. This protocol is suitable for imaging dechorionated embryos using stereomicroscopy or any upright compound fluorescence microscope.

  9. Formal Consistency Verification of Deliberative Agents with Respect to Communication Protocols

    NASA Technical Reports Server (NTRS)

    Ramirez, Jaime; deAntonio, Angelica

    2004-01-01

    The aim of this paper is to show a method that is able to detect inconsistencies in the reasoning carried out by a deliberative agent. The agent is supposed to be provided with a hybrid Knowledge Base expressed in a language called CCR-2, based on production rules and hierarchies of frames, which permits the representation of non-monotonic reasoning, uncertain reasoning and arithmetic constraints in the rules. The method can give a specification of the scenarios in which the agent would deduce an inconsistency. We define a scenario to be a description of the initial agent s state (in the agent life cycle), a deductive tree of rule firings, and a partially ordered set of messages and/or stimuli that the agent must receive from other agents and/or the environment. Moreover, the method will make sure that the scenarios will be valid w.r.t. the communication protocols in which the agent is involved.

  10. Predicting Shear Transformation Events in Metallic Glasses

    NASA Astrophysics Data System (ADS)

    Xu, Bin; Falk, Michael L.; Li, J. F.; Kong, L. T.

    2018-03-01

    Shear transformation is the elementary process for plastic deformation of metallic glasses, the prediction of the occurrence of the shear transformation events is therefore of vital importance to understand the mechanical behavior of metallic glasses. In this Letter, from the view of the potential energy landscape, we find that the protocol-dependent behavior of shear transformation is governed by the stress gradient along its minimum energy path and we propose a framework as well as an atomistic approach to predict the triggering strains, locations, and structural transformations of the shear transformation events under different shear protocols in metallic glasses. Verification with a model Cu64 Zr36 metallic glass reveals that the prediction agrees well with athermal quasistatic shear simulations. The proposed framework is believed to provide an important tool for developing a quantitative understanding of the deformation processes that control mechanical behavior of metallic glasses.

  11. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  12. Predicting Shear Transformation Events in Metallic Glasses.

    PubMed

    Xu, Bin; Falk, Michael L; Li, J F; Kong, L T

    2018-03-23

    Shear transformation is the elementary process for plastic deformation of metallic glasses, the prediction of the occurrence of the shear transformation events is therefore of vital importance to understand the mechanical behavior of metallic glasses. In this Letter, from the view of the potential energy landscape, we find that the protocol-dependent behavior of shear transformation is governed by the stress gradient along its minimum energy path and we propose a framework as well as an atomistic approach to predict the triggering strains, locations, and structural transformations of the shear transformation events under different shear protocols in metallic glasses. Verification with a model Cu_{64}Zr_{36} metallic glass reveals that the prediction agrees well with athermal quasistatic shear simulations. The proposed framework is believed to provide an important tool for developing a quantitative understanding of the deformation processes that control mechanical behavior of metallic glasses.

  13. A Conceptual Design for a Reliable Optical Bus (ROBUS)

    NASA Technical Reports Server (NTRS)

    Miner, Paul S.; Malekpour, Mahyar; Torres, Wilfredo

    2002-01-01

    The Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) is a new family of fault-tolerant architectures under development at NASA Langley Research Center (LaRC). The SPIDER is a general-purpose computational platform suitable for use in ultra-reliable embedded control applications. The design scales from a small configuration supporting a single aircraft function to a large distributed configuration capable of supporting several functions simultaneously. SPIDER consists of a collection of simplex processing elements communicating via a Reliable Optical Bus (ROBUS). The ROBUS is an ultra-reliable, time-division multiple access broadcast bus with strictly enforced write access (no babbling idiots) providing basic fault-tolerant services using formally verified fault-tolerance protocols including Interactive Consistency (Byzantine Agreement), Internal Clock Synchronization, and Distributed Diagnosis. The conceptual design of the ROBUS is presented in this paper including requirements, topology, protocols, and the block-level design. Verification activities, including the use of formal methods, are also discussed.

  14. Gas chromatography-mass spectrometric studies of O-alkyl O-2-(N,N-dialkylamino) ethyl alkylphosphonites(phosphonates) for chemical weapons convention verification.

    PubMed

    Saeidian, Hamid; Babri, Mehran; Ramezani, Atefeh; Ashrafi, Davood; Sarabadani, Mansour; Naseri, Mohammad Taghi

    2013-01-01

    The electron ionization (EI) mass spectra of a series of O-alkyl O-2-(N,N-dialkylaminolethyl alkylphosphonites(phosphonates), which are precursors of nerve agents, were studied for Chemical Weapons Convention (CWC) verification. General El fragmentation pathways were constructed and discussed. Proposed fragment structures were confirmed through analyzing fragment ions of deuterated analogs and density functional theory (DFT) calculations. The observed fragment ions are due to different fragmentation pathways such as hydrogen and McLafferty+1 rearrangements, alkene, amine and alkoxy elimination by alpha- or beta-cleavage process. Fragment ions distinctly allow unequivocal identification of the interested compounds including those of isomeric compounds. The presence and abundance of fragment ions were found to depend on the size and structure of the alkyl group attached to nitrogen, phosphorus and oxygen atoms.

  15. Open-Source Software in Computational Research: A Case Study

    DOE PAGES

    Syamlal, Madhava; O'Brien, Thomas J.; Benyahia, Sofiane; ...

    2008-01-01

    A case study of open-source (OS) development of the computational research software MFIX, used for multiphase computational fluid dynamics simulations, is presented here. The verification and validation steps required for constructing modern computational software and the advantages of OS development in those steps are discussed. The infrastructure used for enabling the OS development of MFIX is described. The impact of OS development on computational research and education in gas-solids flow, as well as the dissemination of information to other areas such as geophysical and volcanology research, is demonstrated. This study shows that the advantages of OS development were realized inmore » the case of MFIX: verification by many users, which enhances software quality; the use of software as a means for accumulating and exchanging information; the facilitation of peer review of the results of computational research.« less

  16. Combining Space Geodesy, Seismology, and Geochemistry for Monitoring Verification and Accounting of CO 2 in Sequestration Sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swart, Peter K.; Dixon, Tim

    2014-09-30

    A series of surface geophysical and geochemical techniques are tested in order to demonstrate and validate low cost approaches for Monitoring, Verification and Accounting (MVA) of the integrity of deep reservoirs for CO 2 storage. These techniques are (i) surface deformation by GPS; ii) surface deformation by InSAR; iii) passive source seismology via broad band seismometers; and iv) soil gas monitoring with a cavity ring down spectrometer for measurement of CO 2 concentration and carbon isotope ratio. The techniques were tested at an active EOR (Enhanced Oil Recovery) site in Texas. Each approach has demonstrated utility. Assuming Carbon Capture, Utilizationmore » and Storage (CCUS) activities become operational in the future, these techniques can be used to augment more expensive down-hole techniques.« less

  17. A reference protocol for comparing the biocidal properties of gas plasma generating devices

    NASA Astrophysics Data System (ADS)

    Shaw, A.; Seri, P.; Borghi, C. A.; Shama, G.; Iza, F.

    2015-12-01

    Growing interest in the use of non-thermal, atmospheric pressure gas plasmas for decontamination purposes has resulted in a multiplicity of plasma-generating devices. There is currently no universally approved method of comparing the biocidal performance of such devices and in the work described here spores of the Gram positive bacterium Bacillus subtilis (ATCC 6633) are proposed as a suitable reference biological agent. In order to achieve consistency in the form in which the biological agent in question is presented to the plasma, a polycarbonate membrane loaded with a monolayer of spores is proposed. The advantages of the proposed protocol are evaluated by comparing inactivation tests in which an alternative microorganism (methicillin resistant Staphylococcus aureus—MRSA) and the widely-used sample preparation technique of directly pipetting cell suspensions onto membranes are employed. In all cases, inactivation tests with either UV irradiation or plasma exposure were more reproducible when the proposed protocol was followed.

  18. An Approach to Verification and Validation of a Reliable Multicasting Protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1994-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or offnominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  19. An approach to verification and validation of a reliable multicasting protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  20. SU-G-BRB-15: Verifications of Absolute and Relative Dosimetry of a Novel Stereotactic Breast Device: GammaPodTM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Becker, S; Mossahebi, S; Yi, B

    Purpose: A dedicated stereotactic breast radiotherapy device, GammaPod, was developed to treat early stage breast cancer. The first clinical unit was installed and commissioned at University of Maryland. We report our methodology of absolute dosimetry in multiple calibration conditions and dosimetric verifications of treatment plans produced by the system. Methods: GammaPod unit is comprised of a rotating hemi-spherical source carrier containing 36 Co-60 sources and a concentric tungsten collimator providing beams of 15 and 25 mm. Absolute dose calibration formalism was developed with modifications to AAPM protocols for unique geometry and different calibration medium (acrylic, polyethylene or liquid water). Breastmore » cup-size specific and collimator output factors were measured and verified with respect to Monte-Carlo simulations for single isocenter plans. Multiple isocenter plans were generated for various target size, location and cup-sizes in phantoms and 20 breast cancer patients images. Stereotactic mini-farmer chamber, OSL and TLD detectors as well as radio-chromic films were used for dosimetric measurements. Results: At the time of calibration (1/14/2016), absolute dose rate of the GammaPod was established to be 2.10 Gy/min in acrylic for 25 mm for sources installed in March 2011. Output factor for 15 mm collimator was measured to be 0.950. Absolute dose calibration was independently verified by IROC-Houston with a TLD/Institution ratio of 0.99. Cup size specific output measurements in liquid water for single isocenter were found to be within 3.0% of MC simulations. Point-dose measurements of multiple isocenter treatment plans were found to be within −1.0 ± 1.2 % of treatment planning system while 2-dimensional gamma analysis yielded a pass rate of 97.9 ± 2.2 % using gamma criteria of 3% and 2mm. Conclusion: The first GammaPod treatment unit for breast stereotactic radiotherapy was successfully installed, calibrated and commissioned for patient treatments. An absolute dosimetry and dosimetric verification protocols were successfully created.« less

Top