377 research outputs found
Detection of low energy positive ions by scintillation methods
This thesis deals with the feasibility of efficiently detecting low energy positive ions, those with energies of less than several hundred electron volts, using phosphors.
The scintillation technique, first used visually and greatly improved in the last ten years by the use of a photomultiplier tube, has greatly advanced detection in high energy fields. The photomultiplier is capable of delivering milliampere pulses of current of short duration and these can be registered directly by the many electronic devices currently in use.
Extensive work has been done with phosphors which scintillate under which energy bombardment, due in part to their wide use in the television industry, but very little is known of their use for the detection of low energy positive ions --Introduction, page1
The Simple Assurance Argument Interchange Format (SAAIF) Manual
This document describes the Simple Assurance Argument Interchange Format, a proposed meta-model for describing structured assurance arguments. We describe the syntax and semantics of the model elements, compare the meta-model to existing argument formats, and give an example to illustrate its use
Formal Assurance Arguments: A Solution In Search of a Problem?
An assurance case comprises evidence and argument showing how that evidence supports assurance claims (e.g., about safety or security). It is unsurprising that some computer scientists have proposed formalizing assurance arguments: most associate formality with rigor. But while engineers can sometimes prove that source code refines a formal specification, it is not clear that formalization will improve assurance arguments or that this benefit is worth its cost. For example, formalization might reduce the benefits of argumentation by limiting the audience to people who can read formal logic. In this paper, we present (1) a systematic survey of the literature surrounding formal assurance arguments, (2) an analysis of errors that formalism can help to eliminate, (3) a discussion of existing evidence, and (4) suggestions for experimental work to definitively answer the question
Athletes' perceived use of information sources when forming initial impressions and expectancies of a coach: An explorative study
The study aimed to identify the sources of information that athletes perceive as influential during their initial evaluation of coaching ability. University athletes (N = 538) were asked to indicate the influence of 31 informational cues (e.g., gender, body language or gestures, reputation) on the initial impression formed of a coach. Following exploratory factor analysis, a 3-factor model, (i.e., static cues, dynamic cues, and third-party reports) was extracted. Mean scores revealed that although static cues (e.g., gender, race or ethnicity) were rated as relatively unimportant during impression formation, dynamic cues (e.g., facial expressions, body language or gestures) and third-party reports (e.g., coaching qualifications, reputation.) were viewed by athletes as influential factors in the formation of expectancies about coaches. Such findings have implications for the occurrence of expectancy effects in coach-athlete relationships and the way in which coaches seek to present themselves. © 2008 Human Kinetics, Inc
An Investigation of Proposed Techniques for Quantifying Confidence in Assurance Arguments
The use of safety cases in certification raises the question of assurance argument sufficiency and the issue of confidence (or uncertainty) in the argument's claims. Some researchers propose to model confidence quantitatively and to calculate confidence in argument conclusions. We know of little evidence to suggest that any proposed technique would deliver trustworthy results when implemented by system safety practitioners. Proponents do not usually assess the efficacy of their techniques through controlled experiment or historical study. Instead, they present an illustrative example where the calculation delivers a plausible result. In this paper, we review current proposals, claims made about them, and evidence advanced in favor of them. We then show that proposed techniques can deliver implausible results in some cases. We conclude that quantitative confidence techniques require further validation before they should be recommended as part of the basis for deciding whether an assurance argument justifies fielding a critical system
Planning the Unplanned Experiment: Towards Assessing the Efficacy of Standards for Safety-Critical Software
Safe use of software in safety-critical applications requires well-founded means of determining whether software is fit for such use. While software in industries such as aviation has a good safety record, little is known about whether standards for software in safety-critical applications 'work' (or even what that means). It is often (implicitly) argued that software is fit for safety-critical use because it conforms to an appropriate standard. Without knowing whether a standard works, such reliance is an experiment; without carefully collecting assessment data, that experiment is unplanned. To help plan the experiment, we organized a workshop to develop practical ideas for assessing software safety standards. In this paper, we relate and elaborate on the workshop discussion, which revealed subtle but important study design considerations and practical barriers to collecting appropriate historical data and recruiting appropriate experimental subjects. We discuss assessing standards as written and as applied, several candidate definitions for what it means for a standard to 'work,' and key assessment strategies and study techniques and the pros and cons of each. Finally, we conclude with thoughts about the kinds of research that will be required and how academia, industry, and regulators might collaborate to overcome the noted barriers
Planning the Unplanned Experiment: Assessing the Efficacy of Standards for Safety Critical Software
We need well-founded means of determining whether software is t for use in safety-critical applications. While software in industries such as aviation has an excellent safety record, the fact that software aws have contributed to deaths illustrates the need for justi ably high con dence in software. It is often argued that software is t for safety-critical use because it conforms to a standard for software in safety-critical systems. But little is known about whether such standards `work.' Reliance upon a standard without knowing whether it works is an experiment; without collecting data to assess the standard, this experiment is unplanned. This paper reports on a workshop intended to explore how standards could practicably be assessed. Planning the Unplanned Experiment: Assessing the Ecacy of Standards for Safety Critical Software (AESSCS) was held on 13 May 2014 in conjunction with the European Dependable Computing Conference (EDCC). We summarize and elaborate on the workshop's discussion of the topic, including both the presented positions and the dialogue that ensued
"Evidence" Under a Magnifying Glass: Thoughts on Safety Argument Epistemology
Common definitions of "safety case" emphasize that evidence is the basis of a safety argument, yet few widely referenced works explicitly define "evidence". Their examples suggest that similar things can be regarded as evidence. But the category evidence seems to contain (1) processes for finding things out, (2) information resulting from such processes, and (3) relevant documents. Moreover, any item of evidence could be replaced by further argument. Normative models of informal argumentation do not offer clear guidance on when a safety argument should cite evidence rather than appeal to a more detailed argument. Disciplines such as the law address the problem with a practical, domain-specific epistemology. In this paper, we explore these problems associated with evidence citations in safety arguments, identify goals for a theory of safety argument evidence and a practical safety argument epistemology, propose a model of safety evidence citation that advances the identified goals, and present a related extension to the Goal Structuring Notation (GSN)
Stochastic errors in quantum instruments
Fault-tolerant quantum computation requires non-destructive quantum
measurements with classical feed-forward. Many experimental groups are actively
working towards implementing such capabilities and so they need to be
accurately evaluated. As with unitary channels, an arbitrary imperfect
implementation of a quantum instrument is difficult to analyze. In this paper,
we define a class of quantum instruments that correspond to stochastic errors
and thus are amenable to standard analysis methods. We derive efficiently
computable upper- and lower-bounds on the diamond distance between two quantum
instruments. Furthermore, we show that, for the special case of uniform
stochastic instruments, the diamond distance and the natural generalization of
the process infidelity to quantum instruments coincide and are equal to a
well-defined probability of an error occurring during the measurement
Thermal Analysis of the Divertor Primary Heat Transfer System Piping During the Gas Baking Process
A preliminary analysis has been performed examining the temperature distribution in the Divertor Primary Heat Transfer System (PHTS) piping and the divertor itself during the gas baking process. During gas baking, it is required that the divertor reach a temperature of 350 C. Thermal losses in the piping and from the divertor itself require that the gas supply temperature be maintained above that temperature in order to ensure that all of the divertor components reach the required temperature. The analysis described in this report was conducted in order to estimate the required supply temperature from the gas heater
- âŠ