Academic literature on the topic 'Internal checking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internal checking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internal checking"

1

Rydén, Lars, and Hans Thornander. "FUNCTIONAL CHECKING OF IMPLANTED CARDIAC PACEMAKERS." Acta Medica Scandinavica 188, no. 1-6 (April 24, 2009): 527–40. http://dx.doi.org/10.1111/j.0954-6820.1970.tb08078.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaitanis, N. "Totally self-checking checkers with separate internal fault indication." IEEE Transactions on Computers 37, no. 10 (1988): 1206–13. http://dx.doi.org/10.1109/12.5982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeiffer, Yvonne, Stephan S. Gut, and David L. B. Schwappach. "Medication Safety in Oncology Care: Mapping Checking Procedures From Prescription to Administration of Chemotherapy." Journal of Oncology Practice 14, no. 4 (April 2018): e201-e210. http://dx.doi.org/10.1200/jop.2017.026427.

Full text
Abstract:
Purpose: To increase medication safety in oncology, checking procedures are increasingly applied by nurses, physicians, and pharmacists. However, little is known about the number, types, and consistency of implemented checks. The aim of the study was to assess the number and types of different checking procedures that are performed along the lifecycle of a chemotherapy prescription across three hospitals, different care settings, administration routes, and professional groups. Methods: A scheme to evaluate checking procedures and a mapping approach to illustrate the checks along the phases of the medication process were developed. Checking procedures were assessed on the basis of analysis of internal guidelines and interviews with nurses and physicians who work on wards and in ambulatory infusion units of three hospitals. Results: There were considerable differences in number and type of checking procedures among administration routes, professional groups, wards and ambulatory infusion units, and hospitals. During the prescribing phase, the lowest number of checks was performed. In internal guidelines, checking procedures were documented poorly, though the pharmacy process was an exception. Conclusion: In contrast to the pharmacists, nurse and physician clinician checking procedures are less standardized within and across hospitals. The results point to different checking habits for the professional groups; for example, physicians would rather perform plausibility reviews than checks. Our evaluation scheme to categorize checks and the visualized mapping approach was feasible and understandable for practitioners.
APA, Harvard, Vancouver, ISO, and other styles
4

McClelland, Gary H. "Assessing bias in professional licensing examinations by checking internal consistency." Law and Human Behavior 9, no. 3 (September 1985): 305–18. http://dx.doi.org/10.1007/bf01044507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barratt, Monica J., Michala Kowalski, Isabelle Volpe, and Larissa J. Maier. "On‐site drug checking can provide quantitative analysis." Internal Medicine Journal 50, no. 8 (August 2020): 1022–23. http://dx.doi.org/10.1111/imj.14954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ахмеджанов and K. Akhmedzhanov. "Quality Control of Internal Audit in the Republic of Uzbekistan." Auditor 1, no. 9 (September 17, 2015): 28–32. http://dx.doi.org/10.12737/13229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smit‐Rigter, Laura Alexandra, and Daan Van der Gouwe. "The neglected benefits of drug checking for harm reduction." Internal Medicine Journal 50, no. 8 (August 2020): 1024. http://dx.doi.org/10.1111/imj.14953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chelmowski, M. K. "Checking for fecal occult blood with digital rectal examinations." Archives of Internal Medicine 152, no. 9 (September 1, 1992): 1929a—1929. http://dx.doi.org/10.1001/archinte.152.9.1929a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Selishchev, S. V. "Structural Aspect of Checking the Continuity of the Enterprise during Internal Audit." Statistics of Ukraine 89, no. 2-3 (November 24, 2020): 155–62. http://dx.doi.org/10.31767/su.2-3(89-90)2020.02-03.16.

Full text
Abstract:
The article presents the results of the study and the further development of approaches to assessing the continuity risks associated with the internal audit of the enterprise. Particular attention is given in the article to the organization of internal audit of termination of activity for groups of events or conditions, which alone or in the aggregate may call into question the validity of the assumption of continuity of activity. The purpose of the article is to research and further develop approaches to assessing the risk assessment of the impact of internal audit effectiveness on the auditor’s assessment of the risk of termination of the enterprise. Current practice research shows that the implementation of an element of internal control, such as internal audit, is either not used at all, or is carried out in a purely formal manner. In particular, it concerns the control over the financial statements, which indicate the probability of termination of the enterprise. In turn, the lack or low efficiency of the internal audit service, whose main task is to monitor the internal control system, causes an increase in audit risk of control, which in turn increases the overall level of audit risk. This situation necessitates an increase in volumes and as a result of audit time. In view of the results of the conducted researches of the current practice of functioning of the internal audit service at the enterprises, in most cases there is a purely formal approach to its functions, in particular in the aspect of ensuring control over the financial status indicators, the critical values of which can directly lead to the termination of the activity of the enterprise. The analysis of the scientific and methodological base shows the lack of materials, the organization of an effective system of internal control over strategic financial indicators, and as a consequence of the lack of an effective concept of its monitoring by the internal audit. We have proposed a comprehensive functional model that includes the following elements: 1) setting an assignment for the internal audit service; 2) identification of sources of necessary information and method of assessment of its reliability; 3) conceptual basis for ensuring the performance of internal audit functions.
APA, Harvard, Vancouver, ISO, and other styles
10

Selishchev, S. V. "Structural Aspect of Checking the Continuity of the Enterprise during Internal Audit." Statistics of Ukraine 89, no. 2-3 (November 24, 2020): 155–62. http://dx.doi.org/10.31767/su.2-3(89-90)2020.02-03.16.

Full text
Abstract:
The article presents the results of the study and the further development of approaches to assessing the continuity risks associated with the internal audit of the enterprise. Particular attention is given in the article to the organization of internal audit of termination of activity for groups of events or conditions, which alone or in the aggregate may call into question the validity of the assumption of continuity of activity. The purpose of the article is to research and further develop approaches to assessing the risk assessment of the impact of internal audit effectiveness on the auditor’s assessment of the risk of termination of the enterprise. Current practice research shows that the implementation of an element of internal control, such as internal audit, is either not used at all, or is carried out in a purely formal manner. In particular, it concerns the control over the financial statements, which indicate the probability of termination of the enterprise. In turn, the lack or low efficiency of the internal audit service, whose main task is to monitor the internal control system, causes an increase in audit risk of control, which in turn increases the overall level of audit risk. This situation necessitates an increase in volumes and as a result of audit time. In view of the results of the conducted researches of the current practice of functioning of the internal audit service at the enterprises, in most cases there is a purely formal approach to its functions, in particular in the aspect of ensuring control over the financial status indicators, the critical values of which can directly lead to the termination of the activity of the enterprise. The analysis of the scientific and methodological base shows the lack of materials, the organization of an effective system of internal control over strategic financial indicators, and as a consequence of the lack of an effective concept of its monitoring by the internal audit. We have proposed a comprehensive functional model that includes the following elements: 1) setting an assignment for the internal audit service; 2) identification of sources of necessary information and method of assessment of its reliability; 3) conceptual basis for ensuring the performance of internal audit functions.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Internal checking"

1

Dubois, Joël. "The influence of conditioning on internal checking of high-temperature dried Pacific Coast hemlock." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/29750.

Full text
Abstract:
The purpose of this study was to evaluate the effectiveness of steam conditioning immediately after drying to reduce internal checking resulting from high-temperature drying of Pacific Coast hemlock lumber. Three different levels of conditioning time, 2, 4 and 6 hours, were carried out on 2 inches wide by 4 inches thick by 3 feet long (51 mm by 102 mm by 0.91 m) , and on 4 inches wide by 4 inches thick by 3 feet long (105 mm by 105 mm by 0.91 m), specimens. For comparison purposes, controls of both sizes of specimens were also high-temperature dried without conditioning. Analysis of the results indicated that internal checking was not significantly reduced by steam conditioning and was more likely to develop afterwards during storage at room temperature, and that total degrade observed in the "4x4" specimens was more excessive than that in the "2x4" ones. The defective "4x4" specimens were found over-dried (below the targeted 12% moisture content) with high core-shell moisture content differences. More internal checking was found when the specimens' final moisture content ranged from 7 to 8%.
Forestry, Faculty of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
2

Blakemore, Philip. "Optimisation of steam reconditioning for regrowth-ash and plantation-grown eucalypt species." Thesis, The University of Sydney, 2008. http://hdl.handle.net/2123/2343.

Full text
Abstract:
Steam reconditioning to recover collapse, in mid to low density eucalypt species, has been known for over ninety years. The current industrial practices for steam reconditioning have largely been based on a few older studies, which were often poorly documented and based on very small sample sizes. On top of this, many local practices and ‘rules of thumb’ have developed over time, many of which have a questionable scientific basis. This thesis was undertaken to more rigorously investigate and fundamentally understand collapse recovery, and try to optimise its application. The most obvious variable that kiln operators have control over is the moisture content of the timber prior to steam reconditioning. Experiments were undertaken to generate a range of moisture gradients (ranging from minimal to more industrially realistic) to evaluate the effect of moisture content on collapse recovery. An optimal moisture content for the core of the boards was found to be between about 18–20%, although there was no statistical difference in recoveries between about 17–25% moisture content. Below 15% moisture content recovery dropped off severely and intra-ring internal checking closure was incomplete, while at 25% moisture content an increased level of normal shrinkage, due to the early removal of drying stresses, was the main drawback. Above a core moisture content of about 35% incomplete closure of intra-ring internal checks was again observed. There was little evidence of re-collapse occurring in these high moisture content samples. Previously established relationships between density and collapse and drying rate were again generally observed in these experiments. However, for the first time an effect of collapse in reducing the fitted drying diffusion coefficients was also observed. It was also observed that, provided the moisture content of the board was in the critical range, most of the collapse recovery was achieved in the time it took to get the core of the board up to the steaming temperature of close to 100°C. This suggests that for most thicknesses a conservative reconditioning period of two hours at temperature is all that is required. This recommended shortening of the reconditioning cycle could dramatically increase the throughput of timber through the steam reconditioning chambers. Alternatively, it could mean that where modern final drying kilns are being used, the reconditioning treatment could be carried out within the final drying kiln. A finite element model was developed to demonstrate the mechanism by which collapse recovery occurs. The theory tested was that the elastic component that stores the energy to restore the shape of the deformed cell is primarily found in the S1 and S3 layers. In contrast, the inelastic component is primarily found in the S2 layer. The model generated here provided limited support for this theory.
APA, Harvard, Vancouver, ISO, and other styles
3

Blakemore, Philip. "Optimisation of steam reconditioning for regrowth-ash and plantation-grown eucalypt species." University of Sydney, 2008. http://hdl.handle.net/2123/2343.

Full text
Abstract:
Doctor of Philosophy
Steam reconditioning to recover collapse, in mid to low density eucalypt species, has been known for over ninety years. The current industrial practices for steam reconditioning have largely been based on a few older studies, which were often poorly documented and based on very small sample sizes. On top of this, many local practices and ‘rules of thumb’ have developed over time, many of which have a questionable scientific basis. This thesis was undertaken to more rigorously investigate and fundamentally understand collapse recovery, and try to optimise its application. The most obvious variable that kiln operators have control over is the moisture content of the timber prior to steam reconditioning. Experiments were undertaken to generate a range of moisture gradients (ranging from minimal to more industrially realistic) to evaluate the effect of moisture content on collapse recovery. An optimal moisture content for the core of the boards was found to be between about 18–20%, although there was no statistical difference in recoveries between about 17–25% moisture content. Below 15% moisture content recovery dropped off severely and intra-ring internal checking closure was incomplete, while at 25% moisture content an increased level of normal shrinkage, due to the early removal of drying stresses, was the main drawback. Above a core moisture content of about 35% incomplete closure of intra-ring internal checks was again observed. There was little evidence of re-collapse occurring in these high moisture content samples. Previously established relationships between density and collapse and drying rate were again generally observed in these experiments. However, for the first time an effect of collapse in reducing the fitted drying diffusion coefficients was also observed. It was also observed that, provided the moisture content of the board was in the critical range, most of the collapse recovery was achieved in the time it took to get the core of the board up to the steaming temperature of close to 100°C. This suggests that for most thicknesses a conservative reconditioning period of two hours at temperature is all that is required. This recommended shortening of the reconditioning cycle could dramatically increase the throughput of timber through the steam reconditioning chambers. Alternatively, it could mean that where modern final drying kilns are being used, the reconditioning treatment could be carried out within the final drying kiln. A finite element model was developed to demonstrate the mechanism by which collapse recovery occurs. The theory tested was that the elastic component that stores the energy to restore the shape of the deformed cell is primarily found in the S1 and S3 layers. In contrast, the inelastic component is primarily found in the S2 layer. The model generated here provided limited support for this theory.
APA, Harvard, Vancouver, ISO, and other styles
4

Conceição, Desirèe Luíse Lopes. "Internet e cidadania: o estímulo ao debate político por meio do jornalismo fact-checking: um estudo de caso do projeto “Truco!”." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/20981.

Full text
Abstract:
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-04-06T12:55:35Z No. of bitstreams: 1 Desirèe Luíse Lopes Conceição.pdf: 2748185 bytes, checksum: c467bc5ad86bb59233d0a5e34244958c (MD5)
Made available in DSpace on 2018-04-06T12:55:35Z (GMT). No. of bitstreams: 1 Desirèe Luíse Lopes Conceição.pdf: 2748185 bytes, checksum: c467bc5ad86bb59233d0a5e34244958c (MD5) Previous issue date: 2018-02-21
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This dissertation aims to analyze the political information produced and disseminated by the digital platform “Truco!”, which is Agência Pública’s fact-checking project developed for the 2014 election in order to identify and ascertain the political debate taking place. The methodology adopted is based on the network policy concept of the author Manuel Castells, and consists of an elaboration for primary data collection, defined from the interactions and linked to the initial proposal of this research. The results recognize qualitative investigative journalism work with political participation activities, and it’s possible to relate them to the idea that the internet has elements to contribute to citizen education
A dissertação tem por objetivo analisar a produção e divulgação de informação política na plataforma digital “Truco!”, um projeto de fact-checking da Agência Pública desenvolvido para as eleições de 2014, além de identificar e averiguar o debate político ocorrido por meio da iniciativa. A metodologia adotada é baseada no conceito de política em rede do autor Manuel Castells. A técnica metodológica consistiu na elaboração de indicadores para a coleta de dados primários, definidos a partir de uma análise piloto e da identificação de padrões de interação relacionados à proposta inicial da pesquisa. Os resultados permitem identificar um trabalho de jornalismo investigativo qualitativo, além da presença de atividades de colaboração e participação política, o que aponta à concepção de que a internet contém elementos para contribuir com a formação para a cidadania
APA, Harvard, Vancouver, ISO, and other styles
5

Radhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.

Full text
Abstract:
La sécurité des Systèmes d’Information (SI) constitue un défi majeur car elle conditionne amplement la future exploitation d’un SI. C’est pourquoi l’étude des vulnérabilités d’un SI dès les phases conceptuelles est cruciale. Il s’agit d’étudier la validation de politiques de sécurité, souvent exprimées par des règles de contrôle d’accès, et d’effectuer des vérifications automatisées sur des modèles afin de garantir une certaine confiance dans le SI avant son opérationnalisation. Notre intérêt porte plus particulièrement sur la détection des vulnérabilités pouvant être exploitées par des utilisateurs internes afin de commettre des attaques, appelées attaques internes, en profitant de leur accès légitime au système. Pour ce faire, nous exploitons des spécifications formelles B générées, par la plateforme B4MSecure, à partir de modèles fonctionnels UML et d’une description Secure UML des règles de contrôle d’accès basées sur les rôles. Ces vulnérabilités étant dues à l’évolution dynamique de l’état fonctionnel du système, nous proposons d’étudier l’atteignabilité des états, dits indésirables, donnant lieu à des attaques potentielles, à partir d’un état normal du système. Les techniques proposées constituent une alternative aux techniques de model-checking. En effet, elles mettent en œuvre une recherche symbolique vers l’arrière fondée sur des approches complémentaires : la preuve et la résolution de contraintes. Ce processus de recherche est entièrement automatisé grâce à notre outil GenISIS qui a montré, sur la base d’études de cas disponibles dans la littérature, sa capacité à retrouver des attaques déjà publiées mais aussi des attaques nouvelles
The early detection of potential threats during the modelling phase of a Secure Information System (IS) is required because it favours the design of a robust access control policy and the prevention of malicious behaviours during the system execution. This involves studying the validation of access control rules and performing vulnerabilities automated checks before the IS operationalization. We are particularly interested in detecting vulnerabilities that can be exploited by internal trusted users to commit attacks, called insider attacks, by taking advantage of their legitimate access to the system. To do so, we use formal B specifications which are generated by the B4MSecure platform from UML functional models and a SecureUML modelling of role-based access control rules. Since these vulnerabilities are due to the dynamic evolution of the functional state, we propose to study the reachability of someundesirable states starting from a normal state of the system. The proposed techniques are an alternative to model-checking techniques. Indeed, they implement symbolic backward search algorithm based on complementary approaches: proof and constraint solving. This rich technical background allowed the development of the GenISIS tool which automates our approach and which was successfully experimented on several case studies available in the literature. These experiments showed its capability to extract already published attacks but also new attacks
APA, Harvard, Vancouver, ISO, and other styles
6

Garcia, Wayne Scott. "Politics, journalism and Web 2.0 in the 2008 U.S. presidential elections." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0002905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.

Full text
Abstract:
L’Internet des Objects (IoT) est un modèle qui évolue rapidement et qui permet à des utilisateursd’utiliser et contrôler une large variété d’objets connectés entre eux. Ces environnementsconnectés augmentent la surface d’attaque d’un système puisque les risques sont multipliés parle nombre d’appareils connectés. Ces appareils sont responsables de tâches plus ou moinscritiques, et peuvent donc être la cible d’utilisateurs malveillants. Dans ce travail de thèse nousprésentons une méthodologie pour évaluer la sécurité de systèmes IoT. Nous proposons unemanière de représenter les systèmes IoT, couplée avec des arbres d’attaques afin d’évaluer leschances de succès d’une attaque sur un système donné. La représentation des systèmes est faitevia un langage formel que nous avons développé : SOML (Security Oriented Modeling Language).Ce langage permet de définir le comportement des différents acteurs du système et d’ajouterdes probabilités sur leurs actions. L’abre d’attaque nous offre un moyen simple et formel dereprésenter de possibles attaques sur le système. L’analyse probabiliste est ensuite effectuée viaun outil de Statistical Model Checking : Plasma. Nous utilisons deux algorithmescomplémentaires pour effectuer cette analyse : Monte Carlo et importance splitting
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large variety of objects interacting between each other over the Internet. In IoT systems, the security risks are multiplied as they involve hetero- geneous devices that are connected to a shared network and that carry critical tasks, and hence, are targets for malicious users. In this thesis, we propose a security-based framework for modeling IoT systems where attack trees are defined alongside the model to detect and prevent security risks in the system. The language we implemented aims to model the IoT paradigm in a simple way. The IoT systems are composed of entities having some communication capabilities between each other. Two entities can communicate if (i) they are connected through a communication protocol and (ii) they satisfy some constraints imposed by the protocol. In order to identify and analyze attacks on the security of a system we use attack trees which are an intuitive and practical formal method to do so. A successful attack can be a rare event in the execution of a well-designed system. When rare, such attacks are hard to detect with usual model checking techniques. Hence, we use importance splitting as a statistical model checking technique for rare events
APA, Harvard, Vancouver, ISO, and other styles
8

Goldberger-Bagalino, Laura. "Le Web politique : l'espace médiatique des candidats de la présidentielle 2012." Thesis, Paris 10, 2017. http://www.theses.fr/2017PA100177/document.

Full text
Abstract:
À l'instar de la psychotechnique des industries culturelles, savoir manier l’émotion pour toujours mieux capter l’attention d’un électeur dans la sphère de l'infotainment reste l’un des premiers objectifs d'une stratégie de campagne. Cependant, le Web politique a fait émerger de nouvelles formes de communication dans les méthodes de persuasion électorale : l’impact du capital médiatique d’un candidat se joue en ligne prolongeant celui du terrain. Sur Internet, les politiques, efficacement secondés par des experts de l’image chargés de façonner leur identité, leur réputation et leur influence, ont découvert de nouveaux territoires pour amplifier leur message, se promotionner 24 heures sur 24 ou mobiliser en temps réel des militants et récolter des fonds. Contournant les médias traditionnels pour ne pas être déstabilisé par les éditorialistes, un responsable politique s’exposera plus généreusement sur les réseaux sociaux pour devenir « rédacteur en chef » de sa propre campagne. En immersion de 2011 à 2017 sur le site de microblogging Twitter qui n’utilise que 140 caractères par message, j'essaie au travers de ma thèse de déterminer la place et la fonction de ce « média social », ainsi que son poids dans la construction de l’espace médiatique des prétendants à l’Élysée, notamment lors de la présidentielle française de 2012. Quels sont les enjeux des candidats sur le Web et que nous révèlent-ils sur les mises en scène du pouvoir ? Comment les professionnels des cellules de communication politique ont-ils pris possession de ces nouveaux outils qui accélèrent la temporalité des logiques institutionnelles et qui offrent aux militants un espace de réactivité aussi performant que celui d’un journaliste pour corriger les imprécisions des promesses de campagne ? Quelques éléments de réponses se trouvent dans les mots-clés : défiance, fact-checking, storytelling, Big Data, modélisations prédictives, irrévérence, infotainment, riposte-party et social-TV et dans les chiffres qui leur sont associés
According to the psycho-technological model of the cultural industries, the ability to manage emotion to get voters’ constant attention in the infotainment sphere, remains one of the first objective in an electoral campaign strategy. However, the political Web contributes to the emergence of new forms of communication in electoral persuasion methods. The impact of a candidate’s media capital plays an important part online and as an extension offline. On the internet, the political class, effectively assisted by technical design experts whose job is specifically to deal with the profile of their identity, their reputation and their influence, have discovered new territories to amplify their message and to promote 24 hours a day, or to mobilize supporters in real time to raise funds. Circumventing traditional media rather than taking the risk of being destabilized by an editorialist, a political manager will choose to be more present on social media to become editor-in-chief of his or her own campaign. Totally immersed from 2011 to 2017 in website Twitter, to practice microblogging (140 characters), I try in my thesis to identify the position and the function of this « social media » as well as its value in the construction of presidential candidates, including during the French 2012 presidential election.What are the issues of the candidates who are present on the web sites and what do they reveal to us about the representation of power? How do the professionals of communication cells (the « cellcoms ») manage to take possession of these new communications tools that accelerate the temporality of institutional logics and offer to supporters an equivalent space to correct the imprecisions of campaign pledges?I suggest some answers to these questions that can be found in these keywords: suspicion, fact-checking, storytelling, Big Data, predictive modeling, irreverence, infotainment, riposte-party and social-TV as well as the associated figures presented in this thesis
APA, Harvard, Vancouver, ISO, and other styles
9

Vitale, Francesco. "Run-time Anomaly Detection with Process Mining: Methodology and Railway System Compliance Case-Study." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105324.

Full text
Abstract:
Detecting anomalies in computer-based systems, including Cyber-Physical Systems (CPS), has attracted a large interest recently. Behavioral anomalies represent deviations from what is regarded as the nominal expected behavior of the system. Both Process science and Data science can yield satisfactory results in detecting behavioral anomalies. Within Process Mining, Conformance Checking addresses data retrieval and the connection of data to behavioral models with the aim to detect behavioral anomalies. Nowadays, computer-based systems are increasingly complex and require appropriate validation, monitoring, and maintenance techniques. Within complex computer-based systems, the European Rail Traffic Management System/European Train Control System (ERTMS/ETCS) represents the specification of a standard Railway System integrating heterogeneous hardware and software components, with the aim of providing international interoperability with trains seemingly interacting within standardized infrastructures. Compliance with the standard as well as expected behavior is essential, considering the criticality of the system in terms of performance, availability, and safety. To that aim, a Process Mining Conformance Checking process can be employed to validate the requirements through run-time model-checking techniques against design-time process models. A Process Mining Conformance Checking methodology has been developed and applied with the goal of validating the behavior exposed by an ERTMS/ETCS system during the execution of specific scenarios. The methodology has been tested and demonstrated correct classification of valid behaviors exposed by the ERTMS/ETCS system prototype. Results also showed that the Fitness metric developed in the methodology allows the detection of latent errors in the system before they can generate any failures.
APA, Harvard, Vancouver, ISO, and other styles
10

Abo, Robert. "Approches formelles pour l'analyse de la performabilité des systèmes communicants mobiles : Applications aux réseaux de capteurs sans fil." Phd thesis, Conservatoire national des arts et metiers - CNAM, 2011. http://tel.archives-ouvertes.fr/tel-00816392.

Full text
Abstract:
Nous nous intéressons à l'analyse des exigences de performabilité des systèmes communicants mobiles par model checking. Nous modélisons ces systèmes à l'aide d'un formalisme de haut niveau issu du π-calcul, permettant de considérer des comportements stochastiques, temporels, déterministes, ou indéterministes. Cependant, dans le π-calcul, la primitive de communication de base des systèmes est la communication en point-à-point synchrone. Or, les systèmes mobiles, qui utilisent des réseaux sans fil, communiquent essentiellement par diffusion locale. C'est pourquoi, dans un premier temps, nous définissons la communication par diffusion dans le π-calcul, afin de mieux modéliser les systèmes que nous étudions. Nous proposons d'utiliser des versions probabilistes et stochastiques de l'algèbre que nous avons défini, pour permettre des études de performance. Nous en définissons une version temporelle permettant de considérer le temps dans les modèles. Mais l'absence d'outils d'analyse des propriétés sur des modèles spécifiés en une algèbre issue du π-calcul est un obstacle majeur à notre travail. La définition de règles de traduction en langage PRISM, nous permet de traduire nos modèles, en modèles de bas niveau supports du model checking, à savoir des chaînes de Markov à temps discret, à temps continu, des automates temporisés, ou des automates temporisés probabilistes. Nous avons choisi l'outil PRISM car, à notre connaissance, dans sa dernière version, il est le seul outil à supporter les formalismes de bas niveau que nous venons de citer, et ainsi il permet de réaliser des études de performabilité complètes. Cette façon de procéder nous permet de pallier à l'absence d'outils d'analyse pour nos modèles. Par la suite, nous appliquons ces concepts théoriques aux réseaux de capteurs sans fil mobiles.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Internal checking"

1

Wolny, Philip. Foursquare and other location-based services: Checking in, staying safe, and being savvy. New York: Rosen Central, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Needing to Know for Sure: A CBT-Based Guide to Overcoming Compulsive Checking and Reassurance Seeking. New Harbinger Publications, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Borel, Brooke. Chicago Guide to Fact-Checking. University of Chicago Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The Chicago guide to fact-checking. The University of Chicago Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Kevin F., and Henry J. Skinner. Quality assurance in echocardiography. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780198726012.003.0072.

Full text
Abstract:
Quality assurance in echocardiography is the systematic process of ensuring that information sent out by echo laboratories is timely, appropriate, and accurate. QA may be both an internal and an external process. QA relates to all aspects of a service, so not only should reports be timely, accurate, and useful, but the patient’s experience should be a safe and positive one. All aspects of a service need to be continuously monitored and optimized if quality is to be maintained and furthermore improved. Particular focus is needed on reporting and measurement with continuous checking for reporting errors and assessment of measurement variability. A systematic quality assurance programme needs to be an essential part of any echo laboratory. Life-determining clinical decisions may depend on it.
APA, Harvard, Vancouver, ISO, and other styles
6

Hirschman, Lynette, and Inderjeet Mani. Evaluation. Edited by Ruslan Mitkov. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199276349.013.0022.

Full text
Abstract:
The commercial success of natural language (NL) technology has raised the technical criticality of evaluation. Choices of evaluation methods depend on software life cycles, typically charting four stages — research, advance prototype, operational prototype, and product. At the prototype stage, embedded evaluation can prove helpful. Analysis components can be loose grouped viz., segmentation, tagging, extracting information, and document threading. Output technologies such as text summarization can be evaluated in terms of intrinsic and extrinsic measures, the former checking for quality and informativeness and the latter, for efficiency and acceptability, in some tasks. ‘Post edit measures’ commonly used in machine translation, determine the amount of correction required to obtain a desirable output. Evaluation of interactive systems typically evaluates the system and the user as one team and deploys subject variability, which runs enough subjects to obtain statistical validity hence, incurring substantial costs. Evaluation being a social activity, creates a community for internal technical comparison, via shared evaluation criteria.
APA, Harvard, Vancouver, ISO, and other styles
7

Irresistible: Why We Can't Stop Checking, Scrolling, Clicking and Watching. Penguin Random House, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alter, Adam. Irresistible: Why We Can't Stop Checking, Scrolling, Clicking and Watching. Penguin Random House, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Russell. Embedded Distributions: Two Numerical Examples. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198505044.003.0007.

Full text
Abstract:
This chapter illustrates use of (i) the score statistic and (ii) a goodness-of-fit statistic to test if an embedded model provides an adequate fit, in the latter case with critical values calculated by bootstrapping. Also illustrated is (iii) calculation of parameter confidence intervals and CDF confidence bands using both asymptotic theory and bootstrapping, and (iv) use of profile log-likelihood plots to display the form of the maximized log-likelihood and scatterplots for checking convergence to normality of estimated parameter distributions. Two different data sets are analysed. In the first, the generalized extreme value (GEVMin) distribution and its embedded model the simple extreme value (EVMin) are fitted to Kevlar-fibre breaking strength data. In the second sample, the four-parameter Burr XII distribution, its three-parameter embedded models, the GEVMin, Type II generalized logistic and Pareto and two-parameter embedded models, the EVMin and shifted exponential, are fitted to carbon-fibre strength data and compared.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Internal checking"

1

Deutsch, Hans-Peter, and Mark W. Beinker. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 575–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22899-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deutsch, Hans-Peter. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 459–66. London: Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9781403946089_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deutsch, Hans-Peter. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 451–58. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1057/9780230502109_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Deutsch, Hans-Peter. "Backtesting: Checking the Applied Methods." In Derivatives and Internal Models, 496–504. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230234758_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blakemore, Philip. "Internal Checking During Eucalypt Processing." In Delamination in Wood, Wood Products and Wood-Based Composites, 237–54. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9550-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Slanina, Zdenek, Jakub Dostal, Filip Krupa, and Jakub Nemcik. "Assembly Line Automation for Internal Gearbox Brake Checking." In Lecture Notes in Networks and Systems, 696–705. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87178-9_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Yuting. "Checking Internal Consistency of SOFL Specification: A Hybrid Approach." In Structured Object-Oriented Formal Language and Method, 175–91. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04915-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajalingham, Kamalasen, David Chadwick, Brian Knight, and Dilwyn Edwards. "Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM)." In Integrity and Internal Control in Information Systems, 41–58. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35501-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yen, Sung-Ming, Wei-Chih Lien, SangJae Moon, and JaeCheol Ha. "Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption." In Progress in Cryptology – Mycrypt 2005, 183–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11554868_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Finkel, Alain, and Jérôme Leroux. "Polynomial Time Image Computation with Interval-Definable Counters Systems." In Model Checking Software, 182–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24732-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internal checking"

1

Goldberg, Eugene, and Kanupriya Gulati. "On Complexity of Internal and External Equivalence Checking." In 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007). IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arimoto, Yasuhito, Michiharu Kudoh, Yuji Watanabe, and Kokichi Futatsugi. "Checking assignments of controls to risks for internal control." In the 2nd International Conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1509096.1509116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Liqiong, Morio Fukuoka, and Peter Tait. "Mechanical Sensing for Reformer Internal Diameter Data Capturing." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-48970.

Full text
Abstract:
Reformer tubes are commonly used in process industry. They are high cost components. The service life of reformer tubes is primarily determined by creep damage. To successfully manage the reformer tubes requires balancing creep life against the production gains of higher temperatures. The key to this requires an ongoing knowledge of the condition of the tubes. Monitoring the diametrical change of the tubes caused by creep damage is one of the most popular methods used in industry. However, the available reformer tube diametrical checking systems are very expensive. This paper presents a novel mechanical sensing unit for reformer tube diametrical measuring. The system is low cost and meets the industrial company specified requirements. Test and field trials made on the prototype gave a very encouraging result. With further study, it is expected that a robust and cost effective reformer tube diametric measuring system can be developed.
APA, Harvard, Vancouver, ISO, and other styles
4

Couceiro, José, Lars Hansson, Ahec Ambrož, and Dick Sandberg. "CT-scanning of the drying process of Eucalyptus nitens." In 21st International Drying Symposium. Valencia: Universitat Politècnica València, 2018. http://dx.doi.org/10.4995/ids2018.2018.7380.

Full text
Abstract:
The drying of Eucalyptus nitens is a troublesome process as the species is extremely prone to drying defects. This paper reports ongoing research to improve the understanding of surface checking and cell collapse in Chilean grown Eucalyptus nitens during drying. Computed tomography (CT) scanning was used as a powerful tool for studying the internal changes in the wood-material during the drying process. Different levels of temperatures have been tested with the same equilibrium moisture content (EMC) conditions and low air velocity. The results confirm that a low drying temperature and a low air velocity, which results in a slow rate of drying, reduce internal cell collapse and surface checking . Keywords: Cell collapse; computed tomography; surface checks; wood drying; internal checks
APA, Harvard, Vancouver, ISO, and other styles
5

Caballero, Gloria, Paula Álvarez, and Mª Jesús López-Miguens. "Internal determinants of university student employability. Construction and validation of scales." In Third International Conference on Higher Education Advances. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/head17.2017.5491.

Full text
Abstract:
One of the challenges faced by European universities today is to ensure that their graduates find employment in line with their attributes. Graduate employability depends, among other factors, on many internal determinants in individuals. However, there is no consensus on how to measure them, and the scales developed to date have not been properly validated. The purpose of this paper is to construct and validate, at confirmatory level, a set of instruments for measuring the internal determinants of graduate employability. The results, based on a sample of 816 students, show the structure of the scales resulting from checking content validity, dimensionality, reliability, and convergent, discriminant and nomological validity.
APA, Harvard, Vancouver, ISO, and other styles
6

Brunin, Olivier, and Geoffrey Deotto. "Loads Applied to Clogged Steam Generators Internal Structures." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77140.

Full text
Abstract:
During their commissioning, steam generators are clean, which means there is no fouling of the heat transfer surface of tubes and no clogging of the flow area on the secondary side. Then sludge appears steadily at a slow pace during operation. Sludge initiates a partial loss of cooling capacity which is modeled by a fouling factor and which mainly results in vapor pressure decrease. Sludge also initiates a reduction of the secondary side flow area, known as clogging. Four safety-related issues are dependant on clogging [1]: the secondary water mass balance, the thermohydraulics oscillations, the tube vibration risk and the resistance of internal structures. This paper focuses on the last of these issues. A numerical application, based on the modeling of a fictitious steam generator, is detailed in this presentation. The order of magnitude is an 8-times increase of the loads in normal operating conditions in case of a typical 60% clogging ratio of the upper tube support plate, and a 12-times increase in case of incidental depressurization transient. These theoretical results emphasize the need to take these loads properly into account in the checking of the mechanical behavior of the internal structure of the steam generators in operation in case of significant sludge deposits.
APA, Harvard, Vancouver, ISO, and other styles
7

Yoshida, Hiroaki, and Masahiro Fujita. "Improving the accuracy of rule-based equivalence checking of system-level design descriptions by identifying potential internal equivalences." In 2009 10th International Symposium on Quality of Electronic Design (ISQED). IEEE, 2009. http://dx.doi.org/10.1109/isqed.2009.4810322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Keming, Jinyang Zheng, Zekun Zhang, Chaohua Gu, and Ping Xu. "A New Method for Preventing Plastic Collapse of Ellipsoidal Head Under Internal Pressure." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21212.

Full text
Abstract:
Abstract Ellipsoidal head is a common end closure of pressure vessel. Plastic collapse is a crucial failure mode considered in the design of ellipsoidal head subjected to internal pressure. Internally pressurized ellipsoidal head tends to be hemisphere (geometric strengthening) due to the effect of material hardening before plastic collapse occurs, which enhances load carrying capacity of ellipsoidal head. However, in the current pressure vessel codes such as ASME BPVC.VIII.1 and BPVC.VIII.2, EN 13445-3, and Chinese codes GB/T 150.3 and JB 4732, design methods based on linear elastic or perfectly-plastic theory are used to prevent plastic collapse of ellipsoidal head, leading to conservative design. Therefore, we developed a new method for preventing plastic collapse of ellipsoidal head under internal pressure, considering the effects of material hardening and geometric strengthening. The new method was developed on basis of our previous extensive work on finite element analysis and experiments for plastic collapse of internally pressurized ellipsoidal heads. The new method provides sufficient margin of safety by checking against the experimental bursting results of full-scale ellipsoidal heads with various geometries, various material types and various manufacturing methods. Compared with the design methods in the current pressure vessel codes, the new method shows an advantage of economy. This new method had been approved by China Standardization Committee on Boilers and Pressure Vessels, and at present it has been introduced into the Chinese pressure vessel code.
APA, Harvard, Vancouver, ISO, and other styles
9

Galgoul, Nelson Szilard, Andre´ Luiz Lupinacci Massa, and Cla´udia Albergaria Claro. "A Discussion on How Internal Pressure is Treated in Offshore Pipeline Design." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0337.

Full text
Abstract:
The design of rigid submarine pipelines has been the object of extensive research work over the last few years, where the most relevant issues include upheaval and lateral buckling problems. Both of these problems systematically associate temperature and pressure loads, where the treatment of the first is obvious, while the latter have always been a matter of discussion. In 1974 Palmer and Baldry [1] presented a theoretical-experimental contribution, in which they have set a pattern that has been followed ever since. Another similar and well known paper was published by Sparks in 1983 [7], who only present a physical interpretation of this same theory. Most of the present day industry codes define an effective axial force, according to which, fixed end pipelines will be under compression due to internal pressure. The starting point of the discussion presented in [1] was that internal pressure produces a lateral force, which is numerically equal to the pressure times internal cross-sectional area times the pipeline curvature: q=p.Ai.d2y/dx2(1) This equation is demonstrated further ahead in this paper. Palmer and Baldry then based their arguments on the traditional equation of the pinned column buckling problem, studied by Euler [2]: EId4y/dx4+Pd2y/dx2=0(2) for which the well known solution is: P=π2EI/L2(3) and on the associated problem studied by Timoshenko [3], which adds a distributed lateral load q to the same problem: EId4y/dx4+Pd2y/dx2=q(4) Replacing q with the lateral pressure given above, they were able to have their own problem fall back onto the Euler solution: EId4y/dx4+Pd2y/dx2=p.Ai.d2y/dx2P-pAi=π2EI/L2(5) After correcting for the Poisson effect they were able to determine the new critical axial force caused by the pressure. Unfortunately, however, the arguments set forth in [1] have been misunderstood. The fact that both axial force and lateral force multiply curvature does not make them forces of the same nature. Being able to add them has solved a mathematical equation, but still hasn’t converted the lateral force to axial. The authors wish to prove that [1] presents no more than a tool, which can be used in the analysis of global buckling problems of pipelines subject to both temperature and pressure. It will be shown, however, that this pressure will not produce an axial force, as now-a-days prescribed conservatively in many pipeline codes, which is even used for stress checking.
APA, Harvard, Vancouver, ISO, and other styles
10

Hsieh, Hsiang-Yu, Nanming Chen, and Ching-Lung Liao. "Visual Recognition System of Elastic Rail Clips for Mass Rapid Transit Systems." In ASME/IEEE 2007 Joint Rail Conference and Internal Combustion Engine Division Spring Technical Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/jrc/ice2007-40080.

Full text
Abstract:
In recent years, the railway transportation system has become one of the main means of transportation. Therefore, driving safety is of great importance. However, because of the potential of multiple breaks of elastic rail clips in a fixed rail, accidents may occur when a train passes through the track. This paper presents the development of a computer visual recognition system which can detect the status of elastic rail clips. This visual recognition system can be used in mass rapid transit systems to reduce the substantial need of manpower for checking elastic rail clips at present. The visual recognition system under current development includes five components: preprocessing, identification of rail position, search of elastic rail clip regions, selection of the elastic rail clip, and recognition of the elastic rail clip. The preprocessing system transforms the colored images into grey-level images and eliminates noises. The identification of rail position system uses characteristics of the grey-level variation and confirms the rail position. The search system uses wavelet transformation to carry out the search of elastic rail clip regions. The selection system finds a suitable threshold, using techniques from morphological processing, object search and image processing. The recognition system processes characteristics and structures of elastic rail clips. Experimental testing shows the ability of the developed system to recognize both normal elastic rail clip images and broken elastic rail clip images. This result confirms the feasibility in developing such a visual recognition system.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internal checking"

1

Stepanyuk, Alla V., Liudmyla P. Mironets, Tetiana M. Olendr, Ivan M. Tsidylo, and Oksana B. Stoliar. Methodology of using mobile Internet devices in the process of biology school course studying. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3887.

Full text
Abstract:
This paper considers the problem of using mobile Internet devices in the process of biology studying in secondary schools. It has been examined how well the scientific problem is developed in pedagogical theory and educational practice. The methodology of using mobile Internet devices in the process of biology studying in a basic school, which involves the use of the Play Market server applications, Smart technologies and a website, has been created. After the analyses of the Play Market server content, there have been found several free of charge applications, which can be used while studying biology in a basic school. Among them are the following: Anatomy 4D, Animal 4D+, Augmented Reality Dinosaurs – my ARgalaxy, BioInc – Biomedical Plague, Plan+Net. Their choice is caused by the specifics of the object of biological cognition (life in all its manifestations) and the concept of bio(eco)centrism, which recognizes the life of any living system as the highest value. The paper suggests the original approach for homework checking, which involves besides computer control of students’ learning outcomes, the use of Miracast wireless technology. This demands the owning of a smartphone, a multimedia projector, and a Google Chromecast type adapter. The methodology of conducting a mobile front-line survey at the lesson on the learned or current material in biology in the test form, with the help of the free Plickers application, has been presented. The expediency of using the website builder Ucoz.ua for creation of a training website in biology has been substantiated. The methodology of organizing the educational process in biology in a basic school using the training website has been developed. Recommendations for using a biology training website have been summarized. According to the results of the forming experiment, the effectiveness of the proposed methodology of using mobile Internet devices in the process of biology studying in a basic school has been substantiated.
APA, Harvard, Vancouver, ISO, and other styles
2

Galili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, October 1994. http://dx.doi.org/10.32747/1994.7570549.bard.

Full text
Abstract:
The objectives of this project were to develop nondestructive methods for detection of internal properties and firmness of fruits and vegetables. One method was based on a soft piezoelectric film transducer developed in the Technion, for analysis of fruit response to low-energy excitation. The second method was a dot-matrix piezoelectric transducer of North Carolina State University, developed for contact-pressure analysis of fruit during impact. Two research teams, one in Israel and the other in North Carolina, coordinated their research effort according to the specific objectives of the project, to develop and apply the two complementary methods for quality control of agricultural commodities. In Israel: An improved firmness testing system was developed and tested with tropical fruits. The new system included an instrumented fruit-bed of three flexible piezoelectric sensors and miniature electromagnetic hammers, which served as fruit support and low-energy excitation device, respectively. Resonant frequencies were detected for determination of firmness index. Two new acoustic parameters were developed for evaluation of fruit firmness and maturity: a dumping-ratio and a centeroid of the frequency response. Experiments were performed with avocado and mango fruits. The internal damping ratio, which may indicate fruit ripeness, increased monotonically with time, while resonant frequencies and firmness indices decreased with time. Fruit samples were tested daily by destructive penetration test. A fairy high correlation was found in tropical fruits between the penetration force and the new acoustic parameters; a lower correlation was found between this parameter and the conventional firmness index. Improved table-top firmness testing units, Firmalon, with data-logging system and on-line data analysis capacity have been built. The new device was used for the full-scale experiments in the next two years, ahead of the original program and BARD timetable. Close cooperation was initiated with local industry for development of both off-line and on-line sorting and quality control of more agricultural commodities. Firmalon units were produced and operated in major packaging houses in Israel, Belgium and Washington State, on mango and avocado, apples, pears, tomatoes, melons and some other fruits, to gain field experience with the new method. The accumulated experimental data from all these activities is still analyzed, to improve firmness sorting criteria and shelf-life predicting curves for the different fruits. The test program in commercial CA storage facilities in Washington State included seven apple varieties: Fuji, Braeburn, Gala, Granny Smith, Jonagold, Red Delicious, Golden Delicious, and D'Anjou pear variety. FI master-curves could be developed for the Braeburn, Gala, Granny Smith and Jonagold apples. These fruits showed a steady ripening process during the test period. Yet, more work should be conducted to reduce scattering of the data and to determine the confidence limits of the method. Nearly constant FI in Red Delicious and the fluctuations of FI in the Fuji apples should be re-examined. Three sets of experiment were performed with Flandria tomatoes. Despite the complex structure of the tomatoes, the acoustic method could be used for firmness evaluation and to follow the ripening evolution with time. Close agreement was achieved between the auction expert evaluation and that of the nondestructive acoustic test, where firmness index of 4.0 and more indicated grade-A tomatoes. More work is performed to refine the sorting algorithm and to develop a general ripening scale for automatic grading of tomatoes for the fresh fruit market. Galia melons were tested in Israel, in simulated export conditions. It was concluded that the Firmalon is capable of detecting the ripening of melons nondestructively, and sorted out the defective fruits from the export shipment. The cooperation with local industry resulted in development of automatic on-line prototype of the acoustic sensor, that may be incorporated with the export quality control system for melons. More interesting is the development of the remote firmness sensing method for sealed CA cool-rooms, where most of the full-year fruit yield in stored for off-season consumption. Hundreds of ripening monitor systems have been installed in major fruit storage facilities, and being evaluated now by the consumers. If successful, the new method may cause a major change in long-term fruit storage technology. More uses of the acoustic test method have been considered, for monitoring fruit maturity and harvest time, testing fruit samples or each individual fruit when entering the storage facilities, packaging house and auction, and in the supermarket. This approach may result in a full line of equipment for nondestructive quality control of fruits and vegetables, from the orchard or the greenhouse, through the entire sorting, grading and storage process, up to the consumer table. The developed technology offers a tool to determine the maturity of the fruits nondestructively by monitoring their acoustic response to mechanical impulse on the tree. A special device was built and preliminary tested in mango fruit. More development is needed to develop a portable, hand operated sensing method for this purpose. In North Carolina: Analysis method based on an Auto-Regressive (AR) model was developed for detecting the first resonance of fruit from their response to mechanical impulse. The algorithm included a routine that detects the first resonant frequency from as many sensors as possible. Experiments on Red Delicious apples were performed and their firmness was determined. The AR method allowed the detection of the first resonance. The method could be fast enough to be utilized in a real time sorting machine. Yet, further study is needed to look for improvement of the search algorithm of the methods. An impact contact-pressure measurement system and Neural Network (NN) identification method were developed to investigate the relationships between surface pressure distributions on selected fruits and their respective internal textural qualities. A piezoelectric dot-matrix pressure transducer was developed for the purpose of acquiring time-sampled pressure profiles during impact. The acquired data was transferred into a personal computer and accurate visualization of animated data were presented. Preliminary test with 10 apples has been performed. Measurement were made by the contact-pressure transducer in two different positions. Complementary measurements were made on the same apples by using the Firmalon and Magness Taylor (MT) testers. Three-layer neural network was designed. 2/3 of the contact-pressure data were used as training input data and corresponding MT data as training target data. The remaining data were used as NN checking data. Six samples randomly chosen from the ten measured samples and their corresponding Firmalon values were used as the NN training and target data, respectively. The remaining four samples' data were input to the NN. The NN results consistent with the Firmness Tester values. So, if more training data would be obtained, the output should be more accurate. In addition, the Firmness Tester values do not consistent with MT firmness tester values. The NN method developed in this study appears to be a useful tool to emulate the MT Firmness test results without destroying the apple samples. To get more accurate estimation of MT firmness a much larger training data set is required. When the larger sensitive area of the pressure sensor being developed in this project becomes available, the entire contact 'shape' will provide additional information and the neural network results would be more accurate. It has been shown that the impact information can be utilized in the determination of internal quality factors of fruit. Until now,
APA, Harvard, Vancouver, ISO, and other styles
3

Payment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Full text
Abstract:
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted decisions that were necessary to supply the market with ample liquid¬ity in pesos and US dollars to guarantee market stability, protect the payment system and preserve the supply of credit. The pronounced growth in mone¬tary aggregates reflected an increased preference for liquidity, which Banco de la República addressed at the right time. These decisions were implemented through operations that were cleared and settled via the financial infrastructure. The second section of this report, following the introduction, offers an analysis of how the various financial infrastructures in Colombia have evolved and per¬formed. One of the highlights is the large-value payment system (CUD), which registered more momentum in 2020 than during the previous year, mainly be¬cause of an increase in average daily remunerated deposits made with Banco de la República by the General Directorate of Public Credit and the National Treasury (DGCPTN), as well as more activity in the sell/buy-back market with sovereign debt. Consequently, with more activity in the CUD, the Central Securi¬ties Depository (DCV) experienced an added impetus sparked by an increase in the money market for bonds and securities placed on the primary market by the national government. The value of operations cleared and settled through the Colombian Central Counterparty (CRCC) continues to grow, propelled largely by peso/dollar non-deliverable forward (NDF) contracts. With respect to the CRCC, it is important to note this clearing house has been in charge of managing risks and clearing and settling operations in the peso/dollar spot market since the end of last year, following its merger with the Foreign Exchange Clearing House of Colombia (CCDC). Since the final quarter of 2020, the CRCC has also been re¬sponsible for clearing and settlement in the equities market, which was former¬ly done by the Colombian Stock Exchange (BVC). The third section of this report provides an all-inclusive view of payments in the market for goods and services; namely, transactions carried out by members of the public and non-financial institutions. During the pandemic, inter- and intra-bank electronic funds transfers, which originate mostly with companies, increased in both the number and value of transactions with respect to 2019. However, debit and credit card payments, which are made largely by private citizens, declined compared to 2019. The incidence of payment by check contin¬ue to drop, exhibiting quite a pronounced downward trend during the past last year. To supplement to the information on electronic funds transfers, section three includes a segment (Box 4) characterizing the population with savings and checking accounts, based on data from a survey by Banco de la República con-cerning the perception of the use of payment instruments in 2019. There also is segment (Box 2) on the growth in transactions with a mobile wallet provided by a company specialized in electronic deposits and payments (Sedpe). It shows the number of users and the value of their transactions have increased since the wallet was introduced in late 2017, particularly during the pandemic. In addition, there is a diagnosis of the effects of the pandemic on the payment patterns of the population, based on data related to the use of cash in circu¬lation, payments with electronic instruments, and consumption and consumer confidence. The conclusion is that the collapse in the consumer confidence in¬dex and the drop in private consumption led to changes in the public’s pay¬ment patterns. Credit and debit card purchases were down, while payments for goods and services through electronic funds transfers increased. These findings, coupled with the considerable increase in cash in circulation, might indicate a possible precautionary cash hoarding by individuals and more use of cash as a payment instrument. There is also a segment (in Focus 3) on the major changes introduced in regulations on the retail-value payment system in Colombia, as provided for in Decree 1692 of December 2020. The fourth section of this report refers to the important innovations and tech¬nological changes that have occurred in the retail-value payment system. Four themes are highlighted in this respect. The first is a key point in building the financial infrastructure for instant payments. It involves of the design and im¬plementation of overlay schemes, a technological development that allows the various participants in the payment chain to communicate openly. The result is a high degree of interoperability among the different payment service providers. The second topic explores developments in the international debate on central bank digital currency (CBDC). The purpose is to understand how it could impact the retail-value payment system and the use of cash if it were to be issued. The third topic is related to new forms of payment initiation, such as QR codes, bio¬metrics or near field communication (NFC) technology. These seemingly small changes can have a major impact on the user’s experience with the retail-value payment system. The fourth theme is the growth in payments via mobile tele¬phone and the internet. The report ends in section five with a review of two papers on applied research done at Banco de la República in 2020. The first analyzes the extent of the CRCC’s capital, acknowledging the relevant role this infrastructure has acquired in pro¬viding clearing and settlement services for various financial markets in Colom¬bia. The capital requirements defined for central counterparties in some jurisdic¬tions are explored, and the risks to be hedged are identified from the standpoint of the service these type of institutions offer to the market and those associated with their corporate activity. The CRCC’s capital levels are analyzed in light of what has been observed in the European Union’s regulations, and the conclusion is that the CRCC has a scheme of security rings very similar to those applied internationally and the extent of its capital exceeds what is stipulated in Colombian regulations, being sufficient to hedge other risks. The second study presents an algorithm used to identify and quantify the liquidity sources that CUD’s participants use under normal conditions to meet their daily obligations in the local financial market. This algorithm can be used as a tool to monitor intraday liquidity. Leonardo Villar Gómez Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography