Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Verification Information System

The Second Review Conference welcomed the progress made in introducing the Verification Information System, including the option of submitting declarations in electronic form. The Second Review Conference encouraged States Parties National Authorities to avail themselves of this possibility. It requested the Secretariat to provide them, on request, with appropriate training and assistance. The Second Review Conference reiterated the need to ensure that confidential data is effectively protected at all times, in accordance with the requirements of the Convention. [Pg.516]

The Third Review Conference welcomed the continued progress since the Second Review Conference in maintaining the Verification Information System, including the option of submitting declarations in electronic form. [Pg.544]

EPA. 1988a. Integrated Risk Information System (IRIS). Risk estimates for carcinogenicity for 1,2-diphenylhydrazine. Online. (Verification date 3/1/88). US Environmental Protection Agency, Office of Health and Environmental Assessment, Environmental Criteria and Assessment Office. Cincinnati, OH. [Pg.63]

IRIS. 1995. Integrated risk information system (IRIS) Risk estimate for ethylene glycol monobutyl ether. Online (Verification Date 3/8/95). Cincinnati, OH Environmental Criteria and Assessment Office, Offfice of Health and Environmental Assessment, U.S. Environmental Protection Agency. [Pg.375]

Implementation of Software Independent Verification and Validation for Lungmen Distributed Control and Information Systems... [Pg.83]

This report presents the implementation of the software independent verification and validation (IV V) for the Distributed Control Information Systems ( DCIS) of the Lungmen Project. It covers the codes and standards as applicable, the scope of the software IV V and the documents reviewed, the organizational structure and activities for performing the IV V work. Furthermore, the problems which were encountered during the implementation are discussed, along with solutions for them. [Pg.83]

USEPA (1994b) Arsenic, inorganic cancer assessment. Verification date 02/03/94. Integrated Risk Information System, on-line file, retrieved April 10, 1997. U.S. Environmental Protection Agency, Office of Research and Development, Washington, DC. [Pg.180]

Records Verification of health component activities by health information system for general population 95.01 95.35 95.18 92.30 96.45 94.38 96.40 — 96.40... [Pg.247]

Another limitation of the MDA tools has to do with model validation. Reasoning about models of systems is well supported by automated theorem provers and model checkers, however these tools are not integrated into CASE tools environments. Only research tools provide support for formal specification and deductive verification. As an example, we can mention USE 3.0 that is a system for specification of information systems in OCL. USE allows snapshots of running systems can be created and manipulated during an animation, checking OCL constraints to validate the specification against non-formal requirements (Use, 2011) (OCL USE, 2011). [Pg.63]

As far as we know, there has not been a lot of work on assuring software whose behaviour is configured using data. There are results on validating the data used in systems that use large quantities of data to perform their function [14,10] and on safety-related information systems [17]. They describe specification and verification techniques for data, but do not consider systems whose flow of execution is itself determined by data. [Pg.166]

To satisfy safety requirements, avionics manufacturers have applied formal development and verification methods for decades, at least for the most critical parts of avionics. Currently, these methods target design faults, in particular software bugs. The approach is based on the ARINC 811 decomposition of the information system into several domains with different levels of criticality. They do not address explicitly security concerns, such as deliberately-introduced malicious logic, intrusions, or denial-of-service attacks. This has changed recently,... [Pg.146]

The prototype of verification system of ultrasonic flaw detector developed is described in the scheme given in figure 2. The verification operators performed with the system are as much automated as possible. The level of automatization is limited by the necessity of human reading of information on flaw detector screen, or other operations as manual adjustment of flaw detector settings. [Pg.703]

Despite these limitations, mobile monitoring systems have been used to obtain useful information, such as the verification and tracking of the St. Louis, Missouri, urban plume. The measurement of a well-defined urban plume spreading northeastward from St. Louis is shown in Fig. 15-2 (7). These data were collected by a combination of instrumented aircraft and mobile vans. Cross-sectional paths were flown by the aircraft at increasing distances downwind. Meteorological conditions of low wind speed in the same direction helped to maintain this urban plume in a well-defined... [Pg.220]

Database system that is designed lo aid in producing both the EPA Manifest and Drum Labels. Includes DOT information for verification. [Pg.294]

If a quality record was intended to be any document generated or used by the quality system, the definition would surely have indicated this. If we decompose the definition further, requirements for quality are defined in ISO 8402 as the expression of the needs or their translation into a set of quantitatively stated requirements for the characteristics of an entity to enable its realization and examination. Clearly, such a requirement would be a contract, product specification, design requirement, etc. This implies that any product verification records are quality records, but it rules out any recorded information as being a quality record. [Pg.495]

Release data related to the SCADA network only on a strict, need-to-know basis, and only to persons explicitly authorized to receive such information. Social engineering, the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks. The more information revealed about a computer or computer network, the more vulnerable the computer/network is. Never divulge data revealed to a SCADA network, including the names and contact information about the system operators/administrators, computer operating systems, and/or physical and logical locations of computers and network systems over telephones or to personnel unless they are explicitly authorized to receive such information. Any requests for information by unknown persons need to be sent to a central network security location for verification and fulfillment. People can be a weak link in an otherwise secure network. Conduct training and information awareness... [Pg.134]

The observation that the first order rate "constant" is not constant for the perturbation and relaxation test intervals leads to the conclusion that a simple first- order model is not sufficient to explain the behavior in this dynamically-perturbed system and another model should be proposed and tested. Often, the new models are in themselves more complex and require more information for verification than was originally collected. Thus, the direct approach may require the iteration of new experiments with additional sampling. [Pg.28]

This chapter has shown many examples of the use of CALPHAD methods, ranging from an unusual application in a binary system, through complex equilibrium calculations to calculations for 10-component alloy systems. In all cases the use of CALPHAD methods has enhanced the understanding of processes, clearly defined alloy behaviour and provided vital information for other models, etc. It is also clear that equilibrium calculations can be used in many different areas and under a surprising number of different conditions. For numerous reasons, modelling will never completely replace experimental measurement. However, die quantitative verification of the accuracy of CALPHAD calculations now means that they can be seriously considered as an information source which can be used as an alternative to experimental measurement in a number of areas and can also enhance interpretation of experimental results. [Pg.419]

A firm s CAPA system and processes should be designed to analyze and respond to quality issues in a systematic way that is commensurate with the risk. The system should provide for the verification or validation of corrective and preventive actions to assure their effectiveness and to assure that actions do not adversely affect the finished product. The system should also assure that pertinent CAPA information is appropriately disseminated throughout the organization as necessary to assure the effective operation of the quality system and for management review. [Pg.222]


See other pages where Verification Information System is mentioned: [Pg.796]    [Pg.796]    [Pg.565]    [Pg.840]    [Pg.256]    [Pg.18]    [Pg.369]    [Pg.705]    [Pg.317]    [Pg.516]    [Pg.79]    [Pg.3149]    [Pg.138]    [Pg.405]    [Pg.536]    [Pg.605]    [Pg.111]    [Pg.122]    [Pg.123]    [Pg.137]    [Pg.9]    [Pg.107]    [Pg.138]    [Pg.167]    [Pg.174]   
See also in sourсe #XX -- [ Pg.48 , Pg.174 , Pg.490 , Pg.516 ]




SEARCH



Information system

Verification

© 2024 chempedia.info