EasyManuals Logo

Mirion Technologies GEM-5 User Manual

Default Icon
443 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #62 background imageLoading...
Page #62 background image
Chapter 2 Installation - First Use of System
46 Gem-5 User’s Manual
Various “flat filesused to transfer data to the database are kept in
D:\MonitorProgram\TEMPDATA folder and are deleted when successfully
transferred to the database. In addition, there is a
D:\MonitorProgram\DATALOG\DB_INFO.LOG file, which keeps the
most recent messages, send back from the database for use in trouble
shooting. This file is UNICODE with a Tab separator.
When the program starts a Startup Backup is done and number of entries
checked similar to the Daily Backup.
Include Alarm Test Results choices are “No” and “Yes” (default).
Include Detector Contamination Check Results choices are “No”, “First
Only” (default), and “All”.
“First Only” put the first Detector Contamination Check Result (after a
Contaminated event) into the database.
“All” also puts Detector Contamination Check results done on the Out of
Service screen into the database (these re-tests are done until a clean
result shows up).
F10Methodology Configuration
The Methodology Configuration screen allows the user to select the methodology
option.
Figure 20 Traditional Methodology Configuration Screen
Line Items
Methodology: “Traditional” (default) or “Bayesian”. Refer to Supplementary
Bayesian Methodology User's Manual for more information.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Mirion Technologies GEM-5 and is the answer not in the manual?

Mirion Technologies GEM-5 Specifications

General IconGeneral
BrandMirion Technologies
ModelGEM-5
CategoryMonitor
LanguageEnglish

Related product manuals