Chapter 2 Installation - First Use of System
46 Gem-5 User’s Manual
• Various “flat files” used to transfer data to the database are kept in
D:\MonitorProgram\TEMPDATA folder and are deleted when successfully
transferred to the database. In addition, there is a
D:\MonitorProgram\DATALOG\DB_INFO.LOG file, which keeps the
most recent messages, send back from the database for use in trouble
shooting. This file is UNICODE with a Tab separator.
• When the program starts a Startup Backup is done and number of entries
checked similar to the Daily Backup.
• Include Alarm Test Results choices are “No” and “Yes” (default).
• Include Detector Contamination Check Results choices are “No”, “First
Only” (default), and “All”.
− “First Only” put the first Detector Contamination Check Result (after a
Contaminated event) into the database.
− “All” also puts Detector Contamination Check results done on the Out of
Service screen into the database (these re-tests are done until a clean
result shows up).
F10 – Methodology Configuration
The Methodology Configuration screen allows the user to select the methodology
option.
Figure 20 Traditional Methodology Configuration Screen
Line Items
Methodology: “Traditional” (default) or “Bayesian”. Refer to Supplementary
Bayesian Methodology User's Manual for more information.