Skip to content

Project README

PyPI version validate examples License: Apache 2.0

The Unit of Assurance is the smallest independently verifiable bundle of credibility evidence for computational modeling and simulation (CM&S). It packages the credibility decision — who judged what, against what criteria, using what evidence, with what result — as a signed, provenance-linked, machine-verifiable engineering artifact.

Conference Attendees: Run the 30-Second Demo

Section titled “Conference Attendees: Run the 30-Second Demo”
Terminal window
pip install uofa
uofa demo

The bundled fixture exercises the full C1 (signature + integrity) + C2 (SHACL) + C3 (Jena rule engine) pipeline against a small pre-computed UofA artifact — no Java install, no LLM runtime, no internet required. Use it to verify “yes, this tool actually does what the speaker claimed” in under a minute.

When you’re ready to encode your own evidence, see the Quick Start below.

Terminal window
# 1. Install the uofa CLI (one command — bundles Python deps, the rule
# engine JAR, and an OpenJDK 17 JRE inside the wheel; no Java or Maven
# install required).
pip install uofa
# 2. Import from Excel (fastest on-ramp for practitioners)
uofa import my-assessment.xlsx --sign --key keys/research.key --check
# — OR — scaffold from a JSON-LD template
uofa init my-project
# Edit my-project/my-project-cou1.jsonld — fill in your project details
uofa sign my-project/my-project-cou1.jsonld --key my-project/keys/my-project.key
uofa check my-project/my-project-cou1.jsonld

Platform wheels are published for macOS (arm64), Linux (x86_64 + aarch64), and Windows (x86_64). Intel-Mac users install the py3-none-any wheel and provide a system Java 17 (brew install openjdk@17). The uofa[extract] extra adds the LLM-backed prose-to-UofA pipeline; see uofa setup --help for one-time runtime installation.

New to UofA? See the Onboarding Guide for a step-by-step walkthrough (and a zero-install Codespaces option), or study the Morrison demo below.


UofA exists because the credibility frameworks are not the problem. ASME V&V 40, NASA-STD-7009B, and the FDA’s 2023 guidance on CM&S credibility provide clear instructions for how to assess simulation credibility. The problem is the last mile: there is no standardized construct for packaging, transmitting, and verifying the evidence and decisions those assessments produce.

The result is predictable. Credibility decisions live in prose PDFs. Evidence is scattered across tools. Provenance is partial. Audit packaging is manual. And reviewers catch quality gaps by intuition rather than automation.

UofA addresses this through three contributions:

ContributionWhat it doesMechanism
C1 — Decision as artifactCaptures the credibility decision as a portable, tool-independent object with provenance lineage and integrity guaranteesJSON-LD + PROV-DM + SHA-256 hash + ed25519 digital signatures
C2 — Completeness enforcementDefines what a UofA must contain at each rigor level and enforces it as a computable constraintSHACL profiles (Minimal / Complete) with format-validated integrity fields
C3 — Quality gatesDetects substantive credibility gaps — missing UQ, orphan claims, acceptance criteria gaps — including compound risks that no individual query can findJena forward-chaining rule engine with compound inference

Live Demo: Morrison Blood Pump (FDA V&V 40 Case Study)

Section titled “Live Demo: Morrison Blood Pump (FDA V&V 40 Case Study)”

The packs/vv40/examples/morrison/ directory contains complete, working UofA evidence packages built from Morrison et al. (2019) — an FDA OSEL co-authored V&V 40 credibility assessment for a centrifugal blood pump. This is the most widely cited V&V 40 worked example.

What the demo shows:

Morrison prose assessment → UofA structured evidence package
"model deemed credible" JSON-LD with 13 V&V 40 factors,
scattered across 10 pages provenance chain, integrity hash,
of journal article machine-verifiable in 30 seconds

Run it yourself:

Terminal window
pip install uofa # bundles the rule engine JAR + an OpenJDK 17 JRE
# Run the full C1 + C2 + C3 pipeline in one command
uofa check packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld

That single command runs three checks:

StepCommandWhat it does
C2uofa shacl FILESHACL Complete profile validation — all required fields present
C1uofa verify FILESHA-256 hash + ed25519 signature verification — content untampered
C3uofa rules FILEJena rule engine — 23 forward-chaining rules (21 core + 2 compound) detect quality gaps

The bundled JAR + JRE inside the wheel mean no Maven, no separate Java install, and no --build flag is needed. Source-tree contributors can still build the JAR via cd src/weakener-engine && mvn package and run from their own checkout — the bundled JRE only activates inside an installed wheel.

What the rule engine finds on Morrison COU1 (11 weakeners across 5 patterns):

PatternSeverityHitsWhat it detects
W-EP-02High3Validation result has no prov:wasGeneratedBy — generation activity is missing
W-AL-01High3Validation result has no uncertainty quantification — aleatory uncertainty is uncharacterized
W-AR-05High3Validation result has no comparedAgainst link — comparator data source is absent
W-CON-04Medium1Complete profile with no sensitivity analysis linked
W-ON-02High1Context of Use lacks both applicability constraint and operating envelope

The catalog includes 23 weakener patterns spanning epistemic, aleatory, ontological, structural, consistency, provenance, and argumentation categories. Run uofa catalog to list the full set. Morrison COU1 fires 5 of those 23 — the more risky COU2 fires a different 6 patterns including 2 Critical compound rules. See the divergence below.

The compound rules fire on the output of the core rules — this is chained forward-chaining inference that standalone SPARQL queries cannot produce. Same model, same data, same rules: the rule engine reasons about the interactions between gaps, not just the gaps themselves.

Want to see the same divergence mechanism in aerospace? A parallel NASA-STD-7009B case study on an HPT turbine-blade CHT model lives at docs/examples/hpt-blade-cht.md.


Morrison contains two Contexts of Use assessing the same CFD model:

  • COU1 (CPB, Class II, Model Risk Level 2) → Decision: Accepted
  • COU2 (VAD, Class III, Model Risk Level 5) → Decision: Not accepted

Same model. Same experimental data. Different credibility requirements driven by different model risk. The uofa diff command surfaces this divergence automatically:

Terminal window
uofa diff packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld \
packs/vv40/examples/morrison/cou2/uofa-morrison-cou2.jsonld
════════════════════════════════════════════════════════
COU Divergence Analysis
════════════════════════════════════════════════════════
COU A COU B
Name COU1: Cardiopulmonary bypass use (Class II) COU2: Ventricular assist device use (Class III)
Device class Class II Class III
Model risk level MRL 2 MRL 5
Decision Accepted Not accepted
Assurance level Medium Low
Weakeners 5 6
══ Weakener Patterns (8) ══
┌────────────────────────────────────────────────────────────────┐
│ Pattern │ Severity │ COU A │ COU B │ Status │
├──────────────┼────────────┼─────────┼─────────┼──────────────┤
│ W-AL-01 │ [High] │ ✓ │ ✗ │ ◆ divergent │
│ W-AL-02 │ [Medium] │ ✗ │ ✓ │ ◆ divergent │
│ W-AR-05 │ [High] │ ✓ │ ✗ │ ◆ divergent │
│ W-CON-04 │ [Medium] │ ✓ │ ✓ │ same │
│ W-EP-02 │ [High] │ ✓ │ ✗ │ ◆ divergent │
│ W-EP-04 │ [High] │ ✗ │ ✓ │ ◆ divergent │
│ W-ON-02 │ [High] │ ✓ │ ✓ │ same │
│ W-PROV-01 │ [Critical] │ ✗ │ ✓ │ ◆ divergent │
└──────────────┴────────────┴─────────┴─────────┴──────────────┘
══ Compound Patterns (1) ══
┌────────────────────────────────────────────────────────────────┐
│ Pattern │ Severity │ COU A │ COU B │ Status │
├──────────────┼────────────┼─────────┼─────────┼──────────────┤
│ COMPOUND-01 │ [Critical] │ ✗ │ ✓ │ ◆ divergent │
└──────────────┴────────────┴─────────┴─────────┴──────────────┘
══ Summary ══
COU A (COU1: Cardiopulmonary bypass use (Class II)):
[High] 4
[Medium] 1
COU B (COU2: Ventricular assist device use (Class III)):
[Critical] 2
[High] 2
[Medium] 2
7 divergence(s) detected

The full report includes a per-divergence “Divergence Explanations” block with the human-readable reason each pattern does or doesn’t fire on each side. The headline: COU2 (the higher-risk Ventricular Assist Device application) trips a Critical W-PROV-01 (broken provenance chain) and a Critical COMPOUND-01 (Critical+High coexistence) that don’t fire under COU1’s lower MRL — even though COU1 has more raw weakeners by count. The C3 engine is correctly weighting risk-driven severity, not raw frequency.


UofA is grounded in existing standards rather than inventing new ones:

  • ASME V&V 40-2018 — Credibility factors, model risk framework, and the Context of Use (COU) concept that drives per-factor assessment
  • FDA 2023 Final Guidance on CM&S Credibility — Regulatory expectations for credibility evidence in medical device submissions
  • NASA-STD-7009B — CMS credibility assessment standard for models and simulations
  • W3C PROV-DM / PROV-O — Provenance data model for artifact lineage
  • W3C SHACL — Shapes Constraint Language for RDF graph validation
  • JSON-LD 1.1 — Linked data serialization that stays human-readable

Every UofA carries a real cryptographic hash and digital signature — not placeholders.

LevelWhat it checksMechanism
Format gateHash and signature are well-formedSHACL sh:pattern regex on both Minimal and Complete profiles
Content verificationHash matches the canonical document contentuofa verify recomputes SHA-256 from JSON canonical form
Cryptographic signatureDocument was signed by the declared authorityed25519 signature verification against the repo public key
Terminal window
# Mint a sealed UofA (sign after edits)
uofa sign packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld --key keys/research.key
# Verify integrity
uofa verify packs/vv40/examples/morrison/cou1/uofa-morrison-cou1.jsonld

Placeholder strings (e.g., sha256:placeholder...) fail SHACL validation by design — a UofA claiming ProfileComplete must carry a real hash.


Quality gap detection uses Apache Jena forward-chaining rules, not just SPARQL queries. The rule engine operates in two levels:

Level 1 — Core detection rules (21 patterns) match structural patterns against the evidence graph. Categories include epistemic (W-EP-), aleatory (W-AL-), ontological (W-ON-), structural (W-SI-), consistency (W-CON-), provenance (W-PROV-), and argumentation (W-AR-*). Run uofa catalog for the full list with descriptions.

Level 2 — Compound inference rules (2 active) fire on the output of Level 1 rules:

RuleWhat it detects
COMPOUND-01Critical + High weakeners coexist → escalated compound risk
COMPOUND-03Declared assurance level contradicts detected Critical gaps

(COMPOUND-02 ships in the rules file but is currently commented out pending design review; uofa catalog filters it from listing output.)

The compound rules are the key differentiator versus SPARQL. They reason about the interactions between gaps — something that requires chained forward-chaining inference. All weakener rules evaluate in a single Jena forward-chaining pass, so compound rules can reason over the full weakener set.

For the data shape (Minimal vs. Complete profiles, CredibilityFactor, WeakenerAnnotation), see docs/profiles.md.


uofa rules, check, diff, and shacl accept an --explain flag that adds a plain-language interpretation block to the structured output. The deterministic analysis remains the source of truth; the explanation is a human-readable layer for regulatory affairs and validation engineers.

Terminal window
uofa rules my-package.jsonld --explain
uofa rules my-package.jsonld --explain --explain-max-items 3
uofa rules my-package.jsonld --explain --explain-format json

Default backend is bundled Ollama (qwen3.5:4b, local-only, free). For higher quality or larger context, configure a remote backend in uofa.toml or override per invocation:

Terminal window
uofa rules my-package.jsonld --explain \
--explain-backend anthropic \
--explain-model claude-sonnet-5-2026
# requires ANTHROPIC_API_KEY in environment

Results are cached at ~/.uofa/cache/explain.db — a second invocation on the same input completes in <100 ms. Standalone re-interpretation of cached output: uofa explain --from-file cache.json.

Full documentation:


Simulation engineers fill an Excel workbook, run one command, and get a signed, validated JSON-LD evidence package. The import pipeline handles URI generation, factor standard assignment, provenance tracking, and optional signing + validation in a single invocation.

Terminal window
pip install -e '.[excel]' # one-time: adds openpyxl dependency
# Import from Excel → JSON-LD, sign, and validate in one step
uofa import my-assessment.xlsx --sign --key keys/research.key --check --pack vv40

The Excel template has 5 sheets: Assessment Summary, Model & Data, Validation Results, Credibility Factors, and Decision. Each pack provides a pre-populated template with locked factor names and dropdown validation. See packs/vv40/templates/uofa-starter-filled.xlsx for a complete filled example.


Document Extract: From Evidence Folder to Excel

Section titled “Document Extract: From Evidence Folder to Excel”

Point uofa extract at a folder of evidence documents (PDF, DOCX, XLSX, CSV, TXT, MD) and a local Ollama+qwen3.5:4b call produces a pre-filled extract Excel that you can review and import:

Terminal window
pip install 'uofa[extract]' # adds litellm + pdfplumber + python-docx
uofa setup # detect existing Ollama, pull qwen3.5:4b (~3 GB)
uofa extract path/to/evidence/ --pack vv40 -o extracted.xlsx
uofa import extracted.xlsx --sign --key keys/research.key --check --pack vv40

The extract prompt is a === SECTION === key-value format (v4-kv) that produces structurally valid output without the brace-counting failures of nested JSON. Typical wall time: 3-10 min per evidence folder on Apple Silicon depending on document size, all local — no API spend.

Validated end-to-end against:

  • The FDA Morrison case study (vv40, F1 = 1.000)
  • An aero HPT blade case (nasa-7009b, F1 = 0.973)
  • A 50-bundle synthetic eval corpus stratified across (standard × domain × quality × format) — all 19 factors detected at 100% rate, mean F1 = 0.964 dev / 0.954 test, zero bundle crashes. See docs/extract_eval_v1.md for the writeup.

To use a remote backend instead (faster, costs money):

Terminal window
uofa extract path/to/evidence/ --pack vv40 \
--extract-backend anthropic --extract-model claude-sonnet-4-6 -o extracted.xlsx
# requires ANTHROPIC_API_KEY in environment

SHACL shapes, Jena rules, templates, and extraction prompts are organized into domain packs under packs/. The core pack ships with standards-agnostic credibility assessment rules (23 weakener patterns). The vv40 pack provides the ASME V&V 40-2018 factor taxonomy (13 factors), and the nasa-7009b pack provides the NASA-STD-7009B factor taxonomy (19 factors, including 6 NASA-only lifecycle factors).

Terminal window
uofa packs # list installed packs + counts
uofa check FILE --pack vv40 # use V&V 40
uofa check FILE --pack vv40 --pack nasa-7009b # combine packs

The --pack flag on any command switches the active pack(s). Multiple packs can be specified to combine factor taxonomies and rules. Per-project rules files next to the input file still take precedence over the pack default. See packs/README.md for the full pack contract.


Terminal window
pip install uofa # CLI + bundled JAR + bundled JRE; nothing else needed
pip install 'uofa[excel]' # adds openpyxl for `uofa import`
pip install 'uofa[extract]' # adds litellm + pdfplumber + python-docx for `uofa extract`
ToolPurposeWhen you need it
Python 3.10+RuntimeAlways
Java 17+Jena rule engine (C3)Only on Intel macOS (where the bundled JRE doesn’t ship) or in source-tree dev when running outside the wheel
Maven 3.8+Build the Jena JAROnly when developing on the rule engine itself

For a zero-install try-it-out path, see docs/onboarding.md.


Terminal window
# Full pipeline (C1 + C2 + C3) on your file
uofa check path/to/your-uofa.jsonld
# Individual steps
uofa shacl path/to/your-uofa.jsonld # C2: SHACL validation
uofa verify path/to/your-uofa.jsonld # C1: Hash + signature check
uofa rules path/to/your-uofa.jsonld # C3: Jena weakener detection
# Sign with your own key
uofa sign path/to/your-uofa.jsonld --key keys/your.key
# Compare weakener profiles across two COUs
uofa diff uofa-cou1.jsonld uofa-cou2.jsonld

Full command reference (extract, import, init, validate, packs, migrate, schema, …) lives in docs/onboarding.md.



Apache License, Version 2.0 — see LICENSE for the full text and NOTICE for bundled-software attributions.

The full project (UofA ontology, JSON-LD context, SHACL shapes, reference examples, Jena rule implementations, and the CLI) is licensed under Apache 2.0. Bundled third-party components retain their own licenses as enumerated in NOTICE (e.g., OpenJDK GPLv2-CE, Ollama MIT).


Contributions are welcome, especially real-world UofA examples from practitioners working with CM&S credibility assessment. If you are preparing a CM&S-supported regulatory submission and want to explore UofA packaging for your evidence, please reach out.

For contributors, see CONTRIBUTING.md, docs/repo-layout.md, and docs/onboarding.md.

Website: uofa.net