WorldWideScience

Sample records for a codes

  1. Safety Code A12

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  2. Code A1 Revised

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  3. A modular code supervisor

    Large industrial computer CEA codes in the field of scientific computing, mechanics, thermohydraulics, and neutronics, are decomposed in sets of separate modules. Each module performs a well-defined task and all information exchanged by the modules are contained in data structures, taken as input or given as output. The advantage of this structure is the great flexibility offered to experienced user to solve a large number of different problems, but to choose, order, monitor large sequences of modules and understand what each module requires as input and output is out of the interest of the common user. The aim is to conserve entirely this flexibility in dealing with knowledge relevant from scientific or technical fields and not from the code itself. The first part of this paper describes the three main steps of the software: specification phase, generating algorithm, translation in code command language. The second part describes how the authors obtain explanations from the modelization of operators and from a particular representation of the internal structure of the generated particular representation of the internal structure of the generated plan (triangular table) that lead to a generalization allowing synthesis of sequences of operators or the transformations of the total order of the generated plan in a partial one. The software is the first part of the modular codes supervisor. It was applied to CRONOS, neutronic reactor core code, which has the command language GIBIANE. It will be extended to the reactor calculations supervisor, SAGA, using the ensemble of the codes developed by CEA/DMT/SERMA

  4. IMP: A performance code

    Dauro, Vincent A., Sr.

    IMP (Integrated Mission Program) is a simulation language and code used to model present and future Earth, Moon, or Mars missions. The profile is user controlled through selection from a large menu of events and maneuvers. A Fehlberg 7/13 Runge-Kutta integrator with error and step size control is used to numerically integrate the differential equations of motion (DEQ) of three spacecraft, a main, a target, and an observer. Through selection, the DEQ's include guided thrust, oblate gravity, atmosphere drag, solar pressure, and Moon gravity effects. Guide parameters for thrust events and performance parameters of velocity changes (Delta-V) and propellant usage (maximum of five systems) are developed as needed. Print, plot, summary, and debug files are output.

  5. Geochemical computer codes. A review

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  6. Combinatorial neural codes from a mathematical coding theory perspective.

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  7. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  8. Revised Safety Code A2

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  9. The Tap code - a code similar to Morse code for communication by tapping

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  10. NESTLE: A nodal kinetics code

    The NESTLE nodal kinetics code has been developed for utilization as a stand-alone code for steady-state and transient reactor neutronic analysis and for incorporation into system transient codes, such as TRAC and RELAP. The latter is desirable to increase the simulation fidelity over that obtained from currently employed zero- and one-dimensional neutronic models and now feasible due to advances in computer performance and efficiency of nodal methods. As a stand-alone code, requirements are that it operate on a range of computing platforms from memory-limited personal computers (PCs) to supercomputers with vector processors. This paper summarizes the features of NESTLE that reflect the utilization and requirements just noted

  11. A New Method for Constructing Circuit Codes

    Byrnes, Kevin M.

    2016-01-01

    Circuit codes are constructed from induced cycles in the graph of the $n$ dimensional hypercube. They are both theoretically and practically important, as circuit codes can be used as error correcting codes. When constructing circuit codes, the length of the cycle determines its accuracy and a parameter called the spread determines how many errors it can detect. We present a new method for constructing a circuit code of spread $k+1$ from a circuit code of spread $k$. This method leads to reco...

  12. Calcium: a code coupling tool

    Today, the calculation performances of computers allow the precise and global simulation of complex industrial processes such as the functioning of a nuclear reactor core. One can question the need for the elaboration of new global numerical models in order to make use of the overall capability of computers. Another less time consuming solution consist in the coupling of existing well validated numerical models in order to make them working together. This paper presents the basic principles of the coupling of numerical codes, the tools required, the Calcium tool for codes coupling and an example of application of this tool in the coupling of the THYC (EdF), COCCINELLE (EdF) and CATHARE (CEA-EdF-Framatome) codes for the modeling of the thermal-hydraulic and neutronic behaviour of a reactor core during accidental situation. (J.S.)

  13. Requirements of a Better Secure Program Coding

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  14. HADES, A Radiographic Simulation Code

    Aufderheide, M.B.; Slone, D.M.; Schach von Wittenau, A.E.

    2000-08-18

    We describe features of the HADES radiographic simulation code. We begin with a discussion of why it is useful to simulate transmission radiography. The capabilities of HADES are described, followed by an application of HADES to a dynamic experiment recently performed at the Los Alamos Neutron Science Center. We describe quantitative comparisons between experimental data and HADES simulations using a copper step wedge. We conclude with a short discussion of future work planned for HADES.

  15. The Proteomic Code: a molecular recognition code for proteins

    Biro Jan C

    2007-11-01

    Full Text Available Abstract Background The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. Review The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. Methods and conclusions A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides.

  16. A class of Sudan-decodable codes

    Nielsen, Rasmus Refslund

    2000-01-01

    In this article, Sudan's algorithm is modified into an efficient method to list-decode a class of codes which can be seen as a generalization of Reed-Solomon codes. The algorithm is specialized into a very efficient method for unique decoding. The code construction can be generalized based on...... algebraic-geometry codes and the decoding algorithms are generalized accordingly. Comparisons with Reed-Solomon and Hermitian codes are made....

  17. User's manual for a measurement simulation code

    The MEASIM code has been developed primarily for modeling process measurements in materials processing facilities associated with the nuclear fuel cycle. In addition, the code computes materials balances and the summation of materials balances along with associated variances. The code has been used primarily in performance assessment of materials' accounting systems. This report provides the necessary information for a potential user to employ the code in these applications. A number of examples that demonstrate most of the capabilities of the code are provided

  18. Why comply with a code of ethics?

    Spielthenner, Georg

    2015-05-01

    A growing number of professional associations and occupational groups are creating codes of ethics with the goal of guiding their members, protecting service users, and safeguarding the reputation of the profession. There is a great deal of literature dealing with the question to what extent ethical codes can achieve their desired objectives. The present paper does not contribute to this debate. Its aim is rather to investigate how rational it is to comply with codes of conduct. It is natural and virtually inevitable for a reflective person to ask why one should pay any attention to ethical codes, in particular if following a code is not in one's own interest. In order to achieve the aim of this paper, I shall (in "Quasi-reasons for complying with an ethical code" section) discuss reasons that only appear to be reasons for complying with a code. In "Code-independent reasons" section, I shall present genuine practical reasons that, however, turn out to be reasons of the wrong kind. In "Code-dependent reasons" section finally presents the most important reasons for complying with ethical codes. The paper argues that while ethical codes do not necessarily yield reasons for action, professionals can have genuine reasons for complying with a code, which may, however, be rather weak and easily overridden by reasons for deviating from the code. PMID:25185873

  19. A Mobile Application Prototype using Network Coding

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank; Larsen, Torben

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report on practical measurement results of coding throughput and energy consumption for a single-source multiple-sinks network, with and without recoding at the sinks. These results confirm that network cod...

  20. Scintiscanning with a coded aperture

    In scintigraphy the quality of the recorded image is a function of the quantum statistics of the photons, because only a small number of photons are available for an image. If the apertured or parallel-hole collimator is replaced by a coded aperture, e.g., a Fresnel-type zone plate of the proper size, a much larger fraction of the gamma quanta emitted by the object under investigation are captured, and there is no loss in resolution. A technique is described which allows the sequential reconstruction of various planes of the object while, at the same time, eliminating the spurious constant light fraction. For recording of the incoherent gamma hologram an on-axis zone plate can be used. In the coherent-optical reconstruction the gamma hologram is correlated with the zone plate used for the recording process. The experimental results shown are optical reconstructions of phantoms filled with 57Co. (orig./ORU)

  1. A Mobile Application Prototype using Network Coding

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank;

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  2. Secrecy Gain: a Wiretap Lattice Code Design

    Belfiore, Jean-Claude

    2010-01-01

    We propose the notion of secrecy gain as a code design criterion for wiretap lattice codes to be used over an additive white Gaussian noise channel. Our analysis relies on the error probabilites of both the legitimate user and the eavesdropper. We focus on geometrical properties of lattices, described by their theta series, to characterize good wiretap codes.

  3. A Simple and a Retargetable Code Generator for TCGS

    Ruys, T.C.

    1995-01-01

    The Twente Compiler Generator System (TCGS) is a parser-generator system which is typically used to generate a compiler that, given an input program, generates abstract stack code. A code generator for TCGS translates this stack code generated by a TCGS compiler to assembler code for a particular target machine. This thesis discusses two code generators for TCGS: GUMP and COGGEN. The simplest strategy to translate stack code into assembler code is to macro expand each stack code instruction t...

  4. On Construction of Optimal A2-Codes

    HU Lei

    2001-01-01

    Two authentication codes with arbitration (A2-codes) are constrructed from finite affine spaces to illustrate for the first time that the information-theoretic lower bounds for A2-codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encoding\\ decoding rules are not genuine ones. As an analogue of 3-dimensional case, an A2-code from 4-dimensional finite projective spaces is constructed, which neets both the information-theoretic and combinatorial lower bounds.

  5. SCAT2: a spherical optical model code

    This note describes, after a short summary of the relevant theoretical formulae, the spherical optical model code SCAT2. This code is highly modular and employs recent numerical methods, in particular for the Coulomb functions calculations. The amount of input data is kept minimal in order to make use of the program extremely simple. The listing and some test cases are given in the appendix. The code is being extensively used in the field of nuclear evaluation

  6. JPIC & How to make a PIC code

    Wu, Hui-Chun

    2011-01-01

    Author developed the parallel fully kinetic particle-in-cell (PIC) code JPIC based on updated and advanced algorithms (e.g. numerical-dispersion-free electromagnetic field solver) for simulating laser plasma interactions. Basic technical points and hints of PIC programming and parallel programming by message passing interface (MPI) are reviewed. Most of contents come from Author's notes when writing up JPIC and experiences when using the code to solve different problems. Enough "how-to-do-it" information should help a new beginner to effectively build up his/her own PIC code. General advices on how to use a PIC code are also given.

  7. Source Code Plagiarism--A Student Perspective

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  8. A Fortran 90 code for magnetohydrodynamics

    This report describes progress in developing a Fortran 90 version of the KITE code for studying plasma instabilities in Tokamaks. In particular, the evaluation of convolution terms appearing in the numerical solution is discussed, and timing results are presented for runs performed on an 8k processor Connection Machine (CM-2). Estimates of the performance on a full-size 64k CM-2 are given, and range between 100 and 200 Mflops. The advantages of having a Fortran 90 version of the KITE code are stressed, and the future use of such a code on the newly announced CM5 and Paragon computers, from Thinking Machines Corporation and Intel, is considered

  9. QUIL: a chemical equilibrium code. [HTGR

    Lunsford, J.L.

    1977-02-01

    A chemical equilibrium code QUIL is described, along with two support codes FENG and SURF. QUIL is designed to allow calculations on a wide range of chemical environments, which may include surface phases. QUIL was written specifically to calculate distributions associated with complex equilibria involving fission products in the primary coolant loop of the high-temperature gas-cooled reactor. QUIL depends upon an energy-data library called ELIB. This library is maintained by FENG and SURF. FENG enters into the library all reactions having standard free energies of reaction that are independent of concentration. SURF enters all surface reactions into ELIB. All three codes are interactive codes written to be used from a remote terminal, with paging control provided. Plotted output is also available.

  10. Predictive coding as a model of cognition.

    Spratling, M W

    2016-08-01

    Previous work has shown that predictive coding can provide a detailed explanation of a very wide range of low-level perceptual processes. It is also widely believed that predictive coding can account for high-level, cognitive, abilities. This article provides support for this view by showing that predictive coding can simulate phenomena such as categorisation, the influence of abstract knowledge on perception, recall and reasoning about conceptual knowledge, context-dependent behavioural control, and naive physics. The particular implementation of predictive coding used here (PC/BC-DIM) has previously been used to simulate low-level perceptual behaviour and the neural mechanisms that underlie them. This algorithm thus provides a single framework for modelling both perceptual and cognitive brain function. PMID:27118562

  11. An Analysis Of Code Switching And Code Mixing Used In A Talk Show Hitam Putih

    Sari, Dewi Maya

    2015-01-01

    In thesis entitled An Analysis of Code Switching and Code Mixing Used in Talk Show Hitam Putih, the author analyzes two types of code switching and code based on two types of mixed Wardaugh theory. The fourth type can be determined by the use of more than one language in an utterance. The purpose of this thesis is to find the types of code switching and code mixing contained in the speech Deddy Corbuzier as presenter in Talk Show Hitam Putih and Nadya Hutagalung as a celebrity guest. Steps ta...

  12. TEA: A Code Calculating Thermochemical Equilibrium Abundances

    Blecic, Jasmina; Harrington, Joseph; Bowman, M. Oliver

    2016-07-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. and Eriksson. It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature–pressure pairs. We tested the code against the method of Burrows & Sharp, the free thermochemical equilibrium code Chemical Equilibrium with Applications (CEA), and the example given by Burrows & Sharp. Using their thermodynamic data, TEA reproduces their final abundances, but with higher precision. We also applied the TEA abundance calculations to models of several hot-Jupiter exoplanets, producing expected results. TEA is written in Python in a modular format. There is a start guide, a user manual, and a code document in addition to this theory paper. TEA is available under a reproducible-research, open-source license via https://github.com/dzesmin/TEA.

  13. CATHENA 4. A thermalhydraulics network analysis code

    Canadian Algorithm for THErmalhydraulic Network Analysis (CATHENA) is a one-dimensional, non-equilibrium, two-phase, two fluid network analysis code that has been in use for over two decades by various groups in Canada and around the world. The objective of the present paper is to describe the design, application and future development plans for the CATHENA 4 thermalhydraulics network analysis code, which is a modernized version of the present frozen CATHENA 3 code. The new code is designed in modular form, using the Fortran 95 (F95) programming language. The semi-implicit numerical integration scheme of CATHENA 3 is re-written to implement a fully-implicit methodology using Newton's iterative solution scheme suitable for nonlinear equations. The closure relations, as a first step, have been converted from the existing CATHENA 3 implementation to F95 but modularized to achieve ease of maintenance. The paper presents the field equations, followed by a description of the Newton's scheme used. The finite-difference form of the field equations is given, followed by a discussion of convergence criteria. Two applications of CATHENA 4 are presented to demonstrate the temporal and spatial convergence of the new code for problems with known solutions or available experimental data. (author)

  14. Code-Switching: L1-Coded Mediation in a Kindergarten Foreign Language Classroom

    Lin, Zheng

    2012-01-01

    This paper is based on a qualitative inquiry that investigated the role of teachers' mediation in three different modes of coding in a kindergarten foreign language classroom in China (i.e. L2-coded intralinguistic mediation, L1-coded cross-lingual mediation, and L2-and-L1-mixed mediation). Through an exploratory examination of the varying effects…

  15. Finding the Key to a Better Code: Code Team Restructure to Improve Performance and Outcomes

    Prince, Cynthia R.; Hines, Elizabeth J.; Chyou, Po-Huang; Heegeman, David J.

    2014-01-01

    Code teams respond to acute life threatening changes in a patient’s status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team’s resuscitation could be hindered. To improve the overall performance of our hospital’s code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team parti...

  16. ELISE, a code for intensity dependent effects

    The Electron ring Limits on Intensity, Stability, and Emittance (ELISE) code described in this paper computes many of the intensity dependent effects of interest to the builder of a small electron storage ring. ELISE is a program, developed largely for the author's own use, which duplicates many of the functions provided by the more general program ZAP developed by the Berkeley group. The motivation for the code was to provide an interactive system for quick answers that could be used during accelerator commissioning. A lattice program, IDA, developed earlier by the author while at Brookhaven National Laboratory, provides a good model of the type of user friendly interaction that would be desirable in such a code

  17. Optical implementation of a unitarily correctable code

    Schreiter, Kurt M; Kaltenbaek, Rainer; Resch, Kevin J; Kribs, David W; 10.1103/PhysRevA.80.022311

    2009-01-01

    Noise poses a challenge for any real-world implementation in quantum information science. The theory of quantum error correction deals with this problem via methods to encode and recover quantum information in a way that is resilient against that noise. Unitarily correctable codes are an error correction technique wherein a single unitary recovery operation is applied without the need for an ancilla Hilbert space. Here, we present the first optical implementation of a non-trivial unitarily correctable code for a noisy quantum channel with no decoherence-free subspaces or noiseless subsystems. We show that recovery of our initial states is achieved with high fidelity (>=0.97), quantitatively proving the efficacy of this unitarily correctable code.

  18. FREEFALL: A seabed penetrator flight code

    This report presents a one-dimensional model and computer program for predicting the motion of seabed penetrators. The program calculates the acceleration, velocity, and depth of a penetrator as a function of time from the moment of launch until the vehicle comes to rest in the sediment. The code is written in Pascal language for use on a small personal computer. Results are presented as printed tables and graphs. A comparison with experimental data is given which indicates that the accuracy of the code is perhaps as good as current techniques for measuring vehicle performance. 31 refs., 12 figs., 5 tabs

  19. Should managers have a code of conduct?

    Bayliss, P

    1994-02-01

    Much attention is currently being given to values and ethics in the NHS. Issues of accountability are being explored as a consequence of the Cadbury report. The Institute of Health Services Management (IHSM) is considering whether managers should have a code of ethics. Central to this issue is what managers themselves think; the application of such a code may well stand or fall by whether managers are prepared to have ownership of it, and are prepared to make it work. Paul Bayliss reports on a survey of managers' views. PMID:10134423

  20. A Network Coding Approach to Loss Tomography

    Sattari, Pegah; Markopoulou, Athina; Fragouli, Christina;

    2013-01-01

    Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of interest is the loss rate of individual links. There is a significant body of work dedicated to this problem using...... multicast and/or unicast end-to-end probes. Independently, recent advances in network coding have shown that there are several advantages from allowing intermediate nodes to process and combine, in addition to just forward, packets. In this paper, we pose the problem of loss tomography in networks that have...... network coding capabilities. We design a framework for estimating link loss rates, which leverages network coding capabilities and we show that it improves several aspects of tomography, including the identifiability of links, the tradeoff between estimation accuracy and bandwidth efficiency, and the...

  1. The politics of a European civil code

    M.W. Hesselink

    2004-01-01

    Last year the European Commission published its Action Plan on European contract law. That plan forms an important step towards a European Civil Code. In its Plan, the Commission tries to depoliticise the codification process by asking a group of academic experts to prepare what it calls a 'common f

  2. A Code of Ethics for Democratic Leadership

    Molina, Ricardo; Klinker, JoAnn Franklin

    2012-01-01

    Democratic leadership rests on sacred values, awareness, judgement, motivation and courage. Four turning points in a 38-year school administrator's career revealed decision-making in problematic moments stemmed from values in a personal and professional code of ethics. Reflection on practice and theory added vocabulary and understanding to make…

  3. TACO: a finite element heat transfer code

    TACO is a two-dimensional implicit finite element code for heat transfer analysis. It can perform both linear and nonlinear analyses and can be used to solve either transient or steady state problems. Either plane or axisymmetric geometries can be analyzed. TACO has the capability to handle time or temperature dependent material properties and materials may be either isotropic or orthotropic. A variety of time and temperature dependent loadings and boundary conditions are available including temperature, flux, convection, and radiation boundary conditions and internal heat generation. Additionally, TACO has some specialized features such as internal surface conditions (e.g., contact resistance), bulk nodes, enclosure radiation with view factor calculations, and chemical reactive kinetics. A user subprogram feature allows for any type of functional representation of any independent variable. A bandwidth and profile minimization option is also available in the code. Graphical representation of data generated by TACO is provided by a companion post-processor named POSTACO. The theory on which TACO is based is outlined, the capabilities of the code are explained, the input data required to perform an analysis with TACO are described. Some simple examples are provided to illustrate the use of the code

  4. CHEETAH: A next generation thermochemical code

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  5. FLUKA: A Multi-Particle Transport Code

    Ferrari, A.; Sala, P.R.; /CERN /INFN, Milan; Fasso, A.; /SLAC; Ranft, J.; /Siegen U.

    2005-12-14

    This report describes the 2005 version of the Fluka particle transport code. The first part introduces the basic notions, describes the modular structure of the system, and contains an installation and beginner's guide. The second part complements this initial information with details about the various components of Fluka and how to use them. It concludes with a detailed history and bibliography.

  6. A simpler derivation of the coding theorem

    Lomnitz, Yuval

    2012-01-01

    A simple proof for the Shannon coding theorem, using only the Markov inequality, is presented. The technique is useful for didactic purposes, since it does not require many preliminaries and the information density and mutual information follow naturally in the proof. It may also be applicable to situations where typicality is not natural.

  7. A coding and high voltage driving module

    A coding and high-voltage pulse driving module used in free-space quantum communication is described. This module generate random control signal to drive High-Voltage Pulse generator to control receiver’s polarization, receive detector signal and encode them by signal channel. (authors)

  8. Building a Hydrodynamics Code with Kinetic Theory

    Sagert, Irina; Colbry, Dirk; Pickett, Rodney; Strother, Terrance

    2013-01-01

    We report on the development of a test-particle based kinetic Monte Carlo code for large systems and its application to simulate matter in the continuum regime. Our code combines advantages of the Direct Simulation Monte Carlo and the Point-of-Closest-Approach methods to solve the collision integral of the Boltzmann equation. With that, we achieve a high spatial accuracy in simulations while maintaining computational feasibility when applying a large number of test-particles. The hybrid setup of our approach allows us to study systems which move in and out of the hydrodynamic regime, with low and high particle densities. To demonstrate our code's ability to reproduce hydrodynamic behavior we perform shock wave simulations and focus here on the Sedov blast wave test. The blast wave problem describes the evolution of a spherical expanding shock front and is an important verification problem for codes which are applied in astrophysical simulation, especially for approaches which aim to study core-collapse supern...

  9. SCANAIR: A transient fuel performance code

    Highlights: • Since the early 1990s, the code SCANAIR is developed at IRSN. • The software focuses on studying fast transients such as RIA in light water reactors. • The fuel rod modelling is based on a 1.5D approach. • Thermal and thermal-hydraulics, mechanical and gas behaviour resolutions are coupled. • The code is used for safety assessment and integral tests analysis. - Abstract: Since the early 1990s, the French “Institut de Radioprotection et de Sûreté Nucléaire” (IRSN) has developed the SCANAIR computer code with the view to analysing pressurised water reactor (PWR) safety. This software specifically focuses on studying fast transients such as reactivity-initiated accidents (RIA) caused by possible ejection of control rods. The code aims at improving the global understanding of the physical mechanisms governing the thermal-mechanical behaviour of a single rod. It is currently used to analyse integral tests performed in CABRI and NSRR experimental reactors. The resulting validated code is used to carry out studies required to evaluate margins in relation to criteria for different types of fuel rods used in nuclear power plants. Because phenomena occurring during fast power transients are complex, the simulation in SCANAIR is based on a close coupling between several modules aimed at modelling thermal, thermal-hydraulics, mechanical and gas behaviour. During the first stage of fast power transients, clad deformation is mainly governed by the pellet–clad mechanical interaction (PCMI). At the later stage, heat transfers from pellet to clad bring the cladding material to such high temperatures that the boiling crisis might occurs. The significant over-pressurisation of the rod and the fact of maintaining the cladding material at elevated temperatures during a fairly long period can lead to ballooning and possible clad failure. A brief introduction describes the context, the historical background and recalls the main phenomena involved under

  10. A method for scientific code coupling in a distributed environment

    This guide book deals with coupling of big scientific codes. First, the context is introduced: big scientific codes devoted to a specific discipline coming to maturity, and more and more needs in terms of multi discipline studies. Then we describe different kinds of code coupling and an example of code coupling: 3D thermal-hydraulic code THYC and 3D neutronics code COCCINELLE. With this example we identify problems to be solved to realize a coupling. We present the different numerical methods usable for the resolution of coupling terms. This leads to define two kinds of coupling: with the leak coupling, we can use explicit methods, and with the strong coupling we need to use implicit methods. On both cases, we analyze the link with the way of parallelizing code. For translation of data from one code to another, we define the notion of Standard Coupling Interface based on a general structure for data. This general structure constitutes an intermediary between the codes, thus allowing a relative independence of the codes from a specific coupling. The proposed method for the implementation of a coupling leads to a simultaneous run of the different codes, while they exchange data. Two kinds of data communication with message exchange are proposed: direct communication between codes with the use of PVM product (Parallel Virtual Machine) and indirect communication with a coupling tool. This second way, with a general code coupling tool, is based on a coupling method, and we strongly recommended to use it. This method is based on the two following principles: re-usability, that means few modifications on existing codes, and definition of a code usable for coupling, that leads to separate the design of a code usable for coupling from the realization of a specific coupling. This coupling tool available from beginning of 1994 is described in general terms. (authors). figs., tabs

  11. QUIC: a chemical kinetics code for use with the chemical equilibrium code QUIL

    A chemical rate kinetics code QUIC is described, along with a support code RATE. QUIC is designed to allow chemical kinetics calculations on a wide variety of chemical environments while operating in the overlay environment of the chemical equilibrium code QUIL. QUIC depends upon a rate-data library called LIBR. This library is maintained by RATE. RATE enters into the library all reactions in a standardized format. The code QUIC, operating in conjunction with QUIL, is interactive and written to be used from a remote terminal, with paging control provided. Plotted output is also available

  12. Cluster Computing: A Mobile Code Approach

    Patel, R. B.; Manpreet Singh

    2006-01-01

    Cluster computing harnesses the combined computing power of multiple processors in a parallel configuration. Cluster Computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. In this paper we have presented design and implementation of a cluster based framework using mobile code. The cluster implementation involves the designing of a server named MCLUSTER which manages the configuring, resetting of clust...

  13. ABINIT: a computer code for matter

    The PAW (Projector Augmented Wave) method has been implemented in the ABINIT Code that computes electronic structures in atoms. This method relies on the simultaneous use of a set of auxiliary functions (in plane waves) and a sphere around each atom. This method allows the computation of systems including many atoms and gives the expression of energy, forces, stress... in terms of the auxiliary function only. We have generated atomic data for iron at very high pressure (over 200 GPa). We get a bcc-hcp transition around 10 GPa and the magnetic order disappears around 50 GPa. This method has been validated on a series of metals. The development of the PAW method has required a great effort for the massive parallelization of the ABINIT code. (A.C.)

  14. Towards a biological coding theory discipline.

    May, Elebeoba Eni

    2003-09-01

    How can information required for the proper functioning of a cell, an organism, or a species be transmitted in an error-introducing environment? Clearly, similar to engineering communication systems, biological systems must incorporate error control in their information transmissino processes. if genetic information in the DNA sequence is encoded in a manner similar to error control encoding, the received sequence, the messenger RNA (mRNA) can be analyzed using coding theory principles. This work explores potential parallels between engineering communication systems and the central dogma of genetics and presents a coding theory approach to modeling the process of protein translation initiation. The messenger RNA is viewed as a noisy encoded sequence and the ribosoe as an error control decoder. Decoding models based on chemical and biological characteristics of the ribosome and the ribosome binding site of the mRNA are developed and results of applying the models to the Escherichia coli K-12 are presented.

  15. Source coding for a simple multi-hop network

    Gu, Wei-Hsin; Effros, Michelle

    2005-01-01

    We derive the rate-distortion region for source coding on a simple multihop network with side information. The result represents the first complete solution to a multihop source coding problem. The proof technique combines ideas from Wyner-Ziv coding and coding with unreliable side information.

  16. CAFE: A New Relativistic MHD Code

    Lora-Clavijo, F. D.; Cruz-Osorio, A.; Guzmán, F. S.

    2015-06-01

    We introduce CAFE, a new independent code designed to solve the equations of relativistic ideal magnetohydrodynamics (RMHD) in three dimensions. We present the standard tests for an RMHD code and for the relativistic hydrodynamics regime because we have not reported them before. The tests include the one-dimensional Riemann problems related to blast waves, head-on collisions of streams, and states with transverse velocities, with and without magnetic field, which is aligned or transverse, constant or discontinuous across the initial discontinuity. Among the two-dimensional (2D) and 3D tests without magnetic field, we include the 2D Riemann problem, a one-dimensional shock tube along a diagonal, the high-speed Emery wind tunnel, the Kelvin-Helmholtz (KH) instability, a set of jets, and a 3D spherical blast wave, whereas in the presence of a magnetic field we show the magnetic rotor, the cylindrical explosion, a case of Kelvin-Helmholtz instability, and a 3D magnetic field advection loop. The code uses high-resolution shock-capturing methods, and we present the error analysis for a combination that uses the Harten, Lax, van Leer, and Einfeldt (HLLE) flux formula combined with a linear, piecewise parabolic method and fifth-order weighted essentially nonoscillatory reconstructors. We use the flux-constrained transport and the divergence cleaning methods to control the divergence-free magnetic field constraint.

  17. OSCAR a Matlab based optical FFT code

    Degallaix, Jerome, E-mail: Jerome.degallaix@aei.mpg.d [Max-Planck-Institut fuer Gravitationsphysik (Albert-Einstein-Institut) and Leibniz Universitaet Hannover, Callinstr. 38, 30167 Hannover (Germany)

    2010-05-01

    Optical simulation softwares are essential tools for designing and commissioning laser interferometers. This article aims to introduce OSCAR, a Matlab based FFT code, to the experimentalist community. OSCAR (Optical Simulation Containing Ansys Results) is used to simulate the steady state electric fields in optical cavities with realistic mirrors. The main advantage of OSCAR over other similar packages is the simplicity of its code requiring only a short time to master. As a result, even for a beginner, it is relatively easy to modify OSCAR to suit other specific purposes. OSCAR includes an extensive manual and numerous detailed examples such as simulating thermal aberration, calculating cavity eigen modes and diffraction loss, simulating flat beam cavities and three mirror ring cavities. An example is also provided about how to run OSCAR on the GPU of modern graphic cards instead of the CPU, making the simulation up to 20 times faster.

  18. A Students Attendance System Using QR Code

    Fadi Masalha; Nael Hirzallah

    2014-01-01

    Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the co...

  19. Random Linear Network Coding: A free cipher?

    Lima, Luísa; Médard, Muriel; Barros, João

    2007-01-01

    We consider the level of information security provided by random linear network coding in network scenarios in which all nodes comply with the communication protocols yet are assumed to be potential eavesdroppers (i.e. "nice but curious"). For this setup, which differs from wiretapping scenarios considered previously, we develop a natural algebraic security criterion, and prove several of its key properties. A preliminary analysis of the impact of network topology on the overall network codin...

  20. A Graph Minor Perspective to Multicast Network Coding

    Yin, Xunrui; Wang, Yan; Li, Zongpeng; Wang, Xin; Xue, Xiangyang

    2013-01-01

    Network Coding encourages information coding across a communication network. While the necessity, benefit and complexity of network coding are sensitive to the underlying graph structure of a network, existing theory on network coding often treats the network topology as a black box, focusing on algebraic or information theoretic aspects of the problem. This work aims at an in-depth examination of the relation between algebraic coding and network topologies. We mathematically establish a seri...

  1. A molecular dynamics simulation code ISIS

    Computer simulation based on the molecular dynamics (MD) method has become an important tool complementary to experiments and theoretical calculations in a wide range of scientific fields such as physics, chemistry, biology, and so on. In the MD method, the Newtonian equations-of-motion of classical particles are integrated numerically to reproduce a phase-space trajectory of the system. In the 1980's, several new techniques have been developed for simulation at constant-temperature and/or constant-pressure in convenient to compare result of computer simulation with experimental results. We first summarize the MD method for both microcanonical and canonical simulations. Then, we present and overview of a newly developed ISIS (Isokinetic Simulation of Soft-spheres) code and its performance on various computers including vector processors. The ISIS code has a capability to make a MD simulation under constant-temperature condition by using the isokinetic constraint method. The equations-of-motion is integrated by a very accurate fifth-order finite differential algorithm. The bookkeeping method is also utilized to reduce the computational time. Furthermore, the ISIS code is well adopted for vector processing: Speedup ratio ranged from 16 to 24 times is obtained on a VP2600/10 vector processor. (author)

  2. Cluster Computing: A Mobile Code Approach

    R. B. Patel

    2006-01-01

    Full Text Available Cluster computing harnesses the combined computing power of multiple processors in a parallel configuration. Cluster Computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. In this paper we have presented design and implementation of a cluster based framework using mobile code. The cluster implementation involves the designing of a server named MCLUSTER which manages the configuring, resetting of cluster. It allows a user to provide necessary information regarding the application to be executed via a graphical user interface (GUI. Framework handles- the generation of application mobile code and its distribution to appropriate client nodes, efficient handling of results so generated and communicated by a number of client nodes and recording of execution time of application. The client node receives and executes the mobile code that defines the distributed job submitted by MCLUSTER server and replies the results back. We have also the analyzed the performance of the developed system emphasizing the tradeoff between communication and computation overhead.

  3. A mean field theory of coded CDMA systems

    We present a mean field theory of code-division multiple-access (CDMA) systems with error-control coding. On the basis of the relation between the free energy and mutual information, we obtain an analytical expression of the maximum spectral efficiency of the coded CDMA system, from which a mean-field description of the coded CDMA system is provided in terms of a bank of scalar Gaussian channels whose variances in general vary at different code symbol positions. Regular low-density parity-check (LDPC)-coded CDMA systems are also discussed as an example of the coded CDMA systems

  4. A mean field theory of coded CDMA systems

    Yano, Toru [Graduate School of Science and Technology, Keio University, Hiyoshi, Kohoku-ku, Yokohama-shi, Kanagawa 223-8522 (Japan); Tanaka, Toshiyuki [Graduate School of Informatics, Kyoto University, Yoshida Hon-machi, Sakyo-ku, Kyoto-shi, Kyoto 606-8501 (Japan); Saad, David [Neural Computing Research Group, Aston University, Birmingham B4 7ET (United Kingdom)], E-mail: yano@thx.appi.keio.ac.jp

    2008-08-15

    We present a mean field theory of code-division multiple-access (CDMA) systems with error-control coding. On the basis of the relation between the free energy and mutual information, we obtain an analytical expression of the maximum spectral efficiency of the coded CDMA system, from which a mean-field description of the coded CDMA system is provided in terms of a bank of scalar Gaussian channels whose variances in general vary at different code symbol positions. Regular low-density parity-check (LDPC)-coded CDMA systems are also discussed as an example of the coded CDMA systems.

  5. CAFE: A New Relativistic MHD Code

    Lora-Clavijo, F D; Guzman, F S

    2014-01-01

    We present CAFE, a new independent code designed to solve the equations of Relativistic ideal Magnetohydrodynamics (RMHD) in 3D. We present the standard tests for a RMHD code and for the Relativistic Hydrodynamics (RMD) regime since we have not reported them before. The tests include the 1D Riemann problems related to blast waves, head-on collision of streams and states with transverse velocities, with and without magnetic field, which is aligned or transverse, constant or discontinuous across the initial discontinuity. Among the 2D tests, without magnetic field we include the 2D Riemann problem, the high speed Emery wind tunnel, the Kelvin-Helmholtz instability test and a set of jets, whereas in the presence of a magnetic field we show the magnetic rotor, the cylindrical explosion and the Kelvin-Helmholtz instability. The code uses High Resolution Shock Capturing methods and as a standard set up we present the error analysis with a simple combination that uses the HLLE flux formula combined with linear, PPM ...

  6. A Students Attendance System Using QR Code

    Fadi Masalha

    2014-01-01

    Full Text Available Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the code in order to confirm their attendance. The paper explains the high level implementation details of the proposed system. It also discusses how the system verifies student identity to eliminate false registrations.

  7. A Method for Automated Program Code Testing

    Sigitas DRĄSUTIS

    2010-10-01

    Full Text Available The Internet has recently encouraged the society to convert almost all its needs to electronic resources such as e-libraries, e-cultures, e-entertainment as well as e-learning, which has become a radical idea to increase the effectiveness of learning services in most schools, colleges and universities. E-learning can not be completely featured and met without e-testing. However, in many cases e-testing tools are suitable just for traditional/theoretical knowledge testing, covered by such items as questions, quizzes, matching boxes and other. The article ``A Method for Automated Program Code Testing'' tackles the lack of functions in e-testing systems and suggests e-assessment possibilities for students who study computer science, especially programming. The article analyzes the method that allows freely entering answers to questions, checking program syntax during the testing and enables automatic written code checking and evaluation.

  8. Xenomicrobiology: a roadmap for genetic code engineering.

    Acevedo-Rocha, Carlos G; Budisa, Nediljko

    2016-09-01

    Biology is an analytical and informational science that is becoming increasingly dependent on chemical synthesis. One example is the high-throughput and low-cost synthesis of DNA, which is a foundation for the research field of synthetic biology (SB). The aim of SB is to provide biotechnological solutions to health, energy and environmental issues as well as unsustainable manufacturing processes in the frame of naturally existing chemical building blocks. Xenobiology (XB) goes a step further by implementing non-natural building blocks in living cells. In this context, genetic code engineering respectively enables the re-design of genes/genomes and proteins/proteomes with non-canonical nucleic (XNAs) and amino (ncAAs) acids. Besides studying information flow and evolutionary innovation in living systems, XB allows the development of new-to-nature therapeutic proteins/peptides, new biocatalysts for potential applications in synthetic organic chemistry and biocontainment strategies for enhanced biosafety. In this perspective, we provide a brief history and evolution of the genetic code in the context of XB. We then discuss the latest efforts and challenges ahead for engineering the genetic code with focus on substitutions and additions of ncAAs as well as standard amino acid reductions. Finally, we present a roadmap for the directed evolution of artificial microbes for emancipating rare sense codons that could be used to introduce novel building blocks. The development of such xenomicroorganisms endowed with a 'genetic firewall' will also allow to study and understand the relation between code evolution and horizontal gene transfer. PMID:27489097

  9. A Contribution Towards A Grammar of Code

    David M. Berry

    2008-01-01

    Full Text Available Over the past thirty years there has been an increasing interest in the social and cultural implications of digital technologies and ‘informationalism’ from the social sciences and humanities. Generally this has concentrated on the implications of the “convergence” of digital devices and services, understood as linked to the discrete processing capabilities of computers, which rely on logical operations, binary processing and symbolic representation. In this paper, I wish to suggest that a ‘grammar of code’ might provide a useful way of thinking about the way in which digital technologies operate as a medium and can contribute usefully to this wider debate. I am interested in the way in which the dynamic properties of code can be understood as operating according to a grammar reflected in its materialisation and operation in the lifeworld – the discretisation of the phenomenal world. As part of that contribution in this paper I develop some tentative Weberian ‘ideal-types’. These ideal-types are then applied to the work of the Japanese composer, Masahiro Miwa, whose innovative ‘Reverse-Simulation music’ models the operation of basic low-level digital circuitry for the performance and generation of musical pieces.

  10. CYLSEC: A three dimensional shield evaluation code

    Existing point kernel gamma codes are either limited to simple geometry configurations or require rather cumbersome input. These codes also require the user to specify the mesh size used in integrating the kernel. This results in computational inefficiencies since it is difficult to establish criteria for choosing mesh size and because it is generally not possible to assure convergence without solving the problem more than once. The interactive program CYLSEC was recently developed to improve this situation. CYLSEC can be used to evaluate bulk or local shielding for radioactive components, to treat streaming problems and to calculate a variety of gamma ray response functions. It will accept three dimensional geometries that can be described in terms of orthogonal slabs, right cylinders and/or right parallelepipeds. While the problem geometry is specified in rectangular coordinates, the integration of the kernel is performed in spherical coordinates. This allows explicit integration over the radial variable, thus reducing the problem to a double integral. The integral mesh size varies and is internally determined such that a specified convergence criterion is met. CYLSEC is also designed to recognize and take advantage of any problem symmetry in order to maximize efficiency. Program input is through interactive routines that are self checking and permit the user to make corrections. A gamma ray data library is provided, however, alternate data may be specified if desired. Comparisons between CYLSEC and other point kernel codes (QAD, GRACE) show excellent agreement in results and demonstrate that CYLSEC requires significantly less CPU time. Comparisons with the discrete ordinates code ANISN also show good agreement. An additional attraction to CYLSEC is that it is suitable for conversion to mini or personal computers

  11. Improving the quality of clinical coding: a comprehensive audit model

    Hamid Moghaddasi; Reza Rabiei; Nasrin Sadeghi

    2014-01-01

    Introduction: The review of medical records with the aim of assessing the quality of codes has long been conducted in different countries. Auditing medical coding, as an instructive approach, could help to review the quality of codes objectively using defined attributes, and this in turn would lead to improvement of the quality of codes. Method: The current study aimed to present a model for auditing the quality of clinical codes. The audit model was formed after reviewing other a...

  12. PetriCode: A Tool for Template-Based Code Generation from CPN Models

    Simonsen, Kent Inge

    2014-01-01

    Code generation is an important part of model driven methodologies. In this paper, we present PetriCode, a software tool for generating protocol software from a subclass of Coloured Petri Nets (CPNs). The CPN subclass is comprised of hierarchical CPN models describing a protocol system at different...

  13. A Literature Review on Code Smells and Refactoring

    2010-01-01

    This thesis reports the results from a literature review conducted on the topic of code smells and refactoring. Code smells are segments of the source code that display potential design issues. Refactoring is the process for modifying source code to improve its quality (e.g. maintainability) without affecting its functionality. Improving the code design is important for reducing costs involved in maintenance projects. Thus, refactoring has become an integral part of developer’s everyday work,...

  14. A FINE GRANULAR JOINT SOURCE CHANNEL CODING METHOD

    Zhuo Li; Shen Lansun; Zhu Qing

    2003-01-01

    An improved FGS (Fine Granular Scalability) coding method is proposed in this letter, which is based on human visual characteristics. This method adjusts FGS coding frame rate according to the evaluation of video sequences so as to improve the coding efficiency and subject perceived quality of reconstructed images. Finally, a fine granular joint source channel coding is proposed based on the source coding method, which not only utilizes the network resources efficiently, but guarantees the reliable transmission of video information.

  15. Theoretical atomic physics code development III TAPS: A display code for atomic physics data

    A large amount of theoretical atomic physics data is becoming available through use of the computer codes CATS and ACE developed at Los Alamos National Laboratory. A new code, TAPS, has been written to access this data, perform averages over terms and configurations, and display information in graphical or text form. 7 refs., 13 figs., 1 tab

  16. MUSIC: a mesh-unrestricted simulation code

    A general formalism to solve the G-group neutron diffusion equation is described. The G-group flux is represented by complementing an ''asymptotic'' mode with (G-1) ''transient'' modes. A particular reduction-to-one-group technique gives a high computational efficiency. MUSIC, a 2-group code using the above formalism, is presented. MUSIC is demonstrated on a fine-mesh calculation and on 2 coarse-mesh core calculations: a heavy-water reactor (HWR) problem and the 2-D lightwater reactor (LWR) IAEA benchmark. Comparison is made to finite-difference results

  17. The rvfit Code: A Detailed Adaptive Simulated Annealing Code for Fitting Binaries and Exoplanets Radial Velocities

    Iglesias-Marzoa, Ramón; Morales, María Jesús Arévalo

    2015-01-01

    The fitting of radial velocity curves is a frequent procedure in binary stars and exoplanet research. In the majority of cases the fitting routines need to be fed with a set of initial parameter values and priors from which to begin the computations and their results can be affected by local minima. We present a new code, the rvfit code, for fitting radial velocities of stellar binaries and exoplanets using an Adaptive Simulated Annealing (ASA) global minimization method, which fastly converges to a global solution minimum without the need to provide preliminary parameter values. We show the performance of the code using both synthetic and real data sets: double-lined binaries, single-lined binaries, and exoplanet systems. In all examples the keplerian orbital parameters fitted by the rvfit code and their computed uncertainties are compared with literature solutions. Finally, we provide the source code with a working example and a detailed description on how to use it.

  18. Interface requirements for coupling a containment code to a reactor system thermal hydraulic codes

    Baratta, A.J.

    1997-07-01

    To perform a complete analysis of a reactor transient, not only the primary system response but the containment response must also be accounted for. Such transients and accidents as a loss of coolant accident in both pressurized water and boiling water reactors and inadvertent operation of safety relief valves all challenge the containment and may influence flows because of containment feedback. More recently, the advanced reactor designs put forth by General Electric and Westinghouse in the US and by Framatome and Seimens in Europe rely on the containment to act as the ultimate heat sink. Techniques used by analysts and engineers to analyze the interaction of the containment and the primary system were usually iterative in nature. Codes such as RELAP or RETRAN were used to analyze the primary system response and CONTAIN or CONTEMPT the containment response. The analysis was performed by first running the system code and representing the containment as a fixed pressure boundary condition. The flows were usually from the primary system to the containment initially and generally under choked conditions. Once the mass flows and timing are determined from the system codes, these conditions were input into the containment code. The resulting pressures and temperatures were then calculated and the containment performance analyzed. The disadvantage of this approach becomes evident when one performs an analysis of a rapid depressurization or a long term accident sequence in which feedback from the containment can occur. For example, in a BWR main steam line break transient, the containment heats up and becomes a source of energy for the primary system. Recent advances in programming and computer technology are available to provide an alternative approach. The author and other researchers have developed linkage codes capable of transferring data between codes at each time step allowing discrete codes to be coupled together.

  19. An Auto sequence Code to Integrate a Neutron Unfolding Code with thePC-MCA Accuspec

    In a neutron spectrometry using proton recoil method, the neutronunfolding code is needed to unfold the measured proton spectrum to become theneutron spectrum. The process of the unfolding neutron in the existingneutron spectrometry which was successfully installed last year was doneseparately. This manuscript reports that the auto sequence code to integratethe neutron unfolding code UNFSPEC.EXE with the software facility of thePC-MCA Accuspec has been made and run successfully so that the new neutronspectrometry become compact. The auto sequence code was written based on therules in application program facility of PC-MCA Accuspec and then it wascompiled using AC-EXE. Result of the test of the auto sequence code showedthat for binning width 20, 30, and 40 giving a little different spectrumshape. The binning width around 30 gives a better spectrum in mean of givingsmall error compared to the others. (author)

  20. A New Arithmetic Coding System Combining Source Channel Coding and MAP Decoding

    PANG Yu-ye; SUN Jun; WANG Jia

    2007-01-01

    A new arithmetic coding system combining source channel coding and maximum a posteriori decoding were proposed.It combines source coding and error correction tasks into one unified process by introducing an adaptive forbidden symbol.The proposed system achieves fixed length code words by adaptively adjusting the probability of the forbidden symbol and adding tail digits of variable length.The corresponding improved MAP decoding metric was derived.The proposed system can improve the performance.Simulations were performed on AWGN channels with various noise levels by using both hard and soft decision with BPSK modulation.The results show its performance is slightly better than that of our adaptive arithmetic error correcting coding system using a forbidden symbol.

  1. Jetto a free boundary plasma transport code

    JETTO is a one-and-a-half-dimensional transport code calculating the evolution of plasma parameters in a time dependent axisymmetric MHD equilibrium configuration. A splitting technique gives a consistent solution of coupled equilibrium and transport equations. The plasma boundary is free and defined either by its contact with a limiter (wall) or by a separatrix or by the toroidal magnetic flux. The Grad's approach to the equilibrium problem with adiabatic (or similar) constraints is adopted. This method consists of iterating by alternately solving the Grad-Schluter-Shafranov equation (PDE) and the ODE obtained by averaging the PDE over the magnetic surfaces. The bidimensional equation of the poloidal flux is solved by a finite difference scheme, whereas a Runge-Kutta method is chosen for the averaged equilibrium equation. The 1D transport equations (averaged over the magnetic surfaces) for the electron and ion densities and energies and for the rotational transform are written in terms of a coordinate (ρ) related to the toroidal flux. Impurity transport is also considered, under the hypothesis of coronal equilibrium. The transport equations are solved by an implicit scheme in time and by a finite difference scheme in space. The centering of the source terms and transport coefficients is performed using a Predictor-Corrector scheme. The basic version of the code is described here in detail; input and output parameters are also listed

  2. Visual mismatch negativity: A predictive coding view

    Gabor eStefanics

    2014-09-01

    Full Text Available An increasing number of studies investigate the visual mismatch negativity (vMMN or use the vMMN as a tool to probe various aspects of human cognition. This paper reviews the theoretical underpinnings of vMMN in the light of methodological considerations and provides recommendations for measuring and interpreting the vMMN. The following key issues are discussed from the experimentalist’s point of view in a predictive coding framework: 1 experimental protocols and procedures to control ‘refractoriness’ effects; 2 methods to control attention; 3 vMMN and veridical perception.

  3. A Code of Ethics for Referees?

    Sturrock, Peter A.

    2004-04-01

    I have read with interest the many letters commenting on the pros and cons of anonymity for referees. While I sympathize with writers who have suffered from referees who are incompetent or uncivil, I also sympathize with those who argue that one would simply exchange one set of problems for another if journals were to require that all referees waive anonymity. Perhaps there is a more direct way to address the issue. It may help if guidelines for referees were to include a code of ethics.

  4. A Construction of Lossy Source Code Using LDPC Matrices

    Miyake, Shigeki; Muramatsu, Jun

    Research into applying LDPC code theory, which is used for channel coding, to source coding has received a lot of attention in several research fields such as distributed source coding. In this paper, a source coding problem with a fidelity criterion is considered. Matsunaga et al. and Martinian et al. constructed a lossy code under the conditions of a binary alphabet, a uniform distribution, and a Hamming measure of fidelity criterion. We extend their results and construct a lossy code under the extended conditions of a binary alphabet, a distribution that is not necessarily uniform, and a fidelity measure that is bounded and additive and show that the code can achieve the optimal rate, rate-distortion function. By applying a formula for the random walk on lattice to the analysis of LDPC matrices on Zq, where q is a prime number, we show that results similar to those for the binary alphabet condition hold for Zq, the multiple alphabet condition.

  5. Time coding with a binary scaler

    A binary scaler is normally used in time-of-flight selectors to code the arrival time of an event and to send it in the appropriate address of a memory. Such scalers involve special problems; two are examined in this paper: (a) The scaler periodically receives long series of impulses. The constituent flip-flops, particularly the first, have to be specially designed for these working conditions, which appear rather more severe than those of the purely random or strictly periodic operations. (b) It is advantageous to catch, in flight, the coded number representing the arrival time of an event, and so avoid a momentary stop of the scaler and artificial restoration of the normal count afterwards. It can be caught in flight provided that the transit time in the scaler is less than the input pulse period. A scaler with a very short transit time has been developed, and then a scaler with simultaneously driven elements. The latter, designed to operate at 10 MHz, comprises ten flip-flops and reaches its stable state 5 x 10-8 s after the injection of each input pulse. (author)

  6. Acceleration of a CFD Code with a GPU

    Dennis C. Jespersen

    2010-01-01

    Full Text Available The Computational Fluid Dynamics code OVERFLOW includes as one of its solver options an algorithm which is a fairly small piece of code but which accounts for a significant portion of the total computational time. This paper studies some of the issues in accelerating this piece of code by using a Graphics Processing Unit (GPU. The algorithm needs to be modified to be suitable for a GPU and attention needs to be given to 64-bit and 32-bit arithmetic. Interestingly, the work done for the GPU produced ideas for accelerating the CPU code and led to significant speedup on the CPU.

  7. A surface code quantum computer in silicon.

    Hill, Charles D; Peretz, Eldad; Hile, Samuel J; House, Matthew G; Fuechsle, Martin; Rogge, Sven; Simmons, Michelle Y; Hollenberg, Lloyd C L

    2015-10-01

    The exceptionally long quantum coherence times of phosphorus donor nuclear spin qubits in silicon, coupled with the proven scalability of silicon-based nano-electronics, make them attractive candidates for large-scale quantum computing. However, the high threshold of topological quantum error correction can only be captured in a two-dimensional array of qubits operating synchronously and in parallel-posing formidable fabrication and control challenges. We present an architecture that addresses these problems through a novel shared-control paradigm that is particularly suited to the natural uniformity of the phosphorus donor nuclear spin qubit states and electronic confinement. The architecture comprises a two-dimensional lattice of donor qubits sandwiched between two vertically separated control layers forming a mutually perpendicular crisscross gate array. Shared-control lines facilitate loading/unloading of single electrons to specific donors, thereby activating multiple qubits in parallel across the array on which the required operations for surface code quantum error correction are carried out by global spin control. The complexities of independent qubit control, wave function engineering, and ad hoc quantum interconnects are explicitly avoided. With many of the basic elements of fabrication and control based on demonstrated techniques and with simulated quantum operation below the surface code error threshold, the architecture represents a new pathway for large-scale quantum information processing in silicon and potentially in other qubit systems where uniformity can be exploited. PMID:26601310

  8. Coupling a Basin Modeling and a Seismic Code using MOAB

    Yan, Mi

    2012-06-02

    We report on a demonstration of loose multiphysics coupling between a basin modeling code and a seismic code running on a large parallel machine. Multiphysics coupling, which is one critical capability for a high performance computing (HPC) framework, was implemented using the MOAB open-source mesh and field database. MOAB provides for code coupling by storing mesh data and input and output field data for the coupled analysis codes and interpolating the field values between different meshes used by the coupled codes. We found it straightforward to use MOAB to couple the PBSM basin modeling code and the FWI3D seismic code on an IBM Blue Gene/P system. We describe how the coupling was implemented and present benchmarking results for up to 8 racks of Blue Gene/P with 8192 nodes and MPI processes. The coupling code is fast compared to the analysis codes and it scales well up to at least 8192 nodes, indicating that a mesh and field database is an efficient way to implement loose multiphysics coupling for large parallel machines.

  9. What to do with a Dead Research Code

    Nemiroff, Robert J.

    2016-01-01

    The project has ended -- should all of the computer codes that enabled the project be deleted? No. Like research papers, research codes typically carry valuable information past project end dates. Several possible end states to the life of research codes are reviewed. Historically, codes are typically left dormant on an increasingly obscure local disk directory until forgotten. These codes will likely become any or all of: lost, impossible to compile and run, difficult to decipher, and likely deleted when the code's proprietor moves on or dies. It is argued here, though, that it would be better for both code authors and astronomy generally if project codes were archived after use in some way. Archiving is advantageous for code authors because archived codes might increase the author's ADS citable publications, while astronomy as a science gains transparency and reproducibility. Paper-specific codes should be included in the publication of the journal papers they support, just like figures and tables. General codes that support multiple papers, possibly written by multiple authors, including their supporting websites, should be registered with a code registry such as the Astrophysics Source Code Library (ASCL). Codes developed on GitHub can be archived with a third party service such as, currently, BackHub. An important code version might be uploaded to a web archiving service like, currently, Zenodo or Figshare, so that this version receives a Digital Object Identifier (DOI), enabling it to found at a stable address into the future. Similar archiving services that are not DOI-dependent include perma.cc and the Internet Archive Wayback Machine at archive.org. Perhaps most simply, copies of important codes with lasting value might be kept on a cloud service like, for example, Google Drive, while activating Google's Inactive Account Manager.

  10. A Content Analysis of Student Conduct Codes

    Martin, Janice Earlene

    2004-01-01

    Scholars in the field of student judicial affairs have recommended that institutions remove all legal terminology and references in student conduct codes and create codes based on student development theory and practice (Dannells, 1997; Gehring, 2001; Stoner & Cerminara 1990; Stoner, 2000). The purpose of this study was to analyze student conduct codes to determine the extent to which college and university administrators have adopted Stoner and Cerminara, Gehring, and Pavela's suggestions. ...

  11. SAGAPOe-A code description and user's guide

    This paper describes the new models inserted in the computer code SAGAPOe-A for the thermo-fluiddynamic analysis of gas cooled fuel element bundles. Moreover, it is intended to be a guide for the user of the code. The physical background of the new models inserted in the code has been described by the author of this work in a previous paper. A listing of the code is included in the Appendix. (orig.)

  12. A Binary Representation of the Genetic Code

    Nemzer, Louis R

    2016-01-01

    This article introduces a novel binary representation of the canonical genetic code, in which each of the four mRNA nucleotide bases is assigned a unique 2-bit identifier. These designations have a physiological meaning derived from the molecular structures of, and relationships between, the bases. In this scheme, the 64 possible triplet codons are each indexed by a 6-bit label. The order of the bits reflects the hierarchical organization manifested by the DNA replication/repair and tRNA translation systems. Transition and transversion mutations are naturally expressed as basic binary operations, and the severity of the different types is analyzed. Using a principal component analysis, it is shown that physicochemical properties of amino acids related to protein folding also correlate with particular bit positions of their respective labels. Thus, the likelihood for a particular point mutation to be conservative, and therefore less likely to cause a change in protein functionality, can be estimated.

  13. A code to calculate multigroup constants for fast neutron reactor

    KQCS-2 code is a new improved version of KQCS code, which was designed to calculate multigroup constants for fast neutron reactor. The changes and improvements on KQCS are described in this paper. (author)

  14. A Python Wrapper Code Generator for Dynamic Libraries

    2011-06-01

    Full Text Available We introduce a new Python code generator for conveniently and transparently wrapping native dynamic libraries. The presented code generator is used in several projects for scientific collaboration and can be adapted to other projects fairly easily.

  15. Thinking through the Issues in a Code of Ethics

    Davis, Michael

    2008-01-01

    In June 2005, seven people met at the Illinois Institute of Technology (IIT) to develop a code of ethics governing all members of the university community. The initial group developed a preamble, that included reasons for establishing such a code and who was to be governed by the code, including rationale for following the guidelines. From this…

  16. A decoding method of an n length binary BCH code through (n + 1n length binary cyclic code

    TARIQ SHAH

    2013-09-01

    Full Text Available For a given binary BCH code Cn of length n = 2 s - 1 generated by a polynomial of degree r there is no binary BCH code of length (n + 1n generated by a generalized polynomial of degree 2r. However, it does exist a binary cyclic code C (n+1n of length (n + 1n such that the binary BCH code Cn is embedded in C (n+1n . Accordingly a high code rate is attained through a binary cyclic code C (n+1n for a binary BCH code Cn . Furthermore, an algorithm proposed facilitates in a decoding of a binary BCH code Cn through the decoding of a binary cyclic code C (n+1n , while the codes Cn and C (n+1n have the same minimum hamming distance.

  17. A Matrix Completion Approach to Linear Index Coding Problem

    Esfahanizadeh, Homa; Lahouti, Farshad; Hassibi, Babak

    2014-01-01

    In this paper, a general algorithm is proposed for rate analysis and code design of linear index coding problems. Specifically a solution for minimum rank matrix completion problem over finite fields representing the linear index coding problem is devised in order to find the optimum transmission rate given vector length and size of the field. The new approach can be applied to both scalar and vector linear index coding.

  18. A novel RS BTC coding scheme for optical communications

    Yuan, Jian-guo; Jia, Yue-xing; Hu, Yun-xia

    2012-07-01

    A novel Reed Solomon (RS) block turbo code (BTC) coding scheme of RS(63,58)×RS(63,58) for optical communications is proposed. The simulation results show that the net coding gain (NCG) of this scheme at the sixth iteration is more than that of other coding schemes at the third iteration for the bit error rate (BER) of 10-12. Furthermore, the novel RS BTC has shorter component code and rapider encoding and decoding speed. Therefore, the novel RS BTC coding scheme can be better used in high-speed long-haul optical communication systems, and the novel RS BTC can be regarded as a candidate code of the super forward error correction (super-FEC) code. Moreover, the encoding/decoding design and implementation of the novel RS BTC are also presented

  19. On the Codes over a Semilocal Finite Ring

    Abdullah Dertli

    2015-10-01

    Full Text Available In this paper, we study the structure of cyclic, quasi cyclic, constacyclic codes and their skew codes over the finite ring R. The Gray images of cyclic, quasi cyclic, skew cyclic, skew quasi cyclic and skew constacyclic codes over R are obtained. A necessary and sufficient condition for cyclic (negacyclic codes over R that contains its dual has been given. The parameters of quantum error correcting codes are obtained from both cyclic and negacyclic codes over R. Some examples are given. Firstly, quasi constacyclic and skew quasi constacyclic codes are introduced. By giving two inner product, it is investigated their duality. A sufficient condition for 1 generator skew quasi constacyclic codes to be free is determined.

  20. MERCATOR: the growth of a nodal code

    The MERCATOR code is described as an example of powerful nodal code for solving the two-group diffusion equation on large cores. The model is discussed from its early version in comparison with other nodal models used in core management. Applications to reactor statics, kinetics and perturbation analysis are examined. Current developments and perspectives are presented: 3-D extension and heterogeneity corrections

  1. SYMTRAN - A Time-dependent Symmetric Tandem Mirror Transport Code

    A time-dependent version of the steady-state radial transport model in symmetric tandem mirrors in Ref. [1] has been coded up and first tests performed. Our code, named SYMTRAN, is an adaptation of the earlier SPHERE code for spheromaks, now modified for tandem mirror physics. Motivated by Post's new concept of kinetic stabilization of symmetric mirrors, it is an extension of the earlier TAMRAC rate-equation code omitting radial transport [2], which successfully accounted for experimental results in TMX. The SYMTRAN code differs from the earlier tandem mirror radial transport code TMT in that our code is focused on axisymmetric tandem mirrors and classical diffusion, whereas TMT emphasized non-ambipolar transport in TMX and MFTF-B due to yin-yang plugs and non-symmetric transitions between the plugs and axisymmetric center cell. Both codes exhibit interesting but different non-linear behavior

  2. A fuel performance code TRUST VIc and its validation

    This paper describes a fuel performance code TRUST V1c developed to analyze thermal and mechanical behavior of LWR fuel rod. Submodels in the code include FP gas models depicting gaseous swelling, gas release from pellet and axial gas mixing. The code has FEM-based structure to handle interaction between thermal and mechanical submodels brought by the gas models. The code is validated against irradiation data of fuel centerline temperature, FGR, pellet porosity and cladding deformation. (author). 9 refs, 8 figs

  3. Deciphering a neural code for vision.

    Passaglia, C; Dodge, F; Herzog, E; Jackson, S; Barlow, R

    1997-11-11

    Deciphering the information that eyes, ears, and other sensory organs transmit to the brain is important for understanding the neural basis of behavior. Recordings from single sensory nerve cells have yielded useful insights, but single neurons generally do not mediate behavior; networks of neurons do. Monitoring the activity of all cells in a neural network of a behaving animal, however, is not yet possible. Taking an alternative approach, we used a realistic cell-based model to compute the ensemble of neural activity generated by one sensory organ, the lateral eye of the horseshoe crab, Limulus polyphemus. We studied how the neural network of this eye encodes natural scenes by presenting to the model movies recorded with a video camera mounted above the eye of an animal that was exploring its underwater habitat. Model predictions were confirmed by simultaneously recording responses from single optic nerve fibers of the same animal. We report here that the eye transmits to the brain robust "neural images" of objects having the size, contrast, and motion of potential mates. The neural code for such objects is not found in ambiguous messages of individual optic nerve fibers but rather in patterns of coherent activity that extend over small ensembles of nerve fibers and are bound together by stimulus motion. Integrative properties of neurons in the first synaptic layer of the brain appear well suited to detecting the patterns of coherent activity. Neural coding by this relatively simple eye helps explain how horseshoe crabs find mates and may lead to a better understanding of how more complex sensory organs process information. PMID:9356504

  4. Toward a Code of Conduct for Graduate Education

    Proper, Eve

    2012-01-01

    Most academic disciplines promulgate codes of ethics that serve as public statements of professional norms of their membership. These codes serve both symbolic and practical purposes, stating to both members and the larger public what a discipline's highest ethics are. This article explores what scholarly society codes of ethics could say about…

  5. SNAP - a three dimensional neutron diffusion code

    This report describes a one- two- three-dimensional multi-group diffusion code, SNAP, which is primarily intended for neutron diffusion calculations but can also carry out gamma calculations if the diffusion approximation is accurate enough. It is suitable for fast and thermal reactor core calculations and for shield calculations. SNAP can solve the multi-group neutron diffusion equations using finite difference methods. The one-dimensional slab, cylindrical and spherical geometries and the two-dimensional case are all treated as simple special cases of three-dimensional geometries. Numerous reflective and periodic symmetry options are available and may be used to reduce the number of mesh points necessary to represent the system. Extrapolation lengths can be specified at internal and external boundaries. (Author)

  6. A Proposed Code Of Ethics For Infrared Thermographic Professionals

    Roberts, Charles C.

    1987-05-01

    The American Heritage Dictionary defines ethics as "The general study of morals and of specific moral choices to be made by the individual in his relationship with others". A code of ethics defines these moral relationships to encourage integrity throughout a profession. A defined code of ethics often yields credibility to an organization or association of professionals. This paper outlines a proposed code of ethics for practitioners in the infrared thermographic field. The proposed code covers relationships with the public, clients, other professionals and employers. The proposed code covers credentials, capabilities, thermograms, compensation and safety.

  7. A class of binary cyclic codes with five weights

    2010-01-01

    In this paper, the dual code of the binary cyclic code of length 2 n-1 with three zeros α, α t 1 and α t 2 is proven to have five nonzero Hamming weights in the case that n 4 is even and t1 = 2 n/2 + 1, t2 = 2 n-1-2 n/2+1 + 1 or 2 n/2 + 3, where α is a primitive element of the finite field F 2 n . The dual code is a divisible code of level n/2+1, and its weight distribution is also completely determined. When n = 4, the dual code satisfies Ward’s bound.

  8. Is the Decision to Code-share a Route Different for Virtual versus Traditional Code-Share Arrangements?

    DU, YAN; McMullen, Starr

    2012-01-01

    This paper analyzes factors that determine whether individual routes remain in or leave a code-share agreement in different scenarios: pooled, purely traditionally code-shared routes, purely virtual code-shared routes and routes both traditionally and purely codeshare. The code-share alliance between Continental and America West Airlines is used as the case study for this analysis. Empirical results show that factors affecting alliance firms’ code sharing decision significantly differ for vir...

  9. ANACROM - A computer code for chromatogram analysis

    The computer code was developed for automatic research of peaks and evaluation of chromatogram parameters as : center, height, area, medium - height width (FWHM) and the rate FWHM/center of each peak. (Author)

  10. JPIC & How to make a PIC code

    Wu, Hui-Chun

    2011-01-01

    Author developed the parallel fully kinetic particle-in-cell (PIC) code JPIC based on updated and advanced algorithms (e.g. numerical-dispersion-free electromagnetic field solver) for simulating laser plasma interactions. Basic technical points and hints of PIC programming and parallel programming by message passing interface (MPI) are reviewed. Most of contents come from Author's notes when writing up JPIC and experiences when using the code to solve different problems. Enough "how-to-do-it"...

  11. A FINE GRANULAR JOINT SOURCE CHANNEL CODING METHOD

    ZhuoLi; ShenLanusun

    2003-01-01

    An improved FGS (Fine Granular Scalability) coding method is proposed in this letter,which is based on human visual characteristics.This method adjusts FGS coding frame rate according to the evaluation of video sequences so as to improve the coding efficiency and subject perceived quality of reconstructed images.Finally,a fine granular joint source channel coding is proposed based on the source coding method,which not only utilizes the network resources efficiently,but guarantees the reliable transmission of video information.

  12. A Generic Safety assessment code for geologic disposal of Radioactive Waste: GSRW computer code user's manual

    The computer code system GSRW (Generic Safety assessment code for geologic disposal of Radioactive Waste) was developed as in interim version of safety assessment methodology for geologic disposal of high-level radioactive waste. Scenarios used here are based on normal evolution scenarios which assume that the performance of a disposal system is not affected by probabilistic events. The code consists of three parts. The first part evaluates a source term from a disposal facility which consists mainly of a vitrified waste, a metallic container and a buffer zone. Two kinds of source term models are provided: Model 1 which simulate the dissolution of silicate component of glass and the diffusive transport of radionuclides in the buffere zone, and Model 2 which assumes that the concentration of a radionuclide is limited by the solubility of its specific chemical form at the interface between the buffer and a vitrified wastes. The second part analyses the transport of radionuclides in the geosphere, which is based on analytical solutions or numerical solutions of a mass transport equation involving the advection, dispersion, linear sorption and decay chain. The third part assesses the transport of radionuclides in the biosphere and the resulting radiological consequences to the man, which is based on a dynamic compartment model for the biosphere and a dose factor method for dose calculations. This report describes mathematical models used, the structure of the code system, and user information and instructions for execution of the code. (author)

  13. Code manual for CONTAIN 2.0: A computer code for nuclear reactor containment analysis

    The CONTAIN 2.0 computer code is an integrated analysis tool used for predicting the physical conditions, chemical compositions, and distributions of radiological materials inside a containment building following the release of material from the primary system in a light-water reactor accident. It can also predict the source term to the environment. CONTAIN 2.0 is intended to replace the earlier CONTAIN 1.12, which was released in 1991. The purpose of this Code Manual is to provide full documentation of the features and models in CONTAIN 2.0. Besides complete descriptions of the models, this Code Manual provides a complete description of the input and output from the code. CONTAIN 2.0 is a highly flexible and modular code that can run problems that are either quite simple or highly complex. An important aspect of CONTAIN is that the interactions among thermal-hydraulic phenomena, aerosol behavior, and fission product behavior are taken into account. The code includes atmospheric models for steam/air thermodynamics, intercell flows, condensation/evaporation on structures and aerosols, aerosol behavior, and gas combustion. It also includes models for reactor cavity phenomena such as core-concrete interactions and coolant pool boiling. Heat conduction in structures, fission product decay and transport, radioactive decay heating, and the thermal-hydraulic and fission product decontamination effects of engineered safety features are also modeled. To the extent possible, the best available models for severe accident phenomena have been incorporated into CONTAIN, but it is intrinsic to the nature of accident analysis that significant uncertainty exists regarding numerous phenomena. In those cases, sensitivity studies can be performed with CONTAIN by means of user-specified input parameters. Thus, the code can be viewed as a tool designed to assist the knowledge reactor safety analyst in evaluating the consequences of specific modeling assumptions

  14. Code manual for CONTAIN 2.0: A computer code for nuclear reactor containment analysis

    Murata, K.K.; Williams, D.C.; Griffith, R.O.; Gido, R.G.; Tadios, E.L.; Davis, F.J.; Martinez, G.M.; Washington, K.E. [Sandia National Labs., Albuquerque, NM (United States); Tills, J. [J. Tills and Associates, Inc., Sandia Park, NM (United States)

    1997-12-01

    The CONTAIN 2.0 computer code is an integrated analysis tool used for predicting the physical conditions, chemical compositions, and distributions of radiological materials inside a containment building following the release of material from the primary system in a light-water reactor accident. It can also predict the source term to the environment. CONTAIN 2.0 is intended to replace the earlier CONTAIN 1.12, which was released in 1991. The purpose of this Code Manual is to provide full documentation of the features and models in CONTAIN 2.0. Besides complete descriptions of the models, this Code Manual provides a complete description of the input and output from the code. CONTAIN 2.0 is a highly flexible and modular code that can run problems that are either quite simple or highly complex. An important aspect of CONTAIN is that the interactions among thermal-hydraulic phenomena, aerosol behavior, and fission product behavior are taken into account. The code includes atmospheric models for steam/air thermodynamics, intercell flows, condensation/evaporation on structures and aerosols, aerosol behavior, and gas combustion. It also includes models for reactor cavity phenomena such as core-concrete interactions and coolant pool boiling. Heat conduction in structures, fission product decay and transport, radioactive decay heating, and the thermal-hydraulic and fission product decontamination effects of engineered safety features are also modeled. To the extent possible, the best available models for severe accident phenomena have been incorporated into CONTAIN, but it is intrinsic to the nature of accident analysis that significant uncertainty exists regarding numerous phenomena. In those cases, sensitivity studies can be performed with CONTAIN by means of user-specified input parameters. Thus, the code can be viewed as a tool designed to assist the knowledge reactor safety analyst in evaluating the consequences of specific modeling assumptions.

  15. An improved canine genome and a comprehensive catalogue of coding genes and non-coding transcripts.

    Marc P Hoeppner

    Full Text Available The domestic dog, Canis familiaris, is a well-established model system for mapping trait and disease loci. While the original draft sequence was of good quality, gaps were abundant particularly in promoter regions of the genome, negatively impacting the annotation and study of candidate genes. Here, we present an improved genome build, canFam3.1, which includes 85 MB of novel sequence and now covers 99.8% of the euchromatic portion of the genome. We also present multiple RNA-Sequencing data sets from 10 different canine tissues to catalog ∼175,000 expressed loci. While about 90% of the coding genes previously annotated by EnsEMBL have measurable expression in at least one sample, the number of transcript isoforms detected by our data expands the EnsEMBL annotations by a factor of four. Syntenic comparison with the human genome revealed an additional ∼3,000 loci that are characterized as protein coding in human and were also expressed in the dog, suggesting that those were previously not annotated in the EnsEMBL canine gene set. In addition to ∼20,700 high-confidence protein coding loci, we found ∼4,600 antisense transcripts overlapping exons of protein coding genes, ∼7,200 intergenic multi-exon transcripts without coding potential, likely candidates for long intergenic non-coding RNAs (lincRNAs and ∼11,000 transcripts were reported by two different library construction methods but did not fit any of the above categories. Of the lincRNAs, about 6,000 have no annotated orthologs in human or mouse. Functional analysis of two novel transcripts with shRNA in a mouse kidney cell line altered cell morphology and motility. All in all, we provide a much-improved annotation of the canine genome and suggest regulatory functions for several of the novel non-coding transcripts.

  16. A new electromagnetic code for ICRF antenna in EAST

    Yang, Hua; Dong, Sa; Zhang, Xin-Jun; Zhao, Yan-Ping; Shang, Lei

    2015-01-01

    The demand for an effective tool to help in the design of ion cyclotron radio frequency (ICRF) antenna system for fusion experiment has driven the development of predictive codes. A new electromagnetic code based on the method of moments (MOM) is described in the paper. The code computes the electromagnetic field by the solution of the electric field integral equation. The structure of ICRF antennas are discretized with triangular mesh. By using the new code, the scattering parameter and the surface current are given and compared with the result by commercial code CST. Moreover, the power spectra are studied with different toroidal phases for heating and current drive. Good agreement of simulation results between the new code and CST are obtained. The code has been validated against CST for EAST ICRF antenna.

  17. CONSTRUCTION OF REGULAR LDPC LIKE CODES BASED ON FULL RANK CODES AND THEIR ITERATIVE DECODING USING A PARITY CHECK TREE

    H. Prashantha Kumar

    2011-09-01

    Full Text Available Low density parity check (LDPC codes are capacity-approaching codes, which means that practical constructions exist that allow the noise threshold to be set very close to the theoretical Shannon limit for a memory less channel. LDPC codes are finding increasing use in applications like LTE-Networks, digital television, high density data storage systems, deep space communication systems etc. Several algebraic and combinatorial methods are available for constructing LDPC codes. In this paper we discuss a novel low complexity algebraic method for constructing regular LDPC like codes derived from full rank codes. We demonstrate that by employing these codes over AWGN channels, coding gains in excess of 2dB over un-coded systems can be realized when soft iterative decoding using a parity check tree is employed.

  18. Extension of the code COCOSYS to a dispersion code for smoke and carbon monoxide

    The code COCOSYS (Containment Code SYStem) was developed by GRS in Germany to simulate processes and nuclear plant states during severe accidents in the containments of light water reactors. It contains several physical models, especially a module for aerosol behaviour. The goal of this work was to extend COCOSYS for applications in more general geometries mainly for complex public buildings. For the application in public buildings models for air condition systems and different boundary conditions according to different environments were developed. The principal application of the extended code COCOSYS is in the area of emergency situations especially in the simulation for carbon monoxide and smoke dispersion. After developing and implementing the new models several test calculations were performed to evaluate the functionality of the extended code. The comparison of the results with those of the original COCOSYS code showed no discrepancies. For the first realistic application several fire emergency scenarios in the Vienna General Hospital (AKH) were selected in agreement with the fire department of the hospital. One of the scenarios addresses the danger of carbon monoxide (CO) and smoke leaking into a fire protection section through a damaged fire protection flap. As a result of the dispersion simulation the CO-concentration in all of the rooms is obtained. Together with additional results as deposition and smoke dispersion the outcome of the simulation can be used for training. Among the next steps are the validation of the new models and the selection of critical scenarios. (author)

  19. A code generation framework for the ALMA common software

    Troncoso, Nicolás; von Brand, Horst H.; Ibsen, Jorge; Mora, Matias; Gonzalez, Victor; Chiozzi, Gianluca; Jeram, Bogdan; Sommer, Heiko; Zamora, Gabriel; Tejeda, Alexis

    2010-07-01

    Code generation helps in smoothing the learning curve of a complex application framework and in reducing the number of Lines Of Code (LOC) that a developer needs to craft. The ALMA Common Software (ACS) has adopted code generation in specific areas, but we are now exploiting the more comprehensive approach of Model Driven code generation to transform directly an UML Model into a full implementation in the ACS framework. This approach makes it easier for newcomers to grasp the principles of the framework. Moreover, a lower handcrafted LOC reduces the error rate. Additional benefits achieved by model driven code generation are: software reuse, implicit application of design patterns and automatic tests generation. A model driven approach to design makes it also possible using the same model with different frameworks, by generating for different targets. The generation framework presented in this paper uses openArchitectureWare1 as the model to text translator. OpenArchitectureWare provides a powerful functional language that makes this easier to implement the correct mapping of data types, the main difficulty encountered in the translation process. The output is an ACS application readily usable by the developer, including the necessary deployment configuration, thus minimizing any configuration burden during testing. The specific application code is implemented by extending generated classes. Therefore, generated and manually crafted code are kept apart, simplifying the code generation process and aiding the developers by keeping a clean logical separation between the two. Our first results show that code generation improves dramatically the code productivity.

  20. A code inspection process for security reviews

    Garzoglio, Gabriele; /Fermilab

    2009-05-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  1. A code inspection process for security reviews

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  2. A restructuring of COR package for MIDAS computer code

    The COR package, which calculates the thermal response of the core and the lower plenum internal structures and models the relocation of the core and lower plenum structural materials, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and a modernized data structure. To do this, the data transferring methods of the current MELCOR code are modified and adopted into the COR package. The data structure of the current MELCOR code using FORTRAN77 has a difficulty in grasping the meaning of the variables as well as a waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which leads to an efficient memory treatment and an easy understanding of the code. Restructuring of the COR package addressed in this paper includes a module development, subroutine modification. The verification has been done by comparing the results of the modified code with those of the existing code. As the trends are similar to each other, it implies that the same approach could be extended to the entire code package. It is expected that the code restructuring will accelerated the code's domestication thanks to a direct understanding of each variable and an easy implementation of the modified or newly developed models. (author)

  3. A Construction of Systematic MDS Codes with Minimum Repair Bandwidth

    Wu, Yunnan

    2009-01-01

    In a distributed storage system based on erasure coding, an important problem is the \\emph{repair problem}: If a node storing a coded piece fails, in order to maintain the same level of reliability, we need to create a new encoded piece and store it at a new node. This paper presents a construction of systematic $(n,k)$-MDS codes for $2k\\le n$ that achieves the minimum repair bandwidth when repairing from $k+1$ nodes.

  4. Improved decoding for a concatenated coding system

    Paaske, Erik

    1990-01-01

    The concatenated coding system recommended by CCSDS (Consultative Committee for Space Data Systems) uses an outer (255,233) Reed-Solomon (RS) code based on 8-b symbols, followed by the block interleaver and an inner rate 1/2 convolutional code with memory 6. Viterbi decoding is assumed. Two new...... decoding procedures based on repeated decoding trials and exchange of information between the two decoders and the deinterleaver are proposed. In the first one, where the improvement is 0.3-0.4 dB, only the RS decoder performs repeated trials. In the second one, where the improvement is 0.5-0.6 dB, both...... decoders perform repeated decoding trials and decoding information is exchanged between them...

  5. SPQR: a Monte Carlo reactor kinetics code

    The SPQR Monte Carlo code has been developed to analyze fast reactor core accident problems where conventional methods are considered inadequate. The code is based on the adiabatic approximation of the quasi-static method. This initial version contains no automatic material motion or feedback. An existing Monte Carlo code is used to calculate the shape functions and the integral quantities needed in the kinetics module. Several sample problems have been devised and analyzed. Due to the large statistical uncertainty associated with the calculation of reactivity in accident simulations, the results, especially at later times, differ greatly from deterministic methods. It was also found that in large uncoupled systems, the Monte Carlo method has difficulty in handling asymmetric perturbations

  6. A computerized energy systems code and information library at Soreq

    In the framework of the contractual agreement between the Ministry of Energy and Infrastructure and the Division of Nuclear Engineering of the Israel Atomic Energy Commission, both Soreq-NRC and Ben-Gurion University have agreed to establish, in 1991, a code center. This code center contains a library of computer codes and relevant data, with particular emphasis on nuclear power plant research and development support. The code center maintains existing computer codes and adapts them to the ever changing computing environment, keeps track of new code developments in the field of nuclear engineering, and acquires the most recent revisions of computer codes of interest. An attempt is made to collect relevant codes developed in Israel and to assure that proper documentation and application instructions are available. En addition to computer programs, the code center collects sample problems and international benchmarks to verify the codes and their applications to various areas of interest to nuclear power plant engineering and safety evaluation. Recently, the reactor simulation group at Soreq acquired, using funds provided by the Ministry of Energy and Infrastructure, a PC work station operating under a Linux operating system to give users of the library an easy on-line way to access resources available at the library. These resources include the computer codes and their documentation, reports published by the reactor simulation group, and other information databases available at Soreq. Registered users set a communication line, through a modem, between their computer and the new workstation at Soreq and use it to download codes and/or information or to solve their problems, using codes from the library, on the computer at Soreq (authors)

  7. A restructuring of RN2 package for MIDAS computer code

    Park, S. H.; Kim, D. H. [KAERI, Taejon (Korea, Republic of)

    2003-10-01

    RN2 package, which is one of two fission product-related package in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the RN2 package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the RN2 package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The validation has been done by comparing the results of the modified code with those from the existing code. As the trends are the similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models.

  8. A restructuring of RN1 package for MIDAS computer code

    RN1 package, which is one of two fission product-related packages in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the RN1 package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the RN1 package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The verification has been done by comparing the results of the modified code with those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  9. A restructuring of RN1 package for MIDAS computer code

    Park, S. H.; Kim, D. H.; Kim, K. R. [KAERI, Taejon (Korea, Republic of)

    2003-10-01

    RN1 package, which is one of two fission product-related packages in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the RN1 package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the RN1 package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The verification has been done by comparing the results of the modified code with those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models.

  10. A restructuring of CF package for MIDAS computer code

    Park, S. H.; Kim, K. R.; Kim, D. H.; Cho, S. W. [KAERI, Taejon (Korea, Republic of)

    2004-07-01

    CF package, which evaluates user-specified 'control functions' and applies them to define or control various aspects of computation, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the CF package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory, difficulty is more over because its data is location information of other package's data due to characteristics of CF package. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the CF package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The verification has been done by comparing the results of the modified code with those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models.

  11. A restructuring of CF package for MIDAS computer code

    CF package, which evaluates user-specified 'control functions' and applies them to define or control various aspects of computation, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the CF package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory, difficulty is more over because its data is location information of other package's data due to characteristics of CF package. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the CF package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The verification has been done by comparing the results of the modified code with those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  12. A restructuring of RN2 package for MIDAS computer code

    RN2 package, which is one of two fission product-related package in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the RN2 package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the RN2 package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The validation has been done by comparing the results of the modified code with those from the existing code. As the trends are the similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  13. Codes of Ethics for Economists: A Pluralist View

    Sheila C. Dow

    2013-01-01

    Within the discussion of ethics and economics some have considered designing a code of ethics for economists. But the idea of such a code is potentially problematic from a pluralist standpoint. Some possibilities are discussed here to show that any code concerning the behaviour of economists presumes a particular view of human nature and thus of professionalism. Further, issues of socio-economic power in the profession pose problems for the interpretation and implementation of some possible p...

  14. Experimental Implementation of a Codeword Stabilized Quantum Code

    Zhang, Jingfu; Grassl, Markus; Zeng, Bei; Laflamme, Raymond

    2011-01-01

    A five-qubit codeword stabilized quantum code is implemented in a seven-qubit system using nuclear magnetic resonance (NMR). Our experiment implements a good nonadditive quantum code which encodes a larger Hilbert space than any stabilizer code with the same length and capable of correcting the same kind of errors. The experimentally measured quantum coherence is shown to be robust against artificially introduced errors, benchmarking the success in implementing the quantum error correction co...

  15. ORNL ALICE: a statistical model computer code including fission competition

    A listing of the computer code ORNL ALICE is given. This code is a modified version of computer codes ALICE and OVERLAID ALICE. It allows for higher excitation energies and for a greater number of evaporated particles than the earlier versions. The angular momentum removal option was made more general and more internally consistent. Certain roundoff errors are avoided by keeping a strict accounting of partial probabilities. Several output options were added

  16. Monitoring the laser marking of a bar code label

    A bar code label which has been laser marked onto the end of a nuclear fuel tube is tested for unacceptable depth penetration of the heat affected zone. The average gray level value of the bar code label is compared with a predetermined standard. The label is optically sensed by a video camera and a set of discrete digital values representative of the bar code label is generated. The average digital value representative of the bar code label is calculated and compared to a predetermined standard level derived from measurements of acceptable laser marked tubes. (author)

  17. RAYS: a geometrical optics code for EBT

    Batchelor, D.B.; Goldfinger, R.C.

    1982-04-01

    The theory, structure, and operation of the code are described. Mathematical details of equilibrium subroutiones for slab, bumpy torus, and tokamak plasma geometry are presented. Wave dispersion and absorption subroutines are presented for frequencies ranging from ion cyclotron frequency to electron cyclotron frequency. Graphics postprocessors for RAYS output data are also described.

  18. RAYS: a geometrical optics code for EBT

    The theory, structure, and operation of the code are described. Mathematical details of equilibrium subroutiones for slab, bumpy torus, and tokamak plasma geometry are presented. Wave dispersion and absorption subroutines are presented for frequencies ranging from ion cyclotron frequency to electron cyclotron frequency. Graphics postprocessors for RAYS output data are also described

  19. A Unicast Retransmission Scheme Based on Network Coding

    Manssour, Jawad; Osseiran, Afif; Ben Slimane, Slimane

    2012-01-01

    A novel scheme for data retransmission for wireless unicast communication is presented. The scheme is based on a transmitter and receiver structure and bit-level data processing using a combination of channel coding and network coding that allows retransmissions to contain the previously incorrectly received information and new information, both destined to the same receiver. Results show that, for the chosen forward error codes, up to 68.75% retransmission throughput gains are achieved compa...

  20. A Theoretical Method for Estimating Performance of Reed-Solomon Codes Concatenated with Orthogonal Space-Time Block Codes

    2002-01-01

    Based on the studies of Reed-Solomon codes and orthogonal space-time block codes over Rayleigh fading channel, a theoretical method for estimating performance of Reed-Solomon codes concatenated with orthogonal space-time block codes is presented in this paper. And an upper bound of the bit error rate is also obtained. It is shown through computer simulations that the signal-to-noise ratio reduces about 15 dB or more after orthogonal space-time block codes are concatenate with Reed-Solomon (15,6) codes over Rayleigh fading channel, when the bit error rate is 10-4.

  1. SRAC2006: A comprehensive neutronics calculation code system

    The SRAC is a code system applicable to neutronics analysis of a variety of reactor types. Since the publication of the second version of the users manual (JAERI-1302) in 1986 for the SRAC system, a number of additions and modifications to the functions and the library data have been made to establish a comprehensive neutronics code system. The current system includes major neutron data libraries (JENDL-3.3, JENDL-3.2, ENDF/B-VII, ENDF/B-VI.8, JEFF-3.1, JEF-2.2, etc.), and integrates five elementary codes for neutron transport and diffusion calculation; PIJ based on the collision probability method applicable to 16 kind of lattice models, SN transport codes ANISN(1D) and TWOTRN(2D), diffusion codes TUD(1D) and CITATION(multi-D). The system also includes an auxiliary code COREBN for multi-dimensional core burn-up calculation. (author)

  2. Continuous Materiality: Through a Hierarchy of Computational Codes

    Jichen Zhu

    2008-01-01

    Full Text Available The legacy of Cartesian dualism inherent in linguistic theory deeply influences current views on the relation between natural language, computer code, and the physical world. However, the oversimplified distinction between mind and body falls short of capturing the complex interaction between the material and the immaterial. In this paper, we posit a hierarchy of codes to delineate a wide spectrum of continuous materiality. Our research suggests that diagrams in architecture provide a valuable analog for approaching computer code in emergent digital systems. After commenting on ways that Cartesian dualism continues to haunt discussions of code, we turn our attention to diagrams and design morphology. Finally we notice the implications a material understanding of code bears for further research on the relation between human cognition and digital code. Our discussion concludes by noticing several areas that we have projected for ongoing research.

  3. Code CUGEL: A code to unfold Ge(Li) spectrometer polyenergetic gamma photon experimental distributions

    Steyn, J. J.; Born, U.

    1970-01-01

    A FORTRAN code was developed for the Univac 1108 digital computer to unfold lithium-drifted germanium semiconductor spectrometers, polyenergetic gamma photon experimental distributions. It was designed to analyze the combination continuous and monoenergetic gamma radiation field of radioisotope volumetric sources. The code generates the detector system response matrix function and applies it to monoenergetic spectral components discretely and to the continuum iteratively. It corrects for system drift, source decay, background, and detection efficiency. Results are presented in digital form for differential and integrated photon number and energy distributions, and for exposure dose.

  4. Arithmetic coding as a non-linear dynamical system

    Nagaraj, Nithin; Vaidya, Prabhakar G.; Bhat, Kishor G.

    2009-04-01

    In order to perform source coding (data compression), we treat messages emitted by independent and identically distributed sources as imprecise measurements (symbolic sequence) of a chaotic, ergodic, Lebesgue measure preserving, non-linear dynamical system known as Generalized Luröth Series (GLS). GLS achieves Shannon's entropy bound and turns out to be a generalization of arithmetic coding, a popular source coding algorithm, used in international compression standards such as JPEG2000 and H.264. We further generalize GLS to piecewise non-linear maps (Skewed-nGLS). We motivate the use of Skewed-nGLS as a framework for joint source coding and encryption.

  5. A Combined Weighted Approach to Detect Code Cloning

    Himanshu; Dr. Sushil Garg

    2014-01-01

    Code clone detection is one of the useful and required approach to generate the reliable and effective code. There are number of approaches defined by earlier researchers to detect the cloning. These approaches include the textual, statistical and token based approaches. In this present work, three main categories of code clone detection approaches are combined in a weighted form to detect the cloning over the system. The work is presented as a weighted model with the exploration of all three...

  6. TEA: A Code for Calculating Thermochemical Equilibrium Abundances

    Blecic, Jasmina; Harrington, Joseph; Bowman, M. Oliver

    2015-01-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. (1958) and Eriksson (1971). It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature-pressure pairs. We tested the code against the method o...

  7. How Moral Codes Evolve in a Trust Game

    Jean Paul Rabanal

    2015-06-01

    Full Text Available This paper analyzes the dynamic stability of moral codes in a two population trust game. Guided by a moral code, members of one population, the Trustors, are willing to punish members of the other population, the Trustees, who defect. Under replicator dynamics, adherence to the moral code has unstable oscillations around an interior Nash Equilibrium (NE, but under smoothed best response dynamics we obtain convergence to Quantal Response Equilibrium (QRE.

  8. TRANSURANUS: A fuel rod analysis code ready for use

    The basic concepts of fuel rod performance codes are discussed. The TRANSURANUS code developed at the Institute for Transuranium Elements, Karlsruhe (GE) is presented. It is a quasi two-dimensional (11/2-D) code designed for treatment of a whole fuel rod for any type of reactor and any situation. The fuel rods found in the majority of test- or power reactors can be analyzed for very different situations (normal, off-normal and accidental). The time scale of the problems to be treated may range from milliseconds to years. The TRANSURANUS code consists of a clearly defined mechanical/mathematical framework into which physical models can easily be incorporated. This framework has been extensively tested and the programming very clearly reflects this structure. The code is well structured and easy to understand. It has a comprehensive material data bank for different fuels, claddings, coolants and their properties. The code can be employed in a deterministic and a statistical version. It is written in standard FORTRAN 77. The code system includes: 2 preprocessor programs (MAKROH and AXORDER) for setting up new data cases; the post-processor URPLOT for plotting all important quantities as a function of the radius, the axial coordinate or the time; the post-processor URSTART evaluating statistical analyses. The TRANSURANUS code exhibits short running times. A new WINDOWS-based interactive interface is under development. The code is now in use in various European institutions and is available to all interested parties. 7 figs., 15 refs

  9. CALMAR: A New Versatile Code Library for Adjustment from Measurements

    Grégoire, G.; Fausser, C.; Destouches, C.; Thiollay, N.

    2016-02-01

    CALMAR, a new library for adjustment has been developed. This code performs simultaneous shape and level adjustment of an initial prior spectrum from measured reactions rates of activation foils. It is written in C++ using the ROOT data analysis framework,with all linear algebra classes. STAYSL code has also been reimplemented in this library. Use of the code is very flexible : stand-alone, inside a C++ code, or driven by scripts. Validation and test cases are under progress. Theses cases will be included in the code package that will be available to the community. Future development are discussed. The code should support the new Generalized Nuclear Data (GND) format. This new format has many advantages compared to ENDF.

  10. MED101: a laser-plasma simulation code. User guide

    Complete details for running the 1-D laser-plasma simulation code MED101 are given including: an explanation of the input parameters, instructions for running on the Rutherford Appleton Laboratory IBM, Atlas Centre Cray X-MP and DEC VAX, and information on three new graphics packages. The code, based on the existing MEDUSA code, is capable of simulating a wide range of laser-produced plasma experiments including the calculation of X-ray laser gain. (author)

  11. A New Monte Carlo Neutron Transport Code at UNIST

    Monte Carlo neutron transport code named MCS is under development at UNIST for the advanced reactor design and research purpose. This MC code can be used for fixed source calculation and criticality calculation. Continuous energy neutron cross section data and multi-group cross section data can be used for the MC calculation. This paper presents the overview of developed MC code and its calculation results. The real time fixed source calculation ability is also tested in this paper. The calculation results show good agreement with commercial code and experiment. A new Monte Carlo neutron transport code is being developed at UNIST. The MC codes are tested with several benchmark problems: ICSBEP, VENUS-2, and Hoogenboom-Martin benchmark. These benchmarks covers pin geometry to 3-dimensional whole core, and results shows good agreement with reference results

  12. A restructuring of DCH package for MIDAS computer code

    Park, S. H.; Kim, K. R.; Kim, D. H.; Cho, S. W. [KAERI, Taejon (Korea, Republic of)

    2004-07-01

    DCH package, which is one of thermal-hydraulic packages in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the DCH package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates an initial data file, as well as MELCOR, which is processing a calculation. The results of the modified code are verified against those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models.

  13. A restructuring of DCH package for MIDAS computer code

    DCH package, which is one of thermal-hydraulic packages in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the DCH package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates an initial data file, as well as MELCOR, which is processing a calculation. The results of the modified code are verified against those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  14. LOLA SYSTEM: A code block for nodal PWR simulation. Part. I - Simula-3 Code

    Description of the theory and users manual of the SIMULA-3 code, which is part of the core calculation system by nodal theory in one group, called LOLA SYSTEM. SIMULA-3 is the main module of the system, it uses a modified nodal theory, with interface leakages equivalent to the diffusion theory. (Author) 4 refs

  15. A new coding scheme in coded ultrasound using staggering repetition interval

    Cheng JIN; Si-ping CHEN; Zheng-di QIN

    2009-01-01

    The increase of frame rate, though with the potential in a coded ultrasound system, is generally concomitant with the simultaneous transmission of a number of apertures, and in consequence leads to increased cross-talks between different apertures.In view of this, a new coding scheme using staggering repetition interval was proposed. The transmitting signals were constructed by repeating the two (or more) modulated codes using staggering repetition interval, and then allocated to and transmitted simultaneously among different apertures. The decoding process was based on the subsection-matched filter under the assistance of different matched filters for different apertures. At last the outputs of subsection-matched filtering were added together. Staggering changed the positions of cross-correlation (CC) peaks from coinciding, which resulted in an effective reduction of CC. Our theoretical analysis and simulations showed that, the coding scheme can be used to reduce cross-talk, and a good cross-talk reduction will be achieved if the staggering delay is kept in an appropriate range.

  16. FLP: a field line plotting code for bundle divertor design

    A computer code was developed to aid in the design of bundle divertors. The code can handle discrete toroidal field coils and various divertor coil configurations. All coils must be composed of straight line segments. The code runs on the PDP-10 and displays plots of the configuration, field lines, and field ripple. It automatically chooses the coil currents to connect the separatrix produced by the divertor to the outer edge of the plasma and calculates the required coil cross sections. Several divertor designs are illustrated to show how the code works

  17. A construction of fully diverse unitary space-time codes

    2009-01-01

    Fully diverse unitary space-time codes are useful in multiantenna communications, especially in multiantenna differential modulation. Recently, two constructions of parametric fully diverse unitary space-time codes for three antennas system have been introduced. We propose a new construction method based on the constructions. In the present paper, fully diverse codes for systems of odd prime number antennas are obtained from this construction. Space-time codes from present construction are found to have better error performance than many best known ones.

  18. A Method for Modeling Co-Occurrence Propensity of Clinical Codes with Application to ICD-10-PCS Auto-Coding

    Subotin, Michael; Davis, Anthony R.

    2015-01-01

    Objective. Natural language processing methods for medical auto-coding, or automatic generation of medical billing codes from electronic health records, generally assign each code independently of the others. They may thus assign codes for closely related procedures or diagnoses to the same document, even when they do not tend to occur together in practice, simply because the right choice can be difficult to infer from the clinical narrative. Materials and Methods. We propose a method that in...

  19. QR Codes in the Library: Are They Worth the Effort? Analysis of a QR Code Pilot Project

    Andrew M. Wilson

    2012-01-01

    The literature is filled with potential uses for Quick Response (QR) codes in the library. Setting, but few library QR code projects have publicized usage statistics. A pilot project carried out in the Eda Kuhn Loeb Music Library of the Harvard College Library sought to determine whether library patrons actually understand and use QR codes. Results and analysis of the pilot project are provided, attempting to answer the question as to whether QR codes are worth the effort for libraries.

  20. A restructuring of TF package for MIDAS computer code

    Park, S. H.; Song, Y. M.; Kim, D. H. [KAERI, Taejon (Korea, Republic of)

    2002-10-01

    TF package which defines some interpolation and extrapolation condition through user defined table has been restructured in MIDAS computer code. To do this, data transferring methods of current MELCOR code are modified and adopted into TF package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of the meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of TF package addressed in this paper does module development and subroutine modification, and treats MELGEN which is making restart file as well as MELCOR which is processing calculation. The validation has been done by comparing the results of the modified code with those from the existing code, and it is confirmed that the results are the same. It hints that the similar approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models.

  1. A restructuring of TF package for MIDAS computer code

    TF package which defines some interpolation and extrapolation condition through user defined table has been restructured in MIDAS computer code. To do this, data transferring methods of current MELCOR code are modified and adopted into TF package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of the meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of TF package addressed in this paper does module development and subroutine modification, and treats MELGEN which is making restart file as well as MELCOR which is processing calculation. The validation has been done by comparing the results of the modified code with those from the existing code, and it is confirmed that the results are the same. It hints that the similar approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  2. A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions

    Lin, Fuchun

    2012-01-01

    Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions between a transmitter and a legitimate receiver, is considered. A new lattice invariant called the secrecy gain is used as a code design criterion for wiretap lattice codes since it was shown to characterize the confusion that a chosen lattice can cause at the eavesdropper: the higher the secrecy gain of the lattice, the more confusion. In this paper, a formula for the secrecy gain of unimodular lattices is derived. Secrecy gains of extremal odd unimodular lattices as well as unimodular lattices in dimension n, 16 \\leq n \\leq 23 are computed, covering the 4 extremal odd unimodular lattices and all the 111 nonextremal unimodular lattices (both odd and even) providing thus a classification of the best wiretap lattice codes coming from unimodular lattices in dimension n, 8 < n \\leq 23. Finally, to permit lattice encoding via Construction A, the corresponding error correction codes are determined.

  3. Roadmap Toward a Predictive Performance-based Commercial Energy Code

    Rosenberg, Michael I.; Hart, Philip R.

    2014-10-01

    Energy codes have provided significant increases in building efficiency over the last 38 years, since the first national energy model code was published in late 1975. The most commonly used path in energy codes, the prescriptive path, appears to be reaching a point of diminishing returns. The current focus on prescriptive codes has limitations including significant variation in actual energy performance depending on which prescriptive options are chosen, a lack of flexibility for designers and developers, and the inability to handle control optimization that is specific to building type and use. This paper provides a high level review of different options for energy codes, including prescriptive, prescriptive packages, EUI Target, outcome-based, and predictive performance approaches. This paper also explores a next generation commercial energy code approach that places a greater emphasis on performance-based criteria. A vision is outlined to serve as a roadmap for future commercial code development. That vision is based on code development being led by a specific approach to predictive energy performance combined with building specific prescriptive packages that are designed to be both cost-effective and to achieve a desired level of performance. Compliance with this new approach can be achieved by either meeting the performance target as demonstrated by whole building energy modeling, or by choosing one of the prescriptive packages.

  4. Periodic boundary conditions in a 3D hydro code

    Morgan, D L; Neely, J R; Vantine, H C

    1998-09-18

    We have modified a 3D hydrodynamics code so that it has the capability to impose periodic boundary conditions on the problem being considered. This capability allows it to treat only a basic symmetry unit of the problem when translational or rotational periodic symmetries are present. The code has been run successfully for two test problems involving rotational symmetries.

  5. Code-Mixing as a Bilingual Instructional Strategy

    Jiang, Yih-Lin Belinda; García, Georgia Earnest; Willis, Arlette Ingram

    2014-01-01

    This study investigated code-mixing practices, specifically the use of L2 (English) in an L1 (Chinese) class in a U.S. bilingual program. Our findings indicate that the code-mixing practices made and prompted by the teacher served five pedagogical functions: (a) to enhance students' bilingualism and bilingual learning, (b) to review and…

  6. A Non-MDS Erasure Code Scheme For Storage Applications

    Kiani, Abbas

    2011-01-01

    This paper investigates the use of redundancy and self repairing against node failures in distributed storage systems, using various strategies. In replication method, access to one replication node is sufficient to reconstruct a lost node, while in MDS erasure coded systems which are optimal in terms of redundancy-reliability tradeoff, a single node failure is repaired after recovering the entire stored data. Moreover, regenerating codes yield a tradeoff curve between storage capacity and repair bandwidth. The current paper aims at investigating a new storage code. Specifically, we propose a non-MDS (2k, k) code that tolerates any three node failures and more importantly, it is shown using our code a single node failure can be repaired through access to only three nodes.

  7. A guide to the use of SUPERB code

    The SUPERB code has been developed for the neutronics design of a BWR fuel assembly. The code SUPERB provides the few group homogenised lattice parameters of the fuel box as a function of burnup for different voids, control and temperatures of fuel and moderators. These nuclear data form the basic input to subsequent steady state or transient core analyses. This report describes the modelling of a BWR fuel box with almost all the complexities like the poisoned pins and control blade. This illustration and a sample input included here should provide a first-hand acquaintance with the code SUPERB and its use. It is hoped that this report facilitates the use of the code SUPERB by a variety of users, the constructive feedback of whom is invaluable in not only improving the versatility but also removing any hitherto hidden infelicities of the code. (author)

  8. TEA: A Code for Calculating Thermochemical Equilibrium Abundances

    Blecic, Jasmina; Bowman, M Oliver

    2015-01-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. (1958) and Eriksson (1971). It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature-pressure pairs. We tested the code against the method of Burrows & Sharp (1999), the free thermochemical equilibrium code CEA (Chemical Equilibrium with Applications), and the example given by White et al. (1958). Using their thermodynamic data, TEA reproduces their final abundances, but with higher precision. We also applied the TEA abundance calculations to models of several hot-Jupiter exoplanets, producing expected results. TEA is written in Python in a modular format. There is a start guide, a user manual, and a code document in addition to this theory paper. TEA is ...

  9. Porting a Hall MHD Code to a Graphic Processing Unit

    Dorelli, John C.

    2011-01-01

    We present our experience porting a Hall MHD code to a Graphics Processing Unit (GPU). The code is a 2nd order accurate MUSCL-Hancock scheme which makes use of an HLL Riemann solver to compute numerical fluxes and second-order finite differences to compute the Hall contribution to the electric field. The divergence of the magnetic field is controlled with Dedner?s hyperbolic divergence cleaning method. Preliminary benchmark tests indicate a speedup (relative to a single Nehalem core) of 58x for a double precision calculation. We discuss scaling issues which arise when distributing work across multiple GPUs in a CPU-GPU cluster.

  10. A Survey on Network Codes for Distributed Storage

    Dimakis, Alexandros G; Wu, Yunnan; Suh, Changho

    2010-01-01

    Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing encoded information fails, in order to maintain the same level of reliability we need to create encoded information at a new node. This amounts to a partial recovery of the code, whereas conventional erasure coding focuses on the complete recovery of the information from a subset of encoded packets. The consideration of the repair network traffic gives rise to new design challenges. Recently, network coding techniques have been instrumental in addressing these challenges, establishing that maintenance bandwidth can be reduced by orders of magnitude compared to standard erasure codes. This paper provides an overview of the research results on this topic.

  11. A Clustering-Based Approach to Enriching Code Foraging Environment.

    Niu, Nan; Jin, Xiaoyu; Niu, Zhendong; Cheng, Jing-Ru C; Li, Ling; Kataev, Mikhail Yu

    2016-09-01

    Developers often spend valuable time navigating and seeking relevant code in software maintenance. Currently, there is a lack of theoretical foundations to guide tool design and evaluation to best shape the code base to developers. This paper contributes a unified code navigation theory in light of the optimal food-foraging principles. We further develop a novel framework for automatically assessing the foraging mechanisms in the context of program investigation. We use the framework to examine to what extent the clustering of software entities affects code foraging. Our quantitative analysis of long-lived open-source projects suggests that clustering enriches the software environment and improves foraging efficiency. Our qualitative inquiry reveals concrete insights into real developer's behavior. Our research opens the avenue toward building a new set of ecologically valid code navigation tools. PMID:25910273

  12. Development of a nuclear power plant system analysis code

    During the period of this study, TASS 1.0 code has been prepared for the non-LOCA licensing and reload safety analyses of the Westinghouse and the Korean Standard Nuclear Power Plants (KSNPP) type reactors operating in Korea. TASS-NPA also has been developed for a real time simulation of the Kori-3/4 transients using on-line graphical interactions. TASS 2.0 code has been further developed to timely apply the TASS 2.0 code for the design certification of the KNGR. The COBRA/RELAP5 code, a multi-dimensional best estimate system code, has been developed by integrating the realistic three-dimensional reactor vessel model with the RELAP5 /MOD3.2 code, a one-dimensional system code. Also, a 3D turbulent two-phase flow analysis code, FEMOTH-TF, has been developed using finite element technique to analyze local thermal hydraulic phenomena in support of the detailed design analysis for the development of the advanced reactors. (author). 84 refs., 27 tabs., 83 figs

  13. On Predictive Coding for Erasure Channels Using a Kalman Framework

    Arildsen, Thomas; Murthi, Manohar; Andersen, Søren Vang;

    2009-01-01

    We present a new design method for robust low-delay coding of auto-regressive (AR) sources for transmission across erasure channels. The method is based on Linear Predictive Coding (LPC) with Kalman estimation at the decoder. The method designs the encoder and decoder off-line through an iterative...

  14. The ICCS Code: A New Development for an Old Problem

    Mendenhall, Stanley

    1987-01-01

    CPHA has developed a new classification system for hospital services, the ICCS (International Classification of Clinical Services). The codes are designed to organize hospital billing data so it is more accessible and useful for both clinical and financial applications. This coding structure has been adopted by over 100 hospitals in the United States since the beginning of 1987.

  15. Toward a Code of Conduct for the Presidency

    Fleming, J. Christopher

    2012-01-01

    A presidential code of conduct is needed more today than ever before. College and university presidents are being required to do more without the proper training to succeed. Presidents from outside the academy enter academia with normative patterns and codes of conduct that served them well in their previous occupations but now have the potential…

  16. Coding as a Trojan Horse for Mathematics Education Reform

    Gadanidis, George

    2015-01-01

    The history of mathematics educational reform is replete with innovations taken up enthusiastically by early adopters without significant transfer to other classrooms. This paper explores the coupling of coding and mathematics education to create the possibility that coding may serve as a Trojan Horse for mathematics education reform. That is,…

  17. ABINIT: a computer code for matter; Abinit: un code au service de la matiere

    Amadon, B.; Bottin, F.; Bouchet, J.; Dewaele, A.; Jollet, F.; Jomard, G.; Loubeyre, P.; Mazevet, S.; Recoules, V.; Torrent, M.; Zerah, G. [CEA Bruyeres-le-Chatel, 91 (France)

    2008-07-01

    The PAW (Projector Augmented Wave) method has been implemented in the ABINIT Code that computes electronic structures in atoms. This method relies on the simultaneous use of a set of auxiliary functions (in plane waves) and a sphere around each atom. This method allows the computation of systems including many atoms and gives the expression of energy, forces, stress... in terms of the auxiliary function only. We have generated atomic data for iron at very high pressure (over 200 GPa). We get a bcc-hcp transition around 10 GPa and the magnetic order disappears around 50 GPa. This method has been validated on a series of metals. The development of the PAW method has required a great effort for the massive parallelization of the ABINIT code. (A.C.)

  18. Calculations of angular momentum coupling coefficients on a computer code

    In this study, Clebsch-Gordan coefficients, 3j symbols, Racah coefficients, Wigner's 6j and 9j symbols were calculated by a prepared computer code of COEFF. The computer program COEFF is described which calculates angular momentum coupling coefficients and expresses them as quotient of two integers multiplied by the square root of the quotient of two integers. The program includes subroutines to encode an integer into its prime factors, to decode of prime factors back into an integer , to perform basic arithmetic operations on prime-coded numbers, as well as subroutines which calculate the coupling coefficients themselves. The computer code COEFF had been prepared to run on a VAX. In this study we rearranged the code to run on PC and tested it successfully. The obtained values in this study, were compared with the values of other computer programmes. A pretty good agreement is obtained between our prepared computer code and other computer programmes

  19. A novel unified coding analytical method for Internet of Things

    Sun, Hong; Zhang, JianHong

    2013-08-01

    This paper presents a novel unified coding analytical method for Internet of Things, which abstracts out the `displacement goods' and `physical objects', and expounds the relationship thereof. It details the item coding principles, establishes a one-to-one relationship between three-dimensional spatial coordinates of points and global manufacturers, can infinitely expand, solves the problem of unified coding in production phase and circulation phase with a novel unified coding method, and further explains how to update the item information corresponding to the coding in stages of sale and use, so as to meet the requirement that the Internet of Things can carry out real-time monitoring and intelligentized management to each item.

  20. COMPBRN III: a computer code for modeling compartment fires

    The computer code COMPBRN III deterministically models the behavior of compartment fires. This code is an improvement of the original COMPBRN codes. It employs a different air entrainment model and numerical scheme to estimate properties of the ceiling hot gas layer model. Moreover, COMPBRN III incorporates a number of improvements in shape factor calculations and error checking, which distinguish it from the COMPBRN II code. This report presents the ceiling hot gas layer model employed by COMPBRN III as well as several other modifications. Information necessary to run COMPBRN III, including descriptions of required input and resulting output, are also presented. Simulation of experiments and a sample problem are included to demonstrate the usage of the code. 37 figs., 46 refs

  1. A solution for automatic parallelization of sequential assembly code

    Kovačević Đorđe

    2013-01-01

    Full Text Available Since modern multicore processors can execute existing sequential programs only on a single core, there is a strong need for automatic parallelization of program code. Relying on existing algorithms, this paper describes one new software solution tool for parallelization of sequential assembly code. The main goal of this paper is to develop the parallelizator which reads sequential assembler code and at the output provides parallelized code for MIPS processor with multiple cores. The idea is the following: the parser translates assembler input file to program objects suitable for further processing. After that the static single assignment is done. Based on the data flow graph, the parallelization algorithm separates instructions on different cores. Once sequential code is parallelized by the parallelization algorithm, registers are allocated with the algorithm for linear allocation, and the result at the end of the program is distributed assembler code on each of the cores. In the paper we evaluate the speedup of the matrix multiplication example, which was processed by the parallelizator of assembly code. The result is almost linear speedup of code execution, which increases with the number of cores. The speed up on the two cores is 1.99, while on 16 cores the speed up is 13.88.

  2. A program to validate computer codes for container impact analysis

    The detailed analysis of containers during impacts to assess either margins to failure or the consequences of different design strategies, requires the use of sophisticated computer codes to model the interactions of the various structural components. The combination of plastic deformation, impact and sliding at interfaces and dynamic loading effects provides a severe test of both the skill of the analyst and the robustness of the computer codes. A program of experiments has been under way at Winfrith since 1987 using extensively instrumented models to provide data for the validation of such codes. Three finite element codes, DYNA3D, HONDO-II and ABAQUS, were selected as suitable tools to cover the range of conditions expected in typical impacts. The impact orientation, velocity and instrumentation locations for the experiments are specified by pre-test calculations using these codes. Post-test analyses using the actual impact orientation and velocities are carried out as necessary if significant discrepancies are found

  3. Selective video encryption of a distributed coded bitstream using LDPC codes

    Um, Hwayoung; Delp, Edward J.

    2006-02-01

    Selective encryption is a technique that is used to minimizec omputational complexity or enable system functionality by only encrypting a portion of a compressed bitstream while still achieving reasonable security. For selective encryption to work, we need to rely not only on the beneficial effects of redundancy reduction, but also on the characteristics of the compression algorithm to concentrate important data representing the source in a relatively small fraction of the compressed bitstream. These important elements of the compressed data become candidates for selective encryption. In this paper, we combine encryption and distributed video source coding to consider the choices of which types of bits are most effective for selective encryption of a video sequence that has been compressed using a distributed source coding method based on LDPC codes. Instead of encrypting the entire video stream bit by bit, we encrypt only the highly sensitive bits. By combining the compression and encryption tasks and thus reducing the number of bits encrypted, we can achieve a reduction in system complexity.

  4. A new two dimensional spectral/spatial multi-diagonal code for noncoherent optical code division multiple access (OCDMA) systems

    Kadhim, Rasim Azeez; Fadhil, Hilal Adnan; Aljunid, S. A.; Razalli, Mohamad Shahrazel

    2014-10-01

    A new two dimensional codes family, namely two dimensional multi-diagonal (2D-MD) codes, is proposed for spectral/spatial non-coherent OCDMA systems based on the one dimensional MD code. Since the MD code has the property of zero cross correlation, the proposed 2D-MD code also has this property. So that, the multi-access interference (MAI) is fully eliminated and the phase induced intensity noise (PIIN) is suppressed with the proposed code. Code performance is analyzed in terms of bit error rate (BER) while considering the effect of shot noise, PIIN, and thermal noise. The performance of the proposed code is compared with the related MD, modified quadratic congruence (MQC), two dimensional perfect difference (2D-PD) and two dimensional diluted perfect difference (2D-DPD) codes. The analytical and the simulation results reveal that the proposed 2D-MD code outperforms the other codes. Moreover, a large number of simultaneous users can be accommodated at low BER and high data rate.

  5. DIVERT: a divertor magnetic field line following code

    The computer code DIVERT has been written to trace magnetic field lines in the presence of a divertor. Its purpose is to allow a user to estimate the thickness of the plasma scrapeoff region and to provide a visual mapping of the magnetic field lines near the divertor. Included in the code is the capability to provide auxiliary graphics and compute the field ripple. The code can handle a divertor made up of any arrangement of straight line coil segments and will provide a graph of the field line configuration on output

  6. Development and validation of a nodal code for core calculation

    The code RHENO solves the multigroup three-dimensional diffusion equation using a nodal method of polynomial expansion.A comparative study has been made between this code and present internationals nodal diffusion codes, resulting that the RHENO is up to date.The RHENO has been integrated to a calculation line and has been extend to make burnup calculations.Two methods for pin power reconstruction were developed: modulation and imbedded. The modulation method has been implemented in a program, while the implementation of the imbedded method will be concluded shortly.The validation carried out (that includes experimental data of a MPR) show very good results and calculation efficiency

  7. LAPU2: a laser pulse propagation code with diffraction

    Complete descriptions of the mathematical models and numerical methods used in the code LAPU2 are presented. This code can be used to study the propagation with diffraction of a temporally finite pulse through a sequence of resonant media and simple optical components. The treatment assumes cylindrical symmetry and allows nonlinear refractive indices. An unlimited number of different media can be distributed along the propagation path of the pulse. A complete users guide to input data is given as well as a FORTRAN listing of the code

  8. Experimental Implementation of a Codeword Stabilized Quantum Code

    Zhang, Jingfu; Zeng, Bei; Laflamme, Raymond

    2011-01-01

    A five-qubit codeword stabilized quantum code is implemented in a seven-spin-qubit system using nuclear magnetic resonance (NMR). For the first time, our experiment implements a good nonadditive quantum code which encodes a larger Hilbert space than any stabilizer code with the same length and capable of correcting the same kind of errors. The robustness of the protected states is well demonstrated. Given the typical decoherence time of the system, our experiment challenges the ultimate limit of coherence control of the system and pushes the limit to implement complex quantum circuits in spin qubits forward.

  9. A Parallel Tree-SPH code for Galaxy Formation

    Lia, C; Lia, Cesario; Carraro, Giovanni

    1999-01-01

    We describe a new implementation of a parallel Tree-SPH code with the aim to simulate Galaxy Formation and Evolution. The code has been parallelized using SHMEM, a Cray proprietary library to handle communications between the 256 processors of the Silicon Graphics T3E massively parallel supercomputer hosted by the Cineca Supercomputing Center (Bologna, Italy). The code combines the Smoothed Particle Hydrodynamics (SPH) method to solve hydro-dynamical equations with the popular Barnes and Hut (1986) tree-code to perform gravity calculation with a NlogN scaling, and it is based on the scalar Tree-SPH code developed by Carraro et al(1998)[MNRAS 297, 1021]. Parallelization is achieved distributing particles along processors according to a work-load criterion. Benchmarks, in terms of load-balance and scalability, of the code are analyzed and critically discussed against the adiabatic collapse of an isothermal gas sphere test using 20,000 particles on 8 processors. The code results balanced at more that 95% level. ...

  10. LACEwING: Lessons from a New Moving Group Code

    Riedel, Adric R

    2015-01-01

    With all the new discoveries being made about nearby young stars, the ability to find new nearby young stars is as important as ever, and membership identification codes will continue to perform a vital role in scientific research. In the process of creating a new moving group membership identification code - LocAting Constituent mEmbers In Nearby Groups (LACEwING) - we have discovered a few pointers relevant to astronomers trying to use codes like LACEwING to locate young stars.

  11. Software exorcism a handbook for debugging and optimizing legacy code

    Blunden, Bill

    2013-01-01

    Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code takes an unflinching, no bulls and look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that you are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our atten

  12. A search for symmetries in the genetic code

    A search for symmetries based on the classification theorem of Cartan for the compact simple Lie algebras is performed to verify to what extent the genetic code is a manifestation of some underlying symmetry. An exact continuous symmetry group cannot be found to reproduce the present, universal code. However a unique approximate symmetry group is compatible with codon assignment for the fundamental amino acids and the termination codon. In order to obtain the actual genetic code, the symmetry must be slightly broken. (author). 27 refs, 3 figs, 6 tabs

  13. SEQassembly: A Practical Tools Program for Coding Sequences Splicing

    Lee, Hongbin; Yang, Hang; Fu, Lei; Qin, Long; Li, Huili; He, Feng; Wang, Bo; Wu, Xiaoming

    CDS (Coding Sequences) is a portion of mRNA sequences, which are composed by a number of exon sequence segments. The construction of CDS sequence is important for profound genetic analysis such as genotyping. A program in MATLAB environment is presented, which can process batch of samples sequences into code segments under the guide of reference exon models, and splice these code segments of same sample source into CDS according to the exon order in queue file. This program is useful in transcriptional polymorphism detection and gene function study.

  14. Code of a Tokamak Fusion Energy Facility ITER

    The technical structural code for ITER (International Thermonuclear Experimental Fusion Reactor) and, as more generic applications, for D-T burning fusion power facilities (hereafter, Fusion Code) should be innovative because of their quite different features of safety and mechanical components from nuclear fission reactors, and the necessity of introducing several new fabrication and examination technologies. Introduction of such newly developed technologies as inspection-free automatic welding into the Fusion Code is rationalized by a pilot application of a new code concept of system-based code for integrity. The code concept means an integration of element technical items necessary for construction, operation and maintenance of mechanical components of fusion power facilities into a single system to attain an optimization of the total margin of these components. Unique and innovative items of the Fusion Code are typically as follows: - Use of non-metals; - Cryogenic application; - New design margins on allowable stresses, and other new design rules; - Use of inspection-free automatic welding, and other newly developed fabrication technologies; - Graded approach of quality assurance standard to cover radiological safety-system components as well as non-safety-system components; - Consideration on replacement components. (authors)

  15. A Case for Dynamic Reverse-code Generation

    Lee, Jooyong

    2007-01-01

    Backtracking (i.e. reverse execution) helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These...... implementations, however, inherently do not scale. As has often been said, the ultimate solution for backtracking is to use reverse code: executing the reverse code restores the previous states of a program. In our earlier work, we presented a method to generate reverse code on the fly while running a debugger....... This article presents a case study of dynamic reverse-code generation. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse...

  16. CRACKEL: a computer code for CFR fuel management calculations

    The CRACKLE computer code is designed to perform rapid fuel management surveys of CFR systems. The code calculates overall features such as reactivity, power distributions and breeding gain, and also calculates for each sub-assembly plutonium content and power output. A number of alternative options are built into the code, in order to permit different fuel management strategies to be calculated, and to perform more detailed calculations when necessary. A brief description is given of the methods of calculation, and the input facilities of CRACKLE, with examples. (author)

  17. Development and validation of a fuel performance analysis code

    CAD has been developing a computer code 'FRAVIZ' for calculation of steady-state thermomechanical behaviour of nuclear reactor fuel rods. It contains four major modules viz., Thermal module, Fission Gas Release module, Material Properties module and Mechanical module. All these four modules are coupled to each other and feedback from each module is fed back to others to get a self-consistent evolution in time. The computer code has been checked against two FUMEX benchmarks. Modelling fuel performance in Advance Heavy Water Reactor would require additional inputs related to the fuel and some modification in the code.(author)

  18. A description of the ENIGMA fuel performance code

    An overview of the main features and characteristics of the ENIGMA code developed by BNFL and CEGB is given. A general description as well as some specific sub-models are presented. One of the characteristics of this code is its fully-modular conception. Each submodel treats a well identified basic mechanism. This detailed, semi-empirical formulation of physical models contributes to reducing the number of tuning parameters. The advantage of such a modular construction is the easy replacement of a model if a less empirical one becomes available, or if shortcomings in current models are discovered. The code can be run on a PC equipped with a transputer. An extensive programme of code assessment is currently underway. (author). 9 refs, 9 figs, 1 tab

  19. Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source Channel Network Coding Approach

    Joda, Roghayeh

    2010-01-01

    This paper addresses network code design for robust transmission of sources over an orthogonal two-hop wireless network with a broadcasting relay. The network consists of multiple sources and destinations in which each destination, benefiting the relay signal, intends to decode a subset of the sources. Two special instances of this network are orthogonal broadcast relay channel and the orthogonal multiple access relay channel. The focus is on complexity constrained scenarios, e.g., for wireless sensor networks, where channel coding is practically imperfect. Taking a source-channel and network coding approach, we design the code (mapping) at the relay such that the average reconstruction distortion at the destinations is minimized. To this end, by decomposing the source and channel-network distortions, an efficient design algorithm is proposed. The resulting network code at the relay is nonlinear and substantially outperforms the best performing linear network code at the relay. A motivating formulation of a f...

  20. F2D: A two dimensional compressible gas flow code

    The F2D computer code is a general-purpose, two-dimensional, fully compressible thermal-fluids code that models most phenomena found in experimental environments with coupled fluid flow and heat transfer. The code solves momentum, continuity, gas energy, and structure energy equations, simultaneously utilizing a predictor-corrector solution algorithm. The F2D code applied to a particle-bed reactor operating at 5 MW/L with a flow-control cold frit, revealed a skew in the temperature contours caused by two-dimensional flow effects. A thermal-fluid stability analysis of particle-bed and NERVA type reactors reveals similar behavior for the stability threshold

  1. ORMEC: a three-dimensional MHD spectral inverse equilibrium code

    The Oak Ridge Moments Equilibrium Code (ORMEC) is an efficient computer code that has been developed to calculate three-dimensional MHD equilibria using the inverse spectral method. The fixed boundary formulation, which is based on a variational principle for the spectral coefficients (moments) of the cylindrical coordinates R and Z, is described and compared with the finite difference code BETA developed by Bauer, Betancourt, and Garabedian. Calculations for the Heliotron, Wendelstein VIIA, and Advanced Toroidal Facility (ATF) configurations are performed to establish the accuracy and mesh convergence properties for the spectral method. 16 refs., 13 figs

  2. A new hydrodynamics code for Type Ia Supernovae

    Leung, S -C; Lin, L -M

    2015-01-01

    A two-dimensional hydrodynamics code for Type Ia supernovae (SNIa) simulations is presented. The code includes a fifth-order shock-capturing scheme WENO, detailed nuclear reaction network, flame-capturing scheme and sub-grid turbulence. For post-processing we have developed a tracer particle scheme to record the thermodynamical history of the fluid elements. We also present a one-dimensional radiative transfer code for computing observational signals. The code solves the Lagrangian hydrodynamics and moment-integrated radiative transfer equations. A local ionization scheme and composition dependent opacity are included. Various verification tests are presented, including standard benchmark tests in one and two dimensions. SNIa models using the pure turbulent deflagration model and the delayed-detonation transition model are studied. The results are consistent with those in the literature. We compute the detailed chemical evolution using the tracer particles' histories, and we construct corresponding bolometric...

  3. Audio Quality for a Simple Forward Error Correcting Code

    Calas, Yvan; Jean-Marie, Alain

    2004-01-01

    International audience The aim of this paper is to study the audio quality offered by a simple Forward Error Correction (FEC) code used in audio applications like Freephone or Rat. This coding technique consists in adding to every audio packet a redundant information concerning a preceding audio packet which belongs to the same audio flow. We show that the audio quality depends not only on the number of FEC flows and the utility function associated to the quantity of information received, ...

  4. Continuous Materiality: Through a Hierarchy of Computational Codes

    Jichen Zhu; Kenneth J. Knoespe

    2008-01-01

    The legacy of Cartesian dualism inherent in linguistic theory deeply influences current views on the relation between natural language, computer code, and the physical world. However, the oversimplified distinction between mind and body falls short of capturing the complex interaction between the material and the immaterial. In this paper, we posit a hierarchy of codes to delineate a wide spectrum of continuous materiality. Our research suggests that diagrams in architecture provide a valuabl...

  5. A New Index Coding Scheme Exploiting Interlinked Cycles

    Thapa, Chandra; Ong, Lawrence; Johnson, Sarah J.

    2015-01-01

    We study the index coding problem in the unicast message setting, i.e., where each message is requested by one unique receiver. This problem can be modeled by a directed graph. We propose a new scheme called interlinked cycle cover, which exploits interlinked cycles in the directed graph, for designing index codes. This new scheme generalizes the existing clique cover and cycle cover schemes. We prove that for a class of infinitely many digraphs with messages of any length, interlinked cycle ...

  6. A coding method for decay pathways in successive decay chain

    The decay pathways in successive decay chain were coded with binary digits. Based the coding approach and by using the E-factor method and recursion algorithm, a general purpose computer code DecayChain for calculation of the growth and decay of any member in a successive decay chain was written. The usage of decay chain code was demonstrated by the calculation of individual activities of each progenies and the total activity for the successive decay chain 228Th through 208Pb (9 members). When the relative detection efficiencies of chain members happen to meet an equation deduced in this paper the total counting rate will exponentially decrease with time with a single half-life. This conclusion was verified by the calculation performed with DecayChain for a 4-membered decay chain. (authors)

  7. GYOTO: a new general relativistic ray-tracing code

    GYOTO, a general relativistic ray-tracing code, is presented. It aims at computing images of astronomical bodies in the vicinity of compact objects, as well as trajectories of massive bodies in relativistic environments. This code is capable of integrating the null and timelike geodesic equations not only in the Kerr metric, but also in any metric computed numerically within the 3+1 formalism of general relativity. Simulated images and spectra have been computed for a variety of astronomical targets, such as a moving star or a toroidal accretion structure. The underlying code is an open source and freely available. It is user-friendly, quickly handled and very modular so that extensions are easy to integrate. Custom analytical or numerical metrics and astronomical targets can be implemented in C++ plug-in extensions independent from the main code. (papers)

  8. POPCORN: A comparison of binary population synthesis codes

    Claeys, J.S.W.A.; Toonen, S.; Mennekens, N.

    2013-01-01

    We compare the results of three binary population synthesis codes to understand the differences in their results. As a first result we find that when equalizing the assumptions the results are similar. The main differences arise from deviating physical input.

  9. POPCORN: A comparison of binary population synthesis codes

    Claeys, J S W; Mennekens, N

    2012-01-01

    We compare the results of three binary population synthesis codes to understand the differences in their results. As a first result we find that when equalizing the assumptions the results are similar. The main differences arise from deviating physical input.

  10. A New Code for Proto-Neutron Star Evolution

    Roberts, Luke F

    2012-01-01

    A new code for following the evolution and emissions of proto-neutron stars during the first minute of their lives is developed and tested. The code is one dimensional, fully implicit, and general relativistic. Multi-group, multi-flavor neutrino transport is incorporated that makes use of variable Eddington factors obtained from a formal solution of the static general relativistic Boltzmann equation with linearized scattering terms. The timescales of neutrino emission and spectral evolution obtained using the new code are broadly consistent with previous results. Unlike other recent calculations, however, the new code predicts that the neutrino-driven wind will be characterized, at least for part of its existence, by a neutron excess. This change, potentially consequential for nucleosynthesis in the wind, is due to an improved treatment of the charged-current interactions of electron flavored neutrinos and anti-neutrinos with nucleons. A comparison is also made between the results obtained using either variab...

  11. GPEC, a real-time capable Tokamak equilibrium code

    Rampp, Markus; Fischer, Rainer

    2015-01-01

    A new parallel equilibrium reconstruction code for tokamak plasmas is presented. GPEC allows to compute equilibrium flux distributions sufficiently accurate to derive parameters for plasma control within 1 ms of runtime which enables real-time applications at the ASDEX Upgrade experiment (AUG) and other machines with a control cycle of at least this size. The underlying algorithms are based on the well-established offline-analysis code CLISTE, following the classical concept of iteratively solving the Grad-Shafranov equation and feeding in diagnostic signals from the experiment. The new code adopts a hybrid parallelization scheme for computing the equilibrium flux distribution and extends the fast, shared-memory-parallel Poisson solver which we have described previously by a distributed computation of the individual Poisson problems corresponding to different basis functions. The code is based entirely on open-source software components and runs on standard server hardware and software environments. The real-...

  12. Development of a New Class of Zero Cross Correlation Codes for Optical CDMA Systems

    Rashidi, Che Bin Mohd; Aljunid, S. A.; Ghani, F.; Anuar, M. S.

    2012-03-01

    The paper presents a method for the development of a new class of zero cross correlation optical code for Optical Code Division Multiple Access (OCDMA) system using Spectral Amplitude Coding. The proposed code is called Modified Zero Cross Correlation Code (MZCC). The code has minimum length and can be constructed quite simply for any number of users and for any code weights. The code has better spectrum slicing properties and noise performance in term of Bit Error Rate. The Modified Zero Cross Correlation Code will be demonstrated in simulation using OptiSys. 6.0 to observe noise performance which is better as compared to the existing Zero Cross Correlation Code.

  13. SPAMCART: a code for smoothed particle Monte Carlo radiative transfer

    Lomax, O

    2016-01-01

    We present a code for generating synthetic SEDs and intensity maps from Smoothed Particle Hydrodynamics simulation snapshots. The code is based on the Lucy (1999) Monte Carlo Radiative Transfer method, i.e. it follows discrete luminosity packets, emitted from external and/or embedded sources, as they propagate through a density field, and then uses their trajectories to compute the radiative equilibrium temperature of the ambient dust. The density is not mapped onto a grid, and therefore the calculation is performed at exactly the same resolution as the hydrodynamics. We present two example calculations using this method. First, we demonstrate that the code strictly adheres to Kirchhoff's law of radiation. Second, we present synthetic intensity maps and spectra of an embedded protostellar multiple system. The algorithm uses data structures that are already constructed for other purposes in modern particle codes. It is therefore relatively simple to implement.

  14. A Novel Channel Coding for Progressive Transmission of Medical Images

    Jagatheeswari, P

    2009-01-01

    A novel channel coding scheme for progressive transmission of large images is proposed. The transmission time, low distortion reconstructed image and low complexity are most concerned in this paper. In the case of medical data transmission, it is vital to keep the distortion level under control as in most of the cases certain clinically important regions have to be transmitted without any visible error. The proposed system significantly reduces the transmission time and error. The progressive transmission is based on the process that the input image is decomposed into many subblocks each to be coded, compressed, and transmitted individually. Therefore, firstly the image is segmented into a number of subblocks and then the discrete wavelet transform decomposes each subblock into different time-frequency components. Finally the components are coded for error control and transmitted. The complete system is coded in VHDL. In the proposed system, we choose a 3-level Haar wavelet transform to perform the wavelet tr...

  15. A comparison of LOCA analysis using SMOKIN and CERBERUS codes

    This paper presents the results of a comparison of the analyses of a postulated Loss of Coolant Accident (LOCA) in Pickering NGS A reactors using the two neutron kinetics codes SMOKIN and CERBERUS. Both codes have been used to simulate the space-time neutronic behaviour of CANDU-PHWR reactors. The main objective of the present study is to evaluate the accuracy with which SMOKIN can predict power transients compared to CERBERUS. The comparison shows that the two codes produce similar bulk power and reactivity transients. However, SMOKIN was found to overestimate the power transient (relative to CERBERUS) in some regions of the core, which is indicative of the spatial differences between the two codes. It was demonstrated that part of this overestimate is due to the use of reaction-rate averaged fuel properties in SMOKIN, compared to instantaneous fuel properties in CERBERUS. (author). 5 refs., 3 tabs., 6 figs

  16. A Low Power Viterbi Decoder for Trellis Coded Modulation System

    M. Jansi Rani; S.Vidheswari

    2014-01-01

    Forward Error Correction (FEC) schemes are an essential component of wireless communication systems. Convolutional codes are employed to implement FEC but the complexity of corresponding decoders increases exponentially according to the constraint length. Present wireless standards such as Third generation (3G) systems, GSM, 802.11A, 802.16 utilize some configuration of convolutional coding. Convolutional encoding with Viterbi decoding is a powerful method for forward error co...

  17. SPORTS - a simple non-linear thermalhydraulic stability code

    A simple code, called SPORTS, has been developed for two-phase stability studies. A novel method of solution of the finite difference equations was deviced and incorporated, and many of the approximations that are common in other stability codes are avoided. SPORTS is believed to be accurate and efficient, as small and large time-steps are permitted, and hence suitable for micro-computers. (orig.)

  18. RADTRAN: a computer code to analyze transportation of radioactive material

    A computer code is presented which predicts the environmental impact of any specific scheme of radioactive material transportation. Results are presented in terms of annual latent cancer fatalities and annual early fatility probability resulting from exposure, during normal transportation or transport accidents. The code is developed in a generalized format to permit wide application including normal transportation analysis; consideration of alternatives; and detailed consideration of specific sectors of industry

  19. A New Code for Proto-Neutron Star Evolution

    Roberts, Luke F.

    2012-01-01

    A new code for following the evolution and emissions of proto-neutron stars during the first minute of their lives is developed and tested. The code is one dimensional, fully implicit, and general relativistic. Multi-group, multi-flavor neutrino transport is incorporated that makes use of variable Eddington factors obtained from a formal solution of the static general relativistic Boltzmann equation with linearized scattering terms. The timescales of neutrino emission and spectral evolution o...

  20. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  1. The Nuremberg Code and the Nuremberg Trial. A reappraisal.

    Katz, J

    1996-11-27

    The Nuremberg Code includes 10 principles to guide physician-investigators in experiments involving human subjects. These principles, particularly the first principle on "voluntary consent," primarily were based on legal concepts because medical codes of ethics existent at the time of the Nazi atrocities did not address consent and other safeguards for human subjects. The US judges who presided over the proceedings did not intend the Code to apply only to the case before them, to be a response to the atrocities committed by the Nazi physicians, or to be inapplicable to research as it is customarily carried on in medical institutions. Instead, a careful reading of the judgment suggests that they wrote the Code for the practice of human experimentation whenever it is being conducted. PMID:8922453

  2. A Monte Carlo code for ion beam therapy

    Anaïs Schaeffer

    2012-01-01

    Initially developed for applications in detector and accelerator physics, the modern Fluka Monte Carlo code is now used in many different areas of nuclear science. Over the last 25 years, the code has evolved to include new features, such as ion beam simulations. Given the growing use of these beams in cancer treatment, Fluka simulations are being used to design treatment plans in several hadron-therapy centres in Europe.   Fluka calculates the dose distribution for a patient treated at CNAO with proton beams. The colour-bar displays the normalized dose values. Fluka is a Monte Carlo code that very accurately simulates electromagnetic and nuclear interactions in matter. In the 1990s, in collaboration with NASA, the code was developed to predict potential radiation hazards received by space crews during possible future trips to Mars. Over the years, it has become the standard tool to investigate beam-machine interactions, radiation damage and radioprotection issues in the CERN accelerator com...

  3. Quantum image coding with a reference-frame-independent scheme

    Chapeau-Blondeau, François; Belin, Etienne

    2016-07-01

    For binary images, or bit planes of non-binary images, we investigate the possibility of a quantum coding decodable by a receiver in the absence of reference frames shared with the emitter. Direct image coding with one qubit per pixel and non-aligned frames leads to decoding errors equivalent to a quantum bit-flip noise increasing with the misalignment. We show the feasibility of frame-invariant coding by using for each pixel a qubit pair prepared in one of two controlled entangled states. With just one common axis shared between the emitter and receiver, exact decoding for each pixel can be obtained by means of two two-outcome projective measurements operating separately on each qubit of the pair. With strictly no alignment information between the emitter and receiver, exact decoding can be obtained by means of a two-outcome projective measurement operating jointly on the qubit pair. In addition, the frame-invariant coding is shown much more resistant to quantum bit-flip noise compared to the direct non-invariant coding. For a cost per pixel of two (entangled) qubits instead of one, complete frame-invariant image coding and enhanced noise resistance are thus obtained.

  4. Quantum image coding with a reference-frame-independent scheme

    Chapeau-Blondeau, François; Belin, Etienne

    2016-04-01

    For binary images, or bit planes of non-binary images, we investigate the possibility of a quantum coding decodable by a receiver in the absence of reference frames shared with the emitter. Direct image coding with one qubit per pixel and non-aligned frames leads to decoding errors equivalent to a quantum bit-flip noise increasing with the misalignment. We show the feasibility of frame-invariant coding by using for each pixel a qubit pair prepared in one of two controlled entangled states. With just one common axis shared between the emitter and receiver, exact decoding for each pixel can be obtained by means of two two-outcome projective measurements operating separately on each qubit of the pair. With strictly no alignment information between the emitter and receiver, exact decoding can be obtained by means of a two-outcome projective measurement operating jointly on the qubit pair. In addition, the frame-invariant coding is shown much more resistant to quantum bit-flip noise compared to the direct non-invariant coding. For a cost per pixel of two (entangled) qubits instead of one, complete frame-invariant image coding and enhanced noise resistance are thus obtained.

  5. ESE a 2D compressible multiphase flow code developed for MFCI analysis - code description

    The ESE (Evaluation of Steam Explosions) computer code has been developed to model the interaction of molten core debris with water during the first premixing stage of a steam explosion. A steam explosion is a physical event, which may occur during a severe reactor accident following core meltdown when the molten fuel comes into contact with the coolant water. In this paper the numerical treatment of probabilistic multiphase flow equations on which ESE is based is described. ESE is a general two-dimensional compressible multiphase flow computer code. Each phase in the multiphase flow usually water, steam, melt and air is represented by one flow field with its own local concentration and temperature and is described with its own set of partial differential mass, momentum and energy equations. These transport equations are solved on a staggered in a 2D rectangular or cylindrical co-ordinate system using a high-resolution finite difference method. The pressure equation is solved using the stabilized squared conjugate gradient method (CGSTAB), which converges fast also for high density ratios. The numerical methods used in ESE were precisely tested on a number of carefully chosen cases where the analytical solutions are known. All results are presented in a form of graphs and they clearly show that the applied high-resolution method most exactly reproduces the analytical behavior.(author)

  6. The Plasma Simulation Code: A modern particle-in-cell code with patch-based load-balancing

    Germaschewski, Kai; Fox, William; Abbott, Stephen; Ahmadi, Narges; Maynard, Kristofor; Wang, Liang; Ruhl, Hartmut; Bhattacharjee, Amitava

    2016-08-01

    This work describes the Plasma Simulation Code (PSC), an explicit, electromagnetic particle-in-cell code with support for different order particle shape functions. We review the basic components of the particle-in-cell method as well as the computational architecture of the PSC code that allows support for modular algorithms and data structure in the code. We then describe and analyze in detail a distinguishing feature of PSC: patch-based load balancing using space-filling curves which is shown to lead to major efficiency gains over unbalanced methods and a previously used simpler balancing method.

  7. ADLIB---A simple database framework for beamline codes

    There are many well developed codes available for beamline design and analysis. A significant fraction of each of these codes is devoted to processing its own unique input language for describing the problem. None of these large, complex, and powerful codes does everything. Adding a new bit of specialized physics can be a difficult task whose successful completion makes the code even larger and more complex. This paper describes an attempt to move in the opposite direction, toward a family of small, simple, single purpose physics and utility modules, linked by an open, portable, public domain database framework. These small specialized physics codes begin with the beamline parameters already loaded in the database, and accessible via the handful of subroutines that constitute ADLIB. Such codes are easier to write, and inherently organized in a manner suitable for incorporation in model based control system algorithms. Examples include programs for analyzing beamline misalignment sensitivities, for simulating and fitting beam steering data, and for translating among MARYLIE, TRANSPORT, and TRACE3D formats

  8. ADLIB: A simple database framework for beamline codes

    There are many well developed codes available for beamline design and analysis. A significant fraction of each of these codes is devoted to processing its own unique input language for describing the problem. None of these large, complex, and powerful codes does everything. Adding a new bit of specialized physics can be a difficult task whose successful completion makes the code even larger and more complex. This paper describes an attempt to move in the opposite direction, toward a family of small, simple, single purpose physics and utility modules, linked by an open, portable, public domain database framework. These small specialized physics codes begin with the beamline parameters already loaded in the database, and accessible via the handful of subroutines that constitute ADLIB. Such codes are easier to write, and inherently organized in a manner suitable for incorporation in model based control system algorithms. Examples include programs for analyzing beamline misalignment sensitivities, for simulating and fitting beam steering data, and for translating among MARYLIE, TRANSPORT, and TRACE3D formats

  9. Kernel Code Integrity Protection Based on a Virtualized Memory Architecture

    Jianhua Sun; Hao Chen; Cheng Chang; Xingbang Li

    2013-01-01

    Kernel rootkits pose significant challenges on defensive techniques as they run at the highest privilege level along with the protection systems. Modern architectural approaches such as the NX protection have been used in mitigating attacks, however determined attackers can still bypass these defenses with specifically crafted payloads. In this paper, we propose a virtualized Harvard memory architecture to address the kernel code integrity problem, which virtually separates the code fetch and...

  10. Code Component Composition Reuse Is a New Programming Paradigm

    2001-01-01

    After describing the characteristics of programming paradigm,this pap er introduces the approach of code component composition reuse in detail, propos es and discusses viewpoint that code component composition reuse is a kind of ne w programming paradigm. This paper also specifies the characteristics of this ne w programming paradigm in detail, and points out some issues that must be resolv ed for using this new programming paradigm.

  11. LINX-1: a code for linking polynomial cross section files

    The capabilities of the LINX-1 code are described. It was developed for the purpose of linking seperate fuel assembly and reflector node polynomial cross section files, obtained by the POLX-1 code, together into a single reactor polynomial cross section library. The output of the polynomial cross section library can be in either binary or fixed (BCD) format. Input data requirements and the format of the output file generated by LINX-1 are also described. 2 refs

  12. A He I Case-B Recombination Code

    Porter, R L

    2007-01-01

    Recent calculations of collisionless, Case-B, He I emissivities were performed by Bauman et al. (2005). The source code used in the calculation has been freely available online since that paper was published. A number of changes have been made to simplify the use of the code by third parties. Here I provide details on how to obtain, compile, and execute the program and interpret the results.

  13. A Comprehensive Validation Approach Using The RAVEN Code

    Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua J; Rinaldi, Ivan; Giannetti, Fabio; Caruso, Gianfranco

    2015-06-01

    The RAVEN computer code , developed at the Idaho National Laboratory, is a generic software framework to perform parametric and probabilistic analysis based on the response of complex system codes. RAVEN is a multi-purpose probabilistic and uncertainty quantification platform, capable to communicate with any system code. A natural extension of the RAVEN capabilities is the imple- mentation of an integrated validation methodology, involving several different metrics, that represent an evolution of the methods currently used in the field. The state-of-art vali- dation approaches use neither exploration of the input space through sampling strategies, nor a comprehensive variety of metrics needed to interpret the code responses, with respect experimental data. The RAVEN code allows to address both these lacks. In the following sections, the employed methodology, and its application to the newer developed thermal-hydraulic code RELAP-7, is reported.The validation approach has been applied on an integral effect experiment, representing natu- ral circulation, based on the activities performed by EG&G Idaho. Four different experiment configurations have been considered and nodalized.

  14. MORET: Version 4.B. A multigroup Monte Carlo criticality code

    MORET 4 is a three dimensional multigroup Monte Carlo code which calculates the effective multiplication factor (keff) of any configurations more or less complex as well as reaction rates in the different volumes of the geometry and the leakage out of the system. MORET 4 is the Monte Carlo code of the APOLLO2-MORET 4 standard route of CRISTAL, the French criticality package. It is the most commonly used Monte Carlo code for French criticality calculations. During the last four years, the MORET 4 team has developed or improved the following major points: modernization of the geometry, implementation of perturbation algorithms, source distribution convergence, statistical detection of stationarity, unbiased variance estimation and creation of pre-processing and post-processing tools. The purpose of this paper is not only to present the new features of MORET but also to detail clearly the physical models and the mathematical methods used in the code. (author)

  15. A multi-scale code for flexible hybrid simulations

    Leukkunen, L; Lopez-Acevedo, O

    2012-01-01

    Multi-scale computer simulations combine the computationally efficient classical algorithms with more expensive but also more accurate ab-initio quantum mechanical algorithms. This work describes one implementation of multi-scale computations using the Atomistic Simulation Environment (ASE). This implementation can mix classical codes like LAMMPS and the Density Functional Theory-based GPAW. Any combination of codes linked via the ASE interface however can be mixed. We also introduce a framework to easily add classical force fields calculators for ASE using LAMMPS, which also allows harnessing the full performance of classical-only molecular dynamics. Our work makes it possible to combine different simulation codes, quantum mechanical or classical, with great ease and minimal coding effort.

  16. Programming a real code in a functional language (part 1)

    Hendrickson, C.P.

    1991-09-10

    For some, functional languages hold the promise of allowing ease of programming massively parallel computers that imperative languages such as Fortran and C do not offer. At LLNL, we have initiated a project to write the physics of a major production code in Sisal, a functional language developed at LLNL in collaboration with researchers throughout the world. We are investigating the expressibility of Sisal, as well as its performance on a shared-memory multiprocessor, the Y-MP. An interesting aspect of the project is that Sisal modules can call Fortran modules, and are callable by them. This eliminates the rewriting of 80% of the production code that would not benefit from parallel execution. Preliminary results indicate that the restrictive nature of the language does not cause problems in expressing the algorithms we have chosen. Some interesting aspects of programming in a mixed functional-imperative environment have surfaced, but can be managed. 8 refs.

  17. HADES, A Code for Simulating a Variety of Radiographic Techniques

    Aufderheide, M B; Henderson, G; von Wittenau, A; Slone, D M; Barty, A; Martz, Jr., H E

    2004-10-28

    It is often useful to simulate radiographic images in order to optimize imaging trade-offs and to test tomographic techniques. HADES is a code that simulates radiography using ray tracing techniques. Although originally developed to simulate X-Ray transmission radiography, HADES has grown to simulate neutron radiography over a wide range of energy, proton radiography in the 1 MeV to 100 GeV range, and recently phase contrast radiography using X-Rays in the keV energy range. HADES can simulate parallel-ray or cone-beam radiography through a variety of mesh types, as well as through collections of geometric objects. HADES was originally developed for nondestructive evaluation (NDE) applications, but could be a useful tool for simulation of portal imaging, proton therapy imaging, and synchrotron studies of tissue. In this paper we describe HADES' current capabilities and discuss plans for a major revision of the code.

  18. CCT, a Code to Automate the Design of Coupled Cavities

    Smith, P D

    2000-01-01

    The CCT (Coupled Cavity Tuning) code automates the RF calculations and sizing of RF cavities for the CCL (Coupled Cavity Linac) structures of APT. It is planned to extend the code to the CCDTL (Coupled Cavity Drift Tube Linac). The CCT code controls the CCLFISH code, a member of the Poisson Superfish series of codes [1]. CCLFISH performs RF calculations and tunes the geometry of individual cavities, including an accelerating cavity (AC) and a coupling cavity (CC). CCT also relates the AC and CC by means of equations that describe the coupling slot between cavities. These equations account for the direct coupling, the next nearest neighbor coupling between adjacent AC's, and the frequency shifts in the AC and CC caused by the slot. Given design objectives of a coupling coefficient k, the pi/2 mode frequency, and the net frequency of the CC, the CCT code iterates to solve for the geometry of the AC and CC and the separation distance between them (this controls the slot size), satisfying the design objectives. T...

  19. ACFA - a versatile activation code for coolant and structural materials

    The ACFA code calculates the neutron-induced activation, afterheat, transmutation, gas production, biological hazard potential, and activation gamma ray spectra in the components of a nuclear system. The quantities of interest may be computed by spatial interval and zone or only by zone of the system considered. To calculate the transmutation coefficients for the neutron-induced reactions the code uses multigroup activation cross sections and space-dependent multigroup neutron fluxes in one- or two-dimensional geometry. The neutron reaction types incorporated in the code are: (n,n'), (n,2n), (n,γ), (n,p), (n,α), (n,n'p), (n,n'α)sub(,) (n,t), (n,3n), (n,He-3), (n,d), and (n,n'd) considering both reactions to the ground state and to isomeric states. The code uses a variable dimensioning technique to adapt the core data storage requirements to the particular problem considered and uses the FIDO input system to read the input data. The numerical methods for establishing and solving the decay chain equations are taken from the ORIGEN code. To test the ACFA code and the nuclear data libraries used, the activation, composition change, and gas production in the first wall of the UWMAK-I fusion reactor are calculated. The results of the activation calculation are compared with earlier results of the University of Wisconsin Fusion Study Group. (orig.)

  20. Threshold Based Iteration Stopping Criterion for Turbo Codes and for Scheme Combining a Turbo Code and a Golden Space-Time Block Code

    SAVIN, A.

    2014-02-01

    Full Text Available This paper proposes an iteration stopping criterion for turbo decoding with Benedetto's decoding algorithm based on a posteriori probabilities. This stopping criterion is used in two schemes. Firstly, it is used in a classical turbo code scheme on additive white gaussian noise (AWGN channel. Secondly, it is used in a scheme combining a turbo code and a Golden space-time block code on fast Rayleigh fading multiple input multiple output (MIMO channel. Simulation results with different thresholds for the stopping criterion show that a threshold of 1.2 and 1.4 in the first and second scheme, respectively, are sufficient for obtaining the same bit error rate and frame error rate performance like in the case of using the ideal genie stopping criterion. The difference between the average number of iterations for these thresholds and for the genie stopping criterion is at most 1.5 and 1.25, respectively.

  1. Code flid (dep 051). A code for the two-dimensional analysis of the thermodynamic behaviour of a boiling liquid

    This two-dimensional code handles the following problems: 1. Analysis of thermal and experiments on a water-loop at high or low pressure, steady state or transient behaviour. 2. Analysis of thermal and hydrodynamic behaviour of a light water reactor hot channel, The fuel elements are assumed to be flat plates. The power and pressure drop variations are obtained from the complementary one-dimensional code CACTUS (CEA report R-3039). (authors)

  2. A need for a code of ethics in science communication?

    Benestad, R. E.

    2009-09-01

    The modern western civilization and high standard of living are to a large extent the 'fruits' of scientific endeavor over generations. Some examples include the longer life expectancy due to progress in medical sciences, and changes in infrastructure associated with the utilization of electromagnetism. Modern meteorology is not possible without the state-of-the-art digital computers, satellites, remote sensing, and communications. Science also is of relevance for policy making, e.g. the present hot topic of climate change. Climate scientists have recently become much exposed to media focus and mass communications, a task for which many are not trained. Furthermore, science, communication, and politics have different objectives, and do not necessarily mix. Scientists have an obligation to provide unbiased information, and a code of ethics is needed to give a guidance for acceptable and unacceptable conduct. Some examples of questionable conduct in Norway include using the title 'Ph.D' to imply scientific authority when the person never had obtained such an academic degree, or writing biased and one-sided articles in Norwegian encyclopedia that do not reflect the scientific consensus. It is proposed here that a set of guide lines (for the scientists and journalists) and a code of conduct could provide recommendation for regarding how to act in media - similar to a code of conduct with respect to carrying out research - to which everyone could agree, even when disagreeing on specific scientific questions.

  3. A systems neurophysiology approach to voluntary event coding.

    Petruo, Vanessa A; Stock, Ann-Kathrin; Münchau, Alexander; Beste, Christian

    2016-07-15

    Mechanisms responsible for the integration of perceptual events and appropriate actions (sensorimotor processes) have been subject to intense research. Different theoretical frameworks have been put forward with the "Theory of Event Coding (TEC)" being one of the most influential. In the current study, we focus on the concept of 'event files' within TEC and examine what sub-processes being dissociable by means of cognitive-neurophysiological methods are involved in voluntary event coding. This was combined with EEG source localization. We also introduce reward manipulations to delineate the neurophysiological sub-processes most relevant for performance variations during event coding. The results show that processes involved in voluntary event coding included predominantly stimulus categorization, feature unbinding and response selection, which were reflected by distinct neurophysiological processes (the P1, N2 and P3 ERPs). On a system's neurophysiological level, voluntary event-file coding is thus related to widely distributed parietal-medial frontal networks. Attentional selection processes (N1 ERP) turned out to be less important. Reward modulated stimulus categorization in parietal regions likely reflecting aspects of perceptual decision making but not in other processes. The perceptual categorization stage appears central for voluntary event-file coding. PMID:27153981

  4. System-Level Genetic Codes Using a Transposable Element-Like Mechanism with Applications to Cancer

    McGowan, John F.

    2000-01-01

    A system-level genetic code is a hypothetical genetic code that exclusively or preferentially codes systems of interacting coadapted parts. System-level genetic codes differ from part-level genetic codes in which each discrete part is coded independently. In general, a system-level genetic code requires coding discrete interacting parts such as organs or proteins in an interdependent way. Changing a single symbol or "gene" in a system-level genetic code affects two or more parts in a coordina...

  5. A novel 2D wavelength-time chaos code in optical CDMA system

    Zhang, Qi; Xin, Xiangjun; Wang, Yongjun; Zhang, Lijia; Yu, Chongxiu; Meng, Nan; Wang, Houtian

    2012-11-01

    Two-dimensional wavelength-time chaos code is proposed and constructed for a synchronous optical code division multiple access system. The access performance is compared between one-dimensional chaos code, WDM/chaos code and the proposed code. Comparison shows that two-dimensional wavelength-time chaos code possesses larger capacity, better spectral efficiency and bit-error ratio than WDM/chaos combinations and one-dimensional chaos code.

  6. BURNCAL: A Nuclear Reactor Burnup Code Using MCNP Tallies

    BURNCAL is a Fortran computer code designed to aid in analysis, prediction, and optimization of fuel burnup performance in a nuclear reactor. The code uses output parameters generated by the Monte Carlo neutronics code MCNP to determine the isotopic inventory as a function of time and power density. The code allows for multiple fueled regions to be analyzed. The companion code, RELOAD, can be used to shuffle fueled regions or reload regions with fresh fuel. BURNCAL can be used to study the reactivity effects and isotopic inventory as a function of time for a nuclear reactor system. Neutron transmutation, fission, and radioactive decay are included in the modeling of the production and removal terms for each isotope of interest. For a fueled region, neutron transmutation, fuel depletion, fission-product poisoning, actinide generation, and burnable poison loading and depletion effects are included in the calculation. Fueled and un-fueled regions, such as cladding and moderator, can be analyzed simultaneously. The nuclides analyzed are limited only by the neutron cross section availability in the MCNP cross-section library. BURNCAL is unique in comparison to other burnup codes in that it does not use the calculated neutron flux as input to other computer codes to generate the nuclide mixture for the next time step. Instead, BURNCAL directly uses the neutron absorption tally/reaction information generated by MCNP for each nuclide of interest to determine the nuclide inventory for that region. This allows for the full capabilities of MCNP to be incorporated into the calculation and a more accurate and robust analysis to be performed

  7. Conjugate heat transfer study of a wire spacer SFR fuel assembly thanks to the thermal code SYRTHES and the CFD code Code-Saturne

    The paper presents a HPC (High Performance Computing) calculation of a conjugate heat transfer simulation in fuel assembly as those found in liquid metal coolant fast reactors. The wire spacers, helically wound along each pin axis, generate a strong secondary flow pattern in opposition to smooth pins. Assemblies with a range of pins going from 7 to 271 have been simulated, 271 pins corresponding to the industrial case. Both the fluid domain, as well as the solid part, are detailed leading to large meshes. The fluid is handled by the CFD code Code-Saturne using 98 million cells, while the solid domain is taken care of thanks to the thermal code SYRTHES on meshes up to 240 million cells. Both codes are fully parallelized and run on cluster with hundreds of processors. Simulations allow access to the temperature field in nominal conditions and degraded situations. (authors)

  8. Experimental qualification of a code for optimizing gamma irradiation facilities

    Mosse, D. C.; Leizier, J. J. M.; Keraron, Y.; Lallemant, T. F.; Perdriau, P. D. M.

    Dose computation codes are a prerequisite for the design of gamma irradiation facilities. Code quality is a basic factor in the achievement of sound economic and technical performance by the facility. This paper covers the validation of a code by reference dosimetry experiments. Developed by the "Société Générale pour les Techniques Nouvelles" (SGN), a supplier of irradiation facilities and member of the CEA Group, the code is currently used by that company. (ERHART, KERARON, 1986) Experimental data were obtained under conditions representative of those prevailing in the gamma irradiation of foodstuffs. Irradiation was performed in POSEIDON, a Cobalt 60 cell of ORIS-I. Several Cobalt 60 rods of known activity are arranged in a planar array typical of industrial irradiation facilities. Pallet density is uniform, ranging from 0 (air) to 0.6. Reference dosimetry measurements were performed by the "Laboratoire de Métrologie des Rayonnements Ionisants" (LMRI) of the "Bureau National de Métrologie" (BNM). The procedure is based on the positioning of more than 300 ESR/alanine dosemeters throughout the various target volumes used. The reference quantity was the absorbed dose in water. The code was validated by a comparison of experimental and computed data. It has proved to be an effective tool for the design of facilities meeting the specific requirements applicable to foodstuff irradiation, which are frequently found difficult to meet.

  9. A neutron spectrum unfolding code based on iterative procedures

    Ortiz R, J. M.; Vega C, H. R., E-mail: morvymm@yahoo.com.mx [Universidad Autonoma de Zacatecas, Unidad Academica de Ingenieria Electrica, Apdo. Postal 336, 98000 Zacatecas (Mexico)

    2012-10-15

    In this work, the version 3.0 of the neutron spectrum unfolding code called Neutron Spectrometry and Dosimetry from Universidad Autonoma de Zacatecas (NSDUAZ), is presented. This code was designed in a graphical interface under the LabVIEW programming environment and it is based on the iterative SPUNIT iterative algorithm, using as entrance data, only the rate counts obtained with 7 Bonner spheres based on a {sup 6}Lil(Eu) neutron detector. The main features of the code are: it is intuitive and friendly to the user; it has a programming routine which automatically selects the initial guess spectrum by using a set of neutron spectra compiled by the International Atomic Energy Agency. Besides the neutron spectrum, this code calculates the total flux, the mean energy, H(10), h(10), 15 dosimetric quantities for radiation protection porpoises and 7 survey meter responses, in four energy grids, based on the International Atomic Energy Agency compilation. This code generates a full report in html format with all relevant information. In this work, the neutron spectrum of a {sup 241}AmBe neutron source on air, located at 150 cm from detector, is unfolded. (Author)

  10. A DOE Computer Code Toolbox: Issues and Opportunities

    The initial activities of a Department of Energy (DOE) Safety Analysis Software Group to establish a Safety Analysis Toolbox of computer models are discussed. The toolbox shall be a DOE Complex repository of verified and validated computer models that are configuration-controlled and made available for specific accident analysis applications. The toolbox concept was recommended by the Defense Nuclear Facilities Safety Board staff as a mechanism to partially address Software Quality Assurance issues. Toolbox candidate codes have been identified through review of a DOE Survey of Software practices and processes, and through consideration of earlier findings of the Accident Phenomenology and Consequence Evaluation program sponsored by the DOE National Nuclear Security Agency/Office of Defense Programs. Planning is described to collect these high-use codes, apply tailored SQA specific to the individual codes, and implement the software toolbox concept. While issues exist such as resource allocation and the interface among code developers, code users, and toolbox maintainers, significant benefits can be achieved through a centralized toolbox and subsequent standardized applications