WorldWideScience

Sample records for a codes

  1. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, A.; Katoen, J.P.; Westra, Y.; Alblas, H.; Gyimóthy, T.

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived fro

  2. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  3. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  4. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  5. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  6. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  7. Revised Safety Code A2

    CERN Document Server

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  8. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  9. Calcium: a code coupling tool

    International Nuclear Information System (INIS)

    Today, the calculation performances of computers allow the precise and global simulation of complex industrial processes such as the functioning of a nuclear reactor core. One can question the need for the elaboration of new global numerical models in order to make use of the overall capability of computers. Another less time consuming solution consist in the coupling of existing well validated numerical models in order to make them working together. This paper presents the basic principles of the coupling of numerical codes, the tools required, the Calcium tool for codes coupling and an example of application of this tool in the coupling of the THYC (EdF), COCCINELLE (EdF) and CATHARE (CEA-EdF-Framatome) codes for the modeling of the thermal-hydraulic and neutronic behaviour of a reactor core during accidental situation. (J.S.)

  10. A New Method for Constructing Circuit Codes

    OpenAIRE

    Byrnes, Kevin M.

    2016-01-01

    Circuit codes are constructed from induced cycles in the graph of the $n$ dimensional hypercube. They are both theoretically and practically important, as circuit codes can be used as error correcting codes. When constructing circuit codes, the length of the cycle determines its accuracy and a parameter called the spread determines how many errors it can detect. We present a new method for constructing a circuit code of spread $k+1$ from a circuit code of spread $k$. This method leads to reco...

  11. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  12. HADES, A Radiographic Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide, M.B.; Slone, D.M.; Schach von Wittenau, A.E.

    2000-08-18

    We describe features of the HADES radiographic simulation code. We begin with a discussion of why it is useful to simulate transmission radiography. The capabilities of HADES are described, followed by an application of HADES to a dynamic experiment recently performed at the Los Alamos Neutron Science Center. We describe quantitative comparisons between experimental data and HADES simulations using a copper step wedge. We conclude with a short discussion of future work planned for HADES.

  13. A class of Sudan-decodable codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2000-01-01

    In this article, Sudan's algorithm is modified into an efficient method to list-decode a class of codes which can be seen as a generalization of Reed-Solomon codes. The algorithm is specialized into a very efficient method for unique decoding. The code construction can be generalized based...... on algebraic-geometry codes and the decoding algorithms are generalized accordingly. Comparisons with Reed-Solomon and Hermitian codes are made....

  14. A Pixel Domain Video Coding based on Turbo code and Arithmetic code

    Directory of Open Access Journals (Sweden)

    Cyrine Lahsini

    2012-05-01

    Full Text Available In recent years, with emerging applications such as multimedia sensors networks, wirelesslow-power surveillance and mobile camera phones, the traditional video coding architecture in beingchallenged. In fact, these applications have different requirements than those of the broadcast videodelivery systems: a low power consumption at the encoder side is essential.In this context, we propose a pixel-domain video coding scheme which fits well in these senarios.In this system, both the arithmetic and turbo codes are used to encode the video sequence's frames.Simulations results show significant gains over Pixel-domain Wyner-Ziv video codeingr.

  15. Why comply with a code of ethics?

    Science.gov (United States)

    Spielthenner, Georg

    2015-05-01

    A growing number of professional associations and occupational groups are creating codes of ethics with the goal of guiding their members, protecting service users, and safeguarding the reputation of the profession. There is a great deal of literature dealing with the question to what extent ethical codes can achieve their desired objectives. The present paper does not contribute to this debate. Its aim is rather to investigate how rational it is to comply with codes of conduct. It is natural and virtually inevitable for a reflective person to ask why one should pay any attention to ethical codes, in particular if following a code is not in one's own interest. In order to achieve the aim of this paper, I shall (in "Quasi-reasons for complying with an ethical code" section) discuss reasons that only appear to be reasons for complying with a code. In "Code-independent reasons" section, I shall present genuine practical reasons that, however, turn out to be reasons of the wrong kind. In "Code-dependent reasons" section finally presents the most important reasons for complying with ethical codes. The paper argues that while ethical codes do not necessarily yield reasons for action, professionals can have genuine reasons for complying with a code, which may, however, be rather weak and easily overridden by reasons for deviating from the code. PMID:25185873

  16. A Mobile Application Prototype using Network Coding

    OpenAIRE

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank; Larsen, Torben

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report on practical measurement results of coding throughput and energy consumption for a single-source multiple-sinks network, with and without recoding at the sinks. These results confirm that network cod...

  17. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank;

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  18. A Simple and a Retargetable Code Generator for TCGS

    OpenAIRE

    Ruys, T.C.

    1995-01-01

    The Twente Compiler Generator System (TCGS) is a parser-generator system which is typically used to generate a compiler that, given an input program, generates abstract stack code. A code generator for TCGS translates this stack code generated by a TCGS compiler to assembler code for a particular target machine. This thesis discusses two code generators for TCGS: GUMP and COGGEN. The simplest strategy to translate stack code into assembler code is to macro expand each stack code instruction t...

  19. On Construction of Optimal A2-Codes

    Institute of Scientific and Technical Information of China (English)

    HU Lei

    2001-01-01

    Two authentication codes with arbitration (A2-codes) are constrructed from finite affine spaces to illustrate for the first time that the information-theoretic lower bounds for A2-codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encoding\\ decoding rules are not genuine ones. As an analogue of 3-dimensional case, an A2-code from 4-dimensional finite projective spaces is constructed, which neets both the information-theoretic and combinatorial lower bounds.

  20. PetriCode: A Tool for Template-Based Code Generation from CPN Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge

    2014-01-01

    levels of abstraction. The elements of the models are annotated with code generation pragmatics enabling PetriCode to use a template-based approach to generate code while keeping the models uncluttered from implementation artefacts. PetriCode is the realization of our code generation approach which has...

  1. JPIC & How to make a PIC code

    CERN Document Server

    Wu, Hui-Chun

    2011-01-01

    Author developed the parallel fully kinetic particle-in-cell (PIC) code JPIC based on updated and advanced algorithms (e.g. numerical-dispersion-free electromagnetic field solver) for simulating laser plasma interactions. Basic technical points and hints of PIC programming and parallel programming by message passing interface (MPI) are reviewed. Most of contents come from Author's notes when writing up JPIC and experiences when using the code to solve different problems. Enough "how-to-do-it" information should help a new beginner to effectively build up his/her own PIC code. General advices on how to use a PIC code are also given.

  2. Code Calibration as a Decision Problem

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard; Kroon, I. B.; Faber, M. H.

    1993-01-01

    Calibration of partial coefficients for a class of structures where no code exists is considered. The partial coefficients are determined such that the difference between the reliability for the different structures in the class considered and a target reliability level is minimized. Code...

  3. A thesaurus for a neural population code.

    Science.gov (United States)

    Ganmor, Elad; Segev, Ronen; Schneidman, Elad

    2015-09-08

    Information is carried in the brain by the joint spiking patterns of large groups of noisy, unreliable neurons. This noise limits the capacity of the neural code and determines how information can be transmitted and read-out. To accurately decode, the brain must overcome this noise and identify which patterns are semantically similar. We use models of network encoding noise to learn a thesaurus for populations of neurons in the vertebrate retina responding to artificial and natural videos, measuring the similarity between population responses to visual stimuli based on the information they carry. This thesaurus reveals that the code is organized in clusters of synonymous activity patterns that are similar in meaning but may differ considerably in their structure. This organization is highly reminiscent of the design of engineered codes. We suggest that the brain may use this structure and show how it allows accurate decoding of novel stimuli from novel spiking patterns.

  4. Source Code Plagiarism--A Student Perspective

    Science.gov (United States)

    Joy, M.; Cosma, G.; Yau, J. Y.-K.; Sinclair, J.

    2011-01-01

    This paper considers the problem of source code plagiarism by students within the computing disciplines and reports the results of a survey of students in Computing departments in 18 institutions in the U.K. This survey was designed to investigate how well students understand the concept of source code plagiarism and to discover what, if any,…

  5. Secure Source Coding with a Helper

    CERN Document Server

    Tandon, Ravi; Ramchandran, Kannan

    2009-01-01

    We consider a secure lossless source coding problem with a rate-limited helper. In particular, Alice observes an i.i.d. source $X^{n}$ and wishes to transmit this source losslessly to Bob at a rate $R_{x}$. A helper, say Helen, observes a correlated source $Y^{n}$ and transmits at a rate $R_{y}$ to Bob. A passive eavesdropper can observe the coded output of Alice. The equivocation $\\Delta$ is measured by the conditional entropy $H(X^{n}|J_{x})/n$, where $J_{x}$ is the coded output of Alice. We first completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf type coding is optimal. We next study two generalizations of this model and provide single-letter characterizations for the respective rate-equivocation regions. In particular, we first consider the case of a two-sided helper where Alice also has access to the coded output of Helen. We show that for this case, Slepian-Wolf type coding is suboptimal and one can further decrease the information l...

  6. A Fortran 90 code for magnetohydrodynamics

    International Nuclear Information System (INIS)

    This report describes progress in developing a Fortran 90 version of the KITE code for studying plasma instabilities in Tokamaks. In particular, the evaluation of convolution terms appearing in the numerical solution is discussed, and timing results are presented for runs performed on an 8k processor Connection Machine (CM-2). Estimates of the performance on a full-size 64k CM-2 are given, and range between 100 and 200 Mflops. The advantages of having a Fortran 90 version of the KITE code are stressed, and the future use of such a code on the newly announced CM5 and Paragon computers, from Thinking Machines Corporation and Intel, is considered

  7. Bonsai: A GPU Tree-Code

    CERN Document Server

    Bédorf, Jeroen; Zwart, Simon Portegies

    2012-01-01

    We present a gravitational hierarchical N-body code that is designed to run efficiently on Graphics Processing Units (GPUs). All parts of the algorithm are executed on the GPU which eliminates the need for data transfer between the Central Processing Unit (CPU) and the GPU. Our tests indicate that the gravitational tree-code outperforms tuned CPU code for all parts of the algorithm and show an overall performance improvement of more than a factor 20, resulting in a processing rate of more than 2.8 million particles per second.

  8. A Fast Fractal Image Compression Coding Method

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Fast algorithms for reducing encoding complexity of fractal image coding have recently been an important research topic. Search of the best matched domain block is the most computation intensive part of the fractal encoding process. In this paper, a fast fractal approximation coding scheme implemented on a personal computer based on matching in range block's neighbours is presented. Experimental results show that the proposed algorithm is very simple in implementation, fast in encoding time and high in compression ratio while PSNR is almost the same as compared with Barnsley's fractal block coding .

  9. Predictive coding as a model of cognition.

    Science.gov (United States)

    Spratling, M W

    2016-08-01

    Previous work has shown that predictive coding can provide a detailed explanation of a very wide range of low-level perceptual processes. It is also widely believed that predictive coding can account for high-level, cognitive, abilities. This article provides support for this view by showing that predictive coding can simulate phenomena such as categorisation, the influence of abstract knowledge on perception, recall and reasoning about conceptual knowledge, context-dependent behavioural control, and naive physics. The particular implementation of predictive coding used here (PC/BC-DIM) has previously been used to simulate low-level perceptual behaviour and the neural mechanisms that underlie them. This algorithm thus provides a single framework for modelling both perceptual and cognitive brain function. PMID:27118562

  10. QUIL: a chemical equilibrium code. [HTGR

    Energy Technology Data Exchange (ETDEWEB)

    Lunsford, J.L.

    1977-02-01

    A chemical equilibrium code QUIL is described, along with two support codes FENG and SURF. QUIL is designed to allow calculations on a wide range of chemical environments, which may include surface phases. QUIL was written specifically to calculate distributions associated with complex equilibria involving fission products in the primary coolant loop of the high-temperature gas-cooled reactor. QUIL depends upon an energy-data library called ELIB. This library is maintained by FENG and SURF. FENG enters into the library all reactions having standard free energies of reaction that are independent of concentration. SURF enters all surface reactions into ELIB. All three codes are interactive codes written to be used from a remote terminal, with paging control provided. Plotted output is also available.

  11. An Analysis Of Code Switching And Code Mixing Used In A Talk Show Hitam Putih

    OpenAIRE

    Sari, Dewi Maya

    2015-01-01

    In thesis entitled An Analysis of Code Switching and Code Mixing Used in Talk Show Hitam Putih, the author analyzes two types of code switching and code based on two types of mixed Wardaugh theory. The fourth type can be determined by the use of more than one language in an utterance. The purpose of this thesis is to find the types of code switching and code mixing contained in the speech Deddy Corbuzier as presenter in Talk Show Hitam Putih and Nadya Hutagalung as a celebrity guest. Steps ta...

  12. TEA: A Code Calculating Thermochemical Equilibrium Abundances

    Science.gov (United States)

    Blecic, Jasmina; Harrington, Joseph; Bowman, M. Oliver

    2016-07-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. and Eriksson. It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature-pressure pairs. We tested the code against the method of Burrows & Sharp, the free thermochemical equilibrium code Chemical Equilibrium with Applications (CEA), and the example given by Burrows & Sharp. Using their thermodynamic data, TEA reproduces their final abundances, but with higher precision. We also applied the TEA abundance calculations to models of several hot-Jupiter exoplanets, producing expected results. TEA is written in Python in a modular format. There is a start guide, a user manual, and a code document in addition to this theory paper. TEA is available under a reproducible-research, open-source license via https://github.com/dzesmin/TEA.

  13. TEA: A Code Calculating Thermochemical Equilibrium Abundances

    Science.gov (United States)

    Blecic, Jasmina; Harrington, Joseph; Bowman, M. Oliver

    2016-07-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. and Eriksson. It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature–pressure pairs. We tested the code against the method of Burrows & Sharp, the free thermochemical equilibrium code Chemical Equilibrium with Applications (CEA), and the example given by Burrows & Sharp. Using their thermodynamic data, TEA reproduces their final abundances, but with higher precision. We also applied the TEA abundance calculations to models of several hot-Jupiter exoplanets, producing expected results. TEA is written in Python in a modular format. There is a start guide, a user manual, and a code document in addition to this theory paper. TEA is available under a reproducible-research, open-source license via https://github.com/dzesmin/TEA.

  14. Code-Switching: L1-Coded Mediation in a Kindergarten Foreign Language Classroom

    Science.gov (United States)

    Lin, Zheng

    2012-01-01

    This paper is based on a qualitative inquiry that investigated the role of teachers' mediation in three different modes of coding in a kindergarten foreign language classroom in China (i.e. L2-coded intralinguistic mediation, L1-coded cross-lingual mediation, and L2-and-L1-mixed mediation). Through an exploratory examination of the varying effects…

  15. CATHENA 4. A thermalhydraulics network analysis code

    International Nuclear Information System (INIS)

    Canadian Algorithm for THErmalhydraulic Network Analysis (CATHENA) is a one-dimensional, non-equilibrium, two-phase, two fluid network analysis code that has been in use for over two decades by various groups in Canada and around the world. The objective of the present paper is to describe the design, application and future development plans for the CATHENA 4 thermalhydraulics network analysis code, which is a modernized version of the present frozen CATHENA 3 code. The new code is designed in modular form, using the Fortran 95 (F95) programming language. The semi-implicit numerical integration scheme of CATHENA 3 is re-written to implement a fully-implicit methodology using Newton's iterative solution scheme suitable for nonlinear equations. The closure relations, as a first step, have been converted from the existing CATHENA 3 implementation to F95 but modularized to achieve ease of maintenance. The paper presents the field equations, followed by a description of the Newton's scheme used. The finite-difference form of the field equations is given, followed by a discussion of convergence criteria. Two applications of CATHENA 4 are presented to demonstrate the temporal and spatial convergence of the new code for problems with known solutions or available experimental data. (author)

  16. Finding the Key to a Better Code: Code Team Restructure to Improve Performance and Outcomes

    OpenAIRE

    Prince, Cynthia R.; Hines, Elizabeth J.; Chyou, Po-Huang; Heegeman, David J.

    2014-01-01

    Code teams respond to acute life threatening changes in a patient’s status 24 hours a day, 7 days a week. If any variable, whether a medical skill or non-medical quality, is lacking, the effectiveness of a code team’s resuscitation could be hindered. To improve the overall performance of our hospital’s code team, we implemented an evidence-based quality improvement restructuring plan. The code team restructure, which occurred over a 3-month period, included a defined number of code team parti...

  17. FCG: a code generator for lazy functional languages

    NARCIS (Netherlands)

    Langendoen, K.G.; Hartel, P.H.

    1992-01-01

    The FCG code generator produces portable code that supports efficient twospace copying garbage collection. The code generator transforms the output of the FAST compiler front end into an abstract machine code. This code explicitly uses a call stack, which is accessible to the garbage collector. In c

  18. A modified TreePM code

    Institute of Scientific and Technical Information of China (English)

    Nishikanta Khandai; J. S. Bagla

    2009-01-01

    We discuss the performance characteristics of using the modification of the tree code suggested by Barnes in the context of the TreePM code. The optimization involves identifying groups of particles and using only one tree walk to compute the force for all the particles in the group. This modification has been in use in our implementation of the TreePM code for some time, and has also been used by others in codes that make use of tree structures. We present the first detailed study of the performance characteristics of this optimization. We show that the modification, if tuned properly, can speed up the TreePM code by a significant amount. We also combine this modification with the use of individual time steps and indicate how to combine these two schemes in an optimal fashion. We find that the combination is at least a factor of two faster than the modified TreePM without individual time steps. Overall performance is often faster by a larger factor because the scheme for the groups optimizes the use of cache for large simulations.

  19. Optical implementation of a unitarily correctable code

    CERN Document Server

    Schreiter, Kurt M; Kaltenbaek, Rainer; Resch, Kevin J; Kribs, David W; 10.1103/PhysRevA.80.022311

    2009-01-01

    Noise poses a challenge for any real-world implementation in quantum information science. The theory of quantum error correction deals with this problem via methods to encode and recover quantum information in a way that is resilient against that noise. Unitarily correctable codes are an error correction technique wherein a single unitary recovery operation is applied without the need for an ancilla Hilbert space. Here, we present the first optical implementation of a non-trivial unitarily correctable code for a noisy quantum channel with no decoherence-free subspaces or noiseless subsystems. We show that recovery of our initial states is achieved with high fidelity (>=0.97), quantitatively proving the efficacy of this unitarily correctable code.

  20. FREEFALL: A seabed penetrator flight code

    International Nuclear Information System (INIS)

    This report presents a one-dimensional model and computer program for predicting the motion of seabed penetrators. The program calculates the acceleration, velocity, and depth of a penetrator as a function of time from the moment of launch until the vehicle comes to rest in the sediment. The code is written in Pascal language for use on a small personal computer. Results are presented as printed tables and graphs. A comparison with experimental data is given which indicates that the accuracy of the code is perhaps as good as current techniques for measuring vehicle performance. 31 refs., 12 figs., 5 tabs

  1. FREEFALL: A seabed penetrator flight code

    Energy Technology Data Exchange (ETDEWEB)

    Hickerson, J.

    1988-01-01

    This report presents a one-dimensional model and computer program for predicting the motion of seabed penetrators. The program calculates the acceleration, velocity, and depth of a penetrator as a function of time from the moment of launch until the vehicle comes to rest in the sediment. The code is written in Pascal language for use on a small personal computer. Results are presented as printed tables and graphs. A comparison with experimental data is given which indicates that the accuracy of the code is perhaps as good as current techniques for measuring vehicle performance. 31 refs., 12 figs., 5 tabs.

  2. A coding procedure for teachers.

    Science.gov (United States)

    Kubany, E S; Sloggett, B B

    1973-01-01

    An observational technique for reliably estimating the per cent of time a student engages in appropriate and inappropriate classroom behavior is described. The regular classroom teacher can utilize the procedure without deviating from regular routine, and the obtained data can serve as a basis for dispensing token reinforcement. PMID:16795415

  3. The natural variation of a neural code.

    Science.gov (United States)

    Kfir, Yoav; Renan, Ittai; Schneidman, Elad; Segev, Ronen

    2012-01-01

    The way information is represented by sequences of action potentials of spiking neurons is determined by the input each neuron receives, but also by its biophysics, and the specifics of the circuit in which it is embedded. Even the "code" of identified neurons can vary considerably from individual to individual. Here we compared the neural codes of the identified H1 neuron in the visual systems of two families of flies, blow flies and flesh flies, and explored the effect of the sensory environment that the flies were exposed to during development on the H1 code. We found that the two families differed considerably in the temporal structure of the code, its content and energetic efficiency, as well as the temporal delay of neural response. The differences in the environmental conditions during the flies' development had no significant effect. Our results may thus reflect an instance of a family-specific design of the neural code. They may also suggest that individual variability in information processing by this specific neuron, in terms of both form and content, is regulated genetically.

  4. Homogenous Chaotic Network Serving as a Rate/Population Code to Temporal Code Converter

    Directory of Open Access Journals (Sweden)

    Mikhail V. Kiselev

    2014-01-01

    Full Text Available At present, it is obvious that different sections of nervous system utilize different methods for information coding. Primary afferent signals in most cases are represented in form of spike trains using a combination of rate coding and population coding while there are clear evidences that temporal coding is used in various regions of cortex. In the present paper, it is shown that conversion between these two coding schemes can be performed under certain conditions by a homogenous chaotic neural network. Interestingly, this effect can be achieved without network training and synaptic plasticity.

  5. The politics of a European civil code

    NARCIS (Netherlands)

    M.W. Hesselink

    2004-01-01

    Last year the European Commission published its Action Plan on European contract law. That plan forms an important step towards a European Civil Code. In its Plan, the Commission tries to depoliticise the codification process by asking a group of academic experts to prepare what it calls a 'common f

  6. Direction coding using a tactile chair

    NARCIS (Netherlands)

    Vries, S.C. de; Erp, J.B.F. van; Kiefer, R.J.

    2009-01-01

    This laboratory study examined the possibility of using a car seat instrumented with tactile display elements (tactors) to communicate directional information to a driver. A car seat fitted with an 8 by 8 matrix of tactors embedded in the seat pan was used to code eight different directions.Localiza

  7. Design of a physical format coding system

    Science.gov (United States)

    Hu, Beibei; Pei, Jing; Zhang, Qicheng; Liu, Hailong; Tang, Yi

    2008-12-01

    A novel design of physical format coding system (PFCS) is presented based on Multi-level read-only memory disc (ML ROM) in order to solve the problem of low efficiency and long period of disc testing during system development. The PFCS is composed of four units, which are 'Encode', 'Add Noise', 'Decode', 'Error Rate', and 'Information'. It is developed with MFC under the environment of VC++ 6.0, and capable to visually simulate the procedure of data processing for ML ROM. This system can also be used for developing other optical disc storage system or similar channel coding system.

  8. A Code of Ethics for Democratic Leadership

    Science.gov (United States)

    Molina, Ricardo; Klinker, JoAnn Franklin

    2012-01-01

    Democratic leadership rests on sacred values, awareness, judgement, motivation and courage. Four turning points in a 38-year school administrator's career revealed decision-making in problematic moments stemmed from values in a personal and professional code of ethics. Reflection on practice and theory added vocabulary and understanding to make…

  9. TACO: a finite element heat transfer code

    International Nuclear Information System (INIS)

    TACO is a two-dimensional implicit finite element code for heat transfer analysis. It can perform both linear and nonlinear analyses and can be used to solve either transient or steady state problems. Either plane or axisymmetric geometries can be analyzed. TACO has the capability to handle time or temperature dependent material properties and materials may be either isotropic or orthotropic. A variety of time and temperature dependent loadings and boundary conditions are available including temperature, flux, convection, and radiation boundary conditions and internal heat generation. Additionally, TACO has some specialized features such as internal surface conditions (e.g., contact resistance), bulk nodes, enclosure radiation with view factor calculations, and chemical reactive kinetics. A user subprogram feature allows for any type of functional representation of any independent variable. A bandwidth and profile minimization option is also available in the code. Graphical representation of data generated by TACO is provided by a companion post-processor named POSTACO. The theory on which TACO is based is outlined, the capabilities of the code are explained, the input data required to perform an analysis with TACO are described. Some simple examples are provided to illustrate the use of the code

  10. Building a Hydrodynamics Code with Kinetic Theory

    CERN Document Server

    Sagert, Irina; Colbry, Dirk; Pickett, Rodney; Strother, Terrance

    2013-01-01

    We report on the development of a test-particle based kinetic Monte Carlo code for large systems and its application to simulate matter in the continuum regime. Our code combines advantages of the Direct Simulation Monte Carlo and the Point-of-Closest-Approach methods to solve the collision integral of the Boltzmann equation. With that, we achieve a high spatial accuracy in simulations while maintaining computational feasibility when applying a large number of test-particles. The hybrid setup of our approach allows us to study systems which move in and out of the hydrodynamic regime, with low and high particle densities. To demonstrate our code's ability to reproduce hydrodynamic behavior we perform shock wave simulations and focus here on the Sedov blast wave test. The blast wave problem describes the evolution of a spherical expanding shock front and is an important verification problem for codes which are applied in astrophysical simulation, especially for approaches which aim to study core-collapse supern...

  11. FLUKA: A Multi-Particle Transport Code

    Energy Technology Data Exchange (ETDEWEB)

    Ferrari, A.; Sala, P.R.; /CERN /INFN, Milan; Fasso, A.; /SLAC; Ranft, J.; /Siegen U.

    2005-12-14

    This report describes the 2005 version of the Fluka particle transport code. The first part introduces the basic notions, describes the modular structure of the system, and contains an installation and beginner's guide. The second part complements this initial information with details about the various components of Fluka and how to use them. It concludes with a detailed history and bibliography.

  12. CHEETAH: A next generation thermochemical code

    Energy Technology Data Exchange (ETDEWEB)

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  13. A method for scientific code coupling in a distributed environment

    International Nuclear Information System (INIS)

    This guide book deals with coupling of big scientific codes. First, the context is introduced: big scientific codes devoted to a specific discipline coming to maturity, and more and more needs in terms of multi discipline studies. Then we describe different kinds of code coupling and an example of code coupling: 3D thermal-hydraulic code THYC and 3D neutronics code COCCINELLE. With this example we identify problems to be solved to realize a coupling. We present the different numerical methods usable for the resolution of coupling terms. This leads to define two kinds of coupling: with the leak coupling, we can use explicit methods, and with the strong coupling we need to use implicit methods. On both cases, we analyze the link with the way of parallelizing code. For translation of data from one code to another, we define the notion of Standard Coupling Interface based on a general structure for data. This general structure constitutes an intermediary between the codes, thus allowing a relative independence of the codes from a specific coupling. The proposed method for the implementation of a coupling leads to a simultaneous run of the different codes, while they exchange data. Two kinds of data communication with message exchange are proposed: direct communication between codes with the use of PVM product (Parallel Virtual Machine) and indirect communication with a coupling tool. This second way, with a general code coupling tool, is based on a coupling method, and we strongly recommended to use it. This method is based on the two following principles: re-usability, that means few modifications on existing codes, and definition of a code usable for coupling, that leads to separate the design of a code usable for coupling from the realization of a specific coupling. This coupling tool available from beginning of 1994 is described in general terms. (authors). figs., tabs

  14. ABINIT: a computer code for matter

    International Nuclear Information System (INIS)

    The PAW (Projector Augmented Wave) method has been implemented in the ABINIT Code that computes electronic structures in atoms. This method relies on the simultaneous use of a set of auxiliary functions (in plane waves) and a sphere around each atom. This method allows the computation of systems including many atoms and gives the expression of energy, forces, stress... in terms of the auxiliary function only. We have generated atomic data for iron at very high pressure (over 200 GPa). We get a bcc-hcp transition around 10 GPa and the magnetic order disappears around 50 GPa. This method has been validated on a series of metals. The development of the PAW method has required a great effort for the massive parallelization of the ABINIT code. (A.C.)

  15. Source coding for a simple multi-hop network

    OpenAIRE

    Gu, Wei-Hsin; Effros, Michelle

    2005-01-01

    We derive the rate-distortion region for source coding on a simple multihop network with side information. The result represents the first complete solution to a multihop source coding problem. The proof technique combines ideas from Wyner-Ziv coding and coding with unreliable side information.

  16. CAFE: A New Relativistic MHD Code

    Science.gov (United States)

    Lora-Clavijo, F. D.; Cruz-Osorio, A.; Guzmán, F. S.

    2015-06-01

    We introduce CAFE, a new independent code designed to solve the equations of relativistic ideal magnetohydrodynamics (RMHD) in three dimensions. We present the standard tests for an RMHD code and for the relativistic hydrodynamics regime because we have not reported them before. The tests include the one-dimensional Riemann problems related to blast waves, head-on collisions of streams, and states with transverse velocities, with and without magnetic field, which is aligned or transverse, constant or discontinuous across the initial discontinuity. Among the two-dimensional (2D) and 3D tests without magnetic field, we include the 2D Riemann problem, a one-dimensional shock tube along a diagonal, the high-speed Emery wind tunnel, the Kelvin-Helmholtz (KH) instability, a set of jets, and a 3D spherical blast wave, whereas in the presence of a magnetic field we show the magnetic rotor, the cylindrical explosion, a case of Kelvin-Helmholtz instability, and a 3D magnetic field advection loop. The code uses high-resolution shock-capturing methods, and we present the error analysis for a combination that uses the Harten, Lax, van Leer, and Einfeldt (HLLE) flux formula combined with a linear, piecewise parabolic method and fifth-order weighted essentially nonoscillatory reconstructors. We use the flux-constrained transport and the divergence cleaning methods to control the divergence-free magnetic field constraint.

  17. CAFE: A NEW RELATIVISTIC MHD CODE

    Energy Technology Data Exchange (ETDEWEB)

    Lora-Clavijo, F. D.; Cruz-Osorio, A. [Instituto de Astronomía, Universidad Nacional Autónoma de México, AP 70-264, Distrito Federal 04510, México (Mexico); Guzmán, F. S., E-mail: fdlora@astro.unam.mx, E-mail: aosorio@astro.unam.mx, E-mail: guzman@ifm.umich.mx [Instituto de Física y Matemáticas, Universidad Michoacana de San Nicolás de Hidalgo. Edificio C-3, Cd. Universitaria, 58040 Morelia, Michoacán, México (Mexico)

    2015-06-22

    We introduce CAFE, a new independent code designed to solve the equations of relativistic ideal magnetohydrodynamics (RMHD) in three dimensions. We present the standard tests for an RMHD code and for the relativistic hydrodynamics regime because we have not reported them before. The tests include the one-dimensional Riemann problems related to blast waves, head-on collisions of streams, and states with transverse velocities, with and without magnetic field, which is aligned or transverse, constant or discontinuous across the initial discontinuity. Among the two-dimensional (2D) and 3D tests without magnetic field, we include the 2D Riemann problem, a one-dimensional shock tube along a diagonal, the high-speed Emery wind tunnel, the Kelvin–Helmholtz (KH) instability, a set of jets, and a 3D spherical blast wave, whereas in the presence of a magnetic field we show the magnetic rotor, the cylindrical explosion, a case of Kelvin–Helmholtz instability, and a 3D magnetic field advection loop. The code uses high-resolution shock-capturing methods, and we present the error analysis for a combination that uses the Harten, Lax, van Leer, and Einfeldt (HLLE) flux formula combined with a linear, piecewise parabolic method and fifth-order weighted essentially nonoscillatory reconstructors. We use the flux-constrained transport and the divergence cleaning methods to control the divergence-free magnetic field constraint.

  18. A Students Attendance System Using QR Code

    OpenAIRE

    Fadi Masalha; Nael Hirzallah

    2014-01-01

    Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the co...

  19. Cluster Computing: A Mobile Code Approach

    Directory of Open Access Journals (Sweden)

    R. B. Patel

    2006-01-01

    Full Text Available Cluster computing harnesses the combined computing power of multiple processors in a parallel configuration. Cluster Computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. In this paper we have presented design and implementation of a cluster based framework using mobile code. The cluster implementation involves the designing of a server named MCLUSTER which manages the configuring, resetting of cluster. It allows a user to provide necessary information regarding the application to be executed via a graphical user interface (GUI. Framework handles- the generation of application mobile code and its distribution to appropriate client nodes, efficient handling of results so generated and communicated by a number of client nodes and recording of execution time of application. The client node receives and executes the mobile code that defines the distributed job submitted by MCLUSTER server and replies the results back. We have also the analyzed the performance of the developed system emphasizing the tradeoff between communication and computation overhead.

  20. A Graph Minor Perspective to Multicast Network Coding

    OpenAIRE

    Yin, Xunrui; Wang, Yan; Li, Zongpeng; Wang, Xin; Xue, Xiangyang

    2013-01-01

    Network Coding encourages information coding across a communication network. While the necessity, benefit and complexity of network coding are sensitive to the underlying graph structure of a network, existing theory on network coding often treats the network topology as a black box, focusing on algebraic or information theoretic aspects of the problem. This work aims at an in-depth examination of the relation between algebraic coding and network topologies. We mathematically establish a seri...

  1. CAFE: A New Relativistic MHD Code

    CERN Document Server

    Lora-Clavijo, F D; Guzman, F S

    2014-01-01

    We present CAFE, a new independent code designed to solve the equations of Relativistic ideal Magnetohydrodynamics (RMHD) in 3D. We present the standard tests for a RMHD code and for the Relativistic Hydrodynamics (RMD) regime since we have not reported them before. The tests include the 1D Riemann problems related to blast waves, head-on collision of streams and states with transverse velocities, with and without magnetic field, which is aligned or transverse, constant or discontinuous across the initial discontinuity. Among the 2D tests, without magnetic field we include the 2D Riemann problem, the high speed Emery wind tunnel, the Kelvin-Helmholtz instability test and a set of jets, whereas in the presence of a magnetic field we show the magnetic rotor, the cylindrical explosion and the Kelvin-Helmholtz instability. The code uses High Resolution Shock Capturing methods and as a standard set up we present the error analysis with a simple combination that uses the HLLE flux formula combined with linear, PPM ...

  2. A Students Attendance System Using QR Code

    Directory of Open Access Journals (Sweden)

    Fadi Masalha

    2014-01-01

    Full Text Available Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the code in order to confirm their attendance. The paper explains the high level implementation details of the proposed system. It also discusses how the system verifies student identity to eliminate false registrations.

  3. A Network Coding Approach to Loss Tomography

    DEFF Research Database (Denmark)

    Sattari, Pegah; Markopoulou, Athina; Fragouli, Christina;

    2013-01-01

    Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of interest is the loss rate of individual links. There is a significant body of work dedicated to this problem using...... multicast and/or unicast end-to-end probes. Independently, recent advances in network coding have shown that there are several advantages from allowing intermediate nodes to process and combine, in addition to just forward, packets. In this paper, we pose the problem of loss tomography in networks that have...... and multiple paths between sources and receivers. This work was the first to make the connection between active network tomography and network coding, and thus opened a new research direction....

  4. Numerical method improvement for a subchannel code

    Energy Technology Data Exchange (ETDEWEB)

    Ding, W.J.; Gou, J.L.; Shan, J.Q. [Xi' an Jiaotong Univ., Shaanxi (China). School of Nuclear Science and Technology

    2016-07-15

    Previous studies showed that the subchannel codes need most CPU time to solve the matrix formed by the conservation equations. Traditional matrix solving method such as Gaussian elimination method and Gaussian-Seidel iteration method cannot meet the requirement of the computational efficiency. Therefore, a new algorithm for solving the block penta-diagonal matrix is designed based on Stone's incomplete LU (ILU) decomposition method. In the new algorithm, the original block penta-diagonal matrix will be decomposed into a block upper triangular matrix and a lower block triangular matrix as well as a nonzero small matrix. After that, the LU algorithm is applied to solve the matrix until the convergence. In order to compare the computational efficiency, the new designed algorithm is applied to the ATHAS code in this paper. The calculation results show that more than 80 % of the total CPU time can be saved with the new designed ILU algorithm for a 324-channel PWR assembly problem, compared with the original ATHAS code.

  5. Xenomicrobiology: a roadmap for genetic code engineering.

    Science.gov (United States)

    Acevedo-Rocha, Carlos G; Budisa, Nediljko

    2016-09-01

    Biology is an analytical and informational science that is becoming increasingly dependent on chemical synthesis. One example is the high-throughput and low-cost synthesis of DNA, which is a foundation for the research field of synthetic biology (SB). The aim of SB is to provide biotechnological solutions to health, energy and environmental issues as well as unsustainable manufacturing processes in the frame of naturally existing chemical building blocks. Xenobiology (XB) goes a step further by implementing non-natural building blocks in living cells. In this context, genetic code engineering respectively enables the re-design of genes/genomes and proteins/proteomes with non-canonical nucleic (XNAs) and amino (ncAAs) acids. Besides studying information flow and evolutionary innovation in living systems, XB allows the development of new-to-nature therapeutic proteins/peptides, new biocatalysts for potential applications in synthetic organic chemistry and biocontainment strategies for enhanced biosafety. In this perspective, we provide a brief history and evolution of the genetic code in the context of XB. We then discuss the latest efforts and challenges ahead for engineering the genetic code with focus on substitutions and additions of ncAAs as well as standard amino acid reductions. Finally, we present a roadmap for the directed evolution of artificial microbes for emancipating rare sense codons that could be used to introduce novel building blocks. The development of such xenomicroorganisms endowed with a 'genetic firewall' will also allow to study and understand the relation between code evolution and horizontal gene transfer. PMID:27489097

  6. CYLSEC: A three dimensional shield evaluation code

    International Nuclear Information System (INIS)

    Existing point kernel gamma codes are either limited to simple geometry configurations or require rather cumbersome input. These codes also require the user to specify the mesh size used in integrating the kernel. This results in computational inefficiencies since it is difficult to establish criteria for choosing mesh size and because it is generally not possible to assure convergence without solving the problem more than once. The interactive program CYLSEC was recently developed to improve this situation. CYLSEC can be used to evaluate bulk or local shielding for radioactive components, to treat streaming problems and to calculate a variety of gamma ray response functions. It will accept three dimensional geometries that can be described in terms of orthogonal slabs, right cylinders and/or right parallelepipeds. While the problem geometry is specified in rectangular coordinates, the integration of the kernel is performed in spherical coordinates. This allows explicit integration over the radial variable, thus reducing the problem to a double integral. The integral mesh size varies and is internally determined such that a specified convergence criterion is met. CYLSEC is also designed to recognize and take advantage of any problem symmetry in order to maximize efficiency. Program input is through interactive routines that are self checking and permit the user to make corrections. A gamma ray data library is provided, however, alternate data may be specified if desired. Comparisons between CYLSEC and other point kernel codes (QAD, GRACE) show excellent agreement in results and demonstrate that CYLSEC requires significantly less CPU time. Comparisons with the discrete ordinates code ANISN also show good agreement. An additional attraction to CYLSEC is that it is suitable for conversion to mini or personal computers

  7. A Contribution Towards A Grammar of Code

    Directory of Open Access Journals (Sweden)

    David M. Berry

    2008-01-01

    Full Text Available Over the past thirty years there has been an increasing interest in the social and cultural implications of digital technologies and ‘informationalism’ from the social sciences and humanities. Generally this has concentrated on the implications of the “convergence” of digital devices and services, understood as linked to the discrete processing capabilities of computers, which rely on logical operations, binary processing and symbolic representation. In this paper, I wish to suggest that a ‘grammar of code’ might provide a useful way of thinking about the way in which digital technologies operate as a medium and can contribute usefully to this wider debate. I am interested in the way in which the dynamic properties of code can be understood as operating according to a grammar reflected in its materialisation and operation in the lifeworld – the discretisation of the phenomenal world. As part of that contribution in this paper I develop some tentative Weberian ‘ideal-types’. These ideal-types are then applied to the work of the Japanese composer, Masahiro Miwa, whose innovative ‘Reverse-Simulation music’ models the operation of basic low-level digital circuitry for the performance and generation of musical pieces.

  8. Improving the quality of clinical coding: a comprehensive audit model

    OpenAIRE

    Hamid Moghaddasi; Reza Rabiei; Nasrin Sadeghi

    2014-01-01

    Introduction: The review of medical records with the aim of assessing the quality of codes has long been conducted in different countries. Auditing medical coding, as an instructive approach, could help to review the quality of codes objectively using defined attributes, and this in turn would lead to improvement of the quality of codes. Method: The current study aimed to present a model for auditing the quality of clinical codes. The audit model was formed after reviewing other a...

  9. A FINE GRANULAR JOINT SOURCE CHANNEL CODING METHOD

    Institute of Scientific and Technical Information of China (English)

    Zhuo Li; Shen Lansun; Zhu Qing

    2003-01-01

    An improved FGS (Fine Granular Scalability) coding method is proposed in this letter, which is based on human visual characteristics. This method adjusts FGS coding frame rate according to the evaluation of video sequences so as to improve the coding efficiency and subject perceived quality of reconstructed images. Finally, a fine granular joint source channel coding is proposed based on the source coding method, which not only utilizes the network resources efficiently, but guarantees the reliable transmission of video information.

  10. Concatenated coding systems employing a unit-memory convolutional code and a byte-oriented decoding algorithm

    Science.gov (United States)

    Lee, L.-N.

    1977-01-01

    Concatenated coding systems utilizing a convolutional code as the inner code and a Reed-Solomon code as the outer code are considered. In order to obtain very reliable communications over a very noisy channel with relatively modest coding complexity, it is proposed to concatenate a byte-oriented unit-memory convolutional code with an RS outer code whose symbol size is one byte. It is further proposed to utilize a real-time minimal-byte-error probability decoding algorithm, together with feedback from the outer decoder, in the decoder for the inner convolutional code. The performance of the proposed concatenated coding system is studied, and the improvement over conventional concatenated systems due to each additional feature is isolated.

  11. The rvfit Code: A Detailed Adaptive Simulated Annealing Code for Fitting Binaries and Exoplanets Radial Velocities

    CERN Document Server

    Iglesias-Marzoa, Ramón; Morales, María Jesús Arévalo

    2015-01-01

    The fitting of radial velocity curves is a frequent procedure in binary stars and exoplanet research. In the majority of cases the fitting routines need to be fed with a set of initial parameter values and priors from which to begin the computations and their results can be affected by local minima. We present a new code, the rvfit code, for fitting radial velocities of stellar binaries and exoplanets using an Adaptive Simulated Annealing (ASA) global minimization method, which fastly converges to a global solution minimum without the need to provide preliminary parameter values. We show the performance of the code using both synthetic and real data sets: double-lined binaries, single-lined binaries, and exoplanet systems. In all examples the keplerian orbital parameters fitted by the rvfit code and their computed uncertainties are compared with literature solutions. Finally, we provide the source code with a working example and a detailed description on how to use it.

  12. Name—Merely a Personal Code

    Institute of Scientific and Technical Information of China (English)

    翟瑜佳

    2015-01-01

    <正>Name,everyone has one.There is no doubt that a name is a label of identification.But is it all?Is a name nothing but a code to distinguish one from others?If that’s the case,an ID number is enough and a name is no longer crucial.People who claim this may have a vague idea what their own names mean so that they cannot realize the significance of names.To explore the importance and meaning of names,we should give them much more thoughts and think about not merely names themselves but

  13. MUSIC: a mesh-unrestricted simulation code

    International Nuclear Information System (INIS)

    A general formalism to solve the G-group neutron diffusion equation is described. The G-group flux is represented by complementing an ''asymptotic'' mode with (G-1) ''transient'' modes. A particular reduction-to-one-group technique gives a high computational efficiency. MUSIC, a 2-group code using the above formalism, is presented. MUSIC is demonstrated on a fine-mesh calculation and on 2 coarse-mesh core calculations: a heavy-water reactor (HWR) problem and the 2-D lightwater reactor (LWR) IAEA benchmark. Comparison is made to finite-difference results

  14. A Readout Mechanism for Latency Codes

    Science.gov (United States)

    Zohar, Oran; Shamir, Maoz

    2016-01-01

    Response latency has been suggested as a possible source of information in the central nervous system when fast decisions are required. The accuracy of latency codes was studied in the past using a simplified readout algorithm termed the temporal-winner-take-all (tWTA). The tWTA is a competitive readout algorithm in which populations of neurons with a similar decision preference compete, and the algorithm selects according to the preference of the population that reaches the decision threshold first. It has been shown that this algorithm can account for accurate decisions among a small number of alternatives during short biologically relevant time periods. However, one of the major points of criticism of latency codes has been that it is unclear how can such a readout be implemented by the central nervous system. Here we show that the solution to this long standing puzzle may be rather simple. We suggest a mechanism that is based on reciprocal inhibition architecture, similar to that of the conventional winner-take-all, and show that under a wide range of parameters this mechanism is sufficient to implement the tWTA algorithm. This is done by first analyzing a rate toy model, and demonstrating its ability to discriminate short latency differences between its inputs. We then study the sensitivity of this mechanism to fine-tuning of its initial conditions, and show that it is robust to wide range of noise levels in the initial conditions. These results are then generalized to a Hodgkin-Huxley type of neuron model, using numerical simulations. Latency codes have been criticized for requiring a reliable stimulus-onset detection mechanism as a reference for measuring latency. Here we show that this frequent assumption does not hold, and that, an additional onset estimator is not needed to trigger this simple tWTA mechanism.

  15. Interface requirements for coupling a containment code to a reactor system thermal hydraulic codes

    Energy Technology Data Exchange (ETDEWEB)

    Baratta, A.J.

    1997-07-01

    To perform a complete analysis of a reactor transient, not only the primary system response but the containment response must also be accounted for. Such transients and accidents as a loss of coolant accident in both pressurized water and boiling water reactors and inadvertent operation of safety relief valves all challenge the containment and may influence flows because of containment feedback. More recently, the advanced reactor designs put forth by General Electric and Westinghouse in the US and by Framatome and Seimens in Europe rely on the containment to act as the ultimate heat sink. Techniques used by analysts and engineers to analyze the interaction of the containment and the primary system were usually iterative in nature. Codes such as RELAP or RETRAN were used to analyze the primary system response and CONTAIN or CONTEMPT the containment response. The analysis was performed by first running the system code and representing the containment as a fixed pressure boundary condition. The flows were usually from the primary system to the containment initially and generally under choked conditions. Once the mass flows and timing are determined from the system codes, these conditions were input into the containment code. The resulting pressures and temperatures were then calculated and the containment performance analyzed. The disadvantage of this approach becomes evident when one performs an analysis of a rapid depressurization or a long term accident sequence in which feedback from the containment can occur. For example, in a BWR main steam line break transient, the containment heats up and becomes a source of energy for the primary system. Recent advances in programming and computer technology are available to provide an alternative approach. The author and other researchers have developed linkage codes capable of transferring data between codes at each time step allowing discrete codes to be coupled together.

  16. A New Arithmetic Coding System Combining Source Channel Coding and MAP Decoding

    Institute of Scientific and Technical Information of China (English)

    PANG Yu-ye; SUN Jun; WANG Jia

    2007-01-01

    A new arithmetic coding system combining source channel coding and maximum a posteriori decoding were proposed.It combines source coding and error correction tasks into one unified process by introducing an adaptive forbidden symbol.The proposed system achieves fixed length code words by adaptively adjusting the probability of the forbidden symbol and adding tail digits of variable length.The corresponding improved MAP decoding metric was derived.The proposed system can improve the performance.Simulations were performed on AWGN channels with various noise levels by using both hard and soft decision with BPSK modulation.The results show its performance is slightly better than that of our adaptive arithmetic error correcting coding system using a forbidden symbol.

  17. Jetto a free boundary plasma transport code

    International Nuclear Information System (INIS)

    JETTO is a one-and-a-half-dimensional transport code calculating the evolution of plasma parameters in a time dependent axisymmetric MHD equilibrium configuration. A splitting technique gives a consistent solution of coupled equilibrium and transport equations. The plasma boundary is free and defined either by its contact with a limiter (wall) or by a separatrix or by the toroidal magnetic flux. The Grad's approach to the equilibrium problem with adiabatic (or similar) constraints is adopted. This method consists of iterating by alternately solving the Grad-Schluter-Shafranov equation (PDE) and the ODE obtained by averaging the PDE over the magnetic surfaces. The bidimensional equation of the poloidal flux is solved by a finite difference scheme, whereas a Runge-Kutta method is chosen for the averaged equilibrium equation. The 1D transport equations (averaged over the magnetic surfaces) for the electron and ion densities and energies and for the rotational transform are written in terms of a coordinate (ρ) related to the toroidal flux. Impurity transport is also considered, under the hypothesis of coronal equilibrium. The transport equations are solved by an implicit scheme in time and by a finite difference scheme in space. The centering of the source terms and transport coefficients is performed using a Predictor-Corrector scheme. The basic version of the code is described here in detail; input and output parameters are also listed

  18. Visual mismatch negativity: A predictive coding view

    Directory of Open Access Journals (Sweden)

    Gabor eStefanics

    2014-09-01

    Full Text Available An increasing number of studies investigate the visual mismatch negativity (vMMN or use the vMMN as a tool to probe various aspects of human cognition. This paper reviews the theoretical underpinnings of vMMN in the light of methodological considerations and provides recommendations for measuring and interpreting the vMMN. The following key issues are discussed from the experimentalist’s point of view in a predictive coding framework: 1 experimental protocols and procedures to control ‘refractoriness’ effects; 2 methods to control attention; 3 vMMN and veridical perception.

  19. A Code of Ethics for Referees?

    Science.gov (United States)

    Sturrock, Peter A.

    2004-04-01

    I have read with interest the many letters commenting on the pros and cons of anonymity for referees. While I sympathize with writers who have suffered from referees who are incompetent or uncivil, I also sympathize with those who argue that one would simply exchange one set of problems for another if journals were to require that all referees waive anonymity. Perhaps there is a more direct way to address the issue. It may help if guidelines for referees were to include a code of ethics.

  20. A Construction of Lossy Source Code Using LDPC Matrices

    Science.gov (United States)

    Miyake, Shigeki; Muramatsu, Jun

    Research into applying LDPC code theory, which is used for channel coding, to source coding has received a lot of attention in several research fields such as distributed source coding. In this paper, a source coding problem with a fidelity criterion is considered. Matsunaga et al. and Martinian et al. constructed a lossy code under the conditions of a binary alphabet, a uniform distribution, and a Hamming measure of fidelity criterion. We extend their results and construct a lossy code under the extended conditions of a binary alphabet, a distribution that is not necessarily uniform, and a fidelity measure that is bounded and additive and show that the code can achieve the optimal rate, rate-distortion function. By applying a formula for the random walk on lattice to the analysis of LDPC matrices on Zq, where q is a prime number, we show that results similar to those for the binary alphabet condition hold for Zq, the multiple alphabet condition.

  1. A surface code quantum computer in silicon.

    Science.gov (United States)

    Hill, Charles D; Peretz, Eldad; Hile, Samuel J; House, Matthew G; Fuechsle, Martin; Rogge, Sven; Simmons, Michelle Y; Hollenberg, Lloyd C L

    2015-10-01

    The exceptionally long quantum coherence times of phosphorus donor nuclear spin qubits in silicon, coupled with the proven scalability of silicon-based nano-electronics, make them attractive candidates for large-scale quantum computing. However, the high threshold of topological quantum error correction can only be captured in a two-dimensional array of qubits operating synchronously and in parallel-posing formidable fabrication and control challenges. We present an architecture that addresses these problems through a novel shared-control paradigm that is particularly suited to the natural uniformity of the phosphorus donor nuclear spin qubit states and electronic confinement. The architecture comprises a two-dimensional lattice of donor qubits sandwiched between two vertically separated control layers forming a mutually perpendicular crisscross gate array. Shared-control lines facilitate loading/unloading of single electrons to specific donors, thereby activating multiple qubits in parallel across the array on which the required operations for surface code quantum error correction are carried out by global spin control. The complexities of independent qubit control, wave function engineering, and ad hoc quantum interconnects are explicitly avoided. With many of the basic elements of fabrication and control based on demonstrated techniques and with simulated quantum operation below the surface code error threshold, the architecture represents a new pathway for large-scale quantum information processing in silicon and potentially in other qubit systems where uniformity can be exploited. PMID:26601310

  2. Acceleration of a CFD Code with a GPU

    Directory of Open Access Journals (Sweden)

    Dennis C. Jespersen

    2010-01-01

    Full Text Available The Computational Fluid Dynamics code OVERFLOW includes as one of its solver options an algorithm which is a fairly small piece of code but which accounts for a significant portion of the total computational time. This paper studies some of the issues in accelerating this piece of code by using a Graphics Processing Unit (GPU. The algorithm needs to be modified to be suitable for a GPU and attention needs to be given to 64-bit and 32-bit arithmetic. Interestingly, the work done for the GPU produced ideas for accelerating the CPU code and led to significant speedup on the CPU.

  3. A graph model for opportunistic network coding

    KAUST Repository

    Sorour, Sameh

    2015-08-12

    © 2015 IEEE. Recent advancements in graph-based analysis and solutions of instantly decodable network coding (IDNC) trigger the interest to extend them to more complicated opportunistic network coding (ONC) scenarios, with limited increase in complexity. In this paper, we design a simple IDNC-like graph model for a specific subclass of ONC, by introducing a more generalized definition of its vertices and the notion of vertex aggregation in order to represent the storage of non-instantly-decodable packets in ONC. Based on this representation, we determine the set of pairwise vertex adjacency conditions that can populate this graph with edges so as to guarantee decodability or aggregation for the vertices of each clique in this graph. We then develop the algorithmic procedures that can be applied on the designed graph model to optimize any performance metric for this ONC subclass. A case study on reducing the completion time shows that the proposed framework improves on the performance of IDNC and gets very close to the optimal performance.

  4. What to do with a Dead Research Code

    Science.gov (United States)

    Nemiroff, Robert J.

    2016-01-01

    The project has ended -- should all of the computer codes that enabled the project be deleted? No. Like research papers, research codes typically carry valuable information past project end dates. Several possible end states to the life of research codes are reviewed. Historically, codes are typically left dormant on an increasingly obscure local disk directory until forgotten. These codes will likely become any or all of: lost, impossible to compile and run, difficult to decipher, and likely deleted when the code's proprietor moves on or dies. It is argued here, though, that it would be better for both code authors and astronomy generally if project codes were archived after use in some way. Archiving is advantageous for code authors because archived codes might increase the author's ADS citable publications, while astronomy as a science gains transparency and reproducibility. Paper-specific codes should be included in the publication of the journal papers they support, just like figures and tables. General codes that support multiple papers, possibly written by multiple authors, including their supporting websites, should be registered with a code registry such as the Astrophysics Source Code Library (ASCL). Codes developed on GitHub can be archived with a third party service such as, currently, BackHub. An important code version might be uploaded to a web archiving service like, currently, Zenodo or Figshare, so that this version receives a Digital Object Identifier (DOI), enabling it to found at a stable address into the future. Similar archiving services that are not DOI-dependent include perma.cc and the Internet Archive Wayback Machine at archive.org. Perhaps most simply, copies of important codes with lasting value might be kept on a cloud service like, for example, Google Drive, while activating Google's Inactive Account Manager.

  5. Coupling a Basin Modeling and a Seismic Code using MOAB

    KAUST Repository

    Yan, Mi

    2012-06-02

    We report on a demonstration of loose multiphysics coupling between a basin modeling code and a seismic code running on a large parallel machine. Multiphysics coupling, which is one critical capability for a high performance computing (HPC) framework, was implemented using the MOAB open-source mesh and field database. MOAB provides for code coupling by storing mesh data and input and output field data for the coupled analysis codes and interpolating the field values between different meshes used by the coupled codes. We found it straightforward to use MOAB to couple the PBSM basin modeling code and the FWI3D seismic code on an IBM Blue Gene/P system. We describe how the coupling was implemented and present benchmarking results for up to 8 racks of Blue Gene/P with 8192 nodes and MPI processes. The coupling code is fast compared to the analysis codes and it scales well up to at least 8192 nodes, indicating that a mesh and field database is an efficient way to implement loose multiphysics coupling for large parallel machines.

  6. A Content Analysis of Student Conduct Codes

    OpenAIRE

    Martin, Janice Earlene

    2004-01-01

    Scholars in the field of student judicial affairs have recommended that institutions remove all legal terminology and references in student conduct codes and create codes based on student development theory and practice (Dannells, 1997; Gehring, 2001; Stoner & Cerminara 1990; Stoner, 2000). The purpose of this study was to analyze student conduct codes to determine the extent to which college and university administrators have adopted Stoner and Cerminara, Gehring, and Pavela's suggestions. ...

  7. A minimum-error, energy-constrained neural code is an instantaneous-rate code.

    Science.gov (United States)

    Johnson, Erik C; Jones, Douglas L; Ratnam, Rama

    2016-04-01

    Sensory neurons code information about stimuli in their sequence of action potentials (spikes). Intuitively, the spikes should represent stimuli with high fidelity. However, generating and propagating spikes is a metabolically expensive process. It is therefore likely that neural codes have been selected to balance energy expenditure against encoding error. Our recently proposed optimal, energy-constrained neural coder (Jones et al. Frontiers in Computational Neuroscience, 9, 61 2015) postulates that neurons time spikes to minimize the trade-off between stimulus reconstruction error and expended energy by adjusting the spike threshold using a simple dynamic threshold. Here, we show that this proposed coding scheme is related to existing coding schemes, such as rate and temporal codes. We derive an instantaneous rate coder and show that the spike-rate depends on the signal and its derivative. In the limit of high spike rates the spike train maximizes fidelity given an energy constraint (average spike-rate), and the predicted interspike intervals are identical to those generated by our existing optimal coding neuron. The instantaneous rate coder is shown to closely match the spike-rates recorded from P-type primary afferents in weakly electric fish. In particular, the coder is a predictor of the peristimulus time histogram (PSTH). When tested against in vitro cortical pyramidal neuron recordings, the instantaneous spike-rate approximates DC step inputs, matching both the average spike-rate and the time-to-first-spike (a simple temporal code). Overall, the instantaneous rate coder relates optimal, energy-constrained encoding to the concepts of rate-coding and temporal-coding, suggesting a possible unifying principle of neural encoding of sensory signals.

  8. SAGAPOe-A code description and user's guide

    International Nuclear Information System (INIS)

    This paper describes the new models inserted in the computer code SAGAPOe-A for the thermo-fluiddynamic analysis of gas cooled fuel element bundles. Moreover, it is intended to be a guide for the user of the code. The physical background of the new models inserted in the code has been described by the author of this work in a previous paper. A listing of the code is included in the Appendix. (orig.)

  9. A Binary Representation of the Genetic Code

    CERN Document Server

    Nemzer, Louis R

    2016-01-01

    This article introduces a novel binary representation of the canonical genetic code, in which each of the four mRNA nucleotide bases is assigned a unique 2-bit identifier. These designations have a physiological meaning derived from the molecular structures of, and relationships between, the bases. In this scheme, the 64 possible triplet codons are each indexed by a 6-bit label. The order of the bits reflects the hierarchical organization manifested by the DNA replication/repair and tRNA translation systems. Transition and transversion mutations are naturally expressed as basic binary operations, and the severity of the different types is analyzed. Using a principal component analysis, it is shown that physicochemical properties of amino acids related to protein folding also correlate with particular bit positions of their respective labels. Thus, the likelihood for a particular point mutation to be conservative, and therefore less likely to cause a change in protein functionality, can be estimated.

  10. A Python Wrapper Code Generator for Dynamic Libraries

    Directory of Open Access Journals (Sweden)

    2011-06-01

    Full Text Available We introduce a new Python code generator for conveniently and transparently wrapping native dynamic libraries. The presented code generator is used in several projects for scientific collaboration and can be adapted to other projects fairly easily.

  11. A new three-dimensional general-relativistic hydrodynamics code

    Science.gov (United States)

    Baiotti, L.; Hawke, I.; Montero, P. J.; Rezzolla, L.

    We present a new three-dimensional general relativistic hydrodynamics code, the Whisky code. This code incorporates the expertise developed over the past years in the numerical solution of Einstein equations and of the hydrodynamics equations in a curved spacetime, and is the result of a collaboration of several European Institutes. We here discuss the ability of the code to carry out long-term accurate evolutions of the linear and nonlinear dynamics of isolated relativistic stars.

  12. A new three-dimensional general-relativistic hydrodynamics code

    CERN Document Server

    Baiotti, Luca; Montero, Pedro J; Rezzolla, Luciano

    2010-01-01

    We present a new three-dimensional general relativistic hydrodynamics code, the Whisky code. This code incorporates the expertise developed over the past years in the numerical solution of Einstein equations and of the hydrodynamics equations in a curved spacetime, and is the result of a collaboration of several European Institutes. We here discuss the ability of the code to carry out long-term accurate evolutions of the linear and nonlinear dynamics of isolated relativistic stars.

  13. Thinking through the Issues in a Code of Ethics

    Science.gov (United States)

    Davis, Michael

    2008-01-01

    In June 2005, seven people met at the Illinois Institute of Technology (IIT) to develop a code of ethics governing all members of the university community. The initial group developed a preamble, that included reasons for establishing such a code and who was to be governed by the code, including rationale for following the guidelines. From this…

  14. A decoding method of an n length binary BCH code through (n + 1n length binary cyclic code

    Directory of Open Access Journals (Sweden)

    TARIQ SHAH

    2013-09-01

    Full Text Available For a given binary BCH code Cn of length n = 2 s - 1 generated by a polynomial of degree r there is no binary BCH code of length (n + 1n generated by a generalized polynomial of degree 2r. However, it does exist a binary cyclic code C (n+1n of length (n + 1n such that the binary BCH code Cn is embedded in C (n+1n . Accordingly a high code rate is attained through a binary cyclic code C (n+1n for a binary BCH code Cn . Furthermore, an algorithm proposed facilitates in a decoding of a binary BCH code Cn through the decoding of a binary cyclic code C (n+1n , while the codes Cn and C (n+1n have the same minimum hamming distance.

  15. A burst-correcting algorithm for Reed Solomon codes

    Science.gov (United States)

    Chen, J.; Owsley, P.

    1990-01-01

    The Bose, Chaudhuri, and Hocquenghem (BCH) codes form a large class of powerful error-correcting cyclic codes. Among the non-binary BCH codes, the most important subclass is the Reed Solomon (RS) codes. Reed Solomon codes have the ability to correct random and burst errors. It is well known that an (n,k) RS code can correct up to (n-k)/2 random errors. When burst errors are involved, the error correcting ability of the RS code can be increased beyond (n-k)/2. It has previously been show that RS codes can reliably correct burst errors of length greater than (n-k)/2. In this paper, a new decoding algorithm is given which can also correct a burst error of length greater than (n-k)/2.

  16. A Matrix Completion Approach to Linear Index Coding Problem

    OpenAIRE

    Esfahanizadeh, Homa; Lahouti, Farshad; Hassibi, Babak

    2014-01-01

    In this paper, a general algorithm is proposed for rate analysis and code design of linear index coding problems. Specifically a solution for minimum rank matrix completion problem over finite fields representing the linear index coding problem is devised in order to find the optimum transmission rate given vector length and size of the field. The new approach can be applied to both scalar and vector linear index coding.

  17. On the Codes over a Semilocal Finite Ring

    Directory of Open Access Journals (Sweden)

    Abdullah Dertli

    2015-10-01

    Full Text Available In this paper, we study the structure of cyclic, quasi cyclic, constacyclic codes and their skew codes over the finite ring R. The Gray images of cyclic, quasi cyclic, skew cyclic, skew quasi cyclic and skew constacyclic codes over R are obtained. A necessary and sufficient condition for cyclic (negacyclic codes over R that contains its dual has been given. The parameters of quantum error correcting codes are obtained from both cyclic and negacyclic codes over R. Some examples are given. Firstly, quasi constacyclic and skew quasi constacyclic codes are introduced. By giving two inner product, it is investigated their duality. A sufficient condition for 1 generator skew quasi constacyclic codes to be free is determined.

  18. A Case for Dynamic Reverse-code Generation

    DEFF Research Database (Denmark)

    Lee, Jooyong

    2007-01-01

    . These implementations, however, inherently do not scale. As has often been said, the ultimate solution for backtracking is to use reverse code: executing the reverse code restores the previous states of a program. In our earlier work, we presented a method to generate reverse code on the fly while running a debugger....... This article presents a case study of dynamic reverse-code generation. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation can...

  19. Toward a Code of Conduct for Graduate Education

    Science.gov (United States)

    Proper, Eve

    2012-01-01

    Most academic disciplines promulgate codes of ethics that serve as public statements of professional norms of their membership. These codes serve both symbolic and practical purposes, stating to both members and the larger public what a discipline's highest ethics are. This article explores what scholarly society codes of ethics could say about…

  20. A Proposed Code Of Ethics For Infrared Thermographic Professionals

    Science.gov (United States)

    Roberts, Charles C.

    1987-05-01

    The American Heritage Dictionary defines ethics as "The general study of morals and of specific moral choices to be made by the individual in his relationship with others". A code of ethics defines these moral relationships to encourage integrity throughout a profession. A defined code of ethics often yields credibility to an organization or association of professionals. This paper outlines a proposed code of ethics for practitioners in the infrared thermographic field. The proposed code covers relationships with the public, clients, other professionals and employers. The proposed code covers credentials, capabilities, thermograms, compensation and safety.

  1. Is the Decision to Code-share a Route Different for Virtual versus Traditional Code-Share Arrangements?

    OpenAIRE

    DU, YAN; McMullen, Starr

    2012-01-01

    This paper analyzes factors that determine whether individual routes remain in or leave a code-share agreement in different scenarios: pooled, purely traditionally code-shared routes, purely virtual code-shared routes and routes both traditionally and purely codeshare. The code-share alliance between Continental and America West Airlines is used as the case study for this analysis. Empirical results show that factors affecting alliance firms’ code sharing decision significantly differ for vir...

  2. Benchmark study between FIDAP and a cellular automata code

    Science.gov (United States)

    Akau, R. L.; Stockman, H. W.

    A fluid flow benchmark exercise was conducted to compare results between a cellular automata code and FIDAP. Cellular automata codes are free from gridding constraints, and are generally used to model slow (Reynolds number approximately 1) flows around complex solid obstacles. However, the accuracy of cellular automata codes at higher Reynolds numbers, where inertial terms are significant, is not well-documented. In order to validate the cellular automata code, two fluids problems were investigated. For both problems, flow was assumed to be laminar, two-dimensional, isothermal, incompressible and periodic. Results showed that the cellular automata code simulated the overall behavior of the flow field.

  3. A class of binary cyclic codes with five weights

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    In this paper, the dual code of the binary cyclic code of length 2 n-1 with three zeros α, α t 1 and α t 2 is proven to have five nonzero Hamming weights in the case that n 4 is even and t1 = 2 n/2 + 1, t2 = 2 n-1-2 n/2+1 + 1 or 2 n/2 + 3, where α is a primitive element of the finite field F 2 n . The dual code is a divisible code of level n/2+1, and its weight distribution is also completely determined. When n = 4, the dual code satisfies Ward’s bound.

  4. ANACROM - A computer code for chromatogram analysis

    International Nuclear Information System (INIS)

    The computer code was developed for automatic research of peaks and evaluation of chromatogram parameters as : center, height, area, medium - height width (FWHM) and the rate FWHM/center of each peak. (Author)

  5. A reflexive exploration of two qualitative data coding techniques

    Directory of Open Access Journals (Sweden)

    Erik Blair

    2016-01-01

    Full Text Available In an attempt to help find meaning within qualitative data, researchers commonly start by coding their data. There are a number of coding systems available to researchers and this reflexive account explores my reflections on the use of two such techniques. As part of a larger investigation, two pilot studies were undertaken as a means to examine the relative merits of open coding and template coding for examining transcripts. This article does not describe the research project per se but attempts to step back and offer a reflexive account of the development of data coding tools. Here I reflect upon and evaluate the two data coding techniques that were piloted, and discuss how using appropriate aspects of both led to the development of my final data coding approach. My exploration found there was no clear-cut ‘best’ option but that the data coding techniques needed to be reflexively-aligned to meet the specific needs of my project. This reflection suggests that, when coding qualitative data, researchers should be methodologically thoughtful when they attempt to apply any data coding technique; that they do not assume pre-established tools are aligned to their particular paradigm; and that they consider combining and refining established techniques as a means to define their own specific codes. DOI: 10.2458/azu_jmmss.v6i1.18772DOI: 10.2458/azu_jmmss.v6i1.18772

  6. A FINE GRANULAR JOINT SOURCE CHANNEL CODING METHOD

    Institute of Scientific and Technical Information of China (English)

    ZhuoLi; ShenLanusun

    2003-01-01

    An improved FGS (Fine Granular Scalability) coding method is proposed in this letter,which is based on human visual characteristics.This method adjusts FGS coding frame rate according to the evaluation of video sequences so as to improve the coding efficiency and subject perceived quality of reconstructed images.Finally,a fine granular joint source channel coding is proposed based on the source coding method,which not only utilizes the network resources efficiently,but guarantees the reliable transmission of video information.

  7. A Generic Safety assessment code for geologic disposal of Radioactive Waste: GSRW computer code user's manual

    International Nuclear Information System (INIS)

    The computer code system GSRW (Generic Safety assessment code for geologic disposal of Radioactive Waste) was developed as in interim version of safety assessment methodology for geologic disposal of high-level radioactive waste. Scenarios used here are based on normal evolution scenarios which assume that the performance of a disposal system is not affected by probabilistic events. The code consists of three parts. The first part evaluates a source term from a disposal facility which consists mainly of a vitrified waste, a metallic container and a buffer zone. Two kinds of source term models are provided: Model 1 which simulate the dissolution of silicate component of glass and the diffusive transport of radionuclides in the buffere zone, and Model 2 which assumes that the concentration of a radionuclide is limited by the solubility of its specific chemical form at the interface between the buffer and a vitrified wastes. The second part analyses the transport of radionuclides in the geosphere, which is based on analytical solutions or numerical solutions of a mass transport equation involving the advection, dispersion, linear sorption and decay chain. The third part assesses the transport of radionuclides in the biosphere and the resulting radiological consequences to the man, which is based on a dynamic compartment model for the biosphere and a dose factor method for dose calculations. This report describes mathematical models used, the structure of the code system, and user information and instructions for execution of the code. (author)

  8. Code manual for CONTAIN 2.0: A computer code for nuclear reactor containment analysis

    International Nuclear Information System (INIS)

    The CONTAIN 2.0 computer code is an integrated analysis tool used for predicting the physical conditions, chemical compositions, and distributions of radiological materials inside a containment building following the release of material from the primary system in a light-water reactor accident. It can also predict the source term to the environment. CONTAIN 2.0 is intended to replace the earlier CONTAIN 1.12, which was released in 1991. The purpose of this Code Manual is to provide full documentation of the features and models in CONTAIN 2.0. Besides complete descriptions of the models, this Code Manual provides a complete description of the input and output from the code. CONTAIN 2.0 is a highly flexible and modular code that can run problems that are either quite simple or highly complex. An important aspect of CONTAIN is that the interactions among thermal-hydraulic phenomena, aerosol behavior, and fission product behavior are taken into account. The code includes atmospheric models for steam/air thermodynamics, intercell flows, condensation/evaporation on structures and aerosols, aerosol behavior, and gas combustion. It also includes models for reactor cavity phenomena such as core-concrete interactions and coolant pool boiling. Heat conduction in structures, fission product decay and transport, radioactive decay heating, and the thermal-hydraulic and fission product decontamination effects of engineered safety features are also modeled. To the extent possible, the best available models for severe accident phenomena have been incorporated into CONTAIN, but it is intrinsic to the nature of accident analysis that significant uncertainty exists regarding numerous phenomena. In those cases, sensitivity studies can be performed with CONTAIN by means of user-specified input parameters. Thus, the code can be viewed as a tool designed to assist the knowledge reactor safety analyst in evaluating the consequences of specific modeling assumptions

  9. Code manual for CONTAIN 2.0: A computer code for nuclear reactor containment analysis

    Energy Technology Data Exchange (ETDEWEB)

    Murata, K.K.; Williams, D.C.; Griffith, R.O.; Gido, R.G.; Tadios, E.L.; Davis, F.J.; Martinez, G.M.; Washington, K.E. [Sandia National Labs., Albuquerque, NM (United States); Tills, J. [J. Tills and Associates, Inc., Sandia Park, NM (United States)

    1997-12-01

    The CONTAIN 2.0 computer code is an integrated analysis tool used for predicting the physical conditions, chemical compositions, and distributions of radiological materials inside a containment building following the release of material from the primary system in a light-water reactor accident. It can also predict the source term to the environment. CONTAIN 2.0 is intended to replace the earlier CONTAIN 1.12, which was released in 1991. The purpose of this Code Manual is to provide full documentation of the features and models in CONTAIN 2.0. Besides complete descriptions of the models, this Code Manual provides a complete description of the input and output from the code. CONTAIN 2.0 is a highly flexible and modular code that can run problems that are either quite simple or highly complex. An important aspect of CONTAIN is that the interactions among thermal-hydraulic phenomena, aerosol behavior, and fission product behavior are taken into account. The code includes atmospheric models for steam/air thermodynamics, intercell flows, condensation/evaporation on structures and aerosols, aerosol behavior, and gas combustion. It also includes models for reactor cavity phenomena such as core-concrete interactions and coolant pool boiling. Heat conduction in structures, fission product decay and transport, radioactive decay heating, and the thermal-hydraulic and fission product decontamination effects of engineered safety features are also modeled. To the extent possible, the best available models for severe accident phenomena have been incorporated into CONTAIN, but it is intrinsic to the nature of accident analysis that significant uncertainty exists regarding numerous phenomena. In those cases, sensitivity studies can be performed with CONTAIN by means of user-specified input parameters. Thus, the code can be viewed as a tool designed to assist the knowledge reactor safety analyst in evaluating the consequences of specific modeling assumptions.

  10. An improved canine genome and a comprehensive catalogue of coding genes and non-coding transcripts.

    Directory of Open Access Journals (Sweden)

    Marc P Hoeppner

    Full Text Available The domestic dog, Canis familiaris, is a well-established model system for mapping trait and disease loci. While the original draft sequence was of good quality, gaps were abundant particularly in promoter regions of the genome, negatively impacting the annotation and study of candidate genes. Here, we present an improved genome build, canFam3.1, which includes 85 MB of novel sequence and now covers 99.8% of the euchromatic portion of the genome. We also present multiple RNA-Sequencing data sets from 10 different canine tissues to catalog ∼175,000 expressed loci. While about 90% of the coding genes previously annotated by EnsEMBL have measurable expression in at least one sample, the number of transcript isoforms detected by our data expands the EnsEMBL annotations by a factor of four. Syntenic comparison with the human genome revealed an additional ∼3,000 loci that are characterized as protein coding in human and were also expressed in the dog, suggesting that those were previously not annotated in the EnsEMBL canine gene set. In addition to ∼20,700 high-confidence protein coding loci, we found ∼4,600 antisense transcripts overlapping exons of protein coding genes, ∼7,200 intergenic multi-exon transcripts without coding potential, likely candidates for long intergenic non-coding RNAs (lincRNAs and ∼11,000 transcripts were reported by two different library construction methods but did not fit any of the above categories. Of the lincRNAs, about 6,000 have no annotated orthologs in human or mouse. Functional analysis of two novel transcripts with shRNA in a mouse kidney cell line altered cell morphology and motility. All in all, we provide a much-improved annotation of the canine genome and suggest regulatory functions for several of the novel non-coding transcripts.

  11. A New Evolutionary Algorithm Based on the Decimal Coding

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functions. In this paper a new Decimal Coding Strategy (DCS) ,which is convenient for space division and alterable precision, was proposed, and the theory analysis of its implicit parallelism and convergence was also discussed. We also redesign several genetic operators for the decimal code. In order to utilize the historical information of the existing individuals in the process of evolution and avoid repeated exploring,the strategies of space shrinking and precision alterable, are adopted. Finally, the evolutionary algorithm based on decimal coding (DCEAs) was applied to the optimization of functions, the optimization of parameter, mixed-integer nonlinear programming. Comparison with traditional GAs was made and the experimental results show that the performances of DCEAS are better than the tradition GAs.

  12. A new electromagnetic code for ICRF antenna in EAST

    CERN Document Server

    Yang, Hua; Dong, Sa; Zhang, Xin-Jun; Zhao, Yan-Ping; Shang, Lei

    2015-01-01

    The demand for an effective tool to help in the design of ion cyclotron radio frequency (ICRF) antenna system for fusion experiment has driven the development of predictive codes. A new electromagnetic code based on the method of moments (MOM) is described in the paper. The code computes the electromagnetic field by the solution of the electric field integral equation. The structure of ICRF antennas are discretized with triangular mesh. By using the new code, the scattering parameter and the surface current are given and compared with the result by commercial code CST. Moreover, the power spectra are studied with different toroidal phases for heating and current drive. Good agreement of simulation results between the new code and CST are obtained. The code has been validated against CST for EAST ICRF antenna.

  13. CONSTRUCTION OF REGULAR LDPC LIKE CODES BASED ON FULL RANK CODES AND THEIR ITERATIVE DECODING USING A PARITY CHECK TREE

    Directory of Open Access Journals (Sweden)

    H. Prashantha Kumar

    2011-09-01

    Full Text Available Low density parity check (LDPC codes are capacity-approaching codes, which means that practical constructions exist that allow the noise threshold to be set very close to the theoretical Shannon limit for a memory less channel. LDPC codes are finding increasing use in applications like LTE-Networks, digital television, high density data storage systems, deep space communication systems etc. Several algebraic and combinatorial methods are available for constructing LDPC codes. In this paper we discuss a novel low complexity algebraic method for constructing regular LDPC like codes derived from full rank codes. We demonstrate that by employing these codes over AWGN channels, coding gains in excess of 2dB over un-coded systems can be realized when soft iterative decoding using a parity check tree is employed.

  14. A parallel memory architecture for video coding

    Institute of Scientific and Technical Information of China (English)

    Jian-ying PENG; Xiao-lang YAN; De-xian LI; Li-zhong CHEN

    2008-01-01

    To efficiently exploit the performance of single instruction multiple data (SIMD) architectures for video coding,a parallel memory architecture with power-of-two memory modules is proposed. It employs two novel skewing schemes to provide conflict-flee access to adjacent elements (8-bit and 16-bit data types) or with power-of-two intervals in both horizontal and vertical dircctions,which were not possible in previous parallel memory architectures. Area consumptions and delay estimations are given respectively with 4,8 and 16 memory modules. Under a 0.18-μm CMOS technology,the synthcsis results show that the proposed system can achieve 230 MHz clock frequency with 16 memory modules at the cost of 19k gates when read and write latcncies are 3 and 2 clock cycles,respectively. We implement the proposed parallel memory architecture on a video signal proccssor (VSP). The results show that VSP enhanced with the proposed architecture achieves 1.28x speedups for H.264 real-time decoding.

  15. A code generation framework for the ALMA common software

    Science.gov (United States)

    Troncoso, Nicolás; von Brand, Horst H.; Ibsen, Jorge; Mora, Matias; Gonzalez, Victor; Chiozzi, Gianluca; Jeram, Bogdan; Sommer, Heiko; Zamora, Gabriel; Tejeda, Alexis

    2010-07-01

    Code generation helps in smoothing the learning curve of a complex application framework and in reducing the number of Lines Of Code (LOC) that a developer needs to craft. The ALMA Common Software (ACS) has adopted code generation in specific areas, but we are now exploiting the more comprehensive approach of Model Driven code generation to transform directly an UML Model into a full implementation in the ACS framework. This approach makes it easier for newcomers to grasp the principles of the framework. Moreover, a lower handcrafted LOC reduces the error rate. Additional benefits achieved by model driven code generation are: software reuse, implicit application of design patterns and automatic tests generation. A model driven approach to design makes it also possible using the same model with different frameworks, by generating for different targets. The generation framework presented in this paper uses openArchitectureWare1 as the model to text translator. OpenArchitectureWare provides a powerful functional language that makes this easier to implement the correct mapping of data types, the main difficulty encountered in the translation process. The output is an ACS application readily usable by the developer, including the necessary deployment configuration, thus minimizing any configuration burden during testing. The specific application code is implemented by extending generated classes. Therefore, generated and manually crafted code are kept apart, simplifying the code generation process and aiding the developers by keeping a clean logical separation between the two. Our first results show that code generation improves dramatically the code productivity.

  16. A code inspection process for security reviews

    Energy Technology Data Exchange (ETDEWEB)

    Garzoglio, Gabriele; /Fermilab

    2009-05-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  17. A code inspection process for security reviews

    International Nuclear Information System (INIS)

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  18. A restructuring of COR package for MIDAS computer code

    International Nuclear Information System (INIS)

    The COR package, which calculates the thermal response of the core and the lower plenum internal structures and models the relocation of the core and lower plenum structural materials, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and a modernized data structure. To do this, the data transferring methods of the current MELCOR code are modified and adopted into the COR package. The data structure of the current MELCOR code using FORTRAN77 has a difficulty in grasping the meaning of the variables as well as a waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which leads to an efficient memory treatment and an easy understanding of the code. Restructuring of the COR package addressed in this paper includes a module development, subroutine modification. The verification has been done by comparing the results of the modified code with those of the existing code. As the trends are similar to each other, it implies that the same approach could be extended to the entire code package. It is expected that the code restructuring will accelerated the code's domestication thanks to a direct understanding of each variable and an easy implementation of the modified or newly developed models. (author)

  19. SPQR: a Monte Carlo reactor kinetics code

    International Nuclear Information System (INIS)

    The SPQR Monte Carlo code has been developed to analyze fast reactor core accident problems where conventional methods are considered inadequate. The code is based on the adiabatic approximation of the quasi-static method. This initial version contains no automatic material motion or feedback. An existing Monte Carlo code is used to calculate the shape functions and the integral quantities needed in the kinetics module. Several sample problems have been devised and analyzed. Due to the large statistical uncertainty associated with the calculation of reactivity in accident simulations, the results, especially at later times, differ greatly from deterministic methods. It was also found that in large uncoupled systems, the Monte Carlo method has difficulty in handling asymmetric perturbations

  20. A comparative study of seismic provisions between International Building Code 2003 and Uniform Building Code 1997

    Institute of Scientific and Technical Information of China (English)

    Wenshen Pong; Zu-Hsu Lee; Anson Lee

    2006-01-01

    This study focuses on the comparison of the Uniform Building Code (UBC) 1997 and International Building Code (IBC) 2003 in relation to the seismic design and analysis of special steel moment resisting frame buildings (SMRF).This paper formulates a numerical study of a steel SMRF building, studied in four different situations, namely: as an office building in San Francisco; as an office building in Sacramento; as an essential facility in San Francisco, and as an essential facility in Sacramento. The analytical results of the model buildings are then compared and analyzed taking note of any significant differences. This case study explores variations in the results obtained using the two codes, particularly the design base shear and drift ratios as they relate to different locations and occupancy use. This study also proves that IBC 2003is more stringent for the redundancy factor under design category E for the SMRF building, and drift limits for essential facilities.

  1. A restructuring of CF package for MIDAS computer code

    International Nuclear Information System (INIS)

    CF package, which evaluates user-specified 'control functions' and applies them to define or control various aspects of computation, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the CF package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory, difficulty is more over because its data is location information of other package's data due to characteristics of CF package. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the CF package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The verification has been done by comparing the results of the modified code with those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  2. A restructuring of RN2 package for MIDAS computer code

    International Nuclear Information System (INIS)

    RN2 package, which is one of two fission product-related package in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and data structure. To do this, data transferring methods of current MELCOR code are modified and adopted into the RN2 package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the RN2 package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates data file, as well as MELCOR, which is processing a calculation. The validation has been done by comparing the results of the modified code with those from the existing code. As the trends are the similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  3. Codes of Ethics for Economists: A Pluralist View

    OpenAIRE

    Sheila C. Dow

    2013-01-01

    Within the discussion of ethics and economics some have considered designing a code of ethics for economists. But the idea of such a code is potentially problematic from a pluralist standpoint. Some possibilities are discussed here to show that any code concerning the behaviour of economists presumes a particular view of human nature and thus of professionalism. Further, issues of socio-economic power in the profession pose problems for the interpretation and implementation of some possible p...

  4. A Semantic Analysis Method for Scientific and Engineering Code

    Science.gov (United States)

    Stewart, Mark E. M.

    1998-01-01

    This paper develops a procedure to statically analyze aspects of the meaning or semantics of scientific and engineering code. The analysis involves adding semantic declarations to a user's code and parsing this semantic knowledge with the original code using multiple expert parsers. These semantic parsers are designed to recognize formulae in different disciplines including physical and mathematical formulae and geometrical position in a numerical scheme. In practice, a user would submit code with semantic declarations of primitive variables to the analysis procedure, and its semantic parsers would automatically recognize and document some static, semantic concepts and locate some program semantic errors. A prototype implementation of this analysis procedure is demonstrated. Further, the relationship between the fundamental algebraic manipulations of equations and the parsing of expressions is explained. This ability to locate some semantic errors and document semantic concepts in scientific and engineering code should reduce the time, risk, and effort of developing and using these codes.

  5. code_swarm: a design study in organic software visualization.

    Science.gov (United States)

    Ogawa, Michael; Ma, Kwan-Liu

    2009-01-01

    In May of 2008, we published online a series of software visualization videos using a method called code_swarm. Shortly thereafter, we made the code open source and its popularity took off. This paper is a study of our code swarm application, comprising its design, results and public response. We share our design methodology, including why we chose the organic information visualization technique, how we designed for both developers and a casual audience, and what lessons we learned from our experiment. We validate the results produced by code_swarm through a qualitative analysis and by gathering online user comments. Furthermore, we successfully released the code as open source, and the software community used it to visualize their own projects and shared their results as well. In the end, we believe code_swarm has positive implications for the future of organic information design and open source information visualization practice.

  6. A Theoretical Method for Estimating Performance of Reed-Solomon Codes Concatenated with Orthogonal Space-Time Block Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Based on the studies of Reed-Solomon codes and orthogonal space-time block codes over Rayleigh fading channel, a theoretical method for estimating performance of Reed-Solomon codes concatenated with orthogonal space-time block codes is presented in this paper. And an upper bound of the bit error rate is also obtained. It is shown through computer simulations that the signal-to-noise ratio reduces about 15 dB or more after orthogonal space-time block codes are concatenate with Reed-Solomon (15,6) codes over Rayleigh fading channel, when the bit error rate is 10-4.

  7. Monitoring the laser marking of a bar code label

    International Nuclear Information System (INIS)

    A bar code label which has been laser marked onto the end of a nuclear fuel tube is tested for unacceptable depth penetration of the heat affected zone. The average gray level value of the bar code label is compared with a predetermined standard. The label is optically sensed by a video camera and a set of discrete digital values representative of the bar code label is generated. The average digital value representative of the bar code label is calculated and compared to a predetermined standard level derived from measurements of acceptable laser marked tubes. (author)

  8. RAYS: a geometrical optics code for EBT

    International Nuclear Information System (INIS)

    The theory, structure, and operation of the code are described. Mathematical details of equilibrium subroutiones for slab, bumpy torus, and tokamak plasma geometry are presented. Wave dispersion and absorption subroutines are presented for frequencies ranging from ion cyclotron frequency to electron cyclotron frequency. Graphics postprocessors for RAYS output data are also described

  9. RAYS: a geometrical optics code for EBT

    Energy Technology Data Exchange (ETDEWEB)

    Batchelor, D.B.; Goldfinger, R.C.

    1982-04-01

    The theory, structure, and operation of the code are described. Mathematical details of equilibrium subroutiones for slab, bumpy torus, and tokamak plasma geometry are presented. Wave dispersion and absorption subroutines are presented for frequencies ranging from ion cyclotron frequency to electron cyclotron frequency. Graphics postprocessors for RAYS output data are also described.

  10. SRAC2006: A comprehensive neutronics calculation code system

    International Nuclear Information System (INIS)

    The SRAC is a code system applicable to neutronics analysis of a variety of reactor types. Since the publication of the second version of the users manual (JAERI-1302) in 1986 for the SRAC system, a number of additions and modifications to the functions and the library data have been made to establish a comprehensive neutronics code system. The current system includes major neutron data libraries (JENDL-3.3, JENDL-3.2, ENDF/B-VII, ENDF/B-VI.8, JEFF-3.1, JEF-2.2, etc.), and integrates five elementary codes for neutron transport and diffusion calculation; PIJ based on the collision probability method applicable to 16 kind of lattice models, SN transport codes ANISN(1D) and TWOTRN(2D), diffusion codes TUD(1D) and CITATION(multi-D). The system also includes an auxiliary code COREBN for multi-dimensional core burn-up calculation. (author)

  11. Continuous Materiality: Through a Hierarchy of Computational Codes

    Directory of Open Access Journals (Sweden)

    Jichen Zhu

    2008-01-01

    Full Text Available The legacy of Cartesian dualism inherent in linguistic theory deeply influences current views on the relation between natural language, computer code, and the physical world. However, the oversimplified distinction between mind and body falls short of capturing the complex interaction between the material and the immaterial. In this paper, we posit a hierarchy of codes to delineate a wide spectrum of continuous materiality. Our research suggests that diagrams in architecture provide a valuable analog for approaching computer code in emergent digital systems. After commenting on ways that Cartesian dualism continues to haunt discussions of code, we turn our attention to diagrams and design morphology. Finally we notice the implications a material understanding of code bears for further research on the relation between human cognition and digital code. Our discussion concludes by noticing several areas that we have projected for ongoing research.

  12. Arithmetic coding as a non-linear dynamical system

    Science.gov (United States)

    Nagaraj, Nithin; Vaidya, Prabhakar G.; Bhat, Kishor G.

    2009-04-01

    In order to perform source coding (data compression), we treat messages emitted by independent and identically distributed sources as imprecise measurements (symbolic sequence) of a chaotic, ergodic, Lebesgue measure preserving, non-linear dynamical system known as Generalized Luröth Series (GLS). GLS achieves Shannon's entropy bound and turns out to be a generalization of arithmetic coding, a popular source coding algorithm, used in international compression standards such as JPEG2000 and H.264. We further generalize GLS to piecewise non-linear maps (Skewed-nGLS). We motivate the use of Skewed-nGLS as a framework for joint source coding and encryption.

  13. TEA: A Code for Calculating Thermochemical Equilibrium Abundances

    OpenAIRE

    Blecic, Jasmina; Harrington, Joseph; Bowman, M. Oliver

    2015-01-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. (1958) and Eriksson (1971). It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature-pressure pairs. We tested the code against the method o...

  14. A Combined Weighted Approach to Detect Code Cloning

    OpenAIRE

    Himanshu; Dr. Sushil Garg

    2014-01-01

    Code clone detection is one of the useful and required approach to generate the reliable and effective code. There are number of approaches defined by earlier researchers to detect the cloning. These approaches include the textual, statistical and token based approaches. In this present work, three main categories of code clone detection approaches are combined in a weighted form to detect the cloning over the system. The work is presented as a weighted model with the exploration of all three...

  15. CALMAR: A New Versatile Code Library for Adjustment from Measurements

    Directory of Open Access Journals (Sweden)

    Grégoire G.

    2016-01-01

    Full Text Available CALMAR, a new library for adjustment has been developed. This code performs simultaneous shape and level adjustment of an initial prior spectrum from measured reactions rates of activation foils. It is written in C++ using the ROOT data analysis framework,with all linear algebra classes. STAYSL code has also been reimplemented in this library. Use of the code is very flexible : stand-alone, inside a C++ code, or driven by scripts. Validation and test cases are under progress. Theses cases will be included in the code package that will be available to the community. Future development are discussed. The code should support the new Generalized Nuclear Data (GND format. This new format has many advantages compared to ENDF.

  16. CALMAR: A New Versatile Code Library for Adjustment from Measurements

    Science.gov (United States)

    Grégoire, G.; Fausser, C.; Destouches, C.; Thiollay, N.

    2016-02-01

    CALMAR, a new library for adjustment has been developed. This code performs simultaneous shape and level adjustment of an initial prior spectrum from measured reactions rates of activation foils. It is written in C++ using the ROOT data analysis framework,with all linear algebra classes. STAYSL code has also been reimplemented in this library. Use of the code is very flexible : stand-alone, inside a C++ code, or driven by scripts. Validation and test cases are under progress. Theses cases will be included in the code package that will be available to the community. Future development are discussed. The code should support the new Generalized Nuclear Data (GND) format. This new format has many advantages compared to ENDF.

  17. MED101: a laser-plasma simulation code. User guide

    International Nuclear Information System (INIS)

    Complete details for running the 1-D laser-plasma simulation code MED101 are given including: an explanation of the input parameters, instructions for running on the Rutherford Appleton Laboratory IBM, Atlas Centre Cray X-MP and DEC VAX, and information on three new graphics packages. The code, based on the existing MEDUSA code, is capable of simulating a wide range of laser-produced plasma experiments including the calculation of X-ray laser gain. (author)

  18. Development of a Set of Neutron Kinetics Codes for CEFR

    Institute of Scientific and Technical Information of China (English)

    TIANHe-chun

    2003-01-01

    The function of some neutron kinetics analysis codes now used in CEFR is quite simple, which do not satisfy multi-purpose or detailed analysis requirements and their calculation accuracy is not so high.For this reason, it is necessary to develop a set of neutron kinetics codes for CEFR design, physical startup and operation. These developed codes include NKF, INHR, RHOT and DROP.

  19. A Deterministic Transport Code for Space Environment Electrons

    Science.gov (United States)

    Nealy, John E.; Chang, C. K.; Norman, Ryan B.; Blattnig, Steve R.; Badavi, Francis F.; Adamczyk, Anne M.

    2010-01-01

    A deterministic computational procedure has been developed to describe transport of space environment electrons in various shield media. This code is an upgrade and extension of an earlier electron code. Whereas the former code was formulated on the basis of parametric functions derived from limited laboratory data, the present code utilizes well established theoretical representations to describe the relevant interactions and transport processes. The shield material specification has been made more general, as have the pertinent cross sections. A combined mean free path and average trajectory approach has been used in the transport formalism. Comparisons with Monte Carlo calculations are presented.

  20. A new coding scheme in coded ultrasound using staggering repetition interval

    Institute of Scientific and Technical Information of China (English)

    Cheng JIN; Si-ping CHEN; Zheng-di QIN

    2009-01-01

    The increase of frame rate, though with the potential in a coded ultrasound system, is generally concomitant with the simultaneous transmission of a number of apertures, and in consequence leads to increased cross-talks between different apertures.In view of this, a new coding scheme using staggering repetition interval was proposed. The transmitting signals were constructed by repeating the two (or more) modulated codes using staggering repetition interval, and then allocated to and transmitted simultaneously among different apertures. The decoding process was based on the subsection-matched filter under the assistance of different matched filters for different apertures. At last the outputs of subsection-matched filtering were added together. Staggering changed the positions of cross-correlation (CC) peaks from coinciding, which resulted in an effective reduction of CC. Our theoretical analysis and simulations showed that, the coding scheme can be used to reduce cross-talk, and a good cross-talk reduction will be achieved if the staggering delay is kept in an appropriate range.

  1. A restructuring of DCH package for MIDAS computer code

    International Nuclear Information System (INIS)

    DCH package, which is one of thermal-hydraulic packages in MELCOR, has been restructured for the MIDAS computer code. MIDAS is being developed as an integrated severe accident analysis code with a user-friendly graphical user interface and modernized data structure. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of the DCH package addressed in this paper includes module development, subroutine modification, and treats MELGEN, which generates an initial data file, as well as MELCOR, which is processing a calculation. The results of the modified code are verified against those from the existing code. As the trends are similar to each other, it hints that the same approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  2. FLP: a field line plotting code for bundle divertor design

    International Nuclear Information System (INIS)

    A computer code was developed to aid in the design of bundle divertors. The code can handle discrete toroidal field coils and various divertor coil configurations. All coils must be composed of straight line segments. The code runs on the PDP-10 and displays plots of the configuration, field lines, and field ripple. It automatically chooses the coil currents to connect the separatrix produced by the divertor to the outer edge of the plasma and calculates the required coil cross sections. Several divertor designs are illustrated to show how the code works

  3. A construction of fully diverse unitary space-time codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Fully diverse unitary space-time codes are useful in multiantenna communications, especially in multiantenna differential modulation. Recently, two constructions of parametric fully diverse unitary space-time codes for three antennas system have been introduced. We propose a new construction method based on the constructions. In the present paper, fully diverse codes for systems of odd prime number antennas are obtained from this construction. Space-time codes from present construction are found to have better error performance than many best known ones.

  4. A Framework for Retargetable Code Generation using Simulated Annealing

    NARCIS (Netherlands)

    Visser, B.S.

    1999-01-01

    embedded systems. Retargetable code generation is a co-designing method to map a high-level software description onto a variety of hardware architectures without the need to rewrite a compiler. Highly efficient code generation is required to meet, for example, timing, area and low-power constraints.

  5. QR Codes in the Library: Are They Worth the Effort? Analysis of a QR Code Pilot Project

    OpenAIRE

    Andrew M. Wilson

    2012-01-01

    The literature is filled with potential uses for Quick Response (QR) codes in the library. Setting, but few library QR code projects have publicized usage statistics. A pilot project carried out in the Eda Kuhn Loeb Music Library of the Harvard College Library sought to determine whether library patrons actually understand and use QR codes. Results and analysis of the pilot project are provided, attempting to answer the question as to whether QR codes are worth the effort for libraries.

  6. A Method for Modeling Co-Occurrence Propensity of Clinical Codes with Application to ICD-10-PCS Auto-Coding

    OpenAIRE

    Subotin, Michael; Davis, Anthony R.

    2015-01-01

    Objective. Natural language processing methods for medical auto-coding, or automatic generation of medical billing codes from electronic health records, generally assign each code independently of the others. They may thus assign codes for closely related procedures or diagnoses to the same document, even when they do not tend to occur together in practice, simply because the right choice can be difficult to infer from the clinical narrative. Materials and Methods. We propose a method that in...

  7. A restructuring of TF package for MIDAS computer code

    International Nuclear Information System (INIS)

    TF package which defines some interpolation and extrapolation condition through user defined table has been restructured in MIDAS computer code. To do this, data transferring methods of current MELCOR code are modified and adopted into TF package. The data structure of the current MELCOR code using FORTRAN77 causes a difficult grasping of the meaning of the variables as well as waste of memory. New features of FORTRAN90 make it possible to allocate the storage dynamically and to use the user-defined data type, which lead to an efficient memory treatment and an easy understanding of the code. Restructuring of TF package addressed in this paper does module development and subroutine modification, and treats MELGEN which is making restart file as well as MELCOR which is processing calculation. The validation has been done by comparing the results of the modified code with those from the existing code, and it is confirmed that the results are the same. It hints that the similar approach could be extended to the entire code package. It is expected that code restructuring will accelerate the code domestication thanks to direct understanding of each variable and easy implementation of modified or newly developed models

  8. Core-seis: a code for LMFBR core seismic analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chellapandi, P.; Ravi, R.; Chetal, S.C.; Bhoje, S.B. [Indira Gandhi Centre for Atomic Research, Kalpakkam (India). Reactor Group

    1995-12-31

    This paper deals with a computer code CORE-SEIS specially developed for seismic analysis of LMFBR core configurations. For demonstrating the prediction capability of the code, results are presented for one of the MONJU reactor core mock ups which deals with a cluster of 37 subassemblies kept in water. (author). 3 refs., 7 figs., 2 tabs.

  9. Periodic boundary conditions in a 3D hydro code

    Energy Technology Data Exchange (ETDEWEB)

    Morgan, D L; Neely, J R; Vantine, H C

    1998-09-18

    We have modified a 3D hydrodynamics code so that it has the capability to impose periodic boundary conditions on the problem being considered. This capability allows it to treat only a basic symmetry unit of the problem when translational or rotational periodic symmetries are present. The code has been run successfully for two test problems involving rotational symmetries.

  10. Code-Mixing as a Bilingual Instructional Strategy

    Science.gov (United States)

    Jiang, Yih-Lin Belinda; García, Georgia Earnest; Willis, Arlette Ingram

    2014-01-01

    This study investigated code-mixing practices, specifically the use of L2 (English) in an L1 (Chinese) class in a U.S. bilingual program. Our findings indicate that the code-mixing practices made and prompted by the teacher served five pedagogical functions: (a) to enhance students' bilingualism and bilingual learning, (b) to review and…

  11. TEA: A Code for Calculating Thermochemical Equilibrium Abundances

    CERN Document Server

    Blecic, Jasmina; Bowman, M Oliver

    2015-01-01

    We present an open-source Thermochemical Equilibrium Abundances (TEA) code that calculates the abundances of gaseous molecular species. The code is based on the methodology of White et al. (1958) and Eriksson (1971). It applies Gibbs free-energy minimization using an iterative, Lagrangian optimization scheme. Given elemental abundances, TEA calculates molecular abundances for a particular temperature and pressure or a list of temperature-pressure pairs. We tested the code against the method of Burrows & Sharp (1999), the free thermochemical equilibrium code CEA (Chemical Equilibrium with Applications), and the example given by White et al. (1958). Using their thermodynamic data, TEA reproduces their final abundances, but with higher precision. We also applied the TEA abundance calculations to models of several hot-Jupiter exoplanets, producing expected results. TEA is written in Python in a modular format. There is a start guide, a user manual, and a code document in addition to this theory paper. TEA is ...

  12. A Trustability Metric for Code Search based on Developer Karma

    CERN Document Server

    Gysin, Florian S

    2010-01-01

    The promise of search-driven development is that developers will save time and resources by reusing external code in their local projects. To efficiently integrate this code, users must be able to trust it, thus trustability of code search results is just as important as their relevance. In this paper, we introduce a trustability metric to help users assess the quality of code search results and therefore ease the cost-benefit analysis they undertake trying to find suitable integration candidates. The proposed trustability metric incorporates both user votes and cross-project activity of developers to calculate a "karma" value for each developer. Through the karma value of all its developers a project is ranked on a trustability scale. We present JBender, a proof-of-concept code search engine which implements our trustability metric and we discuss preliminary results from an evaluation of the prototype.

  13. Porting a Hall MHD Code to a Graphic Processing Unit

    Science.gov (United States)

    Dorelli, John C.

    2011-01-01

    We present our experience porting a Hall MHD code to a Graphics Processing Unit (GPU). The code is a 2nd order accurate MUSCL-Hancock scheme which makes use of an HLL Riemann solver to compute numerical fluxes and second-order finite differences to compute the Hall contribution to the electric field. The divergence of the magnetic field is controlled with Dedner?s hyperbolic divergence cleaning method. Preliminary benchmark tests indicate a speedup (relative to a single Nehalem core) of 58x for a double precision calculation. We discuss scaling issues which arise when distributing work across multiple GPUs in a CPU-GPU cluster.

  14. ABINIT: a computer code for matter; Abinit: un code au service de la matiere

    Energy Technology Data Exchange (ETDEWEB)

    Amadon, B.; Bottin, F.; Bouchet, J.; Dewaele, A.; Jollet, F.; Jomard, G.; Loubeyre, P.; Mazevet, S.; Recoules, V.; Torrent, M.; Zerah, G. [CEA Bruyeres-le-Chatel, 91 (France)

    2008-07-01

    The PAW (Projector Augmented Wave) method has been implemented in the ABINIT Code that computes electronic structures in atoms. This method relies on the simultaneous use of a set of auxiliary functions (in plane waves) and a sphere around each atom. This method allows the computation of systems including many atoms and gives the expression of energy, forces, stress... in terms of the auxiliary function only. We have generated atomic data for iron at very high pressure (over 200 GPa). We get a bcc-hcp transition around 10 GPa and the magnetic order disappears around 50 GPa. This method has been validated on a series of metals. The development of the PAW method has required a great effort for the massive parallelization of the ABINIT code. (A.C.)

  15. Toward a Code of Conduct for the Presidency

    Science.gov (United States)

    Fleming, J. Christopher

    2012-01-01

    A presidential code of conduct is needed more today than ever before. College and university presidents are being required to do more without the proper training to succeed. Presidents from outside the academy enter academia with normative patterns and codes of conduct that served them well in their previous occupations but now have the potential…

  16. On Predictive Coding for Erasure Channels Using a Kalman Framework

    DEFF Research Database (Denmark)

    Arildsen, Thomas; Murthi, Manohar; Andersen, Søren Vang;

    2009-01-01

    We present a new design method for robust low-delay coding of auto-regressive (AR) sources for transmission across erasure channels. The method is based on Linear Predictive Coding (LPC) with Kalman estimation at the decoder. The method designs the encoder and decoder off-line through an iterative...

  17. The motivational interviewing skill code : Reliability and a critical appraisal

    NARCIS (Netherlands)

    de Jonge, JM; Schippers, GM; Schaap, CPDR

    2005-01-01

    The Motivational Interviewing Skill Code (MISC) is a coding system developed to measure adherence to motivational interviewing (MI). MI is an effective clinical style used in different treatment situations. Counsellors practising MI have to follow general principles and avoid certain traps. In the p

  18. Coding as a Trojan Horse for Mathematics Education Reform

    Science.gov (United States)

    Gadanidis, George

    2015-01-01

    The history of mathematics educational reform is replete with innovations taken up enthusiastically by early adopters without significant transfer to other classrooms. This paper explores the coupling of coding and mathematics education to create the possibility that coding may serve as a Trojan Horse for mathematics education reform. That is,…

  19. A Clustering-Based Approach to Enriching Code Foraging Environment.

    Science.gov (United States)

    Niu, Nan; Jin, Xiaoyu; Niu, Zhendong; Cheng, Jing-Ru C; Li, Ling; Kataev, Mikhail Yu

    2016-09-01

    Developers often spend valuable time navigating and seeking relevant code in software maintenance. Currently, there is a lack of theoretical foundations to guide tool design and evaluation to best shape the code base to developers. This paper contributes a unified code navigation theory in light of the optimal food-foraging principles. We further develop a novel framework for automatically assessing the foraging mechanisms in the context of program investigation. We use the framework to examine to what extent the clustering of software entities affects code foraging. Our quantitative analysis of long-lived open-source projects suggests that clustering enriches the software environment and improves foraging efficiency. Our qualitative inquiry reveals concrete insights into real developer's behavior. Our research opens the avenue toward building a new set of ecologically valid code navigation tools. PMID:25910273

  20. Image compression using a novel edge-based coding algorithm

    Science.gov (United States)

    Keissarian, Farhad; Daemi, Mohammad F.

    2001-08-01

    In this paper, we present a novel edge-based coding algorithm for image compression. The proposed coding scheme is the predictive version of the original algorithm, which we presented earlier in literature. In the original version, an image is block coded according to the level of visual activity of individual blocks, following a novel edge-oriented classification stage. Each block is then represented by a set of parameters associated with the pattern appearing inside the block. The use of these parameters at the receiver reduces the cost of reconstruction significantly. In the present study, we extend and improve the performance of the existing technique by exploiting the expected spatial redundancy across the neighboring blocks. Satisfactory coded images at competitive bit rate with other block-based coding techniques have been obtained.

  1. A Practical Approach to Lossy Joint Source-Channel Coding

    CERN Document Server

    Fresia, Maria

    2007-01-01

    This work is devoted to practical joint source channel coding. Although the proposed approach has more general scope, for the sake of clarity we focus on a specific application example, namely, the transmission of digital images over noisy binary-input output-symmetric channels. The basic building blocks of most state-of the art source coders are: 1) a linear transformation; 2) scalar quantization of the transform coefficients; 3) probability modeling of the sequence of quantization indices; 4) an entropy coding stage. We identify the weakness of the conventional separated source-channel coding approach in the catastrophic behavior of the entropy coding stage. Hence, we replace this stage with linear coding, that maps directly the sequence of redundant quantizer output symbols into a channel codeword. We show that this approach does not entail any loss of optimality in the asymptotic regime of large block length. However, in the practical regime of finite block length and low decoding complexity our approach ...

  2. A solution for automatic parallelization of sequential assembly code

    Directory of Open Access Journals (Sweden)

    Kovačević Đorđe

    2013-01-01

    Full Text Available Since modern multicore processors can execute existing sequential programs only on a single core, there is a strong need for automatic parallelization of program code. Relying on existing algorithms, this paper describes one new software solution tool for parallelization of sequential assembly code. The main goal of this paper is to develop the parallelizator which reads sequential assembler code and at the output provides parallelized code for MIPS processor with multiple cores. The idea is the following: the parser translates assembler input file to program objects suitable for further processing. After that the static single assignment is done. Based on the data flow graph, the parallelization algorithm separates instructions on different cores. Once sequential code is parallelized by the parallelization algorithm, registers are allocated with the algorithm for linear allocation, and the result at the end of the program is distributed assembler code on each of the cores. In the paper we evaluate the speedup of the matrix multiplication example, which was processed by the parallelizator of assembly code. The result is almost linear speedup of code execution, which increases with the number of cores. The speed up on the two cores is 1.99, while on 16 cores the speed up is 13.88.

  3. Selective video encryption of a distributed coded bitstream using LDPC codes

    Science.gov (United States)

    Um, Hwayoung; Delp, Edward J.

    2006-02-01

    Selective encryption is a technique that is used to minimizec omputational complexity or enable system functionality by only encrypting a portion of a compressed bitstream while still achieving reasonable security. For selective encryption to work, we need to rely not only on the beneficial effects of redundancy reduction, but also on the characteristics of the compression algorithm to concentrate important data representing the source in a relatively small fraction of the compressed bitstream. These important elements of the compressed data become candidates for selective encryption. In this paper, we combine encryption and distributed video source coding to consider the choices of which types of bits are most effective for selective encryption of a video sequence that has been compressed using a distributed source coding method based on LDPC codes. Instead of encrypting the entire video stream bit by bit, we encrypt only the highly sensitive bits. By combining the compression and encryption tasks and thus reducing the number of bits encrypted, we can achieve a reduction in system complexity.

  4. A New Generalized Complex Orthogonal Space-Time Block Codes

    Institute of Scientific and Technical Information of China (English)

    单红梅; 胡光锐

    2005-01-01

    Recent research challenges in the wireless communication include the usage of diversity and efficient coding to improve data transmission quality and spectral efficiency. Space diversity uses multiple transmitting and/or receiving antennas to create independent fading channels without penalty in bandwidth efficiency. Space-time block coding is an encoding scheme for communication over Rayleigh fading channels using multiple transmitting antennas. Space-time block codes from complex orthogonal designs exist only for two transmitting antennas. This paper generalizes a new complex orthogonal space-time block code for four transmitting antennas, whose decoding complexity is very low. Simulations show that the generalized complex orthogonal space-time block code has low bit error rate, full rate and possibly large diversity.

  5. DIVERT: a divertor magnetic field line following code

    International Nuclear Information System (INIS)

    The computer code DIVERT has been written to trace magnetic field lines in the presence of a divertor. Its purpose is to allow a user to estimate the thickness of the plasma scrapeoff region and to provide a visual mapping of the magnetic field lines near the divertor. Included in the code is the capability to provide auxiliary graphics and compute the field ripple. The code can handle a divertor made up of any arrangement of straight line coil segments and will provide a graph of the field line configuration on output

  6. Development and validation of a nodal code for core calculation

    International Nuclear Information System (INIS)

    The code RHENO solves the multigroup three-dimensional diffusion equation using a nodal method of polynomial expansion.A comparative study has been made between this code and present internationals nodal diffusion codes, resulting that the RHENO is up to date.The RHENO has been integrated to a calculation line and has been extend to make burnup calculations.Two methods for pin power reconstruction were developed: modulation and imbedded. The modulation method has been implemented in a program, while the implementation of the imbedded method will be concluded shortly.The validation carried out (that includes experimental data of a MPR) show very good results and calculation efficiency

  7. LAPU2: a laser pulse propagation code with diffraction

    International Nuclear Information System (INIS)

    Complete descriptions of the mathematical models and numerical methods used in the code LAPU2 are presented. This code can be used to study the propagation with diffraction of a temporally finite pulse through a sequence of resonant media and simple optical components. The treatment assumes cylindrical symmetry and allows nonlinear refractive indices. An unlimited number of different media can be distributed along the propagation path of the pulse. A complete users guide to input data is given as well as a FORTRAN listing of the code

  8. Implementation of a Blowing Boundary Condition in the LAURA Code

    Science.gov (United States)

    Thompson, Richard a.; Gnoffo, Peter A.

    2008-01-01

    Preliminary steps toward modeling a coupled ablation problem using a finite-volume Navier-Stokes code (LAURA) are presented in this paper. Implementation of a surface boundary condition with mass transfer (blowing) is described followed by verification and validation through comparisons with analytic results and experimental data. Application of the code to a carbon-nosetip ablation problem is demonstrated and the results are compared with previously published data. It is concluded that the code and coupled procedure are suitable to support further ablation analyses and studies.

  9. Experimental Implementation of a Codeword Stabilized Quantum Code

    CERN Document Server

    Zhang, Jingfu; Zeng, Bei; Laflamme, Raymond

    2011-01-01

    A five-qubit codeword stabilized quantum code is implemented in a seven-spin-qubit system using nuclear magnetic resonance (NMR). For the first time, our experiment implements a good nonadditive quantum code which encodes a larger Hilbert space than any stabilizer code with the same length and capable of correcting the same kind of errors. The robustness of the protected states is well demonstrated. Given the typical decoherence time of the system, our experiment challenges the ultimate limit of coherence control of the system and pushes the limit to implement complex quantum circuits in spin qubits forward.

  10. Software exorcism a handbook for debugging and optimizing legacy code

    CERN Document Server

    Blunden, Bill

    2013-01-01

    Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code takes an unflinching, no bulls and look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job. Do you have a co-worker who perpetually writes bad code that you are forced to clean up? This is your book. While there are plenty of books on the market that cover debugging and short-term workarounds for bad code, Reverend Bill Blunden takes a revolutionary step beyond them by bringing our atten

  11. SEQassembly: A Practical Tools Program for Coding Sequences Splicing

    Science.gov (United States)

    Lee, Hongbin; Yang, Hang; Fu, Lei; Qin, Long; Li, Huili; He, Feng; Wang, Bo; Wu, Xiaoming

    CDS (Coding Sequences) is a portion of mRNA sequences, which are composed by a number of exon sequence segments. The construction of CDS sequence is important for profound genetic analysis such as genotyping. A program in MATLAB environment is presented, which can process batch of samples sequences into code segments under the guide of reference exon models, and splice these code segments of same sample source into CDS according to the exon order in queue file. This program is useful in transcriptional polymorphism detection and gene function study.

  12. Code of a Tokamak Fusion Energy Facility ITER

    International Nuclear Information System (INIS)

    The technical structural code for ITER (International Thermonuclear Experimental Fusion Reactor) and, as more generic applications, for D-T burning fusion power facilities (hereafter, Fusion Code) should be innovative because of their quite different features of safety and mechanical components from nuclear fission reactors, and the necessity of introducing several new fabrication and examination technologies. Introduction of such newly developed technologies as inspection-free automatic welding into the Fusion Code is rationalized by a pilot application of a new code concept of system-based code for integrity. The code concept means an integration of element technical items necessary for construction, operation and maintenance of mechanical components of fusion power facilities into a single system to attain an optimization of the total margin of these components. Unique and innovative items of the Fusion Code are typically as follows: - Use of non-metals; - Cryogenic application; - New design margins on allowable stresses, and other new design rules; - Use of inspection-free automatic welding, and other newly developed fabrication technologies; - Graded approach of quality assurance standard to cover radiological safety-system components as well as non-safety-system components; - Consideration on replacement components. (authors)

  13. Development and validation of a fuel performance analysis code

    International Nuclear Information System (INIS)

    CAD has been developing a computer code 'FRAVIZ' for calculation of steady-state thermomechanical behaviour of nuclear reactor fuel rods. It contains four major modules viz., Thermal module, Fission Gas Release module, Material Properties module and Mechanical module. All these four modules are coupled to each other and feedback from each module is fed back to others to get a self-consistent evolution in time. The computer code has been checked against two FUMEX benchmarks. Modelling fuel performance in Advance Heavy Water Reactor would require additional inputs related to the fuel and some modification in the code.(author)

  14. Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source Channel Network Coding Approach

    CERN Document Server

    Joda, Roghayeh

    2010-01-01

    This paper addresses network code design for robust transmission of sources over an orthogonal two-hop wireless network with a broadcasting relay. The network consists of multiple sources and destinations in which each destination, benefiting the relay signal, intends to decode a subset of the sources. Two special instances of this network are orthogonal broadcast relay channel and the orthogonal multiple access relay channel. The focus is on complexity constrained scenarios, e.g., for wireless sensor networks, where channel coding is practically imperfect. Taking a source-channel and network coding approach, we design the code (mapping) at the relay such that the average reconstruction distortion at the destinations is minimized. To this end, by decomposing the source and channel-network distortions, an efficient design algorithm is proposed. The resulting network code at the relay is nonlinear and substantially outperforms the best performing linear network code at the relay. A motivating formulation of a f...

  15. A high fidelity VQ coding algorithm with region adaptive subbanding

    Institute of Scientific and Technical Information of China (English)

    YANG Zhong-qi; BAI Zhi-can; LI Dong-mei; YANG Chang-sheng

    2005-01-01

    Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantization (VQ) coding algorithm to image subband. In the algorithm, vector quantizers were adaptively designed for high-frequency bands in an image. In particular,the edges of the image were examined and fewer bits were assigned to high-energy regions. The experimental result showed that the algorithm had higher SNR and higher compression ratio than possible by traditional subband coding, JPEG and JPEG 2000.

  16. ORMEC: a three-dimensional MHD spectral inverse equilibrium code

    International Nuclear Information System (INIS)

    The Oak Ridge Moments Equilibrium Code (ORMEC) is an efficient computer code that has been developed to calculate three-dimensional MHD equilibria using the inverse spectral method. The fixed boundary formulation, which is based on a variational principle for the spectral coefficients (moments) of the cylindrical coordinates R and Z, is described and compared with the finite difference code BETA developed by Bauer, Betancourt, and Garabedian. Calculations for the Heliotron, Wendelstein VIIA, and Advanced Toroidal Facility (ATF) configurations are performed to establish the accuracy and mesh convergence properties for the spectral method. 16 refs., 13 figs

  17. A new hydrodynamics code for Type Ia Supernovae

    CERN Document Server

    Leung, S -C; Lin, L -M

    2015-01-01

    A two-dimensional hydrodynamics code for Type Ia supernovae (SNIa) simulations is presented. The code includes a fifth-order shock-capturing scheme WENO, detailed nuclear reaction network, flame-capturing scheme and sub-grid turbulence. For post-processing we have developed a tracer particle scheme to record the thermodynamical history of the fluid elements. We also present a one-dimensional radiative transfer code for computing observational signals. The code solves the Lagrangian hydrodynamics and moment-integrated radiative transfer equations. A local ionization scheme and composition dependent opacity are included. Various verification tests are presented, including standard benchmark tests in one and two dimensions. SNIa models using the pure turbulent deflagration model and the delayed-detonation transition model are studied. The results are consistent with those in the literature. We compute the detailed chemical evolution using the tracer particles' histories, and we construct corresponding bolometric...

  18. A three-dimensional magnetostatics computer code for insertion devices.

    Science.gov (United States)

    Chubar, O; Elleaume, P; Chavanne, J

    1998-05-01

    RADIA is a three-dimensional magnetostatics computer code optimized for the design of undulators and wigglers. It solves boundary magnetostatics problems with magnetized and current-carrying volumes using the boundary integral approach. The magnetized volumes can be arbitrary polyhedrons with non-linear (iron) or linear anisotropic (permanent magnet) characteristics. The current-carrying elements can be straight or curved blocks with rectangular cross sections. Boundary conditions are simulated by the technique of mirroring. Analytical formulae used for the computation of the field produced by a magnetized volume of a polyhedron shape are detailed. The RADIA code is written in object-oriented C++ and interfaced to Mathematica [Mathematica is a registered trademark of Wolfram Research, Inc.]. The code outperforms currently available finite-element packages with respect to the CPU time of the solver and accuracy of the field integral estimations. An application of the code to the case of a wedge-pole undulator is presented.

  19. Audio Quality for a Simple Forward Error Correcting Code

    OpenAIRE

    Calas, Yvan; Jean-Marie, Alain

    2004-01-01

    International audience The aim of this paper is to study the audio quality offered by a simple Forward Error Correction (FEC) code used in audio applications like Freephone or Rat. This coding technique consists in adding to every audio packet a redundant information concerning a preceding audio packet which belongs to the same audio flow. We show that the audio quality depends not only on the number of FEC flows and the utility function associated to the quantity of information received, ...

  20. Continuous Materiality: Through a Hierarchy of Computational Codes

    OpenAIRE

    Jichen Zhu; Kenneth J. Knoespe

    2008-01-01

    The legacy of Cartesian dualism inherent in linguistic theory deeply influences current views on the relation between natural language, computer code, and the physical world. However, the oversimplified distinction between mind and body falls short of capturing the complex interaction between the material and the immaterial. In this paper, we posit a hierarchy of codes to delineate a wide spectrum of continuous materiality. Our research suggests that diagrams in architecture provide a valuabl...

  1. GPEC, a real-time capable Tokamak equilibrium code

    CERN Document Server

    Rampp, Markus; Fischer, Rainer

    2015-01-01

    A new parallel equilibrium reconstruction code for tokamak plasmas is presented. GPEC allows to compute equilibrium flux distributions sufficiently accurate to derive parameters for plasma control within 1 ms of runtime which enables real-time applications at the ASDEX Upgrade experiment (AUG) and other machines with a control cycle of at least this size. The underlying algorithms are based on the well-established offline-analysis code CLISTE, following the classical concept of iteratively solving the Grad-Shafranov equation and feeding in diagnostic signals from the experiment. The new code adopts a hybrid parallelization scheme for computing the equilibrium flux distribution and extends the fast, shared-memory-parallel Poisson solver which we have described previously by a distributed computation of the individual Poisson problems corresponding to different basis functions. The code is based entirely on open-source software components and runs on standard server hardware and software environments. The real-...

  2. POPCORN: A comparison of binary population synthesis codes

    OpenAIRE

    Claeys, J.S.W.A.; Toonen, S.; Mennekens, N.

    2013-01-01

    We compare the results of three binary population synthesis codes to understand the differences in their results. As a first result we find that when equalizing the assumptions the results are similar. The main differences arise from deviating physical input.

  3. POPCORN: A comparison of binary population synthesis codes

    CERN Document Server

    Claeys, J S W; Mennekens, N

    2012-01-01

    We compare the results of three binary population synthesis codes to understand the differences in their results. As a first result we find that when equalizing the assumptions the results are similar. The main differences arise from deviating physical input.

  4. SPAMCART: a code for smoothed particle Monte Carlo radiative transfer

    Science.gov (United States)

    Lomax, O.; Whitworth, A. P.

    2016-10-01

    We present a code for generating synthetic spectral energy distributions and intensity maps from smoothed particle hydrodynamics simulation snapshots. The code is based on the Lucy Monte Carlo radiative transfer method, i.e. it follows discrete luminosity packets as they propagate through a density field, and then uses their trajectories to compute the radiative equilibrium temperature of the ambient dust. The sources can be extended and/or embedded, and discrete and/or diffuse. The density is not mapped on to a grid, and therefore the calculation is performed at exactly the same resolution as the hydrodynamics. We present two example calculations using this method. First, we demonstrate that the code strictly adheres to Kirchhoff's law of radiation. Secondly, we present synthetic intensity maps and spectra of an embedded protostellar multiple system. The algorithm uses data structures that are already constructed for other purposes in modern particle codes. It is therefore relatively simple to implement.

  5. SPAMCART: a code for smoothed particle Monte Carlo radiative transfer

    CERN Document Server

    Lomax, O

    2016-01-01

    We present a code for generating synthetic SEDs and intensity maps from Smoothed Particle Hydrodynamics simulation snapshots. The code is based on the Lucy (1999) Monte Carlo Radiative Transfer method, i.e. it follows discrete luminosity packets, emitted from external and/or embedded sources, as they propagate through a density field, and then uses their trajectories to compute the radiative equilibrium temperature of the ambient dust. The density is not mapped onto a grid, and therefore the calculation is performed at exactly the same resolution as the hydrodynamics. We present two example calculations using this method. First, we demonstrate that the code strictly adheres to Kirchhoff's law of radiation. Second, we present synthetic intensity maps and spectra of an embedded protostellar multiple system. The algorithm uses data structures that are already constructed for other purposes in modern particle codes. It is therefore relatively simple to implement.

  6. Designing Nonlinear Turbo Codes with a Target Ones Density

    CERN Document Server

    Wang, Jiadong; Chen, Tsung-Yi; Xie, Bike; Wesel, Richard

    2011-01-01

    Certain binary asymmetric channels, such as Z-channels in which one of the two crossover probabilities is zero, demand optimal ones densities different from 50%. Some broadcast channels, such as broadcast binary symmetric channels (BBSC) where each component channel is a binary symmetric channel, also require a non-uniform input distribution due to the superposition coding scheme, which is known to achieve the boundary of capacity region. This paper presents a systematic technique for designing nonlinear turbo codes that are able to support ones densities different from 50%. To demonstrate the effectiveness of our design technique, we design and simulate nonlinear turbo codes for the Z-channel and the BBSC. The best nonlinear turbo code is less than 0.02 bits from capacity.

  7. RADTRAN: a computer code to analyze transportation of radioactive material

    International Nuclear Information System (INIS)

    A computer code is presented which predicts the environmental impact of any specific scheme of radioactive material transportation. Results are presented in terms of annual latent cancer fatalities and annual early fatility probability resulting from exposure, during normal transportation or transport accidents. The code is developed in a generalized format to permit wide application including normal transportation analysis; consideration of alternatives; and detailed consideration of specific sectors of industry

  8. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Directory of Open Access Journals (Sweden)

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  9. A Monte Carlo code for ion beam therapy

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Initially developed for applications in detector and accelerator physics, the modern Fluka Monte Carlo code is now used in many different areas of nuclear science. Over the last 25 years, the code has evolved to include new features, such as ion beam simulations. Given the growing use of these beams in cancer treatment, Fluka simulations are being used to design treatment plans in several hadron-therapy centres in Europe.   Fluka calculates the dose distribution for a patient treated at CNAO with proton beams. The colour-bar displays the normalized dose values. Fluka is a Monte Carlo code that very accurately simulates electromagnetic and nuclear interactions in matter. In the 1990s, in collaboration with NASA, the code was developed to predict potential radiation hazards received by space crews during possible future trips to Mars. Over the years, it has become the standard tool to investigate beam-machine interactions, radiation damage and radioprotection issues in the CERN accelerator com...

  10. Quantum image coding with a reference-frame-independent scheme

    Science.gov (United States)

    Chapeau-Blondeau, François; Belin, Etienne

    2016-07-01

    For binary images, or bit planes of non-binary images, we investigate the possibility of a quantum coding decodable by a receiver in the absence of reference frames shared with the emitter. Direct image coding with one qubit per pixel and non-aligned frames leads to decoding errors equivalent to a quantum bit-flip noise increasing with the misalignment. We show the feasibility of frame-invariant coding by using for each pixel a qubit pair prepared in one of two controlled entangled states. With just one common axis shared between the emitter and receiver, exact decoding for each pixel can be obtained by means of two two-outcome projective measurements operating separately on each qubit of the pair. With strictly no alignment information between the emitter and receiver, exact decoding can be obtained by means of a two-outcome projective measurement operating jointly on the qubit pair. In addition, the frame-invariant coding is shown much more resistant to quantum bit-flip noise compared to the direct non-invariant coding. For a cost per pixel of two (entangled) qubits instead of one, complete frame-invariant image coding and enhanced noise resistance are thus obtained.

  11. The Plasma Simulation Code: A modern particle-in-cell code with patch-based load-balancing

    Science.gov (United States)

    Germaschewski, Kai; Fox, William; Abbott, Stephen; Ahmadi, Narges; Maynard, Kristofor; Wang, Liang; Ruhl, Hartmut; Bhattacharjee, Amitava

    2016-08-01

    This work describes the Plasma Simulation Code (PSC), an explicit, electromagnetic particle-in-cell code with support for different order particle shape functions. We review the basic components of the particle-in-cell method as well as the computational architecture of the PSC code that allows support for modular algorithms and data structure in the code. We then describe and analyze in detail a distinguishing feature of PSC: patch-based load balancing using space-filling curves which is shown to lead to major efficiency gains over unbalanced methods and a previously used simpler balancing method.

  12. ADLIB: A simple database framework for beamline codes

    International Nuclear Information System (INIS)

    There are many well developed codes available for beamline design and analysis. A significant fraction of each of these codes is devoted to processing its own unique input language for describing the problem. None of these large, complex, and powerful codes does everything. Adding a new bit of specialized physics can be a difficult task whose successful completion makes the code even larger and more complex. This paper describes an attempt to move in the opposite direction, toward a family of small, simple, single purpose physics and utility modules, linked by an open, portable, public domain database framework. These small specialized physics codes begin with the beamline parameters already loaded in the database, and accessible via the handful of subroutines that constitute ADLIB. Such codes are easier to write, and inherently organized in a manner suitable for incorporation in model based control system algorithms. Examples include programs for analyzing beamline misalignment sensitivities, for simulating and fitting beam steering data, and for translating among MARYLIE, TRANSPORT, and TRACE3D formats

  13. A He I Case-B Recombination Code

    CERN Document Server

    Porter, R L

    2007-01-01

    Recent calculations of collisionless, Case-B, He I emissivities were performed by Bauman et al. (2005). The source code used in the calculation has been freely available online since that paper was published. A number of changes have been made to simplify the use of the code by third parties. Here I provide details on how to obtain, compile, and execute the program and interpret the results.

  14. A New Video Coding Method Based on Improving Detail Regions

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The Moving Pictures Expert Group (MPEG) and H.263 standard coding method is widely used in video compression. However, the visual quality of detail regions such as eyes and mouth is not content in people at the decoder, as far as the conference telephone or videophone is concerned. A new coding method based on improving detail regions is presented in this paper. Experimental results show that this method can improve the visual quality at the decoder.

  15. Code Component Composition Reuse Is a New Programming Paradigm

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    After describing the characteristics of programming paradigm,this pap er introduces the approach of code component composition reuse in detail, propos es and discusses viewpoint that code component composition reuse is a kind of ne w programming paradigm. This paper also specifies the characteristics of this ne w programming paradigm in detail, and points out some issues that must be resolv ed for using this new programming paradigm.

  16. Codes, standards, and PV power systems. A 1996 status report

    Energy Technology Data Exchange (ETDEWEB)

    Wiles, J

    1996-06-01

    As photovoltaic (PV) electrical power systems gain increasing acceptance for both off-grid and utility-interactive applications, the safety, durability, and performance of these systems gains in importance. Local and state jurisdictions in many areas of the country require that all electrical power systems be installed in compliance with the requirements of the National Electrical Code{reg_sign} (NEC{reg_sign}). Utilities and governmental agencies are now requiring that PV installations and components also meet a number of Institute of Electrical and Electronic Engineers (IEEE) standards. PV installers are working more closely with licensed electricians and electrical contractors who are familiar with existing local codes and installation practices. PV manufacturers, utilities, balance of systems manufacturers, and standards representatives have come together to address safety and code related issues for future PV installations. This paper addresses why compliance with the accepted codes and standards is needed and how it is being achieved.

  17. A multi-scale code for flexible hybrid simulations

    CERN Document Server

    Leukkunen, L; Lopez-Acevedo, O

    2012-01-01

    Multi-scale computer simulations combine the computationally efficient classical algorithms with more expensive but also more accurate ab-initio quantum mechanical algorithms. This work describes one implementation of multi-scale computations using the Atomistic Simulation Environment (ASE). This implementation can mix classical codes like LAMMPS and the Density Functional Theory-based GPAW. Any combination of codes linked via the ASE interface however can be mixed. We also introduce a framework to easily add classical force fields calculators for ASE using LAMMPS, which also allows harnessing the full performance of classical-only molecular dynamics. Our work makes it possible to combine different simulation codes, quantum mechanical or classical, with great ease and minimal coding effort.

  18. A Comprehensive Validation Approach Using The RAVEN Code

    Energy Technology Data Exchange (ETDEWEB)

    Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua J; Rinaldi, Ivan; Giannetti, Fabio; Caruso, Gianfranco

    2015-06-01

    The RAVEN computer code , developed at the Idaho National Laboratory, is a generic software framework to perform parametric and probabilistic analysis based on the response of complex system codes. RAVEN is a multi-purpose probabilistic and uncertainty quantification platform, capable to communicate with any system code. A natural extension of the RAVEN capabilities is the imple- mentation of an integrated validation methodology, involving several different metrics, that represent an evolution of the methods currently used in the field. The state-of-art vali- dation approaches use neither exploration of the input space through sampling strategies, nor a comprehensive variety of metrics needed to interpret the code responses, with respect experimental data. The RAVEN code allows to address both these lacks. In the following sections, the employed methodology, and its application to the newer developed thermal-hydraulic code RELAP-7, is reported.The validation approach has been applied on an integral effect experiment, representing natu- ral circulation, based on the activities performed by EG&G Idaho. Four different experiment configurations have been considered and nodalized.

  19. FLASH: A finite element computer code for variably saturated flow

    Energy Technology Data Exchange (ETDEWEB)

    Baca, R.G.; Magnuson, S.O.

    1992-05-01

    A numerical model was developed for use in performance assessment studies at the INEL. The numerical model, referred to as the FLASH computer code, is designed to simulate two-dimensional fluid flow in fractured-porous media. The code is specifically designed to model variably saturated flow in an arid site vadose zone and saturated flow in an unconfined aquifer. In addition, the code also has the capability to simulate heat conduction in the vadose zone. This report presents the following: description of the conceptual frame-work and mathematical theory; derivations of the finite element techniques and algorithms; computational examples that illustrate the capability of the code; and input instructions for the general use of the code. The FLASH computer code is aimed at providing environmental scientists at the INEL with a predictive tool for the subsurface water pathway. This numerical model is expected to be widely used in performance assessments for: (1) the Remedial Investigation/Feasibility Study process and (2) compliance studies required by the US Department of Energy Order 5820.2A.

  20. HADES, A Code for Simulating a Variety of Radiographic Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide, M B; Henderson, G; von Wittenau, A; Slone, D M; Barty, A; Martz, Jr., H E

    2004-10-28

    It is often useful to simulate radiographic images in order to optimize imaging trade-offs and to test tomographic techniques. HADES is a code that simulates radiography using ray tracing techniques. Although originally developed to simulate X-Ray transmission radiography, HADES has grown to simulate neutron radiography over a wide range of energy, proton radiography in the 1 MeV to 100 GeV range, and recently phase contrast radiography using X-Rays in the keV energy range. HADES can simulate parallel-ray or cone-beam radiography through a variety of mesh types, as well as through collections of geometric objects. HADES was originally developed for nondestructive evaluation (NDE) applications, but could be a useful tool for simulation of portal imaging, proton therapy imaging, and synchrotron studies of tissue. In this paper we describe HADES' current capabilities and discuss plans for a major revision of the code.

  1. Programming a real code in a functional language (part 1)

    Energy Technology Data Exchange (ETDEWEB)

    Hendrickson, C.P.

    1991-09-10

    For some, functional languages hold the promise of allowing ease of programming massively parallel computers that imperative languages such as Fortran and C do not offer. At LLNL, we have initiated a project to write the physics of a major production code in Sisal, a functional language developed at LLNL in collaboration with researchers throughout the world. We are investigating the expressibility of Sisal, as well as its performance on a shared-memory multiprocessor, the Y-MP. An interesting aspect of the project is that Sisal modules can call Fortran modules, and are callable by them. This eliminates the rewriting of 80% of the production code that would not benefit from parallel execution. Preliminary results indicate that the restrictive nature of the language does not cause problems in expressing the algorithms we have chosen. Some interesting aspects of programming in a mixed functional-imperative environment have surfaced, but can be managed. 8 refs.

  2. ACFA - a versatile activation code for coolant and structural materials

    International Nuclear Information System (INIS)

    The ACFA code calculates the neutron-induced activation, afterheat, transmutation, gas production, biological hazard potential, and activation gamma ray spectra in the components of a nuclear system. The quantities of interest may be computed by spatial interval and zone or only by zone of the system considered. To calculate the transmutation coefficients for the neutron-induced reactions the code uses multigroup activation cross sections and space-dependent multigroup neutron fluxes in one- or two-dimensional geometry. The neutron reaction types incorporated in the code are: (n,n'), (n,2n), (n,γ), (n,p), (n,α), (n,n'p), (n,n'α)sub(,) (n,t), (n,3n), (n,He-3), (n,d), and (n,n'd) considering both reactions to the ground state and to isomeric states. The code uses a variable dimensioning technique to adapt the core data storage requirements to the particular problem considered and uses the FIDO input system to read the input data. The numerical methods for establishing and solving the decay chain equations are taken from the ORIGEN code. To test the ACFA code and the nuclear data libraries used, the activation, composition change, and gas production in the first wall of the UWMAK-I fusion reactor are calculated. The results of the activation calculation are compared with earlier results of the University of Wisconsin Fusion Study Group. (orig.)

  3. Threshold Based Iteration Stopping Criterion for Turbo Codes and for Scheme Combining a Turbo Code and a Golden Space-Time Block Code

    Directory of Open Access Journals (Sweden)

    SAVIN, A.

    2014-02-01

    Full Text Available This paper proposes an iteration stopping criterion for turbo decoding with Benedetto's decoding algorithm based on a posteriori probabilities. This stopping criterion is used in two schemes. Firstly, it is used in a classical turbo code scheme on additive white gaussian noise (AWGN channel. Secondly, it is used in a scheme combining a turbo code and a Golden space-time block code on fast Rayleigh fading multiple input multiple output (MIMO channel. Simulation results with different thresholds for the stopping criterion show that a threshold of 1.2 and 1.4 in the first and second scheme, respectively, are sufficient for obtaining the same bit error rate and frame error rate performance like in the case of using the ideal genie stopping criterion. The difference between the average number of iterations for these thresholds and for the genie stopping criterion is at most 1.5 and 1.25, respectively.

  4. PROSA-1: a probabilistic response-surface analysis code. [LMFBR

    Energy Technology Data Exchange (ETDEWEB)

    Vaurio, J. K.; Mueller, C.

    1978-06-01

    Techniques for probabilistic response-surface analysis have been developed to obtain the probability distributions of the consequences of postulated nuclear-reactor accidents. The uncertainties of the consequences are caused by the variability of the system and model input parameters used in the accident analysis. Probability distributions are assigned to the input parameters, and parameter values are systematically chosen from these distributions. These input parameters are then used in deterministic consequence analyses performed by mechanistic accident-analysis codes. The results of these deterministic consequence analyses are used to generate the coefficients for analytical functions that approximate the consequences in terms of the selected input parameters. These approximating functions are used to generate the probability distributions of the consequences with random sampling being used to obtain values for the accident parameters from their distributions. A computer code PROSA has been developed for implementing the probabilistic response-surface technique. Special features of the code generate or treat sensitivities, statistical moments of the input and output variables, regionwise response surfaces, correlated input parameters, and conditional distributions. The code can also be used for calculating important distributions of the input parameters. The use of the code is illustrated in conjunction with the fast-running accident-analysis code SACO to provide probability studies of LMFBR hypothetical core-disruptive accidents. However, the methods and the programming are general and not limited to such applications.

  5. A systems neurophysiology approach to voluntary event coding.

    Science.gov (United States)

    Petruo, Vanessa A; Stock, Ann-Kathrin; Münchau, Alexander; Beste, Christian

    2016-07-15

    Mechanisms responsible for the integration of perceptual events and appropriate actions (sensorimotor processes) have been subject to intense research. Different theoretical frameworks have been put forward with the "Theory of Event Coding (TEC)" being one of the most influential. In the current study, we focus on the concept of 'event files' within TEC and examine what sub-processes being dissociable by means of cognitive-neurophysiological methods are involved in voluntary event coding. This was combined with EEG source localization. We also introduce reward manipulations to delineate the neurophysiological sub-processes most relevant for performance variations during event coding. The results show that processes involved in voluntary event coding included predominantly stimulus categorization, feature unbinding and response selection, which were reflected by distinct neurophysiological processes (the P1, N2 and P3 ERPs). On a system's neurophysiological level, voluntary event-file coding is thus related to widely distributed parietal-medial frontal networks. Attentional selection processes (N1 ERP) turned out to be less important. Reward modulated stimulus categorization in parietal regions likely reflecting aspects of perceptual decision making but not in other processes. The perceptual categorization stage appears central for voluntary event-file coding. PMID:27153981

  6. A need for a code of ethics in science communication?

    Science.gov (United States)

    Benestad, R. E.

    2009-09-01

    The modern western civilization and high standard of living are to a large extent the 'fruits' of scientific endeavor over generations. Some examples include the longer life expectancy due to progress in medical sciences, and changes in infrastructure associated with the utilization of electromagnetism. Modern meteorology is not possible without the state-of-the-art digital computers, satellites, remote sensing, and communications. Science also is of relevance for policy making, e.g. the present hot topic of climate change. Climate scientists have recently become much exposed to media focus and mass communications, a task for which many are not trained. Furthermore, science, communication, and politics have different objectives, and do not necessarily mix. Scientists have an obligation to provide unbiased information, and a code of ethics is needed to give a guidance for acceptable and unacceptable conduct. Some examples of questionable conduct in Norway include using the title 'Ph.D' to imply scientific authority when the person never had obtained such an academic degree, or writing biased and one-sided articles in Norwegian encyclopedia that do not reflect the scientific consensus. It is proposed here that a set of guide lines (for the scientists and journalists) and a code of conduct could provide recommendation for regarding how to act in media - similar to a code of conduct with respect to carrying out research - to which everyone could agree, even when disagreeing on specific scientific questions.

  7. System-Level Genetic Codes Using a Transposable Element-Like Mechanism with Applications to Cancer

    OpenAIRE

    McGowan, John F.

    2000-01-01

    A system-level genetic code is a hypothetical genetic code that exclusively or preferentially codes systems of interacting coadapted parts. System-level genetic codes differ from part-level genetic codes in which each discrete part is coded independently. In general, a system-level genetic code requires coding discrete interacting parts such as organs or proteins in an interdependent way. Changing a single symbol or "gene" in a system-level genetic code affects two or more parts in a coordina...

  8. 25 CFR 18.111 - What will happen if a tribe repeals its probate code?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false What will happen if a tribe repeals its probate code? 18... CODES Approval of Tribal Probate Codes § 18.111 What will happen if a tribe repeals its probate code? If a tribe repeals its tribal probate code: (a) The repeal will not become effective sooner than...

  9. The FORTRAN NALAP code adapted to a microcomputer compiler

    Energy Technology Data Exchange (ETDEWEB)

    Lobo, Paulo David de Castro; Borges, Eduardo Madeira; Braz Filho, Francisco Antonio; Guimaraes, Lamartine Nogueira Frutuoso, E-mail: plobo.a@uol.com.b, E-mail: eduardo@ieav.cta.b, E-mail: fbraz@ieav.cta.b, E-mail: guimarae@ieav.cta.b [Instituto de Estudos Avancados (IEAv/CTA), Sao Jose dos Campos, SP (Brazil)

    2010-07-01

    The Nuclear Energy Division of the Institute for Advanced Studies (IEAv) is conducting the TERRA project (TEcnologia de Reatores Rapidos Avancados), Technology for Advanced Fast Reactors project, aimed at a space reactor application. In this work, to attend the TERRA project, the NALAP code adapted to a microcomputer compiler called Compaq Visual Fortran (Version 6.6) is presented. This code, adapted from the light water reactor transient code RELAP 3B, simulates thermal-hydraulic responses for sodium cooled fast reactors. The strategy to run the code in a PC was divided in some steps mainly to remove unnecessary routines, to eliminate old statements, to introduce new ones and also to include extension precision mode. The source program was able to solve three sample cases under conditions of protected transients suggested in literature: the normal reactor shutdown, with a delay of 200 ms to start the control rod movement and a delay of 500 ms to stop the pumps; reactor scram after transient of loss of flow; and transients protected from overpower. Comparisons were made with results from the time when the NALAP code was acquired by the IEAv, back in the 80's. All the responses for these three simulations reproduced the calculations performed with the CDC compiler in 1985. Further modifications will include the usage of gas as coolant for the nuclear reactor to allow a Closed Brayton Cycle Loop - CBCL - to be used as a heat/electric converter. (author)

  10. Experimental qualification of a code for optimizing gamma irradiation facilities

    Science.gov (United States)

    Mosse, D. C.; Leizier, J. J. M.; Keraron, Y.; Lallemant, T. F.; Perdriau, P. D. M.

    Dose computation codes are a prerequisite for the design of gamma irradiation facilities. Code quality is a basic factor in the achievement of sound economic and technical performance by the facility. This paper covers the validation of a code by reference dosimetry experiments. Developed by the "Société Générale pour les Techniques Nouvelles" (SGN), a supplier of irradiation facilities and member of the CEA Group, the code is currently used by that company. (ERHART, KERARON, 1986) Experimental data were obtained under conditions representative of those prevailing in the gamma irradiation of foodstuffs. Irradiation was performed in POSEIDON, a Cobalt 60 cell of ORIS-I. Several Cobalt 60 rods of known activity are arranged in a planar array typical of industrial irradiation facilities. Pallet density is uniform, ranging from 0 (air) to 0.6. Reference dosimetry measurements were performed by the "Laboratoire de Métrologie des Rayonnements Ionisants" (LMRI) of the "Bureau National de Métrologie" (BNM). The procedure is based on the positioning of more than 300 ESR/alanine dosemeters throughout the various target volumes used. The reference quantity was the absorbed dose in water. The code was validated by a comparison of experimental and computed data. It has proved to be an effective tool for the design of facilities meeting the specific requirements applicable to foodstuff irradiation, which are frequently found difficult to meet.

  11. A neutron spectrum unfolding code based on iterative procedures

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz R, J. M.; Vega C, H. R., E-mail: morvymm@yahoo.com.mx [Universidad Autonoma de Zacatecas, Unidad Academica de Ingenieria Electrica, Apdo. Postal 336, 98000 Zacatecas (Mexico)

    2012-10-15

    In this work, the version 3.0 of the neutron spectrum unfolding code called Neutron Spectrometry and Dosimetry from Universidad Autonoma de Zacatecas (NSDUAZ), is presented. This code was designed in a graphical interface under the LabVIEW programming environment and it is based on the iterative SPUNIT iterative algorithm, using as entrance data, only the rate counts obtained with 7 Bonner spheres based on a {sup 6}Lil(Eu) neutron detector. The main features of the code are: it is intuitive and friendly to the user; it has a programming routine which automatically selects the initial guess spectrum by using a set of neutron spectra compiled by the International Atomic Energy Agency. Besides the neutron spectrum, this code calculates the total flux, the mean energy, H(10), h(10), 15 dosimetric quantities for radiation protection porpoises and 7 survey meter responses, in four energy grids, based on the International Atomic Energy Agency compilation. This code generates a full report in html format with all relevant information. In this work, the neutron spectrum of a {sup 241}AmBe neutron source on air, located at 150 cm from detector, is unfolded. (Author)

  12. Organizing conceptual knowledge in humans with a gridlike code.

    Science.gov (United States)

    Constantinescu, Alexandra O; O'Reilly, Jill X; Behrens, Timothy E J

    2016-06-17

    It has been hypothesized that the brain organizes concepts into a mental map, allowing conceptual relationships to be navigated in a manner similar to that of space. Grid cells use a hexagonally symmetric code to organize spatial representations and are the likely source of a precise hexagonal symmetry in the functional magnetic resonance imaging signal. Humans navigating conceptual two-dimensional knowledge showed the same hexagonal signal in a set of brain regions markedly similar to those activated during spatial navigation. This gridlike signal is consistent across sessions acquired within an hour and more than a week apart. Our findings suggest that global relational codes may be used to organize nonspatial conceptual representations and that these codes may have a hexagonal gridlike pattern when conceptual knowledge is laid out in two continuous dimensions. PMID:27313047

  13. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  14. IRIS: A Generic Three-Dimensional Radiative Transfer Code

    CERN Document Server

    Ibgui, L; Lanz, T; Stehlé, C

    2012-01-01

    We present IRIS, a new generic three-dimensional (3D) spectral radiative transfer code that generates synthetic spectra, or images. It can be used as a diagnostic tool for comparison with astrophysical observations or laboratory astrophysics experiments. We have developed a 3D short-characteristic solver that works with a 3D nonuniform Cartesian grid. We have implemented a piecewise cubic, locally monotonic, interpolation technique that dramatically reduces the numerical diffusion effect. The code takes into account the velocity gradient effect resulting in gradual Doppler shifts of photon frequencies and subsequent alterations of spectral line profiles. It can also handle periodic boundary conditions. This first version of the code assumes Local Thermodynamic Equilibrium (LTE) and no scattering. The opacities and source functions are specified by the user. In the near future, the capabilities of IRIS will be extended to allow for non-LTE and scattering modeling. IRIS has been validated through a number of te...

  15. A particle-based hybrid code for planet formation

    CERN Document Server

    Morishima, Ryuji

    2015-01-01

    We introduce a new particle-based hybrid code for planetary accretion. The code uses an $N$-body routine for interactions with planetary embryos while it can handle a large number of planetesimals using a super-particle approximation, in which a large number of small planetesimals are represented by a small number of tracers. Tracer-tracer interactions are handled by a statistical routine which uses the phase-averaged stirring and collision rates. We compare hybrid simulations with analytic predictions and pure $N$-body simulations for various problems in detail and find good agreements for all cases. The computational load on the portion of the statistical routine is comparable to or less than that for the $N$-body routine. The present code includes an option of hit-and-run bouncing but not fragmentation, which remains for future work.

  16. TRO-2D - A code for rational transonic aerodynamic optimization

    Science.gov (United States)

    Davis, W. H., Jr.

    1985-01-01

    Features and sample applications of the transonic rational optimization (TRO-2D) code are outlined. TRO-2D includes the airfoil analysis code FLO-36, the CONMIN optimization code and a rational approach to defining aero-function shapes for geometry modification. The program is part of an effort to develop an aerodynamically smart optimizer that will simplify and shorten the design process. The user has a selection of drag minimization and associated minimum lift, moment, and the pressure distribution, a choice among 14 resident aero-function shapes, and options on aerodynamic and geometric constraints. Design variables such as the angle of attack, leading edge radius and camber, shock strength and movement, supersonic pressure plateau control, etc., are discussed. The results of calculations of a reduced leading edge camber transonic airfoil and an airfoil with a natural laminar flow are provided, showing that only four design variables need be specified to obtain satisfactory results.

  17. Construction and decoding of a class of algebraic geometry codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Jensen, Helge Elbrønd;

    1989-01-01

    A class of codes derived from algebraic plane curves is constructed. The concepts and results from algebraic geometry that were used are explained in detail; no further knowledge of algebraic geometry is needed. Parameters, generator and parity-check matrices are given. The main result is a decod...... is a decoding algorithm which turns out to be a generalization of the Peterson algorithm for decoding BCH decoder codes......A class of codes derived from algebraic plane curves is constructed. The concepts and results from algebraic geometry that were used are explained in detail; no further knowledge of algebraic geometry is needed. Parameters, generator and parity-check matrices are given. The main result...

  18. Quibbs, a Code Generator for Quantum Gibbs Sampling

    CERN Document Server

    Tucci, Robert R

    2010-01-01

    This paper introduces Quibbs v1.3, a Java application available for free. (Source code included in the distribution.) Quibbs is a "code generator" for quantum Gibbs sampling: after the user inputs some files that specify a classical Bayesian network, Quibbs outputs a quantum circuit for performing Gibbs sampling of that Bayesian network on a quantum computer. Quibbs implements an algorithm described in earlier papers, that combines various apple pie techniques such as: an adaptive fixed-point version of Grover's algorithm, Szegedy operators, quantum phase estimation and quantum multiplexors.

  19. A Coach's Code of Conduct. Position Statement

    Science.gov (United States)

    Lyman, Linda; Ewing, Marty; Martino, Nan

    2009-01-01

    Coaches exert a profound impact on our youths; therefore, society sets high expectations for them. As such, whether coaches are compensated or work solely as volunteers, they are responsible for executing coaching as a professional. If we are to continue to enhance the cultural perceptions of coaching, we must strive to develop and master the…

  20. A neural coding scheme reproducing foraging trajectories

    Science.gov (United States)

    Gutiérrez, Esther D.; Cabrera, Juan Luis

    2015-12-01

    The movement of many animals may follow Lévy patterns. The underlying generating neuronal dynamics of such a behavior is unknown. In this paper we show that a novel discovery of multifractality in winnerless competition (WLC) systems reveals a potential encoding mechanism that is translatable into two dimensional superdiffusive Lévy movements. The validity of our approach is tested on a conductance based neuronal model showing WLC and through the extraction of Lévy flights inducing fractals from recordings of rat hippocampus during open field foraging. Further insights are gained analyzing mice motor cortex neurons and non motor cell signals. The proposed mechanism provides a plausible explanation for the neuro-dynamical fundamentals of spatial searching patterns observed in animals (including humans) and illustrates an until now unknown way to encode information in neuronal temporal series.

  1. Colour coding scrubs as a means of improving perioperative communication.

    Science.gov (United States)

    Litak, Dominika

    2011-05-01

    Effective communication within the operating department is essential for achieving patient safety. A large part of the perioperative communication is non-verbal. One type of non-verbal communication is 'object communication', the most common form of which is clothing. The colour coding of clothing such as scrubs has the potential to optimise perioperative communication with the patients and between the staff. A colour contains a coded message, and is a visual cue for an immediate identification of personnel. This is of key importance in the perioperative environment. The idea of colour coded scrubs in the perioperative setting has not been much explored to date and, given the potential contributiontowards improvement of patient outcomes, deserves consideration. PMID:21834289

  2. A New Shape-Coding Algorithm by Using Wavelet Transform

    Institute of Scientific and Technical Information of China (English)

    石旭利; 张兆杨

    2003-01-01

    In this paper, we propose a new shape-coding algorithm called wavelet-based shape coding (WBSC). Performing wavelet transform on the orientation of original planar curve gives the corners called corner-1 points and end of arcs that belong to the original curve. Each arc is represented by a broken line and the corners called corner-2 points of the broken line are extracted. A polygonal approximation of a contour is an ordered list of corner-1 points, ends of arcs and corner-2 points which are extracted by using the above algorithm. All of the points are called polygonal vertices which will be compressed by our adaptive arithmetic encoding. Experimental results show that our method reduces code bits by about 26% compared with the context-based arithmetic encoding (CAE) of MPEG-4, and the subjective quality of the reconstructed shape is better than that of CAE at the same Dn.

  3. Combined Viterbi Detector for a Balanced Code in Page Memories

    Institute of Scientific and Technical Information of China (English)

    Chen Duan-rong; Xie Chang-sheng; Pei Xian-deng

    2004-01-01

    Based on the two path metrics being equal at a merged node in the trellis employed to describe a Viterbi detector for the detection of data encoded with a rate 6∶8 balanced binary code in page-oriented optical memories, the combined Viterbi detector scheme is proposed to improve raw bit-error rate performance by mitigating the occurrence of a two-bit reversing error event in an estimated codeword for the balanced code. The effectiveness of the detection scheme is verified for different data quantizations using Monte Carlo simulations.

  4. SCAMPI: A code package for cross-section processing

    Energy Technology Data Exchange (ETDEWEB)

    Parks, C.V.; Petrie, L.M.; Bowman, S.M.; Broadhead, B.L.; Greene, N.M.; White, J.E.

    1996-04-01

    The SCAMPI code package consists of a set of SCALE and AMPX modules that have been assembled to facilitate user needs for preparation of problem-specific, multigroup cross-section libraries. The function of each module contained in the SCANTI code package is discussed, along with illustrations of their use in practical analyses. Ideas are presented for future work that can enable one-step processing from a fine-group, problem-independent library to a broad-group, problem-specific library ready for a shielding analysis.

  5. EVAPRED - A CODE FOR FATIGUE ANALYSIS OPTIMIZATION

    Directory of Open Access Journals (Sweden)

    Dorin LOZICI-BRÎNZEI

    2010-03-01

    Full Text Available The fatigue can be, in fact, defined as: “failure under a repeated or otherwise varying load, which never reaches a level sufficient to cause failure in a single application”.Physical testing is clearly unrealistic for every design component. In most applications, fatigue-safe life design requires the prediction of the component fatigue life that accounts for predicted service loads and materials. The primary tool for both understanding and being able to predict and avoid fatigue has proven to be the finite element analysis (FEA. Computer-aided engineering (CAE programs use three major methods to determine the total fatigue life: Stress life (SN, Strain life (EN and Fracture Mechanics (FM. FEA can predict stress concentration areas and can help design engineers to predict how long their designs are likely to last before experiencing the onset of fatigue.

  6. Requirements for a multifunctional code architecture

    Energy Technology Data Exchange (ETDEWEB)

    Tiihonen, O. [VTT Energy (Finland); Juslin, K. [VTT Automation (Finland)

    1997-07-01

    The present paper studies a set of requirements for a multifunctional simulation software architecture in the light of experiences gained in developing and using the APROS simulation environment. The huge steps taken in the development of computer hardware and software during the last ten years are changing the status of the traditional nuclear safety analysis software. The affordable computing power on the safety analysts table by far exceeds the possibilities offered to him/her ten years ago. At the same time the features of everyday office software tend to set standards to the way the input data and calculational results are managed.

  7. Software Code Maintainability : A Literature Review

    Directory of Open Access Journals (Sweden)

    Berna Seref

    2016-05-01

    Full Text Available Software Maintainability is one of the most important quality attributes. To increase quality of a software, to manage software more efficient and to decrease cost of the software, maintainability, maintainability estimation and maintainability evaluation models have been proposed. However, the practical use of these models in software engineering tools and practice remained little due to their limitations or threats to validity. In this paper, results of our Literature Review about maintainability models, maintainability metrics and maintainability estimation are presented. Aim of this paper is providing a baseline for further searches and serving the needs of developers and customers.

  8. Requirements for a multifunctional code architecture

    International Nuclear Information System (INIS)

    The present paper studies a set of requirements for a multifunctional simulation software architecture in the light of experiences gained in developing and using the APROS simulation environment. The huge steps taken in the development of computer hardware and software during the last ten years are changing the status of the traditional nuclear safety analysis software. The affordable computing power on the safety analysts table by far exceeds the possibilities offered to him/her ten years ago. At the same time the features of everyday office software tend to set standards to the way the input data and calculational results are managed

  9. FINELM: a multigroup finite element diffusion code

    International Nuclear Information System (INIS)

    FINELM is a FORTRAN IV program to solve the Neutron Diffusion Equation in X-Y, R-Z, R-theta, X-Y-Z and R-theta-Z geometries using the method of Finite Elements. Lagrangian elements of linear or higher degree to approximate the spacial flux distribution have been provided. The method of dissections, coarse mesh rebalancing and Chebyshev acceleration techniques are available. Simple user defined input is achieved through extensive input subroutines. The input preparation is described followed by a program structure description. Sample test cases are provided. (Auth.)

  10. Unidirectional Error Correcting Codes for Memory Systems: A Comparative Study

    CERN Document Server

    Al-Ani, Muzhir

    2010-01-01

    In order to achieve fault tolerance, highly reliable system often require the ability to detect errors as soon as they occur and prevent the speared of erroneous information throughout the system. Thus, the need for codes capable of detecting and correcting byte errors are extremely important since many memory systems use b-bit-per-chip organization. Redundancy on the chip must be put to make fault-tolerant design available. This paper examined several methods of computer memory systems, and then a proposed technique is designed to choose a suitable method depending on the organization of memory systems. The constructed codes require a minimum number of check bits with respect to codes used previously, then it is optimized to fit the organization of memory systems according to the requirements for data and byte lengths.

  11. Effects of bar coding on a pharmacy stock replenishment system.

    Science.gov (United States)

    Chester, M I; Zilz, D A

    1989-07-01

    A bar-code stock ordering system installed in the ambulatory-care pharmacy and sterile products area of a hospital pharmacy was compared with a manual paper system to quantify overall time demands and determine the error rate associated with each system. The bar-code system was implemented in the ambulatory-care pharmacy in November 1987 and in the sterile products area in January 1988. It consists of a Trakker 9440 transaction manager with a digital scanner; labels are printed with a dot matrix printer. Electronic scanning of bar-code labels and entry of the amount required using the key-pad on the transaction manager replaced use of a preprinted form for ordering items. With the bar-code system, ordering information is transferred electronically via cable to the pharmacy inventory computer; with the manual system, this information was input by a stockroom technician. To compare the systems, the work of technicians in the ambulatory-care pharmacy and sterile products area was evaluated before and after implementation of the bar-code system. The time requirements for information gathering and data transfer were recorded by direct observation; the prevalence of errors under each system was determined by comparing unprocessed ordering information with the corresponding computer-generated "pick lists" (itemized lists including the amount of each product ordered). Time consumed in extra trips to the stockroom to replace out-of-stock items was self-reported. Significantly less time was required to order stock and transfer data to the pharmacy inventory computer with the bar-code system than with the manual system.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:2757044

  12. A Method for Automated Program Code Testing

    Science.gov (United States)

    Drasutis, Sigitas; Motekaityte, Vida; Noreika, Algirdas

    2010-01-01

    The Internet has recently encouraged the society to convert almost all its needs to electronic resources such as e-libraries, e-cultures, e-entertainment as well as e-learning, which has become a radical idea to increase the effectiveness of learning services in most schools, colleges and universities. E-learning can not be completely featured and…

  13. Capacity of Random Network Coding under a Probabilistic Error Model

    CERN Document Server

    Silva, Danilo; Kötter, Ralf

    2008-01-01

    A probabilistic error model for random network coding is considered. The model assumes that n packets of length m are transmitted over the network, and up to t erroneous packets are randomly chosen and injected into the network. Upper and lower bounds on capacity are obtained for any channel parameters, and asymptotic expressions are provided in the limit of long packet length and/or large field size. A simple coding scheme is presented that achieves capacity in both limiting cases. The scheme has decoding complexity O(n^2 m) and a probability of failure that decreases exponentially both in the packet length and in the field size in bits.

  14. A nonlocal electron conduction model for multidimensional radiation hydrodynamics codes

    Science.gov (United States)

    Schurtz, G. P.; Nicolaï, Ph. D.; Busquet, M.

    2000-10-01

    Numerical simulation of laser driven Inertial Confinement Fusion (ICF) related experiments require the use of large multidimensional hydro codes. Though these codes include detailed physics for numerous phenomena, they deal poorly with electron conduction, which is the leading energy transport mechanism of these systems. Electron heat flow is known, since the work of Luciani, Mora, and Virmont (LMV) [Phys. Rev. Lett. 51, 1664 (1983)], to be a nonlocal process, which the local Spitzer-Harm theory, even flux limited, is unable to account for. The present work aims at extending the original formula of LMV to two or three dimensions of space. This multidimensional extension leads to an equivalent transport equation suitable for easy implementation in a two-dimensional radiation-hydrodynamic code. Simulations are presented and compared to Fokker-Planck simulations in one and two dimensions of space.

  15. A robust fusion method for multiview distributed video coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Ascenso, Joao; Brites, Catarina;

    2014-01-01

    to have the various views available simultaneously. However, in multiview DVC (M-DVC), the decoder can still exploit the redundancy between views, avoiding the need for inter-camera communication. The key element of every DVC decoder is the side information (SI), which can be generated by leveraging intra......-view or inter-view redundancy for multiview video data. In this paper, a novel learning-based fusion technique is proposed, which is able to robustly fuse an inter-view SI and an intra-view (temporal) SI. An inter-view SI generation method capable of identifying occluded areas is proposed and is coupled......Distributed video coding (DVC) is a coding paradigm which exploits the redundancy of the source (video) at the decoder side, as opposed to predictive coding, where the encoder leverages the redundancy. To exploit the correlation between views, multiview predictive video codecs require the encoder...

  16. A Unique Perspective on Data Coding and Decoding

    Directory of Open Access Journals (Sweden)

    Wen-Yan Wang

    2010-12-01

    Full Text Available The concept of a loss-less data compression coding method is proposed, and a detailed description of each of its steps follows. Using the Calgary Corpus and Wikipedia data as the experimental samples and compared with existing algorithms, like PAQ or PPMstr, the new coding method could not only compress the source data, but also further re-compress the data produced by the other compression algorithms. The final files are smaller, and by comparison with the original compression ratio, at least 1% redundancy could be eliminated. The new method is simple and easy to realize. Its theoretical foundation is currently under study. The corresponding Matlab source code is provided in  the Appendix.

  17. A Practical View on Tunable Sparse Network Coding

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Shahbaz Badr, Arash; Guerrero, Juan;

    2015-01-01

    Tunable sparse network coding (TSNC) constitutes a promising concept for trading off computational complexity and delay performance. This paper advocates for the use of judicious feedback as a key not only to make TSNC practical, but also to deliver a highly consistent and controlled delay......) can result in a radical improvement of the complexity-delay trade-off....

  18. BUTRAN: a multirod code for studying core uncovery transients

    International Nuclear Information System (INIS)

    The computer code BUTRAN is described. This is a fast running computer code designed to study boildown transients in bundles of fuel pins under accident conditions. The effects of rod to rod and rod to vapour thermal radiation are considered. During the heat up phase of the accident the zircaloy cladding reacts chemically with the steam coolant. The heat and the hydrogen produced by this reaction are calculated and the effect of the hydrogen concentration considered. Input instrumentations for BUTRAN are given together with two sample test cases to enable a user to set up an input deck

  19. ALOHA Random Access that Operates as a Rateless Code

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices. Slotted ALOHA and its derivatives represent a simple solution for distributed random access in wireless...... approach for distributed random access in the slotted ALOHA framework is described in this paper. The proposed approach shares an operational analogy with rateless coding, expressed both through the user access strategy and the adaptive length of the contention period, with the objective to end...... more direct practical implications compared to the approaches for coded random access that lead to high throughputs only asymptotically....

  20. GRADSPMHD: A parallel MHD code based on the SPH formalism

    Science.gov (United States)

    Vanaverbeke, S.; Keppens, R.; Poedts, S.

    2014-03-01

    We present GRADSPMHD, a completely Lagrangian parallel magnetohydrodynamics code based on the SPH formalism. The implementation of the equations of SPMHD in the “GRAD-h” formalism assembles known results, including the derivation of the discretized MHD equations from a variational principle, the inclusion of time-dependent artificial viscosity, resistivity and conductivity terms, as well as the inclusion of a mixed hyperbolic/parabolic correction scheme for satisfying the ∇ṡB→ constraint on the magnetic field. The code uses a tree-based formalism for neighbor finding and can optionally use the tree code for computing the self-gravity of the plasma. The structure of the code closely follows the framework of our parallel GRADSPH FORTRAN 90 code which we added previously to the CPC program library. We demonstrate the capabilities of GRADSPMHD by running 1, 2, and 3 dimensional standard benchmark tests and we find good agreement with previous work done by other researchers. The code is also applied to the problem of simulating the magnetorotational instability in 2.5D shearing box tests as well as in global simulations of magnetized accretion disks. We find good agreement with available results on this subject in the literature. Finally, we discuss the performance of the code on a parallel supercomputer with distributed memory architecture. Catalogue identifier: AERP_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AERP_v1_0.html Program obtainable from: CPC Program Library, Queen’s University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 620503 No. of bytes in distributed program, including test data, etc.: 19837671 Distribution format: tar.gz Programming language: FORTRAN 90/MPI. Computer: HPC cluster. Operating system: Unix. Has the code been vectorized or parallelized?: Yes, parallelized using MPI. RAM: ˜30 MB for a

  1. APC: A New Code for Atmospheric Polarization Computations

    Science.gov (United States)

    Korkin, Sergey V.; Lyapustin, Alexei I.; Rozanov, Vladimir V.

    2014-01-01

    A new polarized radiative transfer code Atmospheric Polarization Computations (APC) is described. The code is based on separation of the diffuse light field into anisotropic and smooth (regular) parts. The anisotropic part is computed analytically. The smooth regular part is computed numerically using the discrete ordinates method. Vertical stratification of the atmosphere, common types of bidirectional surface reflection and scattering by spherical particles or spheroids are included. A particular consideration is given to computation of the bidirectional polarization distribution function (BPDF) of the waved ocean surface.

  2. A labVIEW Code for PolSK encoding

    CERN Document Server

    Soorat, Ram; Vudayagiri, Ashok

    2015-01-01

    We have developed an integrated software module for use in free space Optical communication using Polarization Shift Keying. The module provides options to read the data to be transmitted from a file, convert this data to on/off code for laser diodes as well as measure the state of polarization of the received optical pulses. The Software bundle consists of separate transmitter and receiver components. The entire protocol involves handshaking commands, data transmission as well as an error correction based on post-processing Hamming 7,4 code. The module is developed using \\lv, a proprietary software development IDE from National Instruments Inc. USA

  3. ELEFANT: a user-friendly multipurpose geodynamics code

    Directory of Open Access Journals (Sweden)

    C. Thieulot

    2014-07-01

    Full Text Available A new finite element code for the solution of the Stokes and heat transport equations is presented. It has purposely been designed to address geological flow problems in two and three dimensions at crustal and lithospheric scales. The code relies on the Marker-in-Cell technique and Lagrangian markers are used to track materials in the simulation domain which allows recording of the integrated history of deformation; their (number density is variable and dynamically adapted. A variety of rheologies has been implemented including nonlinear thermally activated dislocation and diffusion creep and brittle (or plastic frictional models. The code is built on the Arbitrary Lagrangian Eulerian kinematic description: the computational grid deforms vertically and allows for a true free surface while the computational domain remains of constant width in the horizontal direction. The solution to the large system of algebraic equations resulting from the finite element discretisation and linearisation of the set of coupled partial differential equations to be solved is obtained by means of the efficient parallel direct solver MUMPS whose performance is thoroughly tested, or by means of the WISMP and AGMG iterative solvers. The code accuracy is assessed by means of many geodynamically relevant benchmark experiments which highlight specific features or algorithms, e.g., the implementation of the free surface stabilisation algorithm, the (visco-plastic rheology implementation, the temperature advection, the capacity of the code to handle large viscosity contrasts. A two-dimensional application to salt tectonics presented as case study illustrates the potential of the code to model large scale high resolution thermo-mechanically coupled free surface flows.

  4. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  5. A Self-Terminated Interleaver Design for Turbo Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Turbo codes can achieve excellent performance at low signal-to-noise ratio (SNR), but the performance can be severely degraded if no trellis termination is employed. This paper proved that if trellis termination bits were appended to RSC1, trellis of RSC2 could be terminated by designing the interleaver properly, consequently, derived the designing condition of such self-terminated interleaver (STI). Then we presented an algorithm of implementing a kind of STI, which could terminate RSC2 as well on condition that the RSC1 was terminated. We verified the performance of STI for turbo codes by simulation, and the simulation results showed that turbo codes with STI outperformed interleavers that could not terminate RSC2 as well.

  6. A Learning Environment for English Vocabulary Using Quick Response Codes

    Science.gov (United States)

    Arikan, Yuksel Deniz; Ozen, Sevil Orhan

    2015-01-01

    This study focuses on the process of developing a learning environment that uses tablets and Quick Response (QR) codes to enhance participants' English language vocabulary knowledge. The author employed the concurrent triangulation strategy, a mixed research design. The study was conducted at a private school in Izmir, Turkey during the 2012-2013…

  7. Preliminary Results from Code FBI on HL-2A Tokamak

    Institute of Scientific and Technical Information of China (English)

    LIQiang; SONGXianming; ZHANGJinhua; YANGQingwei; LIFangzhu; LUOCuiwen; MAOSuying; PANLi; LIULi; YUANBaoshan

    2003-01-01

    FBI is a code originally developed on JT-60U to quickly calculate comprehensive plasma parameters for a discharge under Unix OS. It has been transferred to HL-2A at the beginning of 2003. Its main function is to identify plasma boundary by filament current method with signals from the electromagnetic measurement. The fundamental differences of machine scale and structure,

  8. A New Simple Ultrahigh Speed Decoding Algorithm for BCH Code

    Institute of Scientific and Technical Information of China (English)

    唐建军; 纪越峰

    2002-01-01

    In order to content with forward error correction (FEC) technology of the high-speed optical communication system, a new simple decoding algorithm for triple-error correcting Bose, Chaudhuri, and Hocquenghem (BCH) code is proposed. Without complicated matrix-operation or division-operation or intricate iterative algorithm, the algorithm is high efficient and high-speed because of its simplicity in structure. The result of hardware emulation confirms that the algorithm is feasible completely. Introduction of the parallel structure increases the speed of coding greatly. The algorithm can be used in the high-speed optical communication system and other fields.

  9. GAIA: A 2-D Curvilinear moving grid hydrodynamic code

    International Nuclear Information System (INIS)

    The GAIA computer code is developed for time dependent, compressible, multimaterial fluid flow problems, to overcome some drawbacks of traditional 2-D Lagrangian codes. The initial goals of robustness, entropy accuracies, efficiency in presence of large interfacial slip, have already been achieved. The general GODUNOV approach is applied to an arbitrary time varying control-volume formulation. We review in this paper the Riemann solver, the GODUNOV cartesian and curvilinear moving grid schemes and an efficient grid generation algorithm. We finally outline a possible second order accuracy extension

  10. A Study of Code-switching in the College English Classroom

    Institute of Scientific and Technical Information of China (English)

    LEI Chun-xiao

    2015-01-01

    Code-switching is an important domain in the sociolingusitics. Since the 1970s, lots of linguists and experts has at⁃tached great importance to it. This paper is a tentative study of code-switching in the teaching English as a second language (TESL) from such aspects: the review of code-switching, principles adhered to the code-switching, factors which leads to the code-switching, and attitudes and functions of code-switching in the TESL.

  11. A Note on m-Weights of Linear Codes

    Institute of Scientific and Technical Information of China (English)

    YUAN Yuan; FAN Yun

    2005-01-01

    m-weight, as a new generalization of classical Hamming weight, was discussed in this paper. A condition for the existence of linear codes of certain m-weights was given; the Singleton bound, Plotkin bound and Sphere Parking bound of Hamming weight were correspondingly generalized to the m-weight.

  12. On Predictive Coding for Erasure Channels Using a Kalman Framework

    DEFF Research Database (Denmark)

    Arildsen, Thomas; Murthi, Manohar; Andersen, Søren Vang;

    2009-01-01

    signal. The method is based on linear predictive coding and Kalman estimation at the decoder. We employ a novel encoder state-space representation with a linear quantization noise model. The encoder is represented by the Kalman measurement at the decoder. The presented method designs the encoder...

  13. Evaluating QR Code Case Studies Using a Mobile Learning Framework

    Science.gov (United States)

    Rikala, Jenni

    2014-01-01

    The aim of this study was to evaluate the feasibility of Quick Response (QR) codes and mobile devices in the context of Finnish basic education. The feasibility was analyzed through a mobile learning framework, which includes the core characteristics of mobile learning. The study is part of a larger research where the aim is to develop a…

  14. Development of BERMUDA: a radiation transport code system, 1

    International Nuclear Information System (INIS)

    A radiation transport code system BERMUDA has been developed for one-, two- and three-dimensional geometries. The time-independent transport equation is numerically solved using a direct integration method in a multigroup model, to obtain spatial, angular and energy distributions of neutron, gamma rays or adjoint neutron flux. As to group constants, a library with an any structure of energy groups is capable to be produced from a data base JSSTDL, or by a processing code PROF-GROUCH-G/B, selecting objective nuclear data through a retrieval system EDFSRS. Validity of the present code system has been tested by analyzing the shielding benchmark experiments. The test has shown that accurate results are obtainable with this system especially in deep penetration calculation. Described are the devised calculation method and the results of validity tests. Input data specification, job control languages and output data are also described as a user's manual for the following four neutron transport codes: BERMUDA-1DN : sphere, slab(S20), BERMUDA-2DN : cylinder (S8), BERMUDA-2DN-S16 : cylinder (S16), and BERMUDA-3DN : rectangular parallelpiped (S8). (J.P.N.)

  15. A Hydrochemical Hybrid Code for Astrophysical Problems. I. Code Verification and Benchmarks for Photon-Dominated Region (PDR)

    OpenAIRE

    Motoyama, Kazutaka; Morata, Oscar; Shang, Hsien; Krasnopolsky, Ruben; Hasegawa, Tatsuhiko

    2015-01-01

    A two dimensional hydrochemical hybrid code, KM2, is constructed to deal with astrophysical problems that would require coupled hydrodynamical and chemical evolution. The code assumes axisymmetry in cylindrical coordinate system, and consists of two modules: a hydrodynamics module and a chemistry module. The hydrodynamics module solves hydrodynamics using a Godunov-type finite volume scheme and treats included chemical species as passively advected scalars. The chemistry module implicitly sol...

  16. Parallelization of a Monte Carlo particle transport simulation code

    Science.gov (United States)

    Hadjidoukas, P.; Bousis, C.; Emfietzoglou, D.

    2010-05-01

    We have developed a high performance version of the Monte Carlo particle transport simulation code MC4. The original application code, developed in Visual Basic for Applications (VBA) for Microsoft Excel, was first rewritten in the C programming language for improving code portability. Several pseudo-random number generators have been also integrated and studied. The new MC4 version was then parallelized for shared and distributed-memory multiprocessor systems using the Message Passing Interface. Two parallel pseudo-random number generator libraries (SPRNG and DCMT) have been seamlessly integrated. The performance speedup of parallel MC4 has been studied on a variety of parallel computing architectures including an Intel Xeon server with 4 dual-core processors, a Sun cluster consisting of 16 nodes of 2 dual-core AMD Opteron processors and a 200 dual-processor HP cluster. For large problem size, which is limited only by the physical memory of the multiprocessor server, the speedup results are almost linear on all systems. We have validated the parallel implementation against the serial VBA and C implementations using the same random number generator. Our experimental results on the transport and energy loss of electrons in a water medium show that the serial and parallel codes are equivalent in accuracy. The present improvements allow for studying of higher particle energies with the use of more accurate physical models, and improve statistics as more particles tracks can be simulated in low response time.

  17. Bio—Cryptography: A Possible Coding Role for RNA Redundancy

    Science.gov (United States)

    Regoli, M.

    2009-03-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions," are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behavior in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  18. FILM-30: A Heat Transfer Properties Code for Water Coolant

    Energy Technology Data Exchange (ETDEWEB)

    MARSHALL, THERON D.

    2001-02-01

    A FORTRAN computer code has been written to calculate the heat transfer properties at the wetted perimeter of a coolant channel when provided the bulk water conditions. This computer code is titled FILM-30 and the code calculates its heat transfer properties by using the following correlations: (1) Sieder-Tate: forced convection, (2) Bergles-Rohsenow: onset to nucleate boiling, (3) Bergles-Rohsenow: partially developed nucleate boiling, (4) Araki: fully developed nucleate boiling, (5) Tong-75: critical heat flux (CHF), and (6) Marshall-98: transition boiling. FILM-30 produces output files that provide the heat flux and heat transfer coefficient at the wetted perimeter as a function of temperature. To validate FILM-30, the calculated heat transfer properties were used in finite element analyses to predict internal temperatures for a water-cooled copper mockup under one-sided heating from a rastered electron beam. These predicted temperatures were compared with the measured temperatures from the author's 1994 and 1998 heat transfer experiments. There was excellent agreement between the predicted and experimentally measured temperatures, which confirmed the accuracy of FILM-30 within the experimental range of the tests. FILM-30 can accurately predict the CHF and transition boiling regimes, which is an important advantage over current heat transfer codes. Consequently, FILM-30 is ideal for predicting heat transfer properties for applications that feature high heat fluxes produced by one-sided heating.

  19. Codes of Ethics in Australian Education: Towards a National Perspective

    Science.gov (United States)

    Forster, Daniella J.

    2012-01-01

    Teachers have a dual moral responsibility as both values educators and moral agents representing the integrity of the profession. Codes of ethics and conduct in teaching articulate shared professional values and aim to provide some guidance for action around recognised issues special to the profession but are also instruments of regulation which…

  20. Anthropomorphic Coding of Speech and Audio: A Model Inversion Approach

    Directory of Open Access Journals (Sweden)

    W. Bastiaan Kleijn

    2005-06-01

    Full Text Available Auditory modeling is a well-established methodology that provides insight into human perception and that facilitates the extraction of signal features that are most relevant to the listener. The aim of this paper is to provide a tutorial on perceptual speech and audio coding using an invertible auditory model. In this approach, the audio signal is converted into an auditory representation using an invertible auditory model. The auditory representation is quantized and coded. Upon decoding, it is then transformed back into the acoustic domain. This transformation converts a complex distortion criterion into a simple one, thus facilitating quantization with low complexity. We briefly review past work on auditory models and describe in more detail the components of our invertible model and its inversion procedure, that is, the method to reconstruct the signal from the output of the auditory model. We summarize attempts to use the auditory representation for low-bit-rate coding. Our approach also allows the exploitation of the inherent redundancy of the human auditory system for the purpose of multiple description (joint source-channel coding.

  1. Anthropomorphic Coding of Speech and Audio: A Model Inversion Approach

    Science.gov (United States)

    Feldbauer, Christian; Kubin, Gernot; Kleijn, W. Bastiaan

    2005-12-01

    Auditory modeling is a well-established methodology that provides insight into human perception and that facilitates the extraction of signal features that are most relevant to the listener. The aim of this paper is to provide a tutorial on perceptual speech and audio coding using an invertible auditory model. In this approach, the audio signal is converted into an auditory representation using an invertible auditory model. The auditory representation is quantized and coded. Upon decoding, it is then transformed back into the acoustic domain. This transformation converts a complex distortion criterion into a simple one, thus facilitating quantization with low complexity. We briefly review past work on auditory models and describe in more detail the components of our invertible model and its inversion procedure, that is, the method to reconstruct the signal from the output of the auditory model. We summarize attempts to use the auditory representation for low-bit-rate coding. Our approach also allows the exploitation of the inherent redundancy of the human auditory system for the purpose of multiple description (joint source-channel) coding.

  2. Code-Switching in a College Mathematics Classroom

    Science.gov (United States)

    Chitera, Nancy

    2009-01-01

    This paper presents the findings that explored from the discourse practices of the mathematics teacher educators in initial teacher training colleges in Malawi. It examines how mathematics teacher educators construct a multilingual classroom and how they view code-switching. The discussion is based on pre-observation interviews with four…

  3. Overview of WARP, a particle code for heavy ion fusion

    International Nuclear Information System (INIS)

    The beams in a Heavy Ion beam driven inertial Fusion (HIF) accelerator must be focused onto small spots at the fusion target, and so preservation of beam quality is crucial. The nonlinear self-fields of these space-charge-dominated beams can lead to emittance growth; thus a self-consistent field description is necessary. We have developed a multi-dimensional discrete-particle simulation code, WARP, and are using it to study the behavior of HIF beams. The code's 3d package combines features of an accelerator code and a particle-in-cell plasma simulation, and can efficiently track beams through many lattice elements and around bends. We have used the code to understand the physics of aggressive drift-compression in the MBE-4 experiment at Lawrence Berkeley Laboratory (LBL). We have applied it to LBL's planned ILSE experiments, to various ''recirculator'' configurations, and to the study of equilibria and equilibration processes. Applications of the 3d package to ESQ injectors, and of the r, z package to longitudinal stability in driver beams, are discussed in related papers

  4. Connecting Neural Coding to Number Cognition: A Computational Account

    Science.gov (United States)

    Prather, Richard W.

    2012-01-01

    The current study presents a series of computational simulations that demonstrate how the neural coding of numerical magnitude may influence number cognition and development. This includes behavioral phenomena cataloged in cognitive literature such as the development of numerical estimation and operational momentum. Though neural research has…

  5. CERN access card: Introduction of a bar code

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    Before the latest version of the implementation measures relating to Operational Circular No. 2 comes into force, we would like to inform you that, in future, CERN access cards may bear a bar code to transcribe the holder's identification number. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  6. CERN access cards - Introduction of a bar code (Reminder)

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    In accordance with the latest revised version of the implementation measures relating to Operational Circular No. 2, CERN access cards may bear a bar code transcribing the holder's identification number (the revised version of this subsidiary document to the aforementioned Circular will be published shortly). Relations with the Host States Service http://www.cern.ch/relations/ relations.secretariat@cern.ch Tel. 72848

  7. A Method of Coding and Decoding in Underwater Image Transmission

    Institute of Scientific and Technical Information of China (English)

    程恩

    2001-01-01

    A new method of coding and decoding in the system of underwater image transmission is introduced, including the rapid digital frequency synthesizer in multiple frequency shift keying,image data generator, image grayscale decoder with intelligent fuzzy algorithm, image restoration and display on microcomputer.

  8. RAMSES: A new N-body and hydrodynamical code

    Science.gov (United States)

    Teyssier, Romain

    2010-11-01

    A new N-body and hydrodynamical code, called RAMSES, is presented. It has been designed to study structure formation in the universe with high spatial resolution. The code is based on Adaptive Mesh Refinement (AMR) technique, with a tree based data structure allowing recursive grid refinements on a cell-by-cell basis. The N-body solver is very similar to the one developed for the ART code (Kravtsov et al. 97), with minor differences in the exact implementation. The hydrodynamical solver is based on a second-order Godunov method, a modern shock-capturing scheme known to compute accurately the thermal history of the fluid component. The accuracy of the code is carefully estimated using various test cases, from pure gas dynamical tests to cosmological ones. The specific refinement strategy used in cosmological simulations is described, and potential spurious effects associated to shock waves propagation in the resulting AMR grid are discussed and found to be negligible. Results obtained in a large N-body and hydrodynamical simulation of structure formation in a low density LCDM universe are finally reported, with 256^3 particles and 4.1 10^7 cells in the AMR grid, reaching a formal resolution of 8192^3. A convergence analysis of different quantities, such as dark matter density power spectrum, gas pressure power spectrum and individual haloes temperature profiles, shows that numerical results are converging down to the actual resolution limit of the code, and are well reproduced by recent analytical predictions in the framework of the halo model.

  9. A semianalytic Monte Carlo code for modelling LIDAR measurements

    Science.gov (United States)

    Palazzi, Elisa; Kostadinov, Ivan; Petritoli, Andrea; Ravegnani, Fabrizio; Bortoli, Daniele; Masieri, Samuele; Premuda, Margherita; Giovanelli, Giorgio

    2007-10-01

    LIDAR (LIght Detection and Ranging) is an optical active remote sensing technology with many applications in atmospheric physics. Modelling of LIDAR measurements appears useful approach for evaluating the effects of various environmental variables and scenarios as well as of different measurement geometries and instrumental characteristics. In this regard a Monte Carlo simulation model can provide a reliable answer to these important requirements. A semianalytic Monte Carlo code for modelling LIDAR measurements has been developed at ISAC-CNR. The backscattered laser signal detected by the LIDAR system is calculated in the code taking into account the contributions due to the main atmospheric molecular constituents and aerosol particles through processes of single and multiple scattering. The contributions by molecular absorption, ground and clouds reflection are evaluated too. The code can perform simulations of both monostatic and bistatic LIDAR systems. To enhance the efficiency of the Monte Carlo simulation, analytical estimates and expected value calculations are performed. Artificial devices (such as forced collision, local forced collision, splitting and russian roulette) are moreover foreseen by the code, which can enable the user to drastically reduce the variance of the calculation.

  10. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  11. The Plasma Simulation Code: A modern particle-in-cell code with load-balancing and GPU support

    CERN Document Server

    Germaschewski, Kai; Ahmadi, Narges; Wang, Liang; Abbott, Stephen; Ruhl, Hartmut; Bhattacharjee, Amitava

    2013-01-01

    Recent increases in supercomputing power, driven by the multi-core revolution and accelerators such as the IBM Cell processor, graphics processing units (GPUs) and Intel's Many Integrated Core (MIC) technology have enabled kinetic simulations of plasmas at unprecedented resolutions, but changing HPC architectures also come with challenges for writing efficient numerical codes. This paper describes the Plasma Simulation Code (PSC), an explicit, electromagnetic particle-in-cell code with support for different order particle shape functions. We focus on two distinguishing feature of the code: patch-based load balancing using space-filling curves, and support for Nvidia GPUs, which achieves substantial speed-up of up to more than 6x on the Cray XK7 architecture compared to a CPU-only implementation.

  12. Lissom, a Source Level Proof Carrying Code Platform

    CERN Document Server

    Gomes, Joao; de Sousa, Simao Melo; Pinto, Jorge Sousa

    2008-01-01

    This paper introduces a proposal for a Proof Carrying Code (PCC) architecture called Lissom. Started as a challenge for final year Computing students, Lissom was thought as a mean to prove to a sceptic community, and in particular to students, that formal verification tools can be put to practice in a realistic environment, and be used to solve complex and concrete problems. The attractiveness of the problems that PCC addresses has already brought students to show interest in this project.

  13. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  14. DgSMC-B code: A robust and autonomous direct simulation Monte Carlo code for arbitrary geometries

    Science.gov (United States)

    Kargaran, H.; Minuchehr, A.; Zolfaghari, A.

    2016-07-01

    In this paper, we describe the structure of a new Direct Simulation Monte Carlo (DSMC) code that takes advantage of combinatorial geometry (CG) to simulate any rarefied gas flows Medias. The developed code, called DgSMC-B, has been written in FORTRAN90 language with capability of parallel processing using OpenMP framework. The DgSMC-B is capable of handling 3-dimensional (3D) geometries, which is created with first-and second-order surfaces. It performs independent particle tracking for the complex geometry without the intervention of mesh. In addition, it resolves the computational domain boundary and volume computing in border grids using hexahedral mesh. The developed code is robust and self-governing code, which does not use any separate code such as mesh generators. The results of six test cases have been presented to indicate its ability to deal with wide range of benchmark problems with sophisticated geometries such as airfoil NACA 0012. The DgSMC-B code demonstrates its performance and accuracy in a variety of problems. The results are found to be in good agreement with references and experimental data.

  15. The Energy Code has been passed; Le code de l'energie a ete adopte

    Energy Technology Data Exchange (ETDEWEB)

    Roche, C. [Faculte de droit et des sciences sociales de Poitiers, 86 (France)

    2011-05-15

    The Energy Code has been passed by the order 2011-504 (May 9, 2011). It deals with (1) the general organization of the energy sector (2) the control of the energy demand and of the renewable energy sources (3) the electric power (4) the natural gas (5) the hydroelectric power (6) the petroleum and (7) the heat and cold systems. (O.M.)

  16. A study on the nuclear computer code maintenance and management system

    International Nuclear Information System (INIS)

    According to current software development and quality assurance trends. It is necessary to develop computer code management system for nuclear programs. For this reason, the project started in 1987. Main objectives of the project are to establish a nuclear computer code management system, to secure software reliability, and to develop nuclear computer code packages. Contents of performing the project in this year were to operate and maintain computer code information system of KAERI computer codes, to develop application tool, AUTO-i, for solving the 1st and 2nd moments of inertia on polygon or circle, and to research nuclear computer code conversion between different machines. For better supporting the nuclear code availability and reliability, assistance from users who are using codes is required. Lastly, for easy reference about the codes information, we presented list of code names and information on the codes which were introduced or developed during this year. (Author)

  17. On a stochastic approach to a code performance estimation

    Science.gov (United States)

    Gorshenin, Andrey K.; Frenkel, Sergey L.; Korolev, Victor Yu.

    2016-06-01

    The main goal of an efficient profiling of software is to minimize the runtime overhead under certain constraints and requirements. The traces built by a profiler during the work, affect the performance of the system itself. One of important aspect of an overhead arises from the randomness of variability in the context in which the application is embedded, e.g., due to possible cache misses, etc. Such uncertainty needs to be taken into account in the design phase. In order to overcome these difficulties we propose to investigate this issue through the analysis of the probability distribution of the difference between profiler's times for the same code. The approximating model is based on the finite normal mixtures within the framework of the method of moving separation of mixtures. We demonstrate some results for the MATLAB profiler using plotting of 3D surfaces by the function surf. The idea can be used for an estimating of a program efficiency.

  18. A Theoretical Model of Code of Ethics Conceptualized From Companies’ Public Disclosures on Ethics

    OpenAIRE

    Elena Roxana Anghel-Ilcu

    2014-01-01

    Codes of ethics encompass companies’ vision on business conduct and ethics in relation with its stakeholders. Presenting a code of ethics is rather a voluntarily process, therefore a large amount of heterogeneity is found among such codes. A general model of code of ethics would be a necessarily instrument because it would deliver some starting guidance for companies willing to present an ethical code of their own. Therefore, this paper aims to conceptualize a general and synthetic model of c...

  19. Nexus: A modular workflow management system for quantum simulation codes

    Science.gov (United States)

    Krogel, Jaron T.

    2016-01-01

    The management of simulation workflows represents a significant task for the individual computational researcher. Automation of the required tasks involved in simulation work can decrease the overall time to solution and reduce sources of human error. A new simulation workflow management system, Nexus, is presented to address these issues. Nexus is capable of automated job management on workstations and resources at several major supercomputing centers. Its modular design allows many quantum simulation codes to be supported within the same framework. Current support includes quantum Monte Carlo calculations with QMCPACK, density functional theory calculations with Quantum Espresso or VASP, and quantum chemical calculations with GAMESS. Users can compose workflows through a transparent, text-based interface, resembling the input file of a typical simulation code. A usage example is provided to illustrate the process.

  20. A Plastic Temporal Brain Code for Conscious State Generation

    Directory of Open Access Journals (Sweden)

    Birgitta Dresp-Langley

    2009-01-01

    Full Text Available Consciousness is known to be limited in processing capacity and often described in terms of a unique processing stream across a single dimension: time. In this paper, we discuss a purely temporal pattern code, functionally decoupled from spatial signals, for conscious state generation in the brain. Arguments in favour of such a code include Dehaene et al.'s long-distance reverberation postulate, Ramachandran's remapping hypothesis, evidence for a temporal coherence index and coincidence detectors, and Grossberg's Adaptive Resonance Theory. A time-bin resonance model is developed, where temporal signatures of conscious states are generated on the basis of signal reverberation across large distances in highly plastic neural circuits. The temporal signatures are delivered by neural activity patterns which, beyond a certain statistical threshold, activate, maintain, and terminate a conscious brain state like a bar code would activate, maintain, or inactivate the electronic locks of a safe. Such temporal resonance would reflect a higher level of neural processing, independent from sensorial or perceptual brain mechanisms.

  1. Code Blue Emergencies: A Team Task Analysis and Educational Initiative

    OpenAIRE

    Price, James W.; Applegarth, Oliver; Vu, Mark; Price, John R.

    2012-01-01

    Introduction The objective of this study was to identify factors that have a positive or negative influence on resuscitation team performance during emergencies in the operating room (OR) and post-operative recovery unit (PAR) at a major Canadian teaching hospital. This information was then used to implement a team training program for code blue emergencies. Methods In 2009/10, all OR and PAR nurses and 19 anesthesiologists at Vancouver General Hospital (VGH) were invited to complete an anony...

  2. CodeSkelGen - A Program Skeleton Generator

    OpenAIRE

    Queirós, Ricardo

    2013-01-01

    Existent computer programming training environments help users to learn programming by solving problems from scratch. Nevertheless, initiating the resolution of a program can be frustrating and demotivating if the student does not know where and how to start. Skeleton programming facilitates a top-down design approach, where a partially functional system with complete high-level structures is available, so the student needs only to progressively complete or update the code to meet the r...

  3. Efficient File Synchronization: a Distributed Source Coding Approach

    OpenAIRE

    Ma, Nan; Ramchandran, Kannan; Tse, David

    2011-01-01

    The problem of reconstructing a source sequence with the presence of decoder side-information that is mis-synchronized to the source due to deletions is studied in a distributed source coding framework. Motivated by practical applications, the deletion process is assumed to be bursty and is modeled by a Markov chain. The minimum rate needed to reconstruct the source sequence with high probability is characterized in terms of an information theoretic expression, which is interpreted as the amo...

  4. On Cascade Source Coding with A Side Information "Vending Machine"

    OpenAIRE

    Ahmadi, Behzad; Simeone, Osvaldo; Choudhuri, Chiranjib; Mitra, Urbashi

    2012-01-01

    The model of a side information "vending machine" accounts for scenarios in which acquiring side information is costly and thus should be done efficiently. In this paper, the three-node cascade source coding problem is studied under the assumption that a side information vending machine is available either at the intermediate or at the end node. In both cases, a single-letter characterization of the available trade-offs among the rate, the distortions in the reconstructions at the intermediat...

  5. The 2010 fib Model Code for Structural Concrete: A new approach to structural engineering

    NARCIS (Netherlands)

    Walraven, J.C.; Bigaj-Van Vliet, A.

    2011-01-01

    The fib Model Code is a recommendation for the design of reinforced and prestressed concrete which is intended to be a guiding document for future codes. Model Codes have been published before, in 1978 and 1990. The draft for fib Model Code 2010 was published in May 2010. The most important new elem

  6. The ICPC coding system in pharmacy : developing a subset, ICPC-Ph

    NARCIS (Netherlands)

    van Mil, JWF; Brenninkmeijer, R; Tromp, TFJ

    1998-01-01

    The ICPC system is a coding system developed for general medical practice, to be able to code the GP-patient encounters and other actions. Some of the codes can be easily used by community pharmacists to code complaints and diseases in pharmaceutical care practice. We developed a subset of the ICPC

  7. A chemical reaction network solver for the astrophysics code NIRVANA

    Science.gov (United States)

    Ziegler, U.

    2016-02-01

    Context. Chemistry often plays an important role in astrophysical gases. It regulates thermal properties by changing species abundances and via ionization processes. This way, time-dependent cooling mechanisms and other chemistry-related energy sources can have a profound influence on the dynamical evolution of an astrophysical system. Modeling those effects with the underlying chemical kinetics in realistic magneto-gasdynamical simulations provide the basis for a better link to observations. Aims: The present work describes the implementation of a chemical reaction network solver into the magneto-gasdynamical code NIRVANA. For this purpose a multispecies structure is installed, and a new module for evolving the rate equations of chemical kinetics is developed and coupled to the dynamical part of the code. A small chemical network for a hydrogen-helium plasma was constructed including associated thermal processes which is used in test problems. Methods: Evolving a chemical network within time-dependent simulations requires the additional solution of a set of coupled advection-reaction equations for species and gas temperature. Second-order Strang-splitting is used to separate the advection part from the reaction part. The ordinary differential equation (ODE) system representing the reaction part is solved with a fourth-order generalized Runge-Kutta method applicable for stiff systems inherent to astrochemistry. Results: A series of tests was performed in order to check the correctness of numerical and technical implementation. Tests include well-known stiff ODE problems from the mathematical literature in order to confirm accuracy properties of the solver used as well as problems combining gasdynamics and chemistry. Overall, very satisfactory results are achieved. Conclusions: The NIRVANA code is now ready to handle astrochemical processes in time-dependent simulations. An easy-to-use interface allows implementation of complex networks including thermal processes

  8. Improving a Power Line Communications Standard with LDPC Codes

    Directory of Open Access Journals (Sweden)

    Praveen Jain

    2007-01-01

    Full Text Available We investigate a power line communications (PLC scheme that could be used to enhance the HomePlug 1.0 standard, specifically its ROBO mode which provides modest throughput for the worst case PLC channel. The scheme is based on using a low-density parity-check (LDPC code, in lieu of the concatenated Reed-Solomon and convolutional codes in ROBO mode. The PLC channel is modeled with multipath fading and Middleton's class A noise. Clipping is introduced to mitigate the effect of impulsive noise. A simple and effective method is devised to estimate the variance of the clipped noise for LDPC decoding. Simulation results show that the proposed scheme outperforms the HomePlug 1.0 ROBO mode and has lower computational complexity. The proposed scheme also dispenses with the repetition of information bits in ROBO mode to gain time diversity, resulting in 4-fold increase in physical layer throughput.

  9. Prodeto, a computer code for probabilistic fatigue design

    Energy Technology Data Exchange (ETDEWEB)

    Braam, H. [ECN-Solar and Wind Energy, Petten (Netherlands); Christensen, C.J.; Thoegersen, M.L. [Risoe National Lab., Roskilde (Denmark); Ronold, K.O. [Det Norske Veritas, Hoevik (Norway)

    1999-03-01

    A computer code for structural relibility analyses of wind turbine rotor blades subjected to fatigue loading is presented. With pre-processors that can transform measured and theoretically predicted load series to load range distributions by rain-flow counting and with a family of generic distribution models for parametric representation of these distribution this computer program is available for carying through probabilistic fatigue analyses of rotor blades. (au)

  10. A Cooperative Network Coding Strategy for the Interference Relay Channel

    CERN Document Server

    Bui, Huyen-Chi; Lacan, Jerome; Boucheret, Marie-Laure

    2012-01-01

    In this paper, we study an interference relay network with a satellite as relay. We propose a cooperative strategy based on physical layer network coding and superposition modulation decoding for uni-directional communications among users. The performance of our solution in terms of throughput is evaluated through capacity analysis and simulations that include practical constraints such as the lack of synchronization in time and frequency. We demonstrate throughputs significantly larger than the classical time sharing case.

  11. FARGO3D: A new GPU-oriented MHD code

    CERN Document Server

    Benítez-Llambay, Pablo

    2016-01-01

    We present the FARGO3D code, recently publicly released. It is a magnetohydrodynamics code developed with special emphasis on protoplanetary disks physics and planet-disk interactions, and parallelized with MPI. The hydrodynamics algorithms are based on finite difference upwind, dimensionally split methods. The magnetohydrodynamics algorithms consist of the constrained transport method to preserve the divergence-free property of the magnetic field to machine accuracy, coupled to a method of characteristics for the evaluation of electromotive forces and Lorentz forces. Orbital advection is implemented, and an N-body solver is included to simulate planets or stars interacting with the gas. We present our implementation in detail and present a number of widely known tests for comparison purposes. One strength of FARGO3D is that it can run on both "Graphical Processing Units" (GPUs) or "Central Processing unit" (CPUs), achieving large speed up with respect to CPU cores. We describe our implementation choices, whi...

  12. Code forking in open-source software: a requirements perspective

    CERN Document Server

    Ernst, Neil A; Mylopoulos, John

    2010-01-01

    To fork a project is to copy the existing code base and move in a direction different than that of the erstwhile project leadership. Forking provides a rapid way to address new requirements by adapting an existing solution. However, it can also create a plethora of similar tools, and fragment the developer community. Hence, it is not always clear whether forking is the right strategy. In this paper, we describe a mixed-methods exploratory case study that investigated the process of forking a project. The study concerned the forking of an open-source tool for managing software projects, Trac. Trac was forked to address differing requirements in an academic setting. The paper makes two contributions to our understanding of code forking. First, our exploratory study generated several theories about code forking in open source projects, for further research. Second, we investigated one of these theories in depth, via a quantitative study. We conjectured that the features of the OSS forking process would allow new...

  13. A user's guide to GENEX, SDR, and related computer codes

    International Nuclear Information System (INIS)

    This series of codes will be of use in a variety of fields connected with reactor physics, examples of which are: (a) In evaluation of nuclear data in which the RESP-GENEX part of the system would be used to examine and produce a cross-section set based on the theories and experiments of the nuclear physicists. The approximations in GENEX must however be kept in mind, the chief one being the diagonal expansion approximation of the inverse level matrix originally due to Bethe which precludes a correct representation of strong interference effects (the Lynn effect). (b) In the calculation of Doppler effects or other resonance effects such as establishing equivalence relationships, approximate resonance treatments, etc. A given set of tapes generated by GENEX (or by some other means into the GENEX format) would be used to run the SDH code. The SDR code produces cross-sections and reaction rates over any group structure within its working range. In situations with complex geometries the spatial representation of SDR is liable to be inadequate and in these circumstances it is recommended that the reaction rates are not used directly but instead the cross-sections are used in a more accurate spatial calculation to produce revised reaction rates. (c) Finally the system may be used for a variety of special investigations such as an analysis of the variance of the Doppler coefficient in fast reactors or the accurate assessment of ideal integral measurements, (for instance the Aldermaston sphere experiment

  14. 76 FR 39039 - Establishment of a New Drug Code for Marihuana Extract

    Science.gov (United States)

    2011-07-05

    ... Enforcement Administration 21 CFR Part 1308 RIN 1117-AB33 Establishment of a New Drug Code for Marihuana... Controlled Substances Code Number (``Code Number'' or ``drug code'') under 21 CFR 1308.11 for ``Marihuana... material separately from quantities of marihuana. This in turn will aid in complying with relevant...

  15. A CFD code comparison of wind turbine wakes

    DEFF Research Database (Denmark)

    Laan, van der, Paul Maarten; Storey, R. C.; Sørensen, Niels N.;

    2014-01-01

    A comparison is made between the EllipSys3D and SnS CFD codes. Both codes are used to perform Large-Eddy Simulations (LES) of single wind turbine wakes, using the actuator disk method. The comparison shows that both LES models predict similar velocity deficits and stream-wise Reynolds-stresses for...... simulations using EllipSys3D for a test case that is based on field measurements. In these simulations, two eddy viscosity turbulence models are employed: the k- (ε) model and the k- (ε)-fp model. Where the k- (ε) model fails to predict the velocity deficit, the results of the k- (ε)-fP model show good...

  16. A CLASS OF LDPC CODE'S CONSTRUCTION BASED ON AN ITERATIVE RANDOM METHOD

    Institute of Scientific and Technical Information of China (English)

    Huang Zhonghu; Shen Lianfeng

    2006-01-01

    This letter gives a random construction for Low Density Parity Check (LDPC) codes, which uses an iterative algorithm to avoid short cycles in the Tanner graph. The construction method has great flexible choice in LDPC code's parameters including codelength, code rate, the least girth of the graph, the weight of column and row in the parity check matrix. The method can be applied to the irregular LDPC codes and strict regular LDPC codes. Systemic codes have many applications in digital communication, so this letter proposes a construction of the generator matrix of systemic LDPC codes from the parity check matrix. Simulations show that the method performs well with iterative decoding.

  17. A Framework to Prevent QR Code Based Phishing Attacks

    OpenAIRE

    Dayaratne, T. T.

    2016-01-01

    Though the rapid development and spread of Information and Communication Technology (ICT) making people's life much more easier, on the other hand it causing some serious threats to the society. Phishing is one of the most common cyber threat, that most users falls in. This research investigate on QR code based phishing attacks which is a newly adopted intrusive method and how to enhance the awareness and avoidance behavior of QR based phishing attacks through the user centric security educat...

  18. BALDUR: a one-dimensional plasma transport code

    International Nuclear Information System (INIS)

    The purpose of BALDUR is to calculate the evolution of plasma parameters in an MHD equilibrium which can be approximated by concentric circular flux surfaces. Transport of up to six species of ionized particles, of electron and ion energy, and of poloidal magnetic flux is computed. A wide variety of source terms are calculated including those due to neutral gas, fusion, and auxiliary heating. The code is primarily designed for modeling tokamak plasmas but could be adapted to other toroidal confinement systems

  19. A macroscopic PIC code for beam-target interaction studies

    International Nuclear Information System (INIS)

    A two-dimensional macroscopic PIC (particle-in-cell) code for (laser) beam-target interaction is described and the complete numerical program is presented. Flux limited nonlinear heat conduction is included in the hydrodynamics. Tests of conservation of symmetry and adiabaticity are shown and energy partition into kinetic and internal energies as well as the accuracy of the heat conduction solution are investigated. (orig.)

  20. Starfinder a code for crowded stellar fields analysis

    CERN Document Server

    Diolaiti, E; Bonaccini, D; Close, L M; Currie, D; Parmeggiani, G

    1999-01-01

    Starfinder is an IDL code for the deep analysis of stellar fields, designed for well-sampled images with high and low Strehl factor. An important feature is represented by the possibility to measure the anisoplanatic effect in wide-field Adaptive Optics observations and exploit this knowledge to improve the analysis of the observed field. A description of the method and applications to real AO data are presented.

  1. Teaching and Learning Pharmaceutical Code of Ethics as a Syllabus

    Directory of Open Access Journals (Sweden)

    A Shafiee

    2008-06-01

    Full Text Available "nPharmacy, being a profession which its activities are directly related to the health and wellbeing of the people and soci­ety has been described an ethical profession from earliest time. In the recent decades there has been a shift in the phar­macist role from dispensing to relationship with patients and health care providers and interfere the therapeutic process. Other branches of pharmacy such as producers, distributors and etc. will certainly have the same responsibilities. In this respect, student of pharmacy, besides his professional education needs learning social, behavioral, communicational sciences as well as the principles code of pharmaceutical ethics. Therefore, teaching and learning principles code of ethics seems as an obli­gation. These principles are a guide to the standards of conduct. Furthermore, rapid progress of biotechnology, nanotech­nology and increase cost of new drugs are factors presented the importance of the study of eth­ics in pharmacy. Therefore, setting syllabus in pharmacy law and ethics is a need for undergraduate and even post­graduate students. The code, therefore attempts to define principles to be born in mind. It is the pharmacist who must interpret them in the light of pharmacy prac­tice.

  2. A Hydrochemical Hybrid Code for Astrophysical Problems. I. Code Verification and Benchmarks for Photon-Dominated Region (PDR)

    CERN Document Server

    Motoyama, Kazutaka; Shang, Hsien; Krasnopolsky, Ruben; Hasegawa, Tatsuhiko

    2015-01-01

    A two dimensional hydrochemical hybrid code, KM2, is constructed to deal with astrophysical problems that would require coupled hydrodynamical and chemical evolution. The code assumes axisymmetry in cylindrical coordinate system, and consists of two modules: a hydrodynamics module and a chemistry module. The hydrodynamics module solves hydrodynamics using a Godunov-type finite volume scheme and treats included chemical species as passively advected scalars. The chemistry module implicitly solves non-equilibrium chemistry and change of the energy due to thermal processes with transfer of external ultraviolet radiation. Self-shielding effects on photodissociation of CO and H$_2$ are included. In this introductory paper, the adopted numerical method is presented, along with code verifications using the hydrodynamics modules, and a benchmark on the chemistry module with reactions specific to a photon-dominated region (PDR). Finally, as an example of the expected capability, the hydrochemical evolution of a PDR is...

  3. Development and verification of a thermo-hydraulic simulation code for systems transient in 'Monju' (COPD code)

    International Nuclear Information System (INIS)

    Large system simulation codes are needed for design and safety analysis. A thermal-hydraulic simulation code for systems transient in ''Monju'' (COPD code) was developed and verified with experimental data from an experimental LMFBR ''Joyo'', 50 MWt steam generator test facility and scaled test sections of reactor vessel plenum. This paper summarizes numerical models of this code and their verifications with experimental data. Especially, a simplified analytical model to predict the transient behavior in a reactor vessel plenum is presented in detail, since this behavior has an important effect that must be taken into account in a plant thermal transient, while the reactor is tripped. The COPD is applied to design and safety analysis in ''Monju'' as follows ; (1) Safety analysis with regard to core cooling in anticipated incidents. (2) Plant thermo-hydraulic analysis for setting the design condition in thermal stress analysis and evaluation of components and pipings. (3) Control performance analysis on plant operation for design and evaluation of plant control system. Each of the above analyses requires different predictions of plant response to be analyzed. Therefore, appropriate models and input data are used in the design and evaluation according to the purpose of the analysis. This code was developed and verified under a contract with PNC. (author)

  4. TRAWA, a transient analysis code for water reactions

    International Nuclear Information System (INIS)

    TRAWA is a transient analysis code for water reactors. It solves the two-group neutron diffusion equations simultaneously with the heat conduction equations and the two-phase hydraulic equations for one or more channels. At most one-dimensional submodels are used. Neither thermal nor hydraulic mixing appear between channels. Doppler, coolant density, coolant temperature, and soluble poison density feedbacks due to the thermohydraulics of the channels are described by using polynomial expansions for the group constants. The hydraulic circuit outside the reactor core consists of by-pass channel and risers with two-phase flow and of pump lines with incompressible flow. Nontrivial implicit methods are employed in the discretization of the equations to allow for sparse spatial mesh and flexible choice of time steps. Various transients can be calculated by applying external disturbances. The code is extensively supplied by input and output capabilities. TRAWA is written in FORTRAN V for UNIVAC 1108 computer. (author)

  5. DANTSYS: A diffusion accelerated neutral particle transport code system

    Energy Technology Data Exchange (ETDEWEB)

    Alcouffe, R.E.; Baker, R.S.; Brinkley, F.W.; Marr, D.R.; O`Dell, R.D.; Walters, W.F.

    1995-06-01

    The DANTSYS code package includes the following transport codes: ONEDANT, TWODANT, TWODANT/GQ, TWOHEX, and THREEDANT. The DANTSYS code package is a modular computer program package designed to solve the time-independent, multigroup discrete ordinates form of the boltzmann transport equation in several different geometries. The modular construction of the package separates the input processing, the transport equation solving, and the post processing (or edit) functions into distinct code modules: the Input Module, one or more Solver Modules, and the Edit Module, respectively. The Input and Edit Modules are very general in nature and are common to all the Solver Modules. The ONEDANT Solver Module contains a one-dimensional (slab, cylinder, and sphere), time-independent transport equation solver using the standard diamond-differencing method for space/angle discretization. Also included in the package are solver Modules named TWODANT, TWODANT/GQ, THREEDANT, and TWOHEX. The TWODANT Solver Module solves the time-independent two-dimensional transport equation using the diamond-differencing method for space/angle discretization. The authors have also introduced an adaptive weighted diamond differencing (AWDD) method for the spatial and angular discretization into TWODANT as an option. The TWOHEX Solver Module solves the time-independent two-dimensional transport equation on an equilateral triangle spatial mesh. The THREEDANT Solver Module solves the time independent, three-dimensional transport equation for XYZ and RZ{Theta} symmetries using both diamond differencing with set-to-zero fixup and the AWDD method. The TWODANT/GQ Solver Module solves the 2-D transport equation in XY and RZ symmetries using a spatial mesh of arbitrary quadrilaterals. The spatial differencing method is based upon the diamond differencing method with set-to-zero fixup with changes to accommodate the generalized spatial meshing.

  6. A CODE DESIGN CRITERIA FOR NOT FULLY CONNECTED CHANNEL

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are parallel channels which are not fully connected in practice, such as Frequency DivisionMultiplex (FDM or Orthogonal FDM) systems. Conventional space-time codes can be used for such parallelchannels but not the optimal. Based on the derivation of PEP expression for codes transmitted on parallel blockfading channels, criteria of codes design for not fully connected channels are proposed and are compared withTarokh's criteria for fully connected channel. New codes for such channels are provided by systematical andexhaustive search. Simulation results show that these codes offer better performance on parallel FDM channelsthan other known codes.

  7. A Family of Five-Weight Cyclic Codes and Their Weight Enumerators

    OpenAIRE

    Zhou, Zhengchun; Ding, Cunsheng; Luo, Jinquan; Zhang, Aixian

    2013-01-01

    Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. In this paper, a family of $p$-ary cyclic codes whose duals have three zeros are proposed. The weight distribution of this family of cyclic codes is determined. It turns out that the proposed cyclic codes have five nonzero weights.

  8. Folklore in bureaucracy code: Running a music event

    OpenAIRE

    Krstanović-Lukić Miroslava

    2004-01-01

    A music folk-created piece of work is a construction expressed as a paradigm part of a set in the bureaucracy system and the public arena. Such a work is a mechanical concept, which defines inheritance as a construction of authenticity saturated with elements of folk, national culture. It is also a subject of certain conventions in the system of regulations; namely, it is a part of the administrative code. The usage of the folk created work as a paradigm and legislations is realized through a...

  9. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  10. Exploration of Extreme Mass Ratio Inspirals with a Tree Code

    Science.gov (United States)

    Miller, Michael

    Extreme mass ratio inspirals (EMRIs), in which a stellar-mass object spirals into a supermassive black hole, are critical gravitational wave sources for the Laser Interferometer Space Antenna (LISA) because of their potential as precise probes of strong gravity. They are although thought to contribute to the flares observed in a few active galactic nuclei that have been attributed to tidal disruption of stars. There are, however, large uncertainties about the rates and properties of EMRIs. The reason is that their galactic nuclear environments contain millions of stars around a central massive object, and their paths must be integrated with great precision to include properly effects such as secular resonances, which accumulate over many orbits. Progress is being made on all fronts, but current numerical options are either profoundly computationally intensive (direct N-body integrators, which in addition do not currently have the needed long-term accuracy) or require special symmetry or other simplifications that may compromise the realism of the results (Monte Carlo and Fokker-Planck codes). We propose to undertake extensive simulations of EMRIs using tree codes that we have adapted to the problem. Tree codes are much faster than direct N-body simulations, yet they are powerful and flexible enough to include nonideal physics such as triaxiality, arbitrary mass spectra, post-Newtonian corrections, and secular evolutionary effects such as resonant relaxation and Kozai oscillations to the equations of motion. We propose to extend our codes to include these effects and to allow separate tracking of special ? that will represent binaries, thus allowing us to follow their interactions and evolution. In our development we will compare our results for a few tens of thousands of particles with a state of the art direct N-body integrator, to evaluate the accuracy of our code and discern systematic effects. This will allow detailed yet fast examinations of large-N systems

  11. A Content-Centric Organization of the Genetic Code

    Institute of Scientific and Technical Information of China (English)

    Jun Yu

    2007-01-01

    The codon table for the canonical genetic code can be rearranged in such a way that the code is divided into four quarters and two halves according to the variability of their GC and purine contents, respectively. For prokaryotic genomes, when the genomic GC content increases, their amino acid contents tend to be restricted to the GC-rich quarter and the purine-content insensitive half, where all codons are fourfold degenerate and relatively mutation-tolerant. Conversely, when the genomic GC content decreases, most of the codons retract to the AU-rich quarter and the purine-content sensitive half; most of the codons not only remain encoding physicochemically diversified amino acids but also vary when transversion (between purine and pyrimidine) happens. Amino acids with sixfolddegenerate codons are distributed into all four quarters and across the two halves; their fourfold-degenerate codons are all partitioned into the purine-insensitive half in favorite of robustness against mutations. The features manifested in the rearranged codon table explain most of the intrinsic relationship between protein coding sequences (the informational content) and amino acid compositions (the functional content). The renovated codon table is useful in predicting abundant amino acids and positioning the amino acids with related or distinct physicochemical properties.

  12. Numerical simulations of hydrodynamic instabilities: perturbation codes Pansy, Perle, and 2D code Chic applied to a realistic LIL target

    Energy Technology Data Exchange (ETDEWEB)

    Hallo, L.; Olazabal-Loume, M.; Maire, P.H.; Breil, J.; Schurtz, G. [CELIA, 33 - Talence (France); Morse, R.L. [Arizona Univ., Dept. of Nuclear Engineering, Tucson (United States)

    2006-06-15

    This paper deals with ablation front instabilities simulations in the context of direct drive inertial confinement fusion. A simplified deuterium-tritium target, representative of realistic target on LIL (laser integration line at Megajoule laser facility) is considered. We describe here two numerical approaches: the linear perturbation method using the perturbation codes Perle (planar) and Pansy (spherical) and the direct simulation method using our bi-dimensional hydrodynamic code Chic. Our work shows a good behaviour of all methods even for large wavenumbers during the acceleration phase of the ablation front. We also point out a good agreement between model and numerical predictions at ablation front during the shock wave transit.

  13. Code forking in open-source software: a requirements perspective

    OpenAIRE

    Ernst, Neil A.; Easterbrook, Steve; Mylopoulos, John

    2010-01-01

    To fork a project is to copy the existing code base and move in a direction different than that of the erstwhile project leadership. Forking provides a rapid way to address new requirements by adapting an existing solution. However, it can also create a plethora of similar tools, and fragment the developer community. Hence, it is not always clear whether forking is the right strategy. In this paper, we describe a mixed-methods exploratory case study that investigated the process of forking a ...

  14. A primer on physical-layer network coding

    CERN Document Server

    Liew, Soung Chang; Zhang, Shengli

    2015-01-01

    The concept of physical-layer network coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of communications and networking with a wide following. This book is a primer on PNC. It is the outcome of a set of lecture notes for a course for beginning graduate students at The Chinese University of Hong Kong. The target audience is expected to have some prior background knowledge in communication theory and wireless communications, but not working knowledge at the research level. Indeed, a goal of this book/course is to allow the reader

  15. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  16. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  17. A NOVEL FRAMEWORK OF ONLINE NETWORK CODING FOR MULTICAST SWITCHES WITH CONSTRAINED BUFFERS

    Institute of Scientific and Technical Information of China (English)

    Wang Wei; Yu Li; Zhu Guangxi; Li Hui

    2011-01-01

    Network coding is able to address output conflicts when fanout splitting is allowed for multicast switching.Hence,it successfully achieves a larger rate region than non-coding approaches in crossbar switches.However,network coding requires large coding buffers and a high computational cost on encoding and decoding.In this paper,we propose a novel Online Network Coding framework called Online NC for multicast switches,which is adaptive to constrained buffers.Moreover,it enjoys a much lower decoding complexity O(n2) by a Vandermonde matrix based approach,as compared to conventional randomized network coding O(n3).Our approach realizes online coding with one coding algorithm that synchronizes buffering and coding.Therefore,we significantly reduce requirements on buffer space,while also sustaining high throughputs.We confirm the superior advantages of our contributions using empirical studies.

  18. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  19. Cascade Source Coding with a Side Information "Vending Machine"

    OpenAIRE

    Ahmadi, Behzad; Choudhuri, Chiranjib; Simeone, Osvaldo; Mitra, Urbashi

    2012-01-01

    The model of a side information "vending machine" (VM) accounts for scenarios in which the measurement of side information sequences can be controlled via the selection of cost-constrained actions. In this paper, the three-node cascade source coding problem is studied under the assumption that a side information VM is available and the intermediate and/or at the end node of the cascade. A single-letter characterization of the achievable trade-off among the transmission rates, the distortions ...

  20. Improving the Capabilities of a Continuum Laser Plasma Interaction Code

    Energy Technology Data Exchange (ETDEWEB)

    Hittinger, J F; Dorr, M R

    2006-06-15

    The numerical simulation of plasmas is a critical tool for inertial confinement fusion (ICF). We have been working to improve the predictive capability of a continuum laser plasma interaction code pF3d, which couples a continuum hydrodynamic model of an unmagnetized plasma to paraxial wave equations modeling the laser light. Advanced numerical techniques such as local mesh refinement, multigrid, and multifluid Godunov methods have been adapted and applied to nonlinear heat conduction and to multifluid plasma models. We describe these algorithms and briefly demonstrate their capabilities.

  1. A simple blowdown code for SUPER-SARA loop conditions

    International Nuclear Information System (INIS)

    The Super Sara test programme (SSTP) is aimed to study in pile the fuel and cluster behaviour under two types of accident conditions: - the ''Large break loss of coolant'' condition (LB-Loca), - the ''Severe fuel damage'' (SFD) in a boildown caused by a small break. BIVOL was developed for the LB-Loca situation. This code is made for a loop where essentially two volumes define the thermohydraulics during the blowdown. In the SUPERSARA loop these two volumes are represented by the hot leg and cold leg pipings together with the respective upper and lower plenum of the test section

  2. On Cascade Source Coding with A Side Information "Vending Machine"

    CERN Document Server

    Ahmadi, Behzad; Choudhuri, Chiranjib; Mitra, Urbashi

    2012-01-01

    The model of a side information "vending machine" accounts for scenarios in which acquiring side information is costly and thus should be done efficiently. In this paper, the three-node cascade source coding problem is studied under the assumption that a side information vending machine is available either at the intermediate or at the end node. In both cases, a single-letter characterization of the available trade-offs among the rate, the distortions in the reconstructions at the intermediate and at the end node, and the cost in acquiring the side information are derived under given conditions.

  3. Antiproton annihilation physics annihilation physics in the Monte Carlo particle transport code particle transport code SHIELD-HIT12A

    DEFF Research Database (Denmark)

    Taasti, Vicki Trier; Knudsen, Helge; Holzscheiter, Michael;

    2015-01-01

    The Monte Carlo particle transport code SHIELD-HIT12A is designed to simulate therapeutic beams for cancer radiotherapy with fast ions. SHIELD-HIT12A allows creation of antiproton beam kernels for the treatment planning system TRiP98, but first it must be benchmarked against experimental data...

  4. BIRTH: a beam deposition code for non-circular tokamak plasmas

    International Nuclear Information System (INIS)

    A new beam deposition code has been developed which is capable of calculating fast ion deposition profiles including the orbit correction. The code incorporates any injection geometry and a non-circular cross section plasma with a variable elongation and an outward shift of the magnetic flux surface. Typical cpu time on a DEC-10 computer is 10 - 20 seconds and 5 - 10 seconds with and without the orbit correction, respectively. This is shorter by an order of magnitude than that of other codes, e.g., Monte Carlo codes. The power deposition profile calculated by this code is in good agreement with that calculated by a Monte Carlo code. (author)

  5. A simple histone code opens many paths to epigenetics.

    Science.gov (United States)

    Sneppen, Kim; Dodd, Ian B

    2012-01-01

    Nucleosomes can be covalently modified by addition of various chemical groups on several of their exposed histone amino acids. These modifications are added and removed by enzymes (writers) and can be recognized by nucleosome-binding proteins (readers). Linking a reader domain and a writer domain that recognize and create the same modification state should allow nucleosomes in a particular modification state to recruit enzymes that create that modification state on nearby nucleosomes. This positive feedback has the potential to provide the alternative stable and heritable states required for epigenetic memory. However, analysis of simple histone codes involving interconversions between only two or three types of modified nucleosomes has revealed only a few circuit designs that allow heritable bistability. Here we show by computer simulations that a histone code involving alternative modifications at two histone positions, producing four modification states, combined with reader-writer proteins able to distinguish these states, allows for hundreds of different circuits capable of heritable bistability. These expanded possibilities result from multiple ways of generating two-step cooperativity in the positive feedback--through alternative pathways and an additional, novel cooperativity motif. Our analysis reveals other properties of such epigenetic circuits. They are most robust when the dominant nucleosome types are different at both modification positions and are not the type inserted after DNA replication. The dominant nucleosome types often recruit enzymes that create their own type or destroy the opposing type, but never catalyze their own destruction. The circuits appear to be evolutionary accessible; most circuits can be changed stepwise into almost any other circuit without losing heritable bistability. Thus, our analysis indicates that systems that utilize an expanded histone code have huge potential for generating stable and heritable nucleosome

  6. A simple histone code opens many paths to epigenetics.

    Directory of Open Access Journals (Sweden)

    Kim Sneppen

    Full Text Available Nucleosomes can be covalently modified by addition of various chemical groups on several of their exposed histone amino acids. These modifications are added and removed by enzymes (writers and can be recognized by nucleosome-binding proteins (readers. Linking a reader domain and a writer domain that recognize and create the same modification state should allow nucleosomes in a particular modification state to recruit enzymes that create that modification state on nearby nucleosomes. This positive feedback has the potential to provide the alternative stable and heritable states required for epigenetic memory. However, analysis of simple histone codes involving interconversions between only two or three types of modified nucleosomes has revealed only a few circuit designs that allow heritable bistability. Here we show by computer simulations that a histone code involving alternative modifications at two histone positions, producing four modification states, combined with reader-writer proteins able to distinguish these states, allows for hundreds of different circuits capable of heritable bistability. These expanded possibilities result from multiple ways of generating two-step cooperativity in the positive feedback--through alternative pathways and an additional, novel cooperativity motif. Our analysis reveals other properties of such epigenetic circuits. They are most robust when the dominant nucleosome types are different at both modification positions and are not the type inserted after DNA replication. The dominant nucleosome types often recruit enzymes that create their own type or destroy the opposing type, but never catalyze their own destruction. The circuits appear to be evolutionary accessible; most circuits can be changed stepwise into almost any other circuit without losing heritable bistability. Thus, our analysis indicates that systems that utilize an expanded histone code have huge potential for generating stable and heritable

  7. NMACA Approach Used to Build a Secure Message Authentication Code

    Science.gov (United States)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  8. A guide to the AUS modular neutronics code system

    International Nuclear Information System (INIS)

    A general description is given of the AUS modular neutronics code system, which may be used for calculations of a very wide range of fission reactors, fusion blankets and other neutron applications. The present system has cross-section libraries derived from ENDF/B-IV and includes modules which provide for lattice calculations, one-dimensional transport calculations, and one, two, and three-dimensional diffusion calculations, burnup calculations and the flexible editing of results. Details of all system aspects of AUS are provided but the major individual modules are only outlined. Sufficient information is given to enable other modules to be added to the system

  9. A FAST PARAMETER ESTIMATION ALGORITHM FOR POLYPHASE CODED CW SIGNALS

    Institute of Scientific and Technical Information of China (English)

    Li Hong; Qin Yuliang; Wang Hongqiang; Li Yanpeng; Li Xiang

    2011-01-01

    A fast parameter estimation algorithm is discussed for a polyphase coded Continuous Waveform (CW) signal in Additive White Gaussian Noise (AWGN).The proposed estimator is based on the sum of the modulus square of the ambiguity function at the different Doppler shifts.An iterative refinement stage is proposed to avoid the effect of the spurious peaks that arise when the summation length of the estimator exceeds the subcode duration.The theoretical variance of the subcode rate estimate is derived.The Monte-Carlo simulation results show that the proposed estimator is highly accurate and effective at moderate Signal-to-Noise Ratio (SNR).

  10. A Study on Web Accessibility Improvement Using QR-Code

    Directory of Open Access Journals (Sweden)

    Dae-Jea Cho

    2016-07-01

    Full Text Available Web accessibility makes it possible for the disabled to get equal access to information provided in web like the normal. Therefore, to enable the disabled to use web, there is a need for construction of web page abide by accessibility. The text on the web site is output by sound using screen reader, so that the visually impaired can recognize the meaning of text. However, screen reader cannot recognize image. This paper studies a method for explaining images included in web pages using QR-Code. When producing web page adapting the method provided in this paper, it will help the visually impaired to understand the contents of webpage.

  11. A Novel Secret Sharing Technique Using QR Code

    Directory of Open Access Journals (Sweden)

    Jun-Chou Chuang

    2010-12-01

    Full Text Available Any mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. In this paper, the QR code is employed to design the secret sharing mechanism so that the data privacy during data transmission can be enhanced. The secret data is divided into some shadows by the secret sharing mechanism and the results are embedded into barcode tags. The secret can be recovered only when the number of shadows is greater than or equal to the predefined threshold. In sum, the proposed technique improves data security for data transmission.

  12. Easy as Pi: A Network Coding Raspberry Pi Testbed

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Hernandez, Nestor; Cabrera Guerrero, Juan A.;

    2016-01-01

    In the near future, upcoming communications and storage networks are expected to tolerate major difficulties produced by huge amounts of data being generated from the Internet of Things (IoT). For these types of networks, strategies and mechanisms based on network coding have appeared...... as an alternative to overcome these difficulties in a holistic manner, e.g., without sacrificing the benefit of a given network metric when improving another. There has been recurrent issues on: (i) making large-scale deployments akin to the Internet of Things; (ii) assessing and (iii) replicating the obtained...

  13. Coarse Network Coding: A Simple Relay Strategy to Resolve Interference

    CERN Document Server

    Razaghi, Peyman

    2010-01-01

    Reminiscent of the parity function in network coding for the butterfly network, it is shown that forwarding an even/odd indicator bit for a scalar quantization of a relay observation recovers 1 bit of information at the two destinations in a noiseless interference channel where interference is treated as noise. Based on this observation, a coding strategy is proposed to improve the rate of both users at the same time using a relay node in an interference channel. In this strategy, the relay observes a linear combination of the two source signals, and broadcasts a common message to the two destinations over a shared out-of-band link of rate R0 bits per channel use. The relay message consists of the bin index of a structured binning scheme obtained from a 2^R0-way partition of the squared lattice in the complex plane. We show that such scalar quantization-binning relay strategy asymptotically achieves the cut-set bound in an interference channel with a common out-of-band relay link of limited rate, improving th...

  14. ELLIPT2D: A Flexible Finite Element Code Written Python

    International Nuclear Information System (INIS)

    The use of the Python scripting language for scientific applications and in particular to solve partial differential equations is explored. It is shown that Python's rich data structure and object-oriented features can be exploited to write programs that are not only significantly more concise than their counter parts written in Fortran, C or C++, but are also numerically efficient. To illustrate this, a two-dimensional finite element code (ELLIPT2D) has been written. ELLIPT2D provides a flexible and easy-to-use framework for solving a large class of second-order elliptic problems. The program allows for structured or unstructured meshes. All functions defining the elliptic operator are user supplied and so are the boundary conditions, which can be of Dirichlet, Neumann or Robbins type. ELLIPT2D makes extensive use of dictionaries (hash tables) as a way to represent sparse matrices.Other key features of the Python language that have been widely used include: operator over loading, error handling, array slicing, and the Tkinter module for building graphical use interfaces. As an example of the utility of ELLIPT2D, a nonlinear solution of the Grad-Shafranov equation is computed using a Newton iterative scheme. A second application focuses on a solution of the toroidal Laplace equation coupled to a magnetohydrodynamic stability code, a problem arising in the context of magnetic fusion research

  15. BOA, Beam Optics Analyzer A Particle-In-Cell Code

    Energy Technology Data Exchange (ETDEWEB)

    Thuc Bui

    2007-12-06

    The program was tasked with implementing time dependent analysis of charges particles into an existing finite element code with adaptive meshing, called Beam Optics Analyzer (BOA). BOA was initially funded by a DOE Phase II program to use the finite element method with adaptive meshing to track particles in unstructured meshes. It uses modern programming techniques, state-of-the-art data structures, so that new methods, features and capabilities are easily added and maintained. This Phase II program was funded to implement plasma simulations in BOA and extend its capabilities to model thermal electrons, secondary emissions, self magnetic field and implement a more comprehensive post-processing and feature-rich GUI. The program was successful in implementing thermal electrons, secondary emissions, and self magnetic field calculations. The BOA GUI was also upgraded significantly, and CCR is receiving interest from the microwave tube and semiconductor equipment industry for the code. Implementation of PIC analysis was partially successful. Computational resource requirements for modeling more than 2000 particles begin to exceed the capability of most readily available computers. Modern plasma analysis typically requires modeling of approximately 2 million particles or more. The problem is that tracking many particles in an unstructured mesh that is adapting becomes inefficient. In particular memory requirements become excessive. This probably makes particle tracking in unstructured meshes currently unfeasible with commonly available computer resources. Consequently, Calabazas Creek Research, Inc. is exploring hybrid codes where the electromagnetic fields are solved on the unstructured, adaptive mesh while particles are tracked on a fixed mesh. Efficient interpolation routines should be able to transfer information between nodes of the two meshes. If successfully developed, this could provide high accuracy and reasonable computational efficiency.

  16. The movement towards a more experimental approach to problem solving in mathematics using coding

    Science.gov (United States)

    Barichello, Leonardo

    2016-07-01

    Motivated by a problem proposed in a coding competition for secondary students, I will show on this paper how coding substantially changed the problem-solving process towards a more experimental approach.

  17. The Bilingual Personality as a Metasystem--The Case of Code Switching.

    Science.gov (United States)

    Titone, Renzoo

    1987-01-01

    Suggests that code-switching is not only a neurolinguistic process but also a psychological phenomenon with substantial reference to personality structure and dynamics. The bilingual's personality as a "code-switcher" is tentatively defined. (Author/CB)

  18. A Monte Carlo track structure code for low energy protons

    CERN Document Server

    Endo, S; Nikjoo, H; Uehara, S; Hoshi, M; Ishikawa, M; Shizuma, K

    2002-01-01

    A code is described for simulation of protons (100 eV to 10 MeV) track structure in water vapor. The code simulates molecular interaction by interaction for the transport of primary ions and secondary electrons in the form of ionizations and excitations. When a low velocity ion collides with the atoms or molecules of a target, the ion may also capture or lose electrons. The probabilities for these processes are described by the quantity cross-section. Although proton track simulation at energies above Bragg peak (>0.3 MeV) has been achieved to a high degree of precision, simulations at energies near or below the Bragg peak have only been attempted recently because of the lack of relevant cross-section data. As the hydrogen atom has a different ionization cross-section from that of a proton, charge exchange processes need to be considered in order to calculate stopping power for low energy protons. In this paper, we have used state-of-the-art Monte Carlo track simulation techniques, in conjunction with the pub...

  19. Is a genome a codeword of an error-correcting code?

    Directory of Open Access Journals (Sweden)

    Luzinete C B Faria

    Full Text Available Since a genome is a discrete sequence, the elements of which belong to a set of four letters, the question as to whether or not there is an error-correcting code underlying DNA sequences is unavoidable. The most common approach to answering this question is to propose a methodology to verify the existence of such a code. However, none of the methodologies proposed so far, although quite clever, has achieved that goal. In a recent work, we showed that DNA sequences can be identified as codewords in a class of cyclic error-correcting codes known as Hamming codes. In this paper, we show that a complete intron-exon gene, and even a plasmid genome, can be identified as a Hamming code codeword as well. Although this does not constitute a definitive proof that there is an error-correcting code underlying DNA sequences, it is the first evidence in this direction.

  20. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  1. 17 CFR 275.204A-1 - Investment adviser codes of ethics.

    Science.gov (United States)

    2010-04-01

    ... ethics. 275.204A-1 Section 275.204A-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... codes of ethics. (a) Adoption of code of ethics. If you are an investment adviser registered or required... enforce a written code of ethics that, at a minimum, includes: (1) A standard (or standards) of...

  2. FARGO3D: A New GPU-oriented MHD Code

    Science.gov (United States)

    Benítez-Llambay, Pablo; Masset, Frédéric S.

    2016-03-01

    We present the FARGO3D code, recently publicly released. It is a magnetohydrodynamics code developed with special emphasis on the physics of protoplanetary disks and planet-disk interactions, and parallelized with MPI. The hydrodynamics algorithms are based on finite-difference upwind, dimensionally split methods. The magnetohydrodynamics algorithms consist of the constrained transport method to preserve the divergence-free property of the magnetic field to machine accuracy, coupled to a method of characteristics for the evaluation of electromotive forces and Lorentz forces. Orbital advection is implemented, and an N-body solver is included to simulate planets or stars interacting with the gas. We present our implementation in detail and present a number of widely known tests for comparison purposes. One strength of FARGO3D is that it can run on either graphical processing units (GPUs) or central processing units (CPUs), achieving large speed-up with respect to CPU cores. We describe our implementation choices, which allow a user with no prior knowledge of GPU programming to develop new routines for CPUs, and have them translated automatically for GPUs.

  3. FARGO3D: A NEW GPU-ORIENTED MHD CODE

    Energy Technology Data Exchange (ETDEWEB)

    Benitez-Llambay, Pablo [Instituto de Astronomía Teórica y Experimental, Observatorio Astronónomico, Universidad Nacional de Córdoba. Laprida 854, X5000BGR, Córdoba (Argentina); Masset, Frédéric S., E-mail: pbllambay@oac.unc.edu.ar, E-mail: masset@icf.unam.mx [Instituto de Ciencias Físicas, Universidad Nacional Autónoma de México (UNAM), Apdo. Postal 48-3,62251-Cuernavaca, Morelos (Mexico)

    2016-03-15

    We present the FARGO3D code, recently publicly released. It is a magnetohydrodynamics code developed with special emphasis on the physics of protoplanetary disks and planet–disk interactions, and parallelized with MPI. The hydrodynamics algorithms are based on finite-difference upwind, dimensionally split methods. The magnetohydrodynamics algorithms consist of the constrained transport method to preserve the divergence-free property of the magnetic field to machine accuracy, coupled to a method of characteristics for the evaluation of electromotive forces and Lorentz forces. Orbital advection is implemented, and an N-body solver is included to simulate planets or stars interacting with the gas. We present our implementation in detail and present a number of widely known tests for comparison purposes. One strength of FARGO3D is that it can run on either graphical processing units (GPUs) or central processing units (CPUs), achieving large speed-up with respect to CPU cores. We describe our implementation choices, which allow a user with no prior knowledge of GPU programming to develop new routines for CPUs, and have them translated automatically for GPUs.

  4. A characterization of entanglement-assisted quantum low-density parity-check codes

    CERN Document Server

    Fujiwara, Yuichiro

    2011-01-01

    As in classical coding theory, quantum analogues of low-density parity-check (LDPC) codes have offered good error correction performance and low decoding complexity by employing the Calderbank-Shor-Steane (CSS) construction. However, special requirements in the quantum setting severely limit the structures such quantum codes can have. While the entanglement-assisted stabilizer formalism overcomes this limitation by exploiting maximally entangled states (ebits), excessive reliance on ebits is a substantial obstacle for implementation. This paper gives necessary and sufficient conditions for the existence of quantum LDPC codes which are obtainable from pairs of identical LDPC codes and consume only one ebit, and studies the spectrum of attainable code parameters.

  5. A Novel User Authentication Scheme Based on QR-Code

    Directory of Open Access Journals (Sweden)

    Kuan-Chieh Liao

    2010-08-01

    Full Text Available User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel.  Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized access to restricted resources. Instead of using the password file as conventional authentication systems, many researchers have devoted to implement various one-time password schemes using smart cards, time-synchronized token or short message service in order to reduce the risk of tampering and maintenance cost.  However, these schemes are impractical because of the far from ubiquitous hardware devices or the infrastructure requirements. To remedy these weaknesses, the attraction of the QR-code technique can be introduced into our one-time password authentication protocol. Not the same as before, the proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. For this reason, instead of carrying around a separate hardware token for each security domain, the superiority of handiness benefit from the mobile phone makes our approach more practical and convenient.

  6. HD Photo: a new image coding technology for digital photography

    Science.gov (United States)

    Srinivasan, Sridhar; Tu, Chengjie; Regunathan, Shankar L.; Sullivan, Gary J.

    2007-09-01

    This paper introduces the HD Photo coding technology developed by Microsoft Corporation. The storage format for this technology is now under consideration in the ITU-T/ISO/IEC JPEG committee as a candidate for standardization under the name JPEG XR. The technology was developed to address end-to-end digital imaging application requirements, particularly including the needs of digital photography. HD Photo includes features such as good compression capability, high dynamic range support, high image quality capability, lossless coding support, full-format 4:4:4 color sampling, simple thumbnail extraction, embedded bitstream scalability of resolution and fidelity, and degradation-free compressed domain support of key manipulations such as cropping, flipping and rotation. HD Photo has been designed to optimize image quality and compression efficiency while also enabling low-complexity encoding and decoding implementations. To ensure low complexity for implementations, the design features have been incorporated in a way that not only minimizes the computational requirements of the individual components (including consideration of such aspects as memory footprint, cache effects, and parallelization opportunities) but results in a self-consistent design that maximizes the commonality of functional processing components.

  7. A Free, Fast, Simple and Efficient TVD MHD Code

    CERN Document Server

    Pen, U L; Wong, S K; Pen, Ue-Li; Arras, Phil; Wong, ShingKwong

    2003-01-01

    We describe a numerical method to solve the magnetohydrodynamic (MHD) equations. The fluid variables are updated along each direction using the flux conservative, 2nd order, total variation diminishing (TVD), upwind scheme of Jin and Xin. The magnetic field is updated separately in two-dimensional advection-constraint steps. The electromotive force (EMF) is computed in the advection step using the TVD scheme, and this same EMF is used immediately in the constraint step in order to preserve \\grad.B=0 without the need to store intermediate fluxes. Operator splitting is used to extend the code to three dimensions, and Runge-Kutta is used to get second order accuracy in time. The advantages of this code are high resolution per grid cell, second order accuracy in space and time, enforcement of the \\grad.B=0 constraint to machine precision, no memory overhead, speed, and simplicity. A 3-D Fortran implementation less than 400 lines long is made freely available. We also implemented a fully scalable message-passing p...

  8. A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    Kannan Karthik

    2013-02-01

    Full Text Available Threshold ramp secret sharing schemes are designed so that (i certain subsets of shares have no information about the secret, (ii some subsets have partial information about the secret and (iii some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n, as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n2 for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

  9. Does the health of individuals have a mathematical code?

    Directory of Open Access Journals (Sweden)

    Ali Mehrabi Tavana

    2013-01-01

    Full Text Available The definition of health of individuals is well described by the World Health Organization (WHO and other International Health Organizations. Many studies have also been carried out in order to survey the health conditions in different countries based on this definition, therefore, the health condition of every country analyzed by the WHO. In this hypothesis, I would like to explain "whether the health of individuals has a mathematical code or not? If so, the discovery is on the way to examine each individual based on a health profile as well as every nation in the world to find out, what must be carried out on an individual, national, and international level to increase the health rank? The aim of this hypothesis is to bring to your attention and all of the WHO directors and specialist to ask" whether the health of individuals has a mathematical code or not?" If so, the new view must be considered in regard with the health of the world population, which will be discussed in this hypothesis.

  10. Easy as Pi: A Network Coding Raspberry Pi Testbed

    Directory of Open Access Journals (Sweden)

    Chres W. Sørensen

    2016-10-01

    Full Text Available In the near future, upcoming communications and storage networks are expected to tolerate major difficulties produced by huge amounts of data being generated from the Internet of Things (IoT. For these types of networks, strategies and mechanisms based on network coding have appeared as an alternative to overcome these difficulties in a holistic manner, e.g., without sacrificing the benefit of a given network metric when improving another. There has been recurrent issues on: (i making large-scale deployments akin to the Internet of Things; (ii assessing and (iii replicating the obtained results in preliminary studies. Therefore, finding testbeds that can deal with large-scale deployments and not lose historic data in order to evaluate these mechanisms are greatly needed and desirable from a research perspective. However, this can be hard to manage, not only due to the inherent costs of the hardware, but also due to maintenance challenges. In this paper, we present the required key steps to design, setup and maintain an inexpensive testbed using Raspberry Pi devices for communications and storage networks with network coding capabilities. This testbed can be utilized for any applications requiring results replicability.

  11. Verification and Validation of MERCURY: A Modern, Monte Carlo Particle Transport Code

    Energy Technology Data Exchange (ETDEWEB)

    Procassini, R J; Cullen, D E; Greenman, G M; Hagmann, C A

    2004-12-09

    Verification and Validation (V&V) is a critical phase in the development cycle of any scientific code. The aim of the V&V process is to determine whether or not the code fulfills and complies with the requirements that were defined prior to the start of the development process. While code V&V can take many forms, this paper concentrates on validation of the results obtained from a modern code against those produced by a validated, legacy code. In particular, the neutron transport capabilities of the modern Monte Carlo code MERCURY are validated against those in the legacy Monte Carlo code TART. The results from each code are compared for a series of basic transport and criticality calculations which are designed to check a variety of code modules. These include the definition of the problem geometry, particle tracking, collisional kinematics, sampling of secondary particle distributions, and nuclear data. The metrics that form the basis for comparison of the codes include both integral quantities and particle spectra. The use of integral results, such as eigenvalues obtained from criticality calculations, is shown to be necessary, but not sufficient, for a comprehensive validation of the code. This process has uncovered problems in both the transport code and the nuclear data processing codes which have since been rectified.

  12. A Coded Bit-Loading Linear Precoded Discrete Multitone Solution for Power Line Communication

    CERN Document Server

    Muhammad, Fahad Syed; Hélard, Jean-François; Crussière, Matthieu

    2008-01-01

    Linear precoded discrete multitone modulation (LP-DMT) system has been already proved advantageous with adaptive resource allocation algorithm in a power line communication (PLC) context. In this paper, we investigate the bit and energy allocation algorithm of an adaptive LP-DMT system taking into account the channel coding scheme. A coded adaptive LP-DMT system is presented in the PLC context with a loading algorithm which ccommodates the channel coding gains in bit and energy calculations. The performance of a concatenated channel coding scheme, consisting of an inner Wei's 4-dimensional 16-states trellis code and an outer Reed-Solomon code, in combination with the roposed algorithm is analyzed. Simulation results are presented for a fixed target bit error rate in a multicarrier scenario under power spectral density constraint. Using a multipath model of PLC channel, it is shown that the proposed coded adaptive LP-DMT system performs better than classical coded discrete multitone.

  13. A unified form of exact-MSR codes via product-matrix frameworks

    KAUST Repository

    Lin, Sian Jheng

    2015-02-01

    Regenerating codes represent a class of block codes applicable for distributed storage systems. The [n, k, d] regenerating code has data recovery capability while possessing arbitrary k out of n code fragments, and supports the capability for code fragment regeneration through the use of other arbitrary d fragments, for k ≤ d ≤ n - 1. Minimum storage regenerating (MSR) codes are a subset of regenerating codes containing the minimal size of each code fragment. The first explicit construction of MSR codes that can perform exact regeneration (named exact-MSR codes) for d ≥ 2k - 2 has been presented via a product-matrix framework. This paper addresses some of the practical issues on the construction of exact-MSR codes. The major contributions of this paper include as follows. A new product-matrix framework is proposed to directly include all feasible exact-MSR codes for d ≥ 2k - 2. The mechanism for a systematic version of exact-MSR code is proposed to minimize the computational complexities for the process of message-symbol remapping. Two practical forms of encoding matrices are presented to reduce the size of the finite field.

  14. A symbiotic liaison between the genetic and epigenetic code

    Directory of Open Access Journals (Sweden)

    Holger eHeyn

    2014-05-01

    Full Text Available With rapid advances in sequencing technologies, we are undergoing a paradigm shift from hypothesis- to data-driven research. Genome-wide profiling efforts gave informative insights into biological processes; however, considering the wealth of variation, the major challenge remains their meaningful interpretation. In particular sequence variation in non-coding contexts is often challenging to interpret. Here, data integration approaches for the identification of functional genetic variability represent a likely solution. Exemplary, functional linkage analysis integrating genotype and expression data determined regulatory quantitative trait loci (QTL and proposed causal relationships. In addition to gene expression, epigenetic regulation and specifically DNA methylation was established as highly valuable surrogate mark for functional variance of the genetic code. Epigenetic modification served as powerful mediator trait to elucidate mechanisms forming phenotypes in health and disease. Particularly, integrative studies of genetic and DNA methylation data yet guided interpretation strategies of risk genotypes, but also proved their value for physiological traits, such as natural human variation and aging. This Perspective seeks to illustrate the power of data integration in the genomic era exemplified by DNA methylation quantitative trait loci (meQTLs. However, the model is further extendable to virtually all traceable molecular traits.

  15. Equilibrium and stability code for a diffuse plasma.

    Science.gov (United States)

    Betancourt, O; Garabedian, P

    1976-04-01

    A computer code to investigate the equilibrium and stability of a diffuse plasma in three dimensions is described that generalizes earlier work on a sharp free boundary model. Toroidal equilibria of a plasma are determined by considering paths of steepest descent associated with a new version of the variational principle of magnetohydrodynamics that involves mapping a fixed coordinate domain onto the plasma. A discrete approximation of the potential energy is written down following the finite element method, and the resulting expression is minimized with respect to the values of the mapping at points of a rectangular grid. If a relative minimum of the discrete analogue of the energy is attained, the corresponding equilibrium is considered to be stable.

  16. 39 CFR Appendix A to Part 3000 - Code of Ethics For Government Service

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Code of Ethics For Government Service A Appendix A.... A Appendix A to Part 3000—Code of Ethics For Government Service Resolved by the House of Representatives (the Senate concurring), That it is the sense of the Congress that the following Code of...

  17. A color-coded vision scheme for robotics

    Science.gov (United States)

    Johnson, Kelley Tina

    1991-01-01

    Most vision systems for robotic applications rely entirely on the extraction of information from gray-level images. Humans, however, regularly depend on color to discriminate between objects. Therefore, the inclusion of color in a robot vision system seems a natural extension of the existing gray-level capabilities. A method for robot object recognition using a color-coding classification scheme is discussed. The scheme is based on an algebraic system in which a two-dimensional color image is represented as a polynomial of two variables. The system is then used to find the color contour of objects. In a controlled environment, such as that of the in-orbit space station, a particular class of objects can thus be quickly recognized by its color.

  18. TRANS4: a computer code calculation of solid fuel penetration of a concrete barrier

    International Nuclear Information System (INIS)

    The computer code, TRANS4, models the melting and penetration of a solid barrier by a solid disc of fuel following a core disruptive accident. This computer code has been used to model fuel debris penetration of basalt, limestone concrete, basaltic concrete, and magnetite concrete. Sensitivity studies were performed to assess the importance of various properties on the rate of penetration. Comparisons were made with results from the GROWS II code

  19. A Pragmatic Study on Code-switching in Chinese Network Chat

    Institute of Scientific and Technical Information of China (English)

    周薇

    2016-01-01

    Under the theoretical guideline of politeness principle, this paper will give a detailed analysis of code-switching with typical examples. It aims to offer things for further code-switching study from the perspective of pragmatics.

  20. Multi-View Video Coding Algorithms/Techniques: A Comprehensive Study

    Directory of Open Access Journals (Sweden)

    Shaik.Rahimunnisha

    2016-06-01

    Full Text Available For scientific exploration and visualization, Multi-view display enables a viewer to experience a 3-D environment via a flat 2-D screen. Visualization is the most effective and informative form for delivering any information. In this paper the recent developments in the multi-view video coding are reviewed such as Motion and Disparity Compensated coding, Wavelet based multi-view video coding, Spatial scalability coding etc.

  1. MABEL 2: a code to analyse cladding deformation in a loss of coolant accident

    International Nuclear Information System (INIS)

    The calculation strategy of MABEL-2 and the hierarchy and purpose of its subroutines are described so that a programmer can readily identify both the overall structure of the code and the functions of its constituent parts. Also, to assist those who wish to examine the coding in detail, the common block variables are defined and a list is given of all variables used in the code, together with the subroutines in which they are used. (author)

  2. Simplifying Parallelization of Scientific Codes by a Function-Centric Approach in Python

    OpenAIRE

    Nilsen, Jon K.; Cai, Xing; Hoyland, Bjorn; Langtangen, Hans Petter

    2010-01-01

    The purpose of this paper is to show how existing scientific software can be parallelized using a separate thin layer of Python code where all parallel communication is implemented. We provide specific examples on such layers of code, and these examples may act as templates for parallelizing a wide set of serial scientific codes. The use of Python for parallelization is motivated by the fact that the language is well suited for reusing existing serial codes programmed in other languages. The ...

  3. Motivations of Code-switching among People of Different English Profi-ciency:A Sociolinguistics Survey

    Institute of Scientific and Technical Information of China (English)

    GUAN Hui

    2015-01-01

    Code-switching is a linguistic behavior that arises as a result of languages coming into contact. The idea of code-switching was proposed since the 1970s and has been heatedly discussed. This study will particularly focus on the motivations for code-switching on campus, especially for the reason of college students and teachers as frequent users. The study aims to find out if there is any relevance between one’s English proficiency and motivation for code-switching.

  4. Error threshold for the surface code in a superohmic environment

    Science.gov (United States)

    Lopez-Delgado, Daniel A.; Novais, E.; Mucciolo, Eduardo R.; Caldeira, Amir O.

    Using the Keldysh formalism, we study the fidelity of a quantum memory over multiple quantum error correction cycles when the physical qubits interact with a bosonic bath at zero temperature. For encoding, we employ the surface code, which has one of the highest error thresholds in the case of stochastic and uncorrelated errors. The time evolution of the fidelity of the resulting two-dimensional system is cast into a statistical mechanics phase transition problem on a three-dimensional spin lattice, and the error threshold is determined by the critical temperature of the spin model. For superohmic baths, we find that time does not affect the error threshold: its value is the same for one or an arbitrary number of quantum error correction cycles. Financial support Fapesp, and CNPq (Brazil).

  5. Developing a code of ethics for human cloning.

    Science.gov (United States)

    Collmann, J; Graber, G

    2000-01-01

    Under what conditions might the cloning of human beings constitute an ethical practice? A tendency exists to analyze human cloning merely as a technical procedure. As with all revolutionary technological developments, however, human cloning potentially exists in a broad social context that will both shape and be shaped by the biological techniques. Although human cloning must be subjected to technical analysis that addresses fundamental ethical questions such as its safety and efficacy, questions exist that focus our attention on broader issues. Asserting that cloning inevitably leads to undesirable consequences commits the fallacy of technological determinism and untenably separates technological and ethical evaluation. Drawing from the Report of the National Bioethics Advisory Committee and Aldous Huxley's Brave New World, we offer a draft "Code of Ethics for Human Cloning" in order to stimulate discussion about the ethics of the broader ramifications of human cloning as well as its particular technological properties.

  6. Applications of ASTEC integral code on a generic CANDU 6

    Energy Technology Data Exchange (ETDEWEB)

    Radu, Gabriela, E-mail: gabriela.radu@nuclear.ro [Institute for Nuclear Research, Campului 1, 115400 Mioveni, Arges (Romania); Prisecaru, Ilie [Power Engineering Department, University “Politehnica” of Bucharest, 313 Splaiul Independentei, Bucharest (Romania)

    2015-05-15

    Highlights: • Short overview of the models included in the ASTEC MCCI module. • MEDICIS/CPA coupled calculations for a generic CANDU6 reactor. • Two cases taking into account different pool/concrete interface models. - Abstract: In case of a hypothetical severe accident in a nuclear power plant, the corium consisting of the molten reactor core and internal structures may flow onto the concrete floor of containment building. This would cause an interaction between the molten corium and the concrete (MCCI), in which the heat transfer from the hot melt to the concrete would cause the decomposition and the ablation of the concrete. The potential hazard of this interaction is the loss of integrity of the containment building and the release of fission products into the environment due to the possibility of a concrete foundation melt-through or containment over-pressurization by the gases produced from the decomposition of the concrete or by the inflammation of combustible gases. In the safety assessment of nuclear power plants, it is necessary to know the consequences of such a phenomenon. The paper presents an example of application of the ASTECv2 code to a generic CANDU6 reactor. This concerns the thermal-hydraulic behaviour of the containment during molten core–concrete interaction in the reactor vault. The calculations were carried out with the help of the MEDICIS MCCI module and the CPA containment module of ASTEC code coupled through a specific prediction–correction method, which consists in describing the heat exchanges with the vault walls and partially absorbent gases. Moreover, the heat conduction inside the vault walls is described. Two cases are presented in this paper taking into account two different heat transfer models at the pool/concrete interface and siliceous concrete. The corium pool configuration corresponds to a homogeneous configuration with a detailed description of the upper crust.

  7. Regulations and Ethical Considerations for Astronomy Education Research III: A Suggested Code of Ethics

    Science.gov (United States)

    Brogt, Erik; Foster, Tom; Dokter, Erin; Buxner, Sanlyn; Antonellis, Jessie

    2009-01-01

    We present an argument for, and suggested implementation of, a code of ethics for the astronomy education research community. This code of ethics is based on legal and ethical considerations set forth by U.S. federal regulations and the existing code of conduct of the American Educational Research Association. We also provide a fictitious research…

  8. Upper bounds on the number of errors corrected by a convolutional code

    DEFF Research Database (Denmark)

    Justesen, Jørn

    2004-01-01

    We derive upper bounds on the weights of error patterns that can be corrected by a convolutional code with given parameters, or equivalently we give bounds on the code rate for a given set of error patterns. The bounds parallel the Hamming bound for block codes by relating the number of error...... patterns to the number of distinct syndromes....

  9. An object-oriented scripting interface to a legacy electronic structure code

    DEFF Research Database (Denmark)

    Bahn, Sune Rastad; Jacobsen, Karsten Wedel

    2002-01-01

    The authors have created an object-oriented scripting interface to a mature density functional theory code. The interface gives users a high-level, flexible handle on the code without rewriting the underlying number-crunching code. The authors also discuss design issues and the advantages of...

  10. SSCTRK: A particle tracking code for the SSC

    International Nuclear Information System (INIS)

    While many indirect methods are available to evaluate dynamic aperture there appears at this time to be no reliable substitute to tracking particles through realistic machine lattices for a number of turns determined by the storage times. Machine lattices are generated by ''Monte Carlo'' techniques from the expected rms fabrication and survey errors. Any given generated machine can potentially be a lucky or unlucky fluctuation from the average. Therefore simulation to serve as a predictor of future performance must be done for an ensemble of generated machines. Further, several amplitudes and momenta are necessary to predict machine performance. Thus to make Monte Carlo type simulations for the SSC requires very considerable computer resources. Hitherto, it has been assumed that this was not feasible, and alternative indirect methods have been proposed or tried to answer the problem. We reexamined the feasibility of using direct computation. Previous codes have represented lattices by a succession of thin elements separated by bend-drifts. With ''kick-drift'' configurations, tracking time is linear in the multipole order included, and the code is symplectic. Modern vector processors simultaneously handle a large number of cases in parallel. Combining the efficiencies of kick drift tracking with vector processing, in fact, makes realistic Monte Carlo simulation entirely feasible. SSCTRK uses the above features. It is structured to have a very friendly interface, a very wide latitude of choice for cases to be run in parallel, and, by using pure FORTRAN 77, to interchangeably run on a wide variety of computers. We describe in this paper the program structure operational checks and results achieved

  11. Djehuty, a Code for Modeling Stars in Three Dimensions

    CERN Document Server

    Bazán, G; Dossa, D D; Eggleton, P P; Taylor, A; Castor, J I; Murray, S; Cook, K H; Eltgroth, P G; Cavallo, R M; Turcotte, S; Keller, S C; Pudliner, B S

    2003-01-01

    Current practice in stellar evolution is to employ one-dimensional calculations that quantitatively apply only to a minority of the observed stars (single non-rotating stars, or well detached binaries). Even in these systems, astrophysicists are dependent on approximations to handle complex three-dimensional processes like convection. Understanding the structure of binary stars, like those that lead to the Type Ia supernovae used to measure the expansion of the universe, are grossly non-spherical and await a 3D treatment. To approach very large problems like multi-dimensional modeling of stars, the Lawrence Livermore National Laboratory has invested in massively parallel computers and invested even more in developing the algorithms to utilize them on complex physics problems. We have leveraged skills from across the lab to develop a 3D stellar evolution code, Djehuty (after the Egyptian god for writing and calculation) that operates efficiently on platforms with thousands of nodes, with the best available phy...

  12. A revisit to the GNSS-R code range precision

    CERN Document Server

    Germain, O

    2006-01-01

    We address the feasibility of a GNSS-R code-altimetry space mission and more specifically a dominant term of its error budget: the reflected-signal range precision. This is the RMS error on the reflected-signal delay, as estimated by waveform retracking. So far, the approach proposed by [Lowe et al., 2002] has been the state of the art to theoretically evaluate this precision, although known to rely on strong assumptions (e.g., no speckle noise). In this paper, we perform a critical review of this model and propose an improvement based on the Cramer-Rao Bound (CRB) approach. We derive closed-form expressions for both the direct and reflected signals. The performance predicted by CRB analysis is about four times worse for typical space mission scenarios. The impact of this result is discussed in the context of two classes of GNSS-R applications: mesoscale oceanography and tsunami detection.

  13. On the Feasibility of a Network Coded Mobile Storage Cloud

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Conventional cloud storage services offer relatively good reliability and performance in a cost-effective manner. However, they are typically structured in a centralized and highly controlled fashion. In more dynamic storage scenarios, these centralized approaches are unfeasible and developing...... decentralized storage approaches becomes critical. The novelty of this paper is the introduction of the highly dynamic distributed mobile cloud, which uses free resources on user devices to move storage to the edges of the network. At the core of our approach, lies the use of random linear network coding...... data availability. We have found that as little as 75% redundancy is enough to offer 99.28% availability for the examined period and essentially 100% availability is achieved when using 50% redundancy along with high-availability nodes. We have leveraged traces from a popular P2P mobile application...

  14. A watermarking scheme for High Efficiency Video Coding (HEVC).

    Science.gov (United States)

    Swati, Salahuddin; Hayat, Khizar; Shahid, Zafar

    2014-01-01

    This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC). HEVC is an emerging video compression standard that provides better compression performance as compared to its predecessor, i.e. H.264/AVC. Considering that HEVC may will be used in a variety of applications in the future, the proposed algorithm has a high potential of utilization in applications involving broadcast and hiding of metadata. The watermark is embedded into the Quantized Transform Coefficients (QTCs) during the encoding process. Later, during the decoding process, the embedded message can be detected and extracted completely. The experimental results show that the proposed algorithm does not significantly affect the video quality, nor does it escalate the bitrate.

  15. Visualization of elastic wavefields computed with a finite difference code

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, S. [Lawrence Livermore National Lab., CA (United States); Harris, D.

    1994-11-15

    The authors have developed a finite difference elastic propagation model to simulate seismic wave propagation through geophysically complex regions. To facilitate debugging and to assist seismologists in interpreting the seismograms generated by the code, they have developed an X Windows interface that permits viewing of successive temporal snapshots of the (2D) wavefield as they are calculated. The authors present a brief video displaying the generation of seismic waves by an explosive source on a continent, which propagate to the edge of the continent then convert to two types of acoustic waves. This sample calculation was part of an effort to study the potential of offshore hydroacoustic systems to monitor seismic events occurring onshore.

  16. A watermarking scheme for High Efficiency Video Coding (HEVC.

    Directory of Open Access Journals (Sweden)

    Salahuddin Swati

    Full Text Available This paper presents a high payload watermarking scheme for High Efficiency Video Coding (HEVC. HEVC is an emerging video compression standard that provides better compression performance as compared to its predecessor, i.e. H.264/AVC. Considering that HEVC may will be used in a variety of applications in the future, the proposed algorithm has a high potential of utilization in applications involving broadcast and hiding of metadata. The watermark is embedded into the Quantized Transform Coefficients (QTCs during the encoding process. Later, during the decoding process, the embedded message can be detected and extracted completely. The experimental results show that the proposed algorithm does not significantly affect the video quality, nor does it escalate the bitrate.

  17. Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source-Channel-Network Coding Approach

    OpenAIRE

    Joda, Roghayeh; Lahouti, Farshad

    2010-01-01

    This paper addresses network code design for robust transmission of sources over an orthogonal two-hop wireless network with a broadcasting relay. The network consists of multiple sources and destinations in which each destination, benefiting the relay signal, intends to decode a subset of the sources. Two special instances of this network are orthogonal broadcast relay channel and the orthogonal multiple access relay channel. The focus is on complexity constrained scenarios, e.g., for wirele...

  18. Computer simulation of a klystron using a field-charge interaction code (FCI)

    International Nuclear Information System (INIS)

    The field-charge interaction code (FCI), based on a particle-in-cell simulation, has been used to analyze and develop high power klystrons at KEK as well as at industry labs since 1989. Several new high-power klystrons have been developed by using the FCI code. This lecture describes the code, provides examples of its application, and evaluates performance of the newly developed tubes. Operational details are given in the users manual. (author)

  19. A code of ethics for the life sciences.

    Science.gov (United States)

    Jones, Nancy L

    2007-03-01

    The activities of the life sciences are essential to provide solutions for the future, for both individuals and society. Society has demanded growing accountability from the scientific community as implications of life science research rise in influence and there are concerns about the credibility, integrity and motives of science. While the scientific community has responded to concerns about its integrity in part by initiating training in research integrity and the responsible conduct of research, this approach is minimal. The scientific community justifies itself by appealing to the ethos of science, claiming academic freedom, self-direction, and self-regulation, but no comprehensive codification of this foundational ethos has been forthcoming. A review of the professional norms of science and a prototype code of ethics for the life sciences provide a framework to spur discussions within the scientific community to define scientific professionalism. A formalization of implicit principles can provide guidance for recognizing divergence from the norms, place these norms within a context that would enhance education of trainees, and provide a framework for discussing externally and internally applied pressures that are influencing the practice of science. The prototype code articulates the goal for life sciences research and the responsibilities associated with the freedom of exploration, the principles for the practice of science, and the virtues of the scientists themselves. The time is ripe for scientific communities to reinvigorate professionalism and define the basis of their social contract. Codifying the basis of the social contract between science and society will sustain public trust in the scientific enterprise. PMID:17703607

  20. A Comparison of Source Code Plagiarism Detection Engines

    Science.gov (United States)

    Lancaster, Thomas; Culwin, Fintan

    2004-06-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and effective techniques are seen to involve tokenising student submissions then searching pairs of submissions for long common substrings, an example of what is defined to be a paired structural metric. Computing academics are recommended to use one of the two Web-based detection engines, MOSS and JPlag. It is shown that whilst detection is well established there are still places where further research would be useful, particularly where visual support of the investigation process is possible.

  1. A benchmark study for glacial isostatic adjustment codes

    Science.gov (United States)

    Spada, G.; Barletta, V. R.; Klemann, V.; Riva, R. E. M.; Martinec, Z.; Gasperini, P.; Lund, B.; Wolf, D.; Vermeersen, L. L. A.; King, M. A.

    2011-04-01

    The study of glacial isostatic adjustment (GIA) is gaining an increasingly important role within the geophysical community. Understanding the response of the Earth to loading is crucial in various contexts, ranging from the interpretation of modern satellite geodetic measurements (e.g. GRACE and GOCE) to the projections of future sea level trends in response to climate change. Modern modelling approaches to GIA are based on various techniques that range from purely analytical formulations to fully numerical methods. Despite various teams independently investigating GIA, we do not have a suitably large set of agreed numerical results through which the methods may be validated; a community benchmark data set would clearly be valuable. Following the example of the mantle convection community, here we present, for the first time, the results of a benchmark study of codes designed to model GIA. This has taken place within a collaboration facilitated through European Cooperation in Science and Technology (COST) Action ES0701. The approaches benchmarked are based on significantly different codes and different techniques. The test computations are based on models with spherical symmetry and Maxwell rheology and include inputs from different methods and solution techniques: viscoelastic normal modes, spectral-finite elements and finite elements. The tests involve the loading and tidal Love numbers and their relaxation spectra, the deformation and gravity variations driven by surface loads characterized by simple geometry and time history and the rotational fluctuations in response to glacial unloading. In spite of the significant differences in the numerical methods employed, the test computations show a satisfactory agreement between the results provided by the participants.

  2. Concealed holographic coding for security applications by using a moire technique

    DEFF Research Database (Denmark)

    Zhang, Xiangsu; Dalsgaard, Erik

    1997-01-01

    We present an optical coding technique that enhances the anticounterfeiting power of security holograms. The principles of the technique is based on the moire phenomenon. The code in the hologram has a phase pattern that is invisible and cannot be detected by optical equipment, so that imitation...... is extremely difficult. Holographic, photographic and embossing technique are used in fabricating coded holograms and decoders....

  3. MUXS: a code to generate multigroup cross sections for sputtering calculations

    International Nuclear Information System (INIS)

    This report documents MUXS, a computer code to generate multigroup cross sections for charged particle transport problems. Cross sections generated by MUXS can be used in many multigroup transport codes, with minor modifications to these codes, to calculate sputtering yields, reflection coefficients, penetration distances, etc

  4. MUXS: a code to generate multigroup cross sections for sputtering calculations

    Energy Technology Data Exchange (ETDEWEB)

    Hoffman, T.J.; Robinson, M.T.; Dodds, H.L. Jr.

    1982-10-01

    This report documents MUXS, a computer code to generate multigroup cross sections for charged particle transport problems. Cross sections generated by MUXS can be used in many multigroup transport codes, with minor modifications to these codes, to calculate sputtering yields, reflection coefficients, penetration distances, etc.

  5. A Computer Oriented Scheme for Coding Chemicals in the Field of Biomedicine.

    Science.gov (United States)

    Bobka, Marilyn E.; Subramaniam, J.B.

    The chemical coding scheme of the Medical Coding Scheme (MCS), developed for use in the Comparative Systems Laboratory (CSL), is outlined and evaluated in this report. The chemical coding scheme provides a classification scheme and encoding method for drugs and chemical terms. Using the scheme complicated chemical structures may be expressed…

  6. Code-Switching in English as a Foreign Language Classroom: Teachers' Attitudes

    Science.gov (United States)

    Ibrahim, Engku Haliza Engku; Shah, Mohamed Ismail Ahamad; Armia, Najwa Tgk.

    2013-01-01

    Code-switching has always been an intriguing phenomenon to sociolinguists. While the general attitude to it seems negative, people seem to code-switch quite frequently. Teachers of English as a foreign language too frequently claim that they do not like to code-switch in the language classroom for various reasons--many are of the opinion that only…

  7. LSENS, a general chemical kinetics and sensitivity analysis code for homogeneous gas-phase reactions. 2: Code description and usage

    Science.gov (United States)

    Radhakrishnan, Krishnan; Bittker, David A.

    1994-01-01

    LSENS, the Lewis General Chemical Kinetics Analysis Code, has been developed for solving complex, homogeneous, gas-phase chemical kinetics problems and contains sensitivity analysis for a variety of problems, including nonisothermal situations. This report is part 2 of a series of three reference publications that describe LSENS, provide a detailed guide to its usage, and present many example problems. Part 2 describes the code, how to modify it, and its usage, including preparation of the problem data file required to execute LSENS. Code usage is illustrated by several example problems, which further explain preparation of the problem data file and show how to obtain desired accuracy in the computed results. LSENS is a flexible, convenient, accurate, and efficient solver for chemical reaction problems such as static system; steady, one-dimensional, inviscid flow; reaction behind incident shock wave, including boundary layer correction; and perfectly stirred (highly backmixed) reactor. In addition, the chemical equilibrium state can be computed for the following assigned states: temperature and pressure, enthalpy and pressure, temperature and volume, and internal energy and volume. For static problems the code computes the sensitivity coefficients of the dependent variables and their temporal derivatives with respect to the initial values of the dependent variables and/or the three rate coefficient parameters of the chemical reactions. Part 1 (NASA RP-1328) derives the governing equations describes the numerical solution procedures for the types of problems that can be solved by lSENS. Part 3 (NASA RP-1330) explains the kinetics and kinetics-plus-sensitivity-analysis problems supplied with LSENS and presents sample results.

  8. A fast block mode selection approach for H. Visual coding

    Institute of Scientific and Technical Information of China (English)

    LIN Wei-yao; Fang Xiang-zhong; HUANG Xiu-chao; LI Dian; LIU Xiao-feng

    2006-01-01

    In this paper,a new fast mode-selection approach is proposed.This algorithm combines the proposed approaches of mode pre-decision and precise large-small mode decision,by selecting the best mode efficiently.Experimental results show that the proposed approach can reduce the computational cost of full search and fast multi-block motion estimation by 8% and 45%,respectively,with similar visual quality and bit rate.The proposed algorithm also reduces by 75% the computational cost of the large-small mode isolation algorithm for low-motion sequence coding,and with 0.06 PSNR gain and 3.7% reduction in bit rate.

  9. Assessment of MARMOT. A Mesoscale Fuel Performance Code

    Energy Technology Data Exchange (ETDEWEB)

    Tonks, M. R. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Schwen, D. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Zhang, Y. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Chakraborty, P. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Bai, X. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Fromm, B. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Yu, J. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Teague, M. C. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Andersson, D. A. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-04-01

    MARMOT is the mesoscale fuel performance code under development as part of the US DOE Nuclear Energy Advanced Modeling and Simulation Program. In this report, we provide a high level summary of MARMOT, its capabilities, and its current state of validation. The purpose of MARMOT is to predict the coevolution of microstructure and material properties of nuclear fuel and cladding. It accomplished this using the phase field method coupled to solid mechanics and heat conduction. MARMOT is based on the Multiphysics Object-Oriented Simulation Environment (MOOSE), and much of its basic capability in the areas of the phase field method, mechanics, and heat conduction come directly from MOOSE modules. However, additional capability specific to fuel and cladding is available in MARMOT. While some validation of MARMOT has been completed in the areas of fission gas behavior and grain growth, much more validation needs to be conducted. However, new mesoscale data needs to be obtained in order to complete this validation.

  10. Seeing relativity -- I. Basics of a raytracing code in a Schwarzschild metric

    CERN Document Server

    Riazuelo, Alain

    2015-01-01

    We present here an implementation of a raytracing code in the Schwarzschild metric. We aim at building a numerical code with a correct implementation of both special (aberration, amplification, Doppler) and general (deflection of light, lensing, gravitational redshift) relativistic effects by paying attention to a good rendering of stars

  11. A portable virtual machine target for proof-carrying code

    DEFF Research Database (Denmark)

    Franz, Michael; Chandra, Deepak; Gal, Andreas;

    2005-01-01

    Virtual Machines (VMs) and Proof-Carrying Code (PCC) are two techniques that have been used independently to provide safety for (mobile) code. Existing virtual machines, such as the Java VM, have several drawbacks: First, the effort required for safety verification is considerable. Second and mor...... simultaneously providing efficient justin-time compilation and target-machine independence. In particular, our approach reduces the complexity of the required proofs, resulting in fewer proof obligations that need to be discharged at the target machine.......Virtual Machines (VMs) and Proof-Carrying Code (PCC) are two techniques that have been used independently to provide safety for (mobile) code. Existing virtual machines, such as the Java VM, have several drawbacks: First, the effort required for safety verification is considerable. Second and more...... subtly, the need to provide such verification by the code consumer inhibits the amount of optimization that can be performed by the code producer. This in turn makes justin-time compilation surprisingly expensive. Proof-Carrying Code, on the other hand, has its own set of limitations, among which...

  12. A computer code for seismic qualification of nuclear service valves

    International Nuclear Information System (INIS)

    The computer code, CERTIVALVE, has been developed for detailed frequency, seismic stress, and deformation analysis of nuclear service valves. It is an expedient means of analyzing, designing, and qualifying nuclear service valves for dynamic loads. The program is designed to be applicable to virtually all types of ASME Class 1, 2, and 3 valves, including gate, globe, disk, ball, safety-relief, diaphragm, and butterfly valves. It can evaluate valves of nearly all major manufacturers both foreign and domestic. CERTIVALVE computes all natural frequencies of any valve up to 40 Hertz (or higher if the user desires). The program constructs a multi-degree-offreedom (MDOF) finite element model which is used in the eigenvalue (natural frequency) solution. CERTIVALVE also computes the maximum allowable acceleration capacity of any valve on the basis of user-supplied allowable stress limits and the geometric and material properties of the valve components. The worst spatial orientation of the valve is assumed. The maximum allowable resultant is reported in terms of a multiple of weight (that is, in values of g) for each valve component. The valve components evaluated include the non-pressure retaining yoke structure for prismatic, nonprismatic, and curved sections; the yoke-bonnet junction for bolted, clamped and bossed connection details; the bonnet and body sections for various geometric cross sections; and the body-bonnet junction for both bolted-gasket and threaded connections. Finally, the program also performs an operability deformation analysis to check that stem binding is precluded. The evaluation procedures are performed in accordance with included codes and standards. The theoretical development of the program is provided and examples of the program options are presented

  13. A large scale code resolution service network in the Internet of Things.

    Science.gov (United States)

    Yu, Haining; Zhang, Hongli; Fang, Binxing; Yu, Xiangzhan

    2012-11-07

    In the Internet of Things a code resolution service provides a discovery mechanism for a requester to obtain the information resources associated with a particular product code immediately. In large scale application scenarios a code resolution service faces some serious issues involving heterogeneity, big data and data ownership. A code resolution service network is required to address these issues. Firstly, a list of requirements for the network architecture and code resolution services is proposed. Secondly, in order to eliminate code resolution conflicts and code resolution overloads, a code structure is presented to create a uniform namespace for code resolution records. Thirdly, we propose a loosely coupled distributed network consisting of heterogeneous, independent; collaborating code resolution services and a SkipNet based code resolution service named SkipNet-OCRS, which not only inherits DHT’s advantages, but also supports administrative control and autonomy. For the external behaviors of SkipNet-OCRS, a novel external behavior mode named QRRA mode is proposed to enhance security and reduce requester complexity. For the internal behaviors of SkipNet-OCRS, an improved query algorithm is proposed to increase query efficiency. It is analyzed that integrating SkipNet-OCRS into our resolution service network can meet our proposed requirements. Finally, simulation experiments verify the excellent performance of SkipNet-OCRS.

  14. A Large Scale Code Resolution Service Network in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Xiangzhan Yu

    2012-11-01

    Full Text Available In the Internet of Things a code resolution service provides a discovery mechanism for a requester to obtain the information resources associated with a particular product code immediately. In large scale application scenarios a code resolution service faces some serious issues involving heterogeneity, big data and data ownership. A code resolution service network is required to address these issues. Firstly, a list of requirements for the network architecture and code resolution services is proposed. Secondly, in order to eliminate code resolution conflicts and code resolution overloads, a code structure is presented to create a uniform namespace for code resolution records. Thirdly, we propose a loosely coupled distributed network consisting of heterogeneous, independent; collaborating code resolution services and a SkipNet based code resolution service named SkipNet-OCRS, which not only inherits DHT’s advantages, but also supports administrative control and autonomy. For the external behaviors of SkipNet-OCRS, a novel external behavior mode named QRRA mode is proposed to enhance security and reduce requester complexity. For the internal behaviors of SkipNet-OCRS, an improved query algorithm is proposed to increase query efficiency. It is analyzed that integrating SkipNet-OCRS into our resolution service network can meet our proposed requirements. Finally, simulation experiments verify the excellent performance of SkipNet-OCRS.

  15. A UEP LT Codes Design with Feedback for Underwater Communication

    Directory of Open Access Journals (Sweden)

    Danfeng Zhao

    2016-01-01

    Full Text Available To satisfy the performance requirement of LT codes with Unequal Erasure Protection (UEP in underwater environment, the Weighted Expanding Window Fountain (WEWF code is proposed in this paper. The WEWF codes can achieve strong UEP property by nonuniformly selecting input symbols within each window. To overcome the disadvantages in terms of redundancy in the lower prioritized segments, Correlation Chain Feedback (CCFB is also introduced to help the transmitter to precisely adjust the encoding scheme. Asymptotic analysis and simulation results demonstrate that the proposed approach can achieve lower symbol error rate and less overall redundancy in the underwater acoustic sensor networks.

  16. The Evolution of a Coding Schema in a Paced Program of Research

    Science.gov (United States)

    Winters, Charlene A.; Cudney, Shirley; Sullivan, Therese

    2010-01-01

    A major task involved in the management, analysis, and integration of qualitative data is the development of a coding schema to facilitate the analytic process. Described in this paper is the evolution of a coding schema that was used in the analysis of qualitative data generated from online forums of middle-aged women with chronic conditions who…

  17. Assessement of Codes and Standards Applicable to a Hydrogen Production Plant Coupled to a Nuclear Reactor

    Energy Technology Data Exchange (ETDEWEB)

    M. J. Russell

    2006-06-01

    This is an assessment of codes and standards applicable to a hydrogen production plant to be coupled to a nuclear reactor. The result of the assessment is a list of codes and standards that are expected to be applicable to the plant during its design and construction.

  18. Folklore in bureaucracy code: Running a music event

    Directory of Open Access Journals (Sweden)

    Krstanović-Lukić Miroslava

    2004-01-01

    Full Text Available A music folk-created piece of work is a construction expressed as a paradigm part of a set in the bureaucracy system and the public arena. Such a work is a mechanical concept, which defines inheritance as a construction of authenticity saturated with elements of folk, national culture. It is also a subject of certain conventions in the system of regulations; namely, it is a part of the administrative code. The usage of the folk created work as a paradigm and legislations is realized through an organizational apparatus that is, it becomes entertainment, a spectacle. This paper analyzes the functioning of the organizational machinery of a folk spectacle, starting with the government authorities, local self-management and the spectacle's administrative committees. To illustrate this phenomenon, the paper presents the development of a trumpet playing festival in Dragačevo. This particular festival establishes a cultural, economic and political order with a clear and defined division of power. The analysis shows that the folk event in question, through its programs and activities, represents a scene and arena of individual and group interests. Organizational interactions are recognized in binary oppositions: sovereignty/dependency official/unofficial, dominancy/ subordination, innovative/inherited common/different, needed/useful, original/copy, one's own/belonging to someone else.

  19. Development and Validation of A Nuclear Fuel Cycle Analysis Tool: A FUTURE Code

    International Nuclear Information System (INIS)

    This paper presents the development and validation methods of the FUTURE (FUel cycle analysis Tool for nUcleaR Energy) code, which was developed for a dynamic material flow evaluation and economic analysis of the nuclear fuel cycle. This code enables an evaluation of a nuclear material flow and its economy for diverse nuclear fuel cycles based on a predictable scenario. The most notable virtue of this FUTURE code, which was developed using C and MICROSOFT SQL DBMS, is that a program user can design a nuclear fuel cycle process easily using a standard process on the canvas screen through a drag-and-drop method. From the user's point of view, this code is very easy to use thanks to its high flexibility. In addition, the new code also enables the maintenance of data integrity by constructing a database environment of the results of the nuclear fuel cycle analyses

  20. CIPER: a two- and three-dimensional perturbation code based on diffusion theory

    International Nuclear Information System (INIS)

    The CIPER code calculates a reactivity on the basis of the first order or exact perturbation theory by using an output from a two or three-dimensional diffusion calculation. The code accepts the neutron flux and adjoint flux computed by the CITATION code. The anisotropic effect of leakage can be obtained from the adoption of the anisotropic diffusion coefficients. This code is programmed with the use of arrays with adjustable dimensions for main variables. This article includes an explanation of calculation formula and input-output formats of the CIPER code. The Sample I/O list and Fortran list are given in the appendix. (auth.)

  1. A study of transonic aerodynamic analysis methods for use with a hypersonic aircraft synthesis code

    Science.gov (United States)

    Sandlin, Doral R.; Davis, Paul Christopher

    1992-01-01

    A means of performing routine transonic lift, drag, and moment analyses on hypersonic all-body and wing-body configurations were studied. The analysis method is to be used in conjunction with the Hypersonic Vehicle Optimization Code (HAVOC). A review of existing techniques is presented, after which three methods, chosen to represent a spectrum of capabilities, are tested and the results are compared with experimental data. The three methods consist of a wave drag code, a full potential code, and a Navier-Stokes code. The wave drag code, representing the empirical approach, has very fast CPU times, but very limited and sporadic results. The full potential code provides results which compare favorably to the wind tunnel data, but with a dramatic increase in computational time. Even more extreme is the Navier-Stokes code, which provides the most favorable and complete results, but with a very large turnaround time. The full potential code, TRANAIR, is used for additional analyses, because of the superior results it can provide over empirical and semi-empirical methods, and because of its automated grid generation. TRANAIR analyses include an all body hypersonic cruise configuration and an oblique flying wing supersonic transport.

  2. Teaching, Morality, and Responsibility: A Structuralist Analysis of a Teachers' Code of Conduct

    Science.gov (United States)

    Shortt, Damien; Hallett, Fiona; Spendlove, David; Hardy, Graham; Barton, Amanda

    2012-01-01

    In this paper we conduct a Structuralist analysis of the General Teaching Council for England's "Code of Conduct and Practice for Registered Teachers" in order to reveal how teachers are required to fulfil an apparently impossible social role. The GTCE's "Code," we argue, may be seen as an attempt by a government agency to resolve the political…

  3. A static analysis tool set for assembler code verification

    International Nuclear Information System (INIS)

    Software Verification and Validation (V and V) is an important step in assuring reliability and quality of the software. The verification of program source code forms an important part of the overall V and V activity. The static analysis tools described here are useful in verification of assembler code. The tool set consists of static analysers for Intel 8086 and Motorola 68000 assembly language programs. The analysers examine the program source code and generate information about control flow within the program modules, unreachable code, well-formation of modules, call dependency between modules etc. The analysis of loops detects unstructured loops and syntactically infinite loops. Software metrics relating to size and structural complexity are also computed. This report describes the salient features of the design, implementation and the user interface of the tool set. The outputs generated by the analyser are explained using examples taken from some projects analysed by this tool set. (author). 7 refs., 17 figs

  4. Performance Analysis of a Decoding Algorithm for Algebraic Geometry Codes

    DEFF Research Database (Denmark)

    Jensen, Helge Elbrønd; Nielsen, Rasmus Refslund; Høholdt, Tom

    1998-01-01

    We analyse the known decoding algorithms for algebraic geometry codes in the case where the number of errors is greater than or equal to [(dFR-1)/2]+1, where dFR is the Feng-Rao distance......We analyse the known decoding algorithms for algebraic geometry codes in the case where the number of errors is greater than or equal to [(dFR-1)/2]+1, where dFR is the Feng-Rao distance...

  5. Development of a New Monte Carlo reactor physics code

    OpenAIRE

    Leppänen, Jaakko

    2007-01-01

    Monte Carlo neutron transport codes are widely used in various reactor physics applications, traditionally related to criticality safety analyses, radiation shielding problems, detector modelling and validation of deterministic transport codes. The main advantage of the method is the capability to model geometry and interaction physics without major approximations. The disadvantage is that the modelling of complicated systems is very computing-intensive, which restricts the applications to so...

  6. A code for obtaining temperature distribution by finite element method

    International Nuclear Information System (INIS)

    The ELEFIB Fortran language computer code using finite element method for calculating temperature distribution of linear and two dimensional problems, in permanent region or in the transient phase of heat transfer, is presented. The formulation of equations uses the Galerkin method. Some examples are shown and the results are compared with other papers. The comparative evaluation shows that the elaborated code gives good values. (M.C.K.)

  7. JSPAM: A restricted three-body code for simulating interacting galaxies

    Science.gov (United States)

    Wallin, J. F.; Holincheck, A. J.; Harvey, A.

    2016-07-01

    Restricted three-body codes have a proven ability to recreate much of the disturbed morphology of actual interacting galaxies. As more sophisticated n-body models were developed and computer speed increased, restricted three-body codes fell out of favor. However, their supporting role for performing wide searches of parameter space when fitting orbits to real systems demonstrates a continuing need for their use. Here we present the model and algorithm used in the JSPAM code. A precursor of this code was originally described in 1990, and was called SPAM. We have recently updated the software with an alternate potential and a treatment of dynamical friction to more closely mimic the results from n-body tree codes. The code is released publicly for use under the terms of the Academic Free License ("AFL") v. 3.0 and has been added to the Astrophysics Source Code Library.

  8. JSPAM: A restricted three-body code for simulating interacting galaxies

    CERN Document Server

    Wallin, John; Harvey, Allen

    2015-01-01

    Restricted three-body codes have a proven ability to recreate much of the disturbed morphology of actual interacting galaxies. As more sophisticated n-body models were developed and computer speed increased, restricted three-body codes fell out of favor. However, their supporting role for performing wide searches of parameter space when fitting orbits to real systems demonstrates a continuing need for their use. Here we present the model and algorithm used in the JSPAM code. A precursor of this code was originally described in 1990, and was called SPAM. We have recently updated the software with an alternate potential and a treatment of dynamical friction to more closely mimic the results from n-body tree codes. The code is released publicly for use under the terms of the Academic Free License (AFL) v.3.0 and has been added to the Astrophysics Source Code Library.

  9. A Low-Jitter Wireless Transmission Based on Buffer Management in Coding-Aware Routing

    Directory of Open Access Journals (Sweden)

    Cunbo Lu

    2015-08-01

    Full Text Available It is significant to reduce packet jitter for real-time applications in a wireless network. Existing coding-aware routing algorithms use the opportunistic network coding (ONC scheme in a packet coding algorithm. The ONC scheme never delays packets to wait for the arrival of a future coding opportunity. The loss of some potential coding opportunities may degrade the contribution of network coding to jitter performance. In addition, most of the existing coding-aware routing algorithms assume that all flows participating in the network have equal rate. This is unrealistic, since multi-rate environments often appear. To overcome the above problem and expand coding-aware routing to multi-rate scenarios, from the view of data transmission, we present a low-jitter wireless transmission algorithm based on buffer management (BLJCAR, which decides packets in coding node according to the queue-length based threshold policy instead of the regular ONC policy as used in existing coding-aware routing algorithms. BLJCAR is a unified framework to merge the single rate case and multiple rate case. Simulations results show that the BLJCAR algorithm embedded in coding-aware routing outperforms the traditional ONC policy in terms of jitter, packet delivery delay, packet loss ratio and network throughput in network congestion in any traffic rates.

  10. Development of a frequency-domain coupled neutronic thermal-hydraulic stability analysis code STAC. Verification of thermal-hydraulic part of the code

    International Nuclear Information System (INIS)

    A frequency-domain coupled neutronic thermal-hydraulic stability analysis code STAC is under development in TEPCO Systems Corporation (TEPSYS). The code is composed of the steady-state thermal-hydraulic calculation part and the transfer function calculation part. In the transfer function calculation part, neutronics, fuel heat conduction and thermal-hydraulics models are implemented. In this paper, the thermal hydraulic part of the code is focused on. A basic framework of the code is learned from NUFREQ-NP code. The basic equations are almost the same, but many modifications are conducted. The major modifications in the thermal-hydraulic part are 1) introduction of the finite difference scheme in spatial discretization to simplify the code structure and facilitate the modification of the code and 2) consideration of perturbation in almost all empirical correlations. The STAC code is validated using steady-state pressure drop and void fraction data which were measured in NUPEC full bundle test. A good agreement between predicted and measured values is shown thus the steady-state calculation part of the code is well validated. Then, the STAC code is validated using stability threshold power measurement test data. The stability threshold power is calculated by STAC and the predicted and measured values are compared. Those values agree well. Predicted and measured resonance frequencies are also compared and good agreement is observed. (author)

  11. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  12. A Joint-Coding Scheme With Crosstalk Avoidance in Network On Chip

    Directory of Open Access Journals (Sweden)

    Fen Ge

    2013-01-01

    Full Text Available The reliable transfer in Network on Chip can be guaranteed by crosstalk avoidance and error detection code. In this paper,we propose a joint coding scheme combined with crosstalk avoidance coding with error control coding. The Fibonacci numeral system is applied to satisfy the requirement of crosstalk avoidance coding, and the error detection is achieved by adding parity bits. We also implement the codec in register transfer level. Furthermore, the schemes of codec applying to fault-tolerant router are analyzed. The experimental result shows that "once encode, multiple decode" scheme outperforms other schemes in trade-o_ of delay, area and power.

  13. A CMOS Imager with Focal Plane Compression using Predictive Coding

    Science.gov (United States)

    Leon-Salas, Walter D.; Balkir, Sina; Sayood, Khalid; Schemm, Nathan; Hoffman, Michael W.

    2007-01-01

    This paper presents a CMOS image sensor with focal-plane compression. The design has a column-level architecture and it is based on predictive coding techniques for image decorrelation. The prediction operations are performed in the analog domain to avoid quantization noise and to decrease the area complexity of the circuit, The prediction residuals are quantized and encoded by a joint quantizer/coder circuit. To save area resources, the joint quantizerlcoder circuit exploits common circuitry between a single-slope analog-to-digital converter (ADC) and a Golomb-Rice entropy coder. This combination of ADC and encoder allows the integration of the entropy coder at the column level. A prototype chip was fabricated in a 0.35 pm CMOS process. The output of the chip is a compressed bit stream. The test chip occupies a silicon area of 2.60 mm x 5.96 mm which includes an 80 X 44 APS array. Tests of the fabricated chip demonstrate the validity of the design.

  14. On the performance of a 2D unstructured computational rheology code on a GPU

    NARCIS (Netherlands)

    Pereira, S.P.; Vuik, K.; Pinho, F.T.; Nobrega, J.M.

    2013-01-01

    The present work explores the massively parallel capabilities of the most advanced architecture of graphics processing units (GPUs) code named “Fermi”, on a two-dimensional unstructured cell-centred finite volume code. We use the SIMPLE algorithm to solve the continuity and momentum equations that w

  15. MABEL 2: a code to analyse cladding deformation in a loss-of-coolant accident

    International Nuclear Information System (INIS)

    The code manual for MABEL-2 is written in four parts. Part 2 describes the equations programmed. The code is divided into a number of modules which are largely independent, namely the Geometry, Thermal-Hydraulic, Fuel and Cladding Temperature, Fuel Rod Internal Gas Pressure and Creep Modules. The equations in MABEL are described under these headings. (author)

  16. Modeling Vortex Generators in a Navier-Stokes Code

    Science.gov (United States)

    Dudek, Julianne C.

    2011-01-01

    A source-term model that simulates the effects of vortex generators was implemented into the Wind-US Navier-Stokes code. The source term added to the Navier-Stokes equations simulates the lift force that would result from a vane-type vortex generator in the flowfield. The implementation is user-friendly, requiring the user to specify only three quantities for each desired vortex generator: the range of grid points over which the force is to be applied and the planform area and angle of incidence of the physical vane. The model behavior was evaluated for subsonic flow in a rectangular duct with a single vane vortex generator, subsonic flow in an S-duct with 22 corotating vortex generators, and supersonic flow in a rectangular duct with a counter-rotating vortex-generator pair. The model was also used to successfully simulate microramps in supersonic flow by treating each microramp as a pair of vanes with opposite angles of incidence. The validation results indicate that the source-term vortex-generator model provides a useful tool for screening vortex-generator configurations and gives comparable results to solutions computed using gridded vanes.

  17. A generalized interface module for the coupling of spatial kinetics and thermal-hydraulics codes

    International Nuclear Information System (INIS)

    A generalized interface module has been developed for the coupling of any thermal-hydraulics code to any spatial kinetics code. The coupling scheme was designed and implemented with emphasis placed on maximizing flexibility while minimizing modifications to the respective codes. In this design, the thermal-hydraulics, general interface, and spatial kinetics codes function independently and utilize the Parallel Virtual Machine software to manage cross-process communication. Using this interface, the USNRC version of the 3D neutron kinetics code, PARCX, has been coupled to the USNRC system analysis codes RELAP5 and TRAC-M. RELAP5/PARCS assessment results are presented for two NEACRP rod ejection benchmark problems and an NEA/OECD main steam line break benchmark problem. The assessment of TRAC-M/PARCS has only recently been initiated, nonetheless, the capabilities of the coupled code are presented for a typical PWR system/core model

  18. A quantum algorithm for Viterbi decoding of classical convolutional codes

    Science.gov (United States)

    Grice, Jon R.; Meyer, David A.

    2015-07-01

    We present a quantum Viterbi algorithm (QVA) with better than classical performance under certain conditions. In this paper, the proposed algorithm is applied to decoding classical convolutional codes, for instance, large constraint length and short decode frames . Other applications of the classical Viterbi algorithm where is large (e.g., speech processing) could experience significant speedup with the QVA. The QVA exploits the fact that the decoding trellis is similar to the butterfly diagram of the fast Fourier transform, with its corresponding fast quantum algorithm. The tensor-product structure of the butterfly diagram corresponds to a quantum superposition that we show can be efficiently prepared. The quantum speedup is possible because the performance of the QVA depends on the fanout (number of possible transitions from any given state in the hidden Markov model) which is in general much less than . The QVA constructs a superposition of states which correspond to all legal paths through the decoding lattice, with phase as a function of the probability of the path being taken given received data. A specialized amplitude amplification procedure is applied one or more times to recover a superposition where the most probable path has a high probability of being measured.

  19. Rewriting the Epigenetic Code for Tumor Resensitization: A Review

    Directory of Open Access Journals (Sweden)

    Bryan Oronsky

    2014-10-01

    Full Text Available In cancer chemotherapy, one axiom, which has practically solidified into dogma, is that acquired resistance to antitumor agents or regimens, nearly inevitable in all patients with metastatic disease, remains unalterable and irreversible, rendering therapeutic rechallenge futile. However, the introduction of epigenetic therapies, including histone deacetylase inhibitors (HDACis and DNA methyltransferase inhibitors (DNMTIs, provides oncologists, like computer programmers, with new techniques to “overwrite” the modifiable software pattern of gene expression in tumors and challenge the “one and done” treatment prescription. Taking the epigenetic code-as-software analogy a step further, if chemoresistance is the product of multiple nongenetic alterations, which develop and accumulate over time in response to treatment, then the possibility to hack or tweak the operating system and fall back on a “system restore” or “undo” feature, like the arrow icon in the Windows XP toolbar, reconfiguring the tumor to its baseline nonresistant state, holds tremendous promise for turning advanced, metastatic cancer from a fatal disease into a chronic, livable condition. This review aims 1 to explore the potential mechanisms by which a group of small molecule agents including HDACis (entinostat and vorinostat, DNMTIs (decitabine and 5-azacytidine, and redox modulators (RRx-001 may reprogram the tumor microenvironment from a refractory to a nonrefractory state, 2 highlight some recent findings, and 3 discuss whether the current “once burned forever spurned” paradigm in the treatment of metastatic disease should be revised to promote active resensitization attempts with formerly failed chemotherapies.

  20. A Simple Scheme for Belief Propagation Decoding of BCH and RS Codes in Multimedia Transmissions

    Directory of Open Access Journals (Sweden)

    Marco Baldi

    2008-01-01

    Full Text Available Classic linear block codes, like Bose-Chaudhuri-Hocquenghem (BCH and Reed-Solomon (RS codes, are widely used in multimedia transmissions, but their soft-decision decoding still represents an open issue. Among the several approaches proposed for this purpose, an important role is played by the iterative belief propagation principle, whose application to low-density parity-check (LDPC codes permits to approach the channel capacity. In this paper, we elaborate a new technique for decoding classic binary and nonbinary codes through the belief propagation algorithm. We focus on RS codes included in the recent CDMA2000 standard, and compare the proposed technique with the adaptive belief propagation approach, that is able to ensure very good performance but with higher complexity. Moreover, we consider the case of long BCH codes included in the DVB-S2 standard, for which we show that the usage of “pure” LDPC codes would provide better performance.

  1. BWROPT: A multi-cycle BWR fuel cycle optimization code

    Energy Technology Data Exchange (ETDEWEB)

    Ottinger, Keith E.; Maldonado, G. Ivan, E-mail: Ivan.Maldonado@utk.edu

    2015-09-15

    Highlights: • A multi-cycle BWR fuel cycle optimization algorithm is presented. • New fuel inventory and core loading pattern determination. • The parallel simulated annealing algorithm was used for the optimization. • Variable sampling probabilities were compared to constant sampling probabilities. - Abstract: A new computer code for performing BWR in-core and out-of-core fuel cycle optimization for multiple cycles simultaneously has been developed. Parallel simulated annealing (PSA) is used to optimize the new fuel inventory and placement of new and reload fuel for each cycle considered. Several algorithm improvements were implemented and evaluated. The most significant of these are variable sampling probabilities and sampling new fuel types from an ordered array. A heuristic control rod pattern (CRP) search algorithm was also implemented, which is useful for single CRP determinations, however, this feature requires significant computational resources and is currently not practical for use in a full multi-cycle optimization. The PSA algorithm was demonstrated to be capable of significant objective function reduction and finding candidate loading patterns without constraint violations. The use of variable sampling probabilities was shown to reduce runtime while producing better results compared to using constant sampling probabilities. Sampling new fuel types from an ordered array was shown to have a mixed effect compared to random new fuel type sampling, whereby using both random and ordered sampling produced better results but required longer runtimes.

  2. Saphyr: a code system from reactor design to reference calculations

    International Nuclear Information System (INIS)

    In this paper we briefly present the package SAPHYR (in French Advanced System for Reactor Physics) which is devoted to reactor calculations, safety analysis and design. This package is composed of three main codes: APOLLO2 for lattice calculations, CRONOS2 for whole core neutronic calculations and FLICA4 for thermohydraulics. Thanks to a continuous development effort, the SAPHYR system is an outstanding tool covering a large domain of applications, from sophisticated 'research and development' studies that need state-of-the-art methodology to routine industrial calculations for reactor and criticality analysis. SAPHYR is powerful enough to carry out calculations for all types of reactors and is invaluable to understand complex phenomena. SAPHYR components are in use in various nuclear companies such as 'Electricite de France', Framatome-ANP, Cogema, SGN, Transnucleaire and Technicatome. Waiting for the next generation tools (DESCARTES for neutronics and NEPTUNE for thermohydraulics) to be available for such a variety of use, with a better level of flexibility and at least equivalent validation and qualification level, the improvement of SAPHYR is going on, to acquire new functions constantly required by users and to improve current performance levels

  3. Saphyr: a code system from reactor design to reference calculations

    Energy Technology Data Exchange (ETDEWEB)

    Akherraz, B.; Baudron, A.M.; Buiron, L.; Coste-Delclaux, M.; Fedon-Magnaud, C.; Lautard, J.J.; Moreau, F.; Nicolas, A.; Sanchez, R.; Zmijarevic, I. [CEA Saclay, Direction de l' Energie Nucleaire, Departement de Modelisation des Systemes et Structures, Service d' Etudes des Reacteurs et de Modelisation Avancee (DENDMSS/SERMA), 91 - Gif sur Yvette (France); Bergeron, A.; Caruge, D.; Fillion, P.; Gallo, D.; Royer, E. [CEA Saclay, Direction de l' Energie Nucleaire, Departement de Modelisation des Systemes et Structures, Service Fluides numeriques, Modelisations et Etudes (DEN/DMSS/SFNME), 91 - Gif sur Yvette (France); Loubiere, S. [CEA Saclay, Direction de l' Energie Nucleaire, Direction de la Simulation et des Outils Experimentaux, 91- Gif sur Yvette (France)

    2003-07-01

    In this paper we briefly present the package SAPHYR (in French Advanced System for Reactor Physics) which is devoted to reactor calculations, safety analysis and design. This package is composed of three main codes: APOLLO2 for lattice calculations, CRONOS2 for whole core neutronic calculations and FLICA4 for thermohydraulics. Thanks to a continuous development effort, the SAPHYR system is an outstanding tool covering a large domain of applications, from sophisticated 'research and development' studies that need state-of-the-art methodology to routine industrial calculations for reactor and criticality analysis. SAPHYR is powerful enough to carry out calculations for all types of reactors and is invaluable to understand complex phenomena. SAPHYR components are in use in various nuclear companies such as 'Electricite de France', Framatome-ANP, Cogema, SGN, Transnucleaire and Technicatome. Waiting for the next generation tools (DESCARTES for neutronics and NEPTUNE for thermohydraulics) to be available for such a variety of use, with a better level of flexibility and at least equivalent validation and qualification level, the improvement of SAPHYR is going on, to acquire new functions constantly required by users and to improve current performance levels.

  4. A Software Upgrade of the NASA Aeroheating Code "MINIVER"

    Science.gov (United States)

    Louderback, Pierce Mathew

    2013-01-01

    Computational Fluid Dynamics (CFD) is a powerful and versatile tool simulating fluid and thermal environments of launch and re-entry vehicles alike. Where it excels in power and accuracy, however, it lacks in speed. An alternative tool for this purpose is known as MINIVER, an aeroheating code widely used by NASA and within the aerospace industry. Capable of providing swift, reasonably accurate approximations of the fluid and thermal environment of launch vehicles, MINIVER is used where time is of the essence and accuracy need not be exact. However, MINIVER is an old, aging tool: running on a user-unfriendly, legacy command-line interface, it is difficult for it to keep pace with more modem software tools. Florida Institute of Technology was tasked with the construction of a new Graphical User Interface (GUI) that implemented the legacy version's capabilities and enhanced them with new tools and utilities. This thesis provides background to the legacy version of the program, the progression and final version of a modem user interface, and benchmarks to demonstrate its usefulness.

  5. A Secure Code-Based Authentication Scheme for RFID Systems

    Directory of Open Access Journals (Sweden)

    Noureddine Chikouche

    2015-08-01

    Full Text Available Two essential problems are still posed in terms of Radio Frequency Identification (RFID systems, including: security and limitation of resources. Recently, Li et al.'s proposed a mutual authentication scheme for RFID systems in 2014, it is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC McEliece cryptosystem. This cryptosystem is designed to reducing the key sizes. In this paper, we found that this scheme does not provide untraceability and forward secrecy properties. Furthermore, we propose an improved version of this scheme to eliminate existing vulnerabilities of studied scheme. It is based on the QC-MDPC McEliece cryptosystem with padding the plaintext by a random bit-string. Our work also includes a security comparison between our improved scheme and different code-based RFID authentication schemes. We prove secrecy and mutual authentication properties by AVISPA (Automated Validation of Internet Security Protocols and Applications tools. Concerning the performance, our scheme is suitable for low-cost tags with resource limitation.

  6. The source coding game with a cheating switcher

    CERN Document Server

    Palaiyanur, Hari; Sahai, Anant

    2007-01-01

    Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) composed of a finite number of subsources with known distributions. Berger's paper `The Source Coding Game', \\emph{IEEE Trans. Inform. Theory}, 1971, solves this problem under the condition that the adversary is allowed only strictly causal access to the subsource realizations. We consider the case when the adversary has access to the subsource realizations non-causally. Using the type-covering lemma, this new rate-distortion function is determined to be the maximum of the IID rate-distortion function over a set of source distributions attainable by the adversary. We then extend the results to allow for partial or noisy observations of subsource realizations. We further explore the model by attempting to find the rate-distortion function when the adversary is actually helpful. Finally, a bound is developed on the uniform continuity of the I...

  7. A New Class of TAST Codes With A Simplified Tree Structure

    CERN Document Server

    Damen, Mohamed Oussama; Badr, Ahmed A

    2010-01-01

    We consider in this paper the design of full diversity and high rate space-time codes with moderate decoding complexity for arbitrary number of transmit and receive antennas and arbitrary input alphabets. We focus our attention to codes from the threaded algebraic space-time (TAST) framework since the latter includes most known full diversity space-time codes. We propose a new construction of the component single-input single-output (SISO) encoders such that the equivalent code matrix has an upper triangular form. We accomplish this task by designing each SISO encoder to create an ISI-channel in each thread. This, in turn, greatly simplifies the QR-decomposition of the composite channel and code matrix, which is essential for optimal or near-optimal tree search algorithms, such as the sequential decoder.

  8. Rotated Walsh-Hadamard Spreading with Robust Channel Estimation for a Coded MC-CDMA System

    Directory of Open Access Journals (Sweden)

    Raulefs Ronald

    2004-01-01

    Full Text Available We investigate rotated Walsh-Hadamard spreading matrices for a broadband MC-CDMA system with robust channel estimation in the synchronous downlink. The similarities between rotated spreading and signal space diversity are outlined. In a multiuser MC-CDMA system, possible performance improvements are based on the chosen detector, the channel code, and its Hamming distance. By applying rotated spreading in comparison to a standard Walsh-Hadamard spreading code, a higher throughput can be achieved. As combining the channel code and the spreading code forms a concatenated code, the overall minimum Hamming distance of the concatenated code increases. This asymptotically results in an improvement of the bit error rate for high signal-to-noise ratio. Higher convolutional channel code rates are mostly generated by puncturing good low-rate channel codes. The overall Hamming distance decreases significantly for the punctured channel codes. Higher channel code rates are favorable for MC-CDMA, as MC-CDMA utilizes diversity more efficiently compared to pure OFDMA. The application of rotated spreading in an MC-CDMA system allows exploiting diversity even further. We demonstrate that the rotated spreading gain is still present for a robust pilot-aided channel estimator. In a well-designed system, rotated spreading extends the performance by using a maximum likelihood detector with robust channel estimation at the receiver by about 1 dB.

  9. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  10. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  11. Code optimisation in a nested-sampling algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, S.J. [SUPA School of Physics and Astronomy, University of Glasgow, Glasgow G12 8QQ (United Kingdom); Ireland, D.G., E-mail: David.Ireland@glasgow.ac.uk [SUPA School of Physics and Astronomy, University of Glasgow, Glasgow G12 8QQ (United Kingdom); Vanderbauwhede, W. [School of Computing Science, University of Glasgow, Glasgow G12 8QQ (United Kingdom)

    2015-06-11

    The speed-up in program running time is investigated for problems of parameter estimation with nested sampling Monte Carlo methods. The example used in this study is to extract a polarisation observable from event-by-event data from meson photoproduction reactions. Various implementations of the basic algorithm were compared, consisting of combinations of single threaded versus multi-threaded, and CPU versus GPU versions. These were implemented in OpenMP and OpenCL. For the application under study, and with the number of events as used in our work, we find that straightforward multi-threaded CPU OpenMP coding gives the best performance; for larger numbers of events, OpenCL on the CPU performs better. The study also shows that there is a “break-even” point of the number of events where the use of GPUs helps performance. GPUs are not found to be generally helpful for this problem, due to the data transfer times, which more than offset the improvement in computation time.

  12. GOVERNANCE CODES: FACTS OR FICTIONS? A STUDY OF GOVERNANCE CODES IN COLOMBIA

    Directory of Open Access Journals (Sweden)

    JULIÁN BENAVIDES FRANCO

    2010-01-01

    para autorregularse, reduciendo sus beneficios privados y/o la expropiación de las partes no controladoras, a través de la introducción del código, es en realidad una medida efectiva y que los mercados financieros apoyan, incrementando el suministro de fondos a las firmas.

  13. COBRA-SFS: A thermal-hydraulic analysis code for spent fuel storage and transportation casks

    International Nuclear Information System (INIS)

    COBRA-SFS is a general thermal-hydraulic analysis computer code for prediction of material temperatures and fluid conditions in a wide variety of systems. The code has been validated for analysis of spent fuel storage systems, as part of the Commercial Spent Fuel Management Program of the US Department of Energy. The code solves finite volume equations representing the conservation equations for mass, moment, and energy for an incompressible single-phase heat transfer fluid. The fluid solution is coupled to a finite volume solution of the conduction equation in the solid structure of the system. This document presents a complete description of Cycle 2 of COBRA-SFS, and consists of three main parts. Part 1 describes the conservation equations, constitutive models, and solution methods used in the code. Part 2 presents the User Manual, with guidance on code applications, and complete input instructions. This part also includes a detailed description of the auxiliary code RADGEN, used to generate grey body view factors required as input for radiative heat transfer modeling in the code. Part 3 describes the code structure, platform dependent coding, and program hierarchy. Installation instructions are also given for the various platform versions of the code that are available

  14. Connect and immerse: a poetry of codes and signals

    Directory of Open Access Journals (Sweden)

    Jesper Olsson

    2012-06-01

    Full Text Available This article investigates how codes and signals were employed in avant-garde poetry and art in the 1960s, and how such attempts were performed in the wake of cybernetics and (partly through the use of new media technologies, such as the tape recorder and the computer. This poetry—as exemplified here by works by Åke Hodell, Peter Weibel, and Henri Chopin—not only employed new materials, media, and methods for the production of poems; it also transformed the interface of literature and the act of reading through immersion in sound, through the activation of different cognitive modes, and through an intersensorial address. On the one hand, this literary and artistic output can be seen as a response to the increasing intermedation (in Katherine Hayles's sense in culture and society during the last century. On the other hand, we might, as contemporary readers, return to these poetic works in order to use them as media archaeological tools that might shed light on the aesthetic transformations taking place within new media today.

  15. TRIPOLI-3: a neutron/photon Monte Carlo transport code

    Energy Technology Data Exchange (ETDEWEB)

    Nimal, J.C.; Vergnaud, T. [Commissariat a l' Energie Atomique, Gif-sur-Yvette (France). Service d' Etudes de Reacteurs et de Mathematiques Appliquees

    2001-07-01

    The present version of TRIPOLI-3 solves the transport equation for coupled neutron and gamma ray problems in three dimensional geometries by using the Monte Carlo method. This code is devoted both to shielding and criticality problems. The most important feature for particle transport equation solving is the fine treatment of the physical phenomena and sophisticated biasing technics useful for deep penetrations. The code is used either for shielding design studies or for reference and benchmark to validate cross sections. Neutronic studies are essentially cell or small core calculations and criticality problems. TRIPOLI-3 has been used as reference method, for example, for resonance self shielding qualification. (orig.)

  16. Source Coding with a Side Information "Vending Machine"

    OpenAIRE

    Weissman, Tsachy; Permuter, Haim H.

    2009-01-01

    We study source coding in the presence of side information, when the system can take actions that affect the availability, quality, or nature of the side information. We begin by extending the Wyner-Ziv problem of source coding with decoder side information to the case where the decoder is allowed to choose actions affecting the side information. We then consider the setting where actions are taken by the encoder, based on its observation of the source. Actions may have costs that are commens...

  17. SHETEMP: a computer code for calculation of fuel temperature behavior under reactivity initiated accidents

    International Nuclear Information System (INIS)

    A fast running computer code SHETEMP has been developed for analysis of reactivity initiated accidents under constant core cooling conditions such as coolant temperature and heat transfer coefficient on fuel rods. This code can predict core power and fuel temperature behaviours. A control rod movement can be taken into account in power control system. The objective of the code is to provide fast running capability with easy handling of the code required for audit and design calculations where a large number of calculations are performed for parameter surveys during short time period. The fast running capability of the code was realized by neglection of fluid flow calculation. The computer code SHETEMP was made up by extracting and conglomerating routines for reactor kinetics and heat conduction in the transient reactor thermal-hydraulic analysis code ALARM-P1, and by combining newly developed routines for reactor power control system. As ALARM-P1, SHETEMP solves point reactor kinetics equations by the modified Runge-Kutta method and one-dimensional transient heat conduction equations for slab and cylindrical geometries by the Crank-Nicholson methods. The model for reactor power control system takes into account effects of PID regulator and control rod drive mechanism. In order to check errors in programming of the code, calculated results by SHETEMP were compared with analytic solution. Based on the comparisons, the appropriateness of the programming was verified. Also, through a sample calculation for typical modelling, it was concluded that the code could satisfy the fast running capability required for audit and design calculations. This report will be described as a code manual of SHETEMP. It contains descriptions on a sample problem, code structure, input data specifications and usage of the code, in addition to analytical models and results of code verification calculations. (author)

  18. A long-term, integrated impact assessment of alternative building energy code scenarios in China

    International Nuclear Information System (INIS)

    China is the second largest building energy user in the world, ranking first and third in residential and commercial energy consumption. Beginning in the early 1980s, the Chinese government has developed a variety of building energy codes to improve building energy efficiency and reduce total energy demand. This paper studies the impact of building energy codes on energy use and CO2 emissions by using a detailed building energy model that represents four distinct climate zones each with three building types, nested in a long-term integrated assessment framework GCAM. An advanced building stock module, coupled with the building energy model, is developed to reflect the characteristics of future building stock and its interaction with the development of building energy codes in China. This paper also evaluates the impacts of building codes on building energy demand in the presence of economy-wide carbon policy. We find that building energy codes would reduce Chinese building energy use by 13–22% depending on building code scenarios, with a similar effect preserved even under the carbon policy. The impact of building energy codes shows regional and sectoral variation due to regionally differentiated responses of heating and cooling services to shell efficiency improvement. - Highlights: • We assessed long-term impacts of building codes and climate policy using GCAM. • Building energy codes would reduce Chinese building energy use by 13–22%. • The impacts of codes on building energy use vary by climate region and sub-sector

  19. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  20. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  1. A dual-sided coded-aperture radiation detection system

    Science.gov (United States)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  2. New Class of Quantum Error-Correcting Codes for a Bosonic Mode

    Science.gov (United States)

    Michael, Marios H.; Silveri, Matti; Brierley, R. T.; Albert, Victor V.; Salmilehto, Juha; Jiang, Liang; Girvin, S. M.

    2016-07-01

    We construct a new class of quantum error-correcting codes for a bosonic mode, which are advantageous for applications in quantum memories, communication, and scalable computation. These "binomial quantum codes" are formed from a finite superposition of Fock states weighted with binomial coefficients. The binomial codes can exactly correct errors that are polynomial up to a specific degree in bosonic creation and annihilation operators, including amplitude damping and displacement noise as well as boson addition and dephasing errors. For realistic continuous-time dissipative evolution, the codes can perform approximate quantum error correction to any given order in the time step between error detection measurements. We present an explicit approximate quantum error recovery operation based on projective measurements and unitary operations. The binomial codes are tailored for detecting boson loss and gain errors by means of measurements of the generalized number parity. We discuss optimization of the binomial codes and demonstrate that by relaxing the parity structure, codes with even lower unrecoverable error rates can be achieved. The binomial codes are related to existing two-mode bosonic codes, but offer the advantage of requiring only a single bosonic mode to correct amplitude damping as well as the ability to correct other errors. Our codes are similar in spirit to "cat codes" based on superpositions of the coherent states but offer several advantages such as smaller mean boson number, exact rather than approximate orthonormality of the code words, and an explicit unitary operation for repumping energy into the bosonic mode. The binomial quantum codes are realizable with current superconducting circuit technology, and they should prove useful in other quantum technologies, including bosonic quantum memories, photonic quantum communication, and optical-to-microwave up- and down-conversion.

  3. A restructuring of the FL package for the MIDAS computer code

    International Nuclear Information System (INIS)

    The developmental need for a localized severe accident analysis code is on the rise, and KAERI is developing a severe accident code MIDAS, based on MELCOR. The existing data saving method uses pointer variables for a fix-sized storage management, and it deteriorates the readability, maintainability and portability of the code. But new features in FORTRAN90 such as a dynamic allocation have been used for the restructuring. The restructuring of the data saving and transferring method of the existing code makes it easy to understand the code. Before an entire restructuring of the code, a restructuring template for a simple package was developed and tested. The target for the restructuring was the FL package which is responsible for modeling the thermal-hydraulic behavior of a liquid water, water vapor, and gases in MELCOR with the CVH package. The verification was done through comparing the results before and after the restructuring

  4. Polish Code of Ethics of a Medical Laboratory Specialist

    Science.gov (United States)

    2014-01-01

    Along with the development of medicine, increasingly significant role has been played by the laboratory diagnostics. For over ten years the profession of the medical laboratory specialist has been regarded in Poland as the autonomous medical profession and has enjoyed a status of one of public trust. The process of education of medical laboratory specialists consists of a five-year degree in laboratory medicine, offered at Medical Universities, and of a five-year Vocational Specialization in one of the fields of laboratory medicine such as clinical biochemistry, medical microbiology, medical laboratory toxicology, medical laboratory cytomorphology and medical laboratory transfusiology. An important component of medical laboratory specialists’ identity is awareness of inherited ethos obtained from bygone generations of workers in this particular profession and the need to continue its further development. An expression of this awareness is among others Polish Code of Ethics of a Medical Laboratory Specialist (CEMLS) containing a set of values and a moral standpoint characteristic of this type of professional environment. Presenting the ethos of the medical laboratory specialist is a purpose of this article. Authors focus on the role CEMLS plays in areas of professional ethics and law. Next, they reconstruct the Polish model of ethos of medical diagnostic laboratory personnel. An overall picture consists of a presentation of the general moral principles concerning execution of this profession and rules of conduct in relations with the patient, own professional environment and the rest of the society. Polish model of ethical conduct, which is rooted in Hippocratic medical tradition, harmonizes with the ethos of medical laboratory specialists of other European countries and the world.

  5. A New Family of Unitary Space-Time Codes with a Fast Parallel Sphere Decoder Algorithm

    CERN Document Server

    Chen, Xinjia; Aravena, Jorge L

    2007-01-01

    In this paper we propose a new design criterion and a new class of unitary signal constellations for differential space-time modulation for multiple-antenna systems over Rayleigh flat-fading channels with unknown fading coefficients. Extensive simulations show that the new codes have significantly better performance than existing codes. We have compared the performance of our codes with differential detection schemes using orthogonal design, Cayley differential codes, fixed-point-free group codes and product of groups and for the same bit error rate, our codes allow smaller signal to noise ratio by as much as 10 dB. The design of the new codes is accomplished in a systematic way through the optimization of a performance index that closely describes the bit error rate as a function of the signal to noise ratio. The new performance index is computationally simple and we have derived analytical expressions for its gradient with respect to constellation parameters. Decoding of the proposed constellations is reduc...

  6. A Code Level Based Programmer Assessment and Selection Criterion Using Metric Tools

    OpenAIRE

    Ezekiel U. Okike

    2014-01-01

    this study presents a code level measurement of computer programs developed by computer programmers using a Chidamber and Kemerer Java metric (CKJM) tool and the Myers Briggs Type Indicator (MBTI) tool. The identification of potential computer programmers using personality trait factors does not seem to be the best approach without a code level measurement of the quality of programs. Hence the need to evolve a metric tool which measures both personality traits of programmers and code level qu...

  7. New draft code for research involving humans proved a major challenge.

    OpenAIRE

    Baer, N

    1996-01-01

    A new draft code of conduct for research involving humans aims to bring a fresh vision to the ethics field. The code is a joint endeavour of the Medical Research Council, the Natural Sciences and Engineering Research Council and the Social Sciences and Humanities Research Council and supersedes all three agencies' earlier ethics statements. Once the draft code is revised and approved, likely by the end of the year, investigators will have a more refined understanding of the ethical limits of ...

  8. Consensus Coding as a Tool in Visual Appearance Research

    Directory of Open Access Journals (Sweden)

    D R Simmons

    2011-04-01

    Full Text Available A common problem in visual appearance research is how to quantitatively characterise the visual appearance of a region of an image which is categorised by human observers in the same way. An example of this is scarring in medical images (Ayoub et al, 2010, The Cleft-Palate Craniofacial Journal, in press. We have argued that “scarriness” is itself a visual appearance descriptor which summarises the distinctive combination of colour, texture and shape information which allows us to distinguish scarred from non-scarred tissue (Simmons et al, ECVP 2009. Other potential descriptors for other image classes would be “metallic”, “natural”, or “liquid”. Having developed an automatic algorithm to locate scars in medical images, we then tested “ground truth” by asking untrained observers to draw around the region of scarring. The shape and size of the scar on the image was defined by building a contour plot of the agreement between observers' outlines and thresholding at the point above which 50% of the observers agreed: a consensus coding scheme. Based on the variability in the amount of overlap between the scar as defined by the algorithm, and the consensus scar of the observers, we have concluded that the algorithm does not completely capture the putative appearance descriptor “scarriness”. A simultaneous analysis of qualitative descriptions of the scarring by the observers revealed that other image features than those encoded by the algorithm (colour and texture might be important, such as scar boundary shape. This approach to visual appearance research in medical imaging has potential applications in other application areas, such as botany, geology and archaeology.

  9. A combinatorial code for splicing silencing: UAGG and GGGG motifs.

    Directory of Open Access Journals (Sweden)

    Kyoungha Han

    2005-05-01

    Full Text Available Alternative pre-mRNA splicing is widely used to regulate gene expression by tuning the levels of tissue-specific mRNA isoforms. Few regulatory mechanisms are understood at the level of combinatorial control despite numerous sequences, distinct from splice sites, that have been shown to play roles in splicing enhancement or silencing. Here we use molecular approaches to identify a ternary combination of exonic UAGG and 5'-splice-site-proximal GGGG motifs that functions cooperatively to silence the brain-region-specific CI cassette exon (exon 19 of the glutamate NMDA R1 receptor (GRIN1 transcript. Disruption of three components of the motif pattern converted the CI cassette into a constitutive exon, while predominant skipping was conferred when the same components were introduced, de novo, into a heterologous constitutive exon. Predominant exon silencing was directed by the motif pattern in the presence of six competing exonic splicing enhancers, and this effect was retained after systematically repositioning the two exonic UAGGs within the CI cassette. In this system, hnRNP A1 was shown to mediate silencing while hnRNP H antagonized silencing. Genome-wide computational analysis combined with RT-PCR testing showed that a class of skipped human and mouse exons can be identified by searches that preserve the sequence and spatial configuration of the UAGG and GGGG motifs. This analysis suggests that the multi-component silencing code may play an important role in the tissue-specific regulation of the CI cassette exon, and that it may serve more generally as a molecular language to allow for intricate adjustments and the coordination of splicing patterns from different genes.

  10. Development of a one-dimensional computer code describing the convection in arbitrary flow networks

    International Nuclear Information System (INIS)

    The subject of this paper is in the first place the computer code LOOPY and the application of this code to the mathematical investigation of the flow behavior of the HHT demonstration plant at afterheat removal operation and on failure of all afterheat removal circulators. Moreover, comparative calculations assuming failure of the afterheat removal were performed for the THTR in order to verify the code. The present code may be used to solve the problems mentioned above. In combination with the two-dimensional flow and heat code THERMIX and other code units a modular code system may be established by means of which the flow and temperature behavior in HTR plants may be described with justifiable computing effort. Within such a code system the one-dimensional code takes over the duty of describing the loops adjacent to the core. The results obtained using the one-dimensional code must, however, be judged critically with respect to natural convection where in part only small mass flows will be formed. (orig.)

  11. Changing priorities of codes and standards -- quality engineering: A utility perspective

    International Nuclear Information System (INIS)

    The topic of this panel ''Changing Priorities of Codes and Standards--Quality Engineering'' is timely, since the ASME Code, Section XI is currently in the process of redefining its scope. Section XI is the Code that impacts operating nuclear power plants the most. The currently proposed change in scope is laudable, but there are other important changes needed, particularly in the area of quality engineering, for the, code to be more useful to operating plants. The currently proposed change in scope of the ASME Code, Section XI, recognizes that this Code is really a Structural Integrity Code and not just an In-Service Inspection Code, as its title historically suggested. This redirection is long overdue, since Section XI includes repairs and replacements, and also because the acceptance criteria are, in some cases, significantly different from the construction Code, namely the ASME Code, Section III. The authors feel that since Section XI is at a crossroads and in the process of redefining its scope, ASME should consider deleting the residual programmatic connection to Section III. In their opinion, the ASME's current charter for operating nuclear power plants should be the development of the governing technical rules, leaving the programmatic requirements, administration, and accreditation to those agencies who have regulatory jurisdiction over the nuclear power plant

  12. A genetic code alteration is a phenotype diversity generator in the human pathogen Candida albicans.

    Directory of Open Access Journals (Sweden)

    Isabel Miranda

    Full Text Available BACKGROUND: The discovery of genetic code alterations and expansions in both prokaryotes and eukaryotes abolished the hypothesis of a frozen and universal genetic code and exposed unanticipated flexibility in codon and amino acid assignments. It is now clear that codon identity alterations involve sense and non-sense codons and can occur in organisms with complex genomes and proteomes. However, the biological functions, the molecular mechanisms of evolution and the diversity of genetic code alterations remain largely unknown. In various species of the genus Candida, the leucine CUG codon is decoded as serine by a unique serine tRNA that contains a leucine 5'-CAG-3'anticodon (tRNA(CAG(Ser. We are using this codon identity redefinition as a model system to elucidate the evolution of genetic code alterations. METHODOLOGY/PRINCIPAL FINDINGS: We have reconstructed the early stages of the Candida genetic code alteration by engineering tRNAs that partially reverted the identity of serine CUG codons back to their standard leucine meaning. Such genetic code manipulation had profound cellular consequences as it exposed important morphological variation, altered gene expression, re-arranged the karyotype, increased cell-cell adhesion and secretion of hydrolytic enzymes. CONCLUSION/SIGNIFICANCE: Our study provides the first experimental evidence for an important role of genetic code alterations as generators of phenotypic diversity of high selective potential and supports the hypothesis that they speed up evolution of new phenotypes.

  13. Quantum error correcting codes and one-way quantum computing: Towards a quantum memory

    CERN Document Server

    Schlingemann, D

    2003-01-01

    For realizing a quantum memory we suggest to first encode quantum information via a quantum error correcting code and then concatenate combined decoding and re-encoding operations. This requires that the encoding and the decoding operation can be performed faster than the typical decoherence time of the underlying system. The computational model underlying the one-way quantum computer, which has been introduced by Hans Briegel and Robert Raussendorf, provides a suitable concept for a fast implementation of quantum error correcting codes. It is shown explicitly in this article is how encoding and decoding operations for stabilizer codes can be realized on a one-way quantum computer. This is based on the graph code representation for stabilizer codes, on the one hand, and the relation between cluster states and graph codes, on the other hand.

  14. gevolution: a cosmological N-body code based on General Relativity

    CERN Document Server

    Adamek, Julian; Durrer, Ruth; Kunz, Martin

    2016-01-01

    We present a new N-body code, gevolution, for the evolution of large scale structure in the Universe. Our code is based on a weak field expansion of General Relativity and calculates all six metric degrees of freedom in Poisson gauge. N-body particles are evolved by solving the geodesic equation which we write in terms of a canonical momentum such that it remains valid also for relativistic particles. We validate the code by considering the Schwarzschild solution and, in the Newtonian limit, by comparing with the Newtonian N-body code Gadget-2. We then proceed with a simulation of large scale structure in a Universe with massive neutrinos where we study the gravitational slip induced by the neutrino shear stress. The code can be extended to include different kinds of dark energy or modified gravity models and going beyond the usually adopted quasi-static approximation. Our code is publicly available.

  15. A good performance watermarking LDPC code used in high-speed optical fiber communication system

    Science.gov (United States)

    Zhang, Wenbo; Li, Chao; Zhang, Xiaoguang; Xi, Lixia; Tang, Xianfeng; He, Wenxue

    2015-07-01

    A watermarking LDPC code, which is a strategy designed to improve the performance of the traditional LDPC code, was introduced. By inserting some pre-defined watermarking bits into original LDPC code, we can obtain a more correct estimation about the noise level in the fiber channel. Then we use them to modify the probability distribution function (PDF) used in the initial process of belief propagation (BP) decoding algorithm. This algorithm was tested in a 128 Gb/s PDM-DQPSK optical communication system and results showed that the watermarking LDPC code had a better tolerances to polarization mode dispersion (PMD) and nonlinearity than that of traditional LDPC code. Also, by losing about 2.4% of redundancy for watermarking bits, the decoding efficiency of the watermarking LDPC code is about twice of the traditional one.

  16. gevolution: a cosmological N-body code based on General Relativity

    Science.gov (United States)

    Adamek, Julian; Daverio, David; Durrer, Ruth; Kunz, Martin

    2016-07-01

    We present a new N-body code, gevolution, for the evolution of large scale structure in the Universe. Our code is based on a weak field expansion of General Relativity and calculates all six metric degrees of freedom in Poisson gauge. N-body particles are evolved by solving the geodesic equation which we write in terms of a canonical momentum such that it remains valid also for relativistic particles. We validate the code by considering the Schwarzschild solution and, in the Newtonian limit, by comparing with the Newtonian N-body codes Gadget-2 and RAMSES. We then proceed with a simulation of large scale structure in a Universe with massive neutrinos where we study the gravitational slip induced by the neutrino shear stress. The code can be extended to include different kinds of dark energy or modified gravity models and going beyond the usually adopted quasi-static approximation. Our code is publicly available.

  17. A computer code to simulate X-ray imaging techniques

    Energy Technology Data Exchange (ETDEWEB)

    Duvauchelle, Philippe E-mail: philippe.duvauchelle@insa-lyon.fr; Freud, Nicolas; Kaftandjian, Valerie; Babot, Daniel

    2000-09-01

    A computer code was developed to simulate the operation of radiographic, radioscopic or tomographic devices. The simulation is based on ray-tracing techniques and on the X-ray attenuation law. The use of computer-aided drawing (CAD) models enables simulations to be carried out with complex three-dimensional (3D) objects and the geometry of every component of the imaging chain, from the source to the detector, can be defined. Geometric unsharpness, for example, can be easily taken into account, even in complex configurations. Automatic translations or rotations of the object can be performed to simulate radioscopic or tomographic image acquisition. Simulations can be carried out with monochromatic or polychromatic beam spectra. This feature enables, for example, the beam hardening phenomenon to be dealt with or dual energy imaging techniques to be studied. The simulation principle is completely deterministic and consequently the computed images present no photon noise. Nevertheless, the variance of the signal associated with each pixel of the detector can be determined, which enables contrast-to-noise ratio (CNR) maps to be computed, in order to predict quantitatively the detectability of defects in the inspected object. The CNR is a relevant indicator for optimizing the experimental parameters. This paper provides several examples of simulated images that illustrate some of the rich possibilities offered by our software. Depending on the simulation type, the computation time order of magnitude can vary from 0.1 s (simple radiographic projection) up to several hours (3D tomography) on a PC, with a 400 MHz microprocessor. Our simulation tool proves to be useful in developing new specific applications, in choosing the most suitable components when designing a new testing chain, and in saving time by reducing the number of experimental tests.

  18. MMA, A Computer Code for Multi-Model Analysis

    Science.gov (United States)

    Poeter, Eileen P.; Hill, Mary C.

    2007-01-01

    This report documents the Multi-Model Analysis (MMA) computer code. MMA can be used to evaluate results from alternative models of a single system using the same set of observations for all models. As long as the observations, the observation weighting, and system being represented are the same, the models can differ in nearly any way imaginable. For example, they may include different processes, different simulation software, different temporal definitions (for example, steady-state and transient models could be considered), and so on. The multiple models need to be calibrated by nonlinear regression. Calibration of the individual models needs to be completed before application of MMA. MMA can be used to rank models and calculate posterior model probabilities. These can be used to (1) determine the relative importance of the characteristics embodied in the alternative models, (2) calculate model-averaged parameter estimates and predictions, and (3) quantify the uncertainty of parameter estimates and predictions in a way that integrates the variations represented by the alternative models. There is a lack of consensus on what model analysis methods are best, so MMA provides four default methods. Two are based on Kullback-Leibler information, and use the AIC (Akaike Information Criterion) or AICc (second-order-bias-corrected AIC) model discrimination criteria. The other two default methods are the BIC (Bayesian Information Criterion) and the KIC (Kashyap Information Criterion) model discrimination criteria. Use of the KIC criterion is equivalent to using the maximum-likelihood Bayesian model averaging (MLBMA) method. AIC, AICc, and BIC can be derived from Frequentist or Bayesian arguments. The default methods based on Kullback-Leibler information have a number of theoretical advantages, including that they tend to favor more complicated models as more data become available than do the other methods, which makes sense in many situations. Many applications of MMA will

  19. Erasure Coded Storage on a Changing Network: the Untold Story

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Venkat, Narayan; Oran, David

    2016-01-01

    As faster storage devices become commercially viable alternatives to disk drives, the network is increasingly becoming the bottleneck in achieving good performance in distributed storage systems. This is especially true for erasure coded storage, where the reconstruction of lost data can signific...

  20. ABAREX: A neutron spherical optical-statistical model code

    International Nuclear Information System (INIS)

    The spherical optical-statistical model is briefly reviewed and the capabilities of the neutron scattering code, ABAREX, are presented. Input files for ten examples, in which neutrons are scattered by various nuclei, are given and the output of each run is discussed in detail

  1. A Normative Code of Conduct for Admissions Officers

    Science.gov (United States)

    Hodum, Robert L.

    2012-01-01

    The increasing competition for the desired quantity and quality of college students, along with the rise of for-profit institutions, has amplified the scrutiny of behavior and ethics among college admissions professionals and has increased the need for meaningful ethical guidelines and codes of conduct. Many other areas of responsibility within…

  2. Developing a Working Code of Ethics for Human Resource Personnel.

    Science.gov (United States)

    Rampal, Kuldip R.

    1991-01-01

    To develop codes of ethics for their profession, college human resources personnel must first understand their primary job-related responsibilities. These include being alert to evolving organizational needs; coordinating needed training of employees; appreciating the nuances of psychology, communication, and motivation; and observing employee…

  3. Verification & Validation Toolkit to Assess Codes: Is it Theory Limitation, Numerical Method Inadequacy, Bug in the Code or a Serious Flaw?

    Science.gov (United States)

    Bombardelli, F. A.; Zamani, K.

    2014-12-01

    We introduce and discuss an open-source, user friendly, numerical post-processing piece of software to assess reliability of the modeling results of environmental fluid mechanics' codes. Verification and Validation, Uncertainty Quantification (VAVUQ) is a toolkit developed in Matlab© for general V&V proposes. In this work, The VAVUQ implementation of V&V techniques and user interfaces would be discussed. VAVUQ is able to read Excel, Matlab, ASCII, and binary files and it produces a log of the results in txt format. Next, each capability of the code is discussed through an example: The first example is the code verification of a sediment transport code, developed with the Finite Volume Method, with MES. Second example is a solution verification of a code for groundwater flow, developed with the Boundary Element Method, via MES. Third example is a solution verification of a mixed order, Compact Difference Method code of heat transfer via MMS. Fourth example is a solution verification of a 2-D, Finite Difference Method code of floodplain analysis via Complete Richardson Extrapolation. In turn, application of VAVUQ in quantitative model skill assessment studies (validation) of environmental codes is given through two examples: validation of a two-phase flow computational modeling of air entrainment in a free surface flow versus lab measurements and heat transfer modeling in the earth surface versus field measurement. At the end, we discuss practical considerations and common pitfalls in interpretation of V&V results.

  4. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  5. Massively parallel implementation in Python of a pseudo-spectral DNS code for turbulent flows

    OpenAIRE

    Mortensen, Mikael

    2016-01-01

    Direct Numerical Simulations (DNS) of the Navier Stokes equations is a valuable research tool in fluid dynamics, but there are very few publicly available codes and, due to heavy number crunching, codes are usually written in low-level languages. In this work a \\textasciitilde{}100 line standard scientific Python DNS code is described that nearly matches the performance of pure C for thousands of processors and billions of unknowns. With optimization of a few routines in Cython, it is found t...

  6. ACFAC: a cash flow analysis code for estimating product price from an industrial operation

    International Nuclear Information System (INIS)

    A computer code is presented which uses a discountted cash flow methodology to obtain an average product price for an industtrial process. The general discounted cash flow method is discussed. Special code options include multiple treatments of interest during construction and other preoperational costs, investment tax credits, and different methods for tax depreciation of capital assets. Two options for allocating the cost of plant decommissioning are available. The FORTRAN code listing and the computer output for a sample problem are included

  7. Development of a three-dimensional kinetics code for commercial-scale FBR full core analysis

    International Nuclear Information System (INIS)

    A transient analysis code has been developed for the analysis of future, commercial-size Fast Breeder Reactors. The code uses diffusion theory, a nodal expansion method for the spatial discretization, while the temporal discretization uses either a direct numerical solution, the Improved Quasi-Static method, or the adiabatic method. Numerical acceleration is used to obtain practical calculation times on large problems. Trial calculations have shown satisfactory code performance. (author)

  8. A Monte Carlo Code for Relativistic Radiation Transport Around Kerr Black Holes

    Science.gov (United States)

    Schnittman, Jeremy David; Krolik, Julian H.

    2013-01-01

    We present a new code for radiation transport around Kerr black holes, including arbitrary emission and absorption mechanisms, as well as electron scattering and polarization. The code is particularly useful for analyzing accretion flows made up of optically thick disks and optically thin coronae. We give a detailed description of the methods employed in the code and also present results from a number of numerical tests to assess its accuracy and convergence.

  9. Establishing a code of ethics for nuclear operating organizations

    International Nuclear Information System (INIS)

    The IAEA Technical Working Group on Training and Qualification of Nuclear Power Plant Personnel (TWG-T and Q) recommended that the IAEA develop a publication on improving the performance of nuclear facility operating organizations through focusing on the ethics and professionalism of personnel at all levels of such organizations. This publication has been prepared in response to that recommendation. The TWG-T and Q made its recommendation based upon an understanding that an organization's code of ethics should apply to behaviours at all levels of the organization; from the Board Room to the working level. The TWG-T and Q also recognized that having the technical competencies related to nuclear technology is not enough to ensure that an operating organization's performance is at the high standards needed for a sustainable nuclear industry. The values and ethics of individuals and organizational units play an equally important role. This publication is addressed primarily to senior managers of operating organizations, as experience has shown that, in order to succeed, such initiatives need to come from and be continually supported by the highest levels of the organization. This publication was developed under an IAEA project in its 2006-7 programme entitled Achieving Excellence in the Performance of Nuclear Power Plant Personnel. The principal objectives of this project were: - To enhance the capability of Member States to utilize proven practices accumulated, developed and transferred by the Agency for improving personnel performance and maintaining high standards, and - To demonstrate how positive attitudes and professionalism, appropriate performance management, adherence to a systematic approach to training, quality management and the use of effective information and knowledge management technologies contribute to the success in achieving organization objectives in a challenging business environment

  10. MMA, A Computer Code for Multi-Model Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Eileen P. Poeter and Mary C. Hill

    2007-08-20

    This report documents the Multi-Model Analysis (MMA) computer code. MMA can be used to evaluate results from alternative models of a single system using the same set of observations for all models. As long as the observations, the observation weighting, and system being represented are the same, the models can differ in nearly any way imaginable. For example, they may include different processes, different simulation software, different temporal definitions (for example, steady-state and transient models could be considered), and so on. The multiple models need to be calibrated by nonlinear regression. Calibration of the individual models needs to be completed before application of MMA. MMA can be used to rank models and calculate posterior model probabilities. These can be used to (1) determine the relative importance of the characteristics embodied in the alternative models, (2) calculate model-averaged parameter estimates and predictions, and (3) quantify the uncertainty of parameter estimates and predictions in a way that integrates the variations represented by the alternative models. There is a lack of consensus on what model analysis methods are best, so MMA provides four default methods. Two are based on Kullback-Leibler information, and use the AIC (Akaike Information Criterion) or AICc (second-order-bias-corrected AIC) model discrimination criteria. The other two default methods are the BIC (Bayesian Information Criterion) and the KIC (Kashyap Information Criterion) model discrimination criteria. Use of the KIC criterion is equivalent to using the maximum-likelihood Bayesian model averaging (MLBMA) method. AIC, AICc, and BIC can be derived from Frequentist or Bayesian arguments. The default methods based on Kullback-Leibler information have a number of theoretical advantages, including that they tend to favor more complicated models as more data become available than do the other methods, which makes sense in many situations.

  11. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  12. The non-power model of the genetic code: a paradigm for interpreting genomic information.

    Science.gov (United States)

    Gonzalez, Diego Luis; Giannerini, Simone; Rosa, Rodolfo

    2016-03-13

    In this article, we present a mathematical framework based on redundant (non-power) representations of integer numbers as a paradigm for the interpretation of genomic information. The core of the approach relies on modelling the degeneracy of the genetic code. The model allows one to explain many features and symmetries of the genetic code and to uncover hidden symmetries. Also, it provides us with new tools for the analysis of genomic sequences. We review briefly three main areas: (i) the Euplotid nuclear code, (ii) the vertebrate mitochondrial code, and (iii) the main coding/decoding strategies used in the three domains of life. In every case, we show how the non-power model is a natural unified framework for describing degeneracy and deriving sound biological hypotheses on protein coding. The approach is rooted on number theory and group theory; nevertheless, we have kept the technical level to a minimum by focusing on key concepts and on the biological implications. PMID:26857679

  13. Birth: A Neutral Beam Deposition Code for Non-Circular Tokamak Plasma

    International Nuclear Information System (INIS)

    A new neutral beam deposition code has been developed which is capable of calculating fast ion deposition profiles including the orbit correction. The code incorporates any injection geometry and a non-circular cross-section plasma with a variable elongation and an outward shift of the magnetic flux surface. Typical CPU time on a KL DEC-10 computer is 10--20 s and 5--10 s with and without the orbit correction, respectively. This is shorter by an order of magnitude than that of other codes, e.g., Monte Carlo beam deposition codes. The power deposition profile calculated by this code is in good agreement with that calculated by the Monte Carlo code which was developed to calculate the complete behaviors of the fast ions in circular plasmas

  14. A new magnetic bar code system based on a magnetic anisotropy detection (abstract)

    Science.gov (United States)

    Sasada, I.; Watanabe, N.

    1996-04-01

    Magnetic bar codes can be used in unclean environments, where widely used optical bar code systems cannot be applied. Readout system for magnetic bar codes can also be made much simpler than optical ones. A new magnetic bar code system is proposed, in which binary information is coded in the sign of tilted angles of magnetic strips from a given standard direction. This scheme is unique compared to the conventional optical bar code, where width or space of the parallel pattern carries information, or an already reported magnetic bar code, where cross sectional shapes of pattern engraved in a ferromagnetic body carries information. Each of the magnetic strips brings about magnetic anisotropy due to its shape effect, hence angular dependent permeability in the proximity of the strip. The sign of the tilted angle of each magnetic strip is detected inductively through the angular dependent permeability by using a magnetic pickup head with a pair of cross-coupled figure-eight coils, where the sign of mutual inductance between the primary and the secondary figure-eight coil has one to one relationship to the sign of the tilted angle. Because the detection of the tilted angle is independent of scanning speed, variation in the scanning speed of the readout head does not affect the performance. In our preliminary study, the proposed magnetic bar code system was examined using pickup head consisting of a pair of cross-coupled 10-turn figure-eight coils which was embedded in a rectangular ferrite rod with cross-shape groove on the top surface of 6.5×3 mm dimension. The head was made thinner in the scanning direction to allow dense alignment of the pattern. Two kinds of pattern were made: the one was by aligning short amorphous wires (5 mm in length and 120 μm in diameter) on the plastic film and the other by using a thin (10 μm in thickness) copper film with tilted slits backed by an amorphous ribbon. These samples of magnetic bar code patterns were scanned with lift-off of

  15. LISA. A code for safety assessment in nuclear waste disposals program description and user guide

    International Nuclear Information System (INIS)

    The code LISA (Long term Isolation Safety Assessment), developed at the Joint Research Centre, Ispra is a useful tool in the analysis of the hazard due to the disposal of nuclear waste in geological formations. The risk linked to preestablished release scenarios is assessed by the code in terms of dose rate to a maximum exposed individual. The various submodels in the code simulate the system of barriers -both natural and man made- which are interposed between the contaminants and man. After a description of the code features a guide for the user is supplied and then a test case is presented

  16. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  17. Clustering of neural code words revealed by a first-order phase transition

    Science.gov (United States)

    Huang, Haiping; Toyoizumi, Taro

    2016-06-01

    A network of neurons in the central nervous system collectively represents information by its spiking activity states. Typically observed states, i.e., code words, occupy only a limited portion of the state space due to constraints imposed by network interactions. Geometrical organization of code words in the state space, critical for neural information processing, is poorly understood due to its high dimensionality. Here, we explore the organization of neural code words using retinal data by computing the entropy of code words as a function of Hamming distance from a particular reference codeword. Specifically, we report that the retinal code words in the state space are divided into multiple distinct clusters separated by entropy-gaps, and that this structure is shared with well-known associative memory networks in a recallable phase. Our analysis also elucidates a special nature of the all-silent state. The all-silent state is surrounded by the densest cluster of code words and located within a reachable distance from most code words. This code-word space structure quantitatively predicts typical deviation of a state-trajectory from its initial state. Altogether, our findings reveal a non-trivial heterogeneous structure of the code-word space that shapes information representation in a biological network.

  18. Engineering Ethics Education Having Reflected Various Values and a Global Code of Ethics

    Science.gov (United States)

    Kanemitsu, Hidekazu

    At the present day, a movement trying to establish a global code of ethics for science and engineering is in activity. The author overviews the context of this movement, and examines the possibility of engineering ethics education which uses global code of ethics. In this paper, the engineering ethics education which uses code of ethics in general will be considered, and an expected function of global code of ethics will be also. Engineering ethics education in the new century should be aimed to share the values among different countries and cultures. To use global code of ethics as a tool for such education, the code should include various values, especially Asian values which engineering ethics has paid little attention to.

  19. Licensee event report sequence coding and search procedure: a training tool

    International Nuclear Information System (INIS)

    At the request of the Nuclear Regulatory Commission's Office for Analysis and Evaluation of Operational Data (AEOD), the Nuclear Safety Information Center (NSIC) has undertaken the development of a detailed computer-compatible coding system for events and sequences of occurrences described in Licensee Event Reports (LERs). This task was conceived by AEOD and is designated the LER Sequence Coding and Search Procedure. The coding system is intended to describe the sequence of events detailed in the LER in a computer-readable and computer-searchable format. The NSIC has developed coding tables, a coding form and compatible computer software to permit storage and on-line computer search capability. The AEOD draft Watch List has been revised to categorize and retrieve identified situations of interest. The coding system provides an orderly presentation of occurrences that resulted because of an initiating event. The sequences could be used for training operators and maintenance personnel in transients that have actually occurred

  20. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    Directory of Open Access Journals (Sweden)

    Ai-bing Zhang

    Full Text Available Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish and two representing non-coding ITS barcodes (rust fungi and brown algae. Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ and Maximum likelihood (ML methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40% for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37% for 1094 brown algae queries, both using ITS barcodes.

  1. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  2. A Brief Study On Uyghur Teachers’ Code-switching In English Classroom

    Institute of Scientific and Technical Information of China (English)

    古力斯旦木·哈德尔艾山

    2013-01-01

    Generally speaking,code-switching is a common phenomenon in language contact,both in bilingual and multilingual environment.It refers to circumstances in which a speaker uses two or more than two language varieties.Teacher code-switching,is a quite common occurrence in English classrooms.This study intends to investigate into Uyghur teachers’ code-switching in English classrooms.This research concludes that the teachers’ code-switching plays a complementary and facilitative part in English classrooms.It is necessary to switch from English to Chinese,English to Uyghur to explain grammar and usage of words,and classroom management.

  3. A Unidirectional Split-key Based Signature Protocol with Encrypted Function in Mobile Code Environment

    Institute of Scientific and Technical Information of China (English)

    MIAOFuyou; YANGShoubao; XIONGYan; HUABei; WANGXingfu

    2005-01-01

    In mobile code environment, signing private keys are liable to be exposed; visited hosts are susceptible to be attacked by all kinds of vicious mobile codes, therefore a signer often sends remote nodes mobile codes containing an encrypted signature function to complete a signature. The paper first presents a unidirectional split-key scheme for private key protection based on RSA, which is more simple and secure than secret sharing; and then proposes a split-key based signature protocol with encrypted function, which is traceable, undeniable and malignance resistant. Security analysis shows that the protocol can effectively protect the signing private key and complete secure signatures in mobile code environment.

  4. Criticality qualification of a new Monte Carlo code for reactor core analysis

    Energy Technology Data Exchange (ETDEWEB)

    Catsaros, N. [Institute of Nuclear Technology - Radiation Protection, NCSR ' DEMOKRITOS' , P.O. Box 60228, 15310 Aghia Paraskevi (Greece); Gaveau, B. [MAPS, Universite Paris VI, 4 Place Jussieu, 75005 Paris (France); Jaekel, M. [Laboratoire de Physique Theorique, Ecole Normale Superieure, 24 rue Lhomond, 75231 Paris (France); Maillard, J. [MAPS, Universite Paris VI, 4 Place Jussieu, 75005 Paris (France); CNRS-IDRIS, Bt 506, BP167, 91403 Orsay (France); CNRS-IN2P3, 3 rue Michel Ange, 75794 Paris (France); Maurel, G. [Faculte de Medecine, Universite Paris VI, 27 rue de Chaligny, 75012 Paris (France); MAPS, Universite Paris VI, 4 Place Jussieu, 75005 Paris (France); Savva, P., E-mail: savvapan@ipta.demokritos.g [Institute of Nuclear Technology - Radiation Protection, NCSR ' DEMOKRITOS' , P.O. Box 60228, 15310 Aghia Paraskevi (Greece); Silva, J. [MAPS, Universite Paris VI, 4 Place Jussieu, 75005 Paris (France); Varvayanni, M.; Zisis, Th. [Institute of Nuclear Technology - Radiation Protection, NCSR ' DEMOKRITOS' , P.O. Box 60228, 15310 Aghia Paraskevi (Greece)

    2009-11-15

    In order to accurately simulate Accelerator Driven Systems (ADS), the utilization of at least two computational tools is necessary (the thermal-hydraulic problem is not considered in the frame of this work), namely: (a) A High Energy Physics (HEP) code system dealing with the 'Accelerator part' of the installation, i.e. the computation of the spectrum, intensity and spatial distribution of the neutrons source created by (p, n) reactions of a proton beam on a target and (b) a neutronics code system, handling the 'Reactor part' of the installation, i.e. criticality calculations, neutron transport, fuel burn-up and fission products evolution. In the present work, a single computational tool, aiming to analyze an ADS in its integrity and also able to perform core analysis for a conventional fission reactor, is proposed. The code is based on the well qualified HEP code GEANT (version 3), transformed to perform criticality calculations. The performance of the code is tested against two qualified neutronics code systems, the diffusion/transport SCALE-CITATION code system and the Monte Carlo TRIPOLI code, in the case of a research reactor core analysis. A satisfactory agreement was exhibited by the three codes.

  5. X-ray enabled MOCASSIN: a 3D code for photoionized media

    CERN Document Server

    Ercolano, Barbara; Drake, Jeremy J; Raymond, John C

    2007-01-01

    We present a new version of the fully 3D photoionization and dust radiative transfer code, MOCASSIN, that uses a Monte Carlo approach for the transfer of radiation. The X-ray enabled MOCASSIN allows a fully geometry independent description of low-density gaseous environments strongly photoionized by a radiation field extending from radio to gamma rays. The code has been thoroughly benchmarked against other established codes routinely used in the literature, using simple plane parallel models designed to test performance under standard conditions. We show the results of our benchmarking exercise and discuss applicability and limitations of the new code, which should be of guidance for future astrophysical studies with MOCASSIN.

  6. A Video Coding Algorithm Based on Intraframe and Interframe Joint Prediction of Wavelet Coefficients

    Institute of Scientific and Technical Information of China (English)

    1998-01-01

    A novel video coding algorithm based on intraframe and interframe prediction of wavelet coefficients is described in this paper. A BZT (Block Zero Tree) coding scheme represents the position of zero coefficients block efficiently. For nonzero coefficients block, temporal redundancy is removed using MultiResolution Motion Estimation (MRME). The proposed algorithm improves the coding performance significantly over the baseline MRME technique. In addition, the computational complexity is further reduced.

  7. A public code for general relativistic, polarised radiative transfer around spinning black holes

    OpenAIRE

    Dexter, Jason

    2016-01-01

    Ray tracing radiative transfer is a powerful method for comparing theoretical models of black hole accretion flows and jets with observations. We present a public code, grtrans, for carrying out such calculations in the Kerr metric, including the full treatment of polarised radiative transfer and parallel transport along geodesics. The code is written in Fortran 90 and efficiently parallelises with OpenMP, and the full code and several components have Python interfaces. We describe several te...

  8. Implementing the Netherlands Code of Conduct for Scientific Practice: A Case Study

    OpenAIRE

    Schuurbiers, D.; Osseweijer, P.; Kinderlerer, J.

    2009-01-01

    Widespread enthusiasm for establishing scientific codes of conduct notwithstanding, the utility of such codes in influencing scientific practice is not self-evident. It largely depends on the implementation phase following their establishment—a phase which often receives little attention. The aim of this paper is to provide recommendations for guiding effective implementation through an assessment of one particular code of conduct in one particular institute. Based on a series of interviews h...

  9. A family of fast-decodable MIDO codes from crossed-product algebras over Q

    CERN Document Server

    Luzzi, Laura

    2011-01-01

    Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in the downlink from base stations to portable devices. Previous MIDO code constructions with low Maximum Likelihood (ML) decoding complexity, full diversity and the non-vanishing determinant (NVD) property are mostly based on cyclic division algebras. In this paper, a new family of MIDO codes with the NVD property based on crossed-product algebras over Q is introduced. Fast decodability follows naturally from the structure of the codewords which consist of four generalized Alamouti blocks. The associated ML complexity order is the lowest known for full-rate MIDO codes (O(M^{10}) instead of O(M^{16}) with respect to the real constellation size M). Numerical simulations show that these codes have a performance from comparable up to 1dB gain compared to the best known MIDO code with the same complexity.

  10. A NEW UEP SCHEME FOR ROBUST VIDEO TRANSMISSION IN LDPC CODED MIMO-OFDM SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Ru Congchong; Zheng Haifeng; Yin Liuguo; Lu Jianhua; Chen Changwen

    2007-01-01

    In order to improve the video transmission performance in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing(MIMO-OFDM)system,a new scheme,which integrates Multiple Description Coding(MDC),Low Density Parity Check(LDPC)coding and hybrid space time coding,is proposed in this letter.In particular,a hybrid space time coding algorithm is combined with LDPC codes to perform Unequal Error Protection(UEP)of MDC encoded video streams.Comparing with the UEP transmission with only LDPC codes,the proposed scheme achieves more than 1dB gain in terms of Signal to Noise Ratio(SNR)when the Peak Signal to Noise Ratio(PSNR)of reconstructed video is above 30dB.

  11. A Literature Review of Code Clone Analysis to Improve Software Maintenance Process

    CERN Document Server

    Morshed, Md Monzur; Ahmed, Salah Uddin

    2012-01-01

    Software systems are getting more complex as the system grows where maintaining such system is a primary concern for the industry. Code clone is one of the factors making software maintenance more difficult. It is a process of replicating code blocks by copy-and-paste that is common in software development. In the beginning stage of the project, developers find it easy and time consuming though it has crucial drawbacks in the long run. There are two types of researchers where some researchers think clones lead to additional changes during maintenance phase, in later stage increase the overall maintenance effort. On the other hand, some researchers think that cloned codes are more stable than non cloned codes. In this study, we discussed Code Clones and different ideas, methods, clone detection tools, related research on code clone, case study.

  12. Development of a graphical interface computer code for reactor fuel reloading optimization

    International Nuclear Information System (INIS)

    This report represents the results of the project performed in 2007. The aim of this project is to develop a graphical interface computer code that allows refueling engineers to design fuel reloading patterns for research reactor using simulated graphical model of reactor core. Besides, this code can perform refueling optimization calculations based on genetic algorithms as well as simulated annealing. The computer code was verified based on a sample problem, which relies on operational and experimental data of Dalat research reactor. This code can play a significant role in in-core fuel management practice at nuclear research reactor centers and in training. (author)

  13. SD-EQR: A New Technique To Use QR CodesTM in Cryptography

    OpenAIRE

    Dey, Somdip

    2012-01-01

    In this paper the author present a new technique of using QR Codes (commonly known as 'Quick Respond Codes') in the field of Cryptography. QR Codes are mainly used to convey or store messages because they have higher or large storage capacity than any other normal conventional 'barcodes'. In this paper the primary focus will be on storing messages in encrypted format with a password and send it to the required destination hiding in a QR Code, without being tracked or decrypted properly by any...

  14. A NEW DESIGN METHOD OF CDMA SPREADING CODES BASED ON MULTI-RATE UNITARY FILTER BANK

    Institute of Scientific and Technical Information of China (English)

    Bi Jianxin; Wang Yingmin; Yi Kechu

    2001-01-01

    It is well-known that the multi-valued CDMA spreading codes can be designed by means of a pair of mirror multi-rate filter banks based on some optimizing criterion. This paper indicates that there exists a theoretical bound in the performance of its circulating correlation property, which is given by an explicit expression. Based on this analysis, a criterion of maximizing entropy is proposed to design such codes. Computer simulation result suggests that the resulted codes outperform the conventional binary balanced Gold codes for an asynchronous CDMA system.

  15. DOGS: a collection of graphics for support of discrete ordinates codes

    International Nuclear Information System (INIS)

    A collection of computer codes called DOGS (Discrete Ordinates Graphics Support) has been developed to assist in the display and presentation of data generated by commonly used discrete ordinates transport codes. The DOGS codes include: EGAD for plotting two-dimensional geometries, ISOPLOT4 for plotting 2-D fluxes in a contour line fashion, FORM for plotting 2-D fluxes in a 3-D surface fashion, ACTUAL for calculating 2-D activities, TOOTH for calculating and plotting space-energy contributon fluxes, and ASPECT for plotting energy spectra. All of the codes use FIDO input formats and DISSPLA graphics software including the DISSPOP post processors

  16. DOGS: a collection of graphics for support of discrete ordinates codes

    Energy Technology Data Exchange (ETDEWEB)

    Ingersoll, D.T.; Slater, C.O.

    1980-03-01

    A collection of computer codes called DOGS (Discrete Ordinates Graphics Support) has been developed to assist in the display and presentation of data generated by commonly used discrete ordinates transport codes. The DOGS codes include: EGAD for plotting two-dimensional geometries, ISOPLOT4 for plotting 2-D fluxes in a contour line fashion, FORM for plotting 2-D fluxes in a 3-D surface fashion, ACTUAL for calculating 2-D activities, TOOTH for calculating and plotting space-energy contributon fluxes, and ASPECT for plotting energy spectra. All of the codes use FIDO input formats and DISSPLA graphics software including the DISSPOP post processors.

  17. FUMACS-G, a Graphical User Interface for FUMACS Code Package

    International Nuclear Information System (INIS)

    The FUMACS (FUel MAnagement Code System) code package has been developed at Rudjer Boskovic Institute in year 1991 with the aim to enable in-core fuel management analysis of the NPP Krsko core for nominal conditions. Due to modernization and uprating of the NPP Krsko core in year 2000 and the original 1991 FUMACS inadequacy in simulating NPP Krsko core in these uprated conditions, in the year 2001 a new version of FUMACS code package has been developed - FUMACS/FEEC 2001. The code package upgrading procedure consisted of two main aspects: modifications of master files, libraries and codes necessary for proper modeling of the uprated NPP Krsko core and development of the code package structure suitable for Windows-32 environment. The latter included upgrading the source of the code from FORTRAN F77 to F90 level and development of a graphical, user-friendly interface with fully integrated electronic help system. Since the original FUMACS code package has been developed as a DOS based application, running of the code package on a Windows operating system proved to be rather inefficient and lacking in advantages of a standard Windows application. Therefore, FUMACS-G has been developed as a user friendly environment for handling off all project input and output files, as well as for easier overall project management. The design of FUMACS-G shell has been based on Microsoft application design guidelines. (author)

  18. Subgroup A : nuclear model codes report to the Sixteenth Meeting of the WPEC

    Energy Technology Data Exchange (ETDEWEB)

    Talou, P. (Patrick); Chadwick, M. B. (Mark B.); Dietrich, F. S.; Herman, M.; Kawano, T. (Toshihiko); Konig, A.; Obložinský, P.

    2004-01-01

    The Subgroup A activities focus on the development of nuclear reaction models and codes, used in evaluation work for nuclear reactions from the unresolved energy region up to the pion threshold production limit, and for target nuclides from the low teens and heavier. Much of the efforts are devoted by each participant to the continuing development of their own Institution codes. Progresses in this arena are reported in detail for each code in the present document. EMPIRE-II is of public access. The release of the TALYS code has been announced for the ND2004 Conference in Santa Fe, NM, October 2004. McGNASH is still under development and is not expected to be released in the very near future. In addition, Subgroup A members have demonstrated a growing interest in working on common modeling and codes capabilities, which would significantly reduce the amount of duplicate work, help manage efficiently the growing lines of existing codes, and render codes inter-comparison much easier. A recent and important activity of the Subgroup A has therefore been to develop the framework and the first bricks of the ModLib library, which is constituted of mostly independent pieces of codes written in Fortran 90 (and above) to be used in existing and future nuclear reaction codes. Significant progresses in the development of ModLib have been made during the past year. Several physics modules have been added to the library, and a few more have been planned in detail for the coming year.

  19. Subgroup A: nuclear model codes report to the Sixteenth Meeting of the WPEC

    International Nuclear Information System (INIS)

    The Subgroup A activities focus on the development of nuclear reaction models and codes, used in evaluation work for nuclear reactions from the unresolved energy region up to the pion threshold production limit, and for target nuclides from the low teens and heavier. Much of the efforts are devoted by each participant to the continuing development of their own Institution codes. Progresses in this arena are reported in detail for each code in the present document. EMPIRE-II is of public access. The release of the TALYS code has been announced for the ND2004 Conference in Santa Fe, NM, October 2004. McGNASH is still under development and is not expected to be released in the very near future. In addition, Subgroup A members have demonstrated a growing interest in working on common modeling and codes capabilities, which would significantly reduce the amount of duplicate work, help manage efficiently the growing lines of existing codes, and render codes inter-comparison much easier. A recent and important activity of the Subgroup A has therefore been to develop the framework and the first bricks of the ModLib library, which is constituted of mostly independent pieces of codes written in Fortran 90 (and above) to be used in existing and future nuclear reaction codes. Significant progresses in the development of ModLib have been made during the past year. Several physics modules have been added to the library, and a few more have been planned in detail for the coming year.

  20. TEMP: a computer code to calculate fuel pin temperatures during a transient

    International Nuclear Information System (INIS)

    The computer code TEMP calculates fuel pin temperatures during a transient. It was developed to accommodate temperature calculations in any system of axi-symmetric concentric cylinders. When used to calculate fuel pin temperatures, the code will handle a fuel pin as simple as a solid cylinder or as complex as a central void surrounded by fuel that is broken into three regions by two circumferential cracks. Any fuel situation between these two extremes can be analyzed along with additional cladding, heat sink, coolant or capsule regions surrounding the fuel. The one-region version of the code accurately calculates the solution to two problems having closed-form solutions. The code uses an implicit method, an explicit method and a Crank-Nicolson (implicit-explicit) method