WorldWideScience

Sample records for abstracting code specific

  1. Testing abstract behavioral specifications

    NARCIS (Netherlands)

    P.Y.H. Wong; R. Bubel (Richard); F.S. de Boer (Frank); C.P.T. de Gouw (Stijn); M. Gómez-Zamalloa; R Haehnle; K. Meinke; M.A. Sindhu

    2015-01-01

    htmlabstractWe present a range of testing techniques for the Abstract Behavioral Specification (ABS) language and apply them to an industrial case study. ABS is a formal modeling language for highly variable, concurrent, component-based systems. The nature of these systems makes them susceptible to

  2. Stimulus-response bindings code both abstract and specific representations of stimuli: evidence from a classification priming design that reverses multiple levels of response representation.

    Science.gov (United States)

    Horner, A J; Henson, R N

    2011-11-01

    Repetition priming can be caused by the rapid retrieval of previously encoded stimulus-response (S-R) bindings. S-R bindings have recently been shown to simultaneously code multiple levels of response representation, from specific Motor-actions to more abstract Decisions ("yes"/"no") and Classifications (e.g., "man-made"/"natural"). Using an experimental design that reverses responses at all of these levels, we assessed whether S-R bindings also code multiple levels of stimulus representation. Across two experiments, we found effects of response reversal on priming when switching between object pictures and object names, consistent with S-R bindings that code stimuli at an abstract level. Nonetheless, the size of this reversal effect was smaller for such across-format (e.g., word-picture) repetition than for within-format (e.g., picture-picture) repetition, suggesting additional coding of format-specific stimulus representations. We conclude that S-R bindings simultaneously represent both stimuli and responses at multiple levels of abstraction.

  3. Coding the Eggen Cards (Poster abstract)

    Science.gov (United States)

    Silvis, G.

    2014-06-01

    (Abstract only) A look at the Eggen Portal for accessing the Eggen cards. And a call for volunteers to help code the cards: 100,000 cards must be looked at and their star references identified and coded into the database for this to be a valuable resource.

  4. Convolutional-Code-Specific CRC Code Design

    OpenAIRE

    Lou, Chung-Yu; Daneshrad, Babak; Wesel, Richard D.

    2015-01-01

    Cyclic redundancy check (CRC) codes check if a codeword is correctly received. This paper presents an algorithm to design CRC codes that are optimized for the code-specific error behavior of a specified feedforward convolutional code. The algorithm utilizes two distinct approaches to computing undetected error probability of a CRC code used with a specific convolutional code. The first approach enumerates the error patterns of the convolutional code and tests if each of them is detectable. Th...

  5. Argonne Code Center: compilation of program abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Butler, M.K.; DeBruler, M.; Edwards, H.S.; Harrison, C. Jr.; Hughes, C.E.; Jorgensen, R.; Legan, M.; Menozzi, T.; Ranzini, L.; Strecok, A.J.

    1977-08-01

    This publication is the eleventh supplement to, and revision of, ANL-7411. It contains additional abstracts and revisions to some earlier abstracts and other pages. Sections of the complete document ANL-7411 are as follows: preface, history and acknowledgements, abstract format, recommended program package contents, program classification guide and thesaurus, and the abstract collection. (RWR)

  6. Argonne Code Center: compilation of program abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Butler, M.K.; DeBruler, M.; Edwards, H.S.

    1976-08-01

    This publication is the tenth supplement to, and revision of, ANL-7411. It contains additional abstracts and revisions to some earlier abstracts and other pages. Sections of the document are as follows: preface; history and acknowledgements; abstract format; recommended program package contents; program classification guide and thesaurus; and abstract collection. (RWR)

  7. Reversible machine code and its abstract processor architecture

    DEFF Research Database (Denmark)

    Axelsen, Holger Bock; Glück, Robert; Yokoyama, Tetsuo

    2007-01-01

    A reversible abstract machine architecture and its reversible machine code are presented and formalized. For machine code to be reversible, both the underlying control logic and each instruction must be reversible. A general class of machine instruction sets was proven to be reversible, building ...... on our concept of reversible updates. The presentation is abstract and can serve as a guideline for a family of reversible processor designs. By example, we illustrate programming principles for the abstract machine architecture formalized in this paper....

  8. Abstracts of digital computer code packages. Assembled by the Radiation Shielding Information Center. [Radiation transport codes

    Energy Technology Data Exchange (ETDEWEB)

    McGill, B.; Maskewitz, B.F.; Anthony, C.M.; Comolander, H.E.; Hendrickson, H.R.

    1976-01-01

    The term ''code package'' is used to describe a miscellaneous grouping of materials which, when interpreted in connection with a digital computer, enables the scientist--user to solve technical problems in the area for which the material was designed. In general, a ''code package'' consists of written material--reports, instructions, flow charts, listings of data, and other useful material and IBM card decks (or, more often, a reel of magnetic tape) on which the source decks, sample problem input (including libraries of data) and the BCD/EBCDIC output listing from the sample problem are written. In addition to the main code, and any available auxiliary routines are also included. The abstract format was chosen to give to a potential code user several criteria for deciding whether or not he wishes to request the code package. (RWR)

  9. Hardware Abstraction and Protocol Optimization for Coded Sensor Networks

    DEFF Research Database (Denmark)

    Nistor, Maricica; Lucani Rötter, Daniel Enrique; Barros, joao

    2014-01-01

    The design of the communication protocols in wireless sensor networks (WSNs) often neglects several key characteristics of the sensor's hardware, while assuming that the number of transmitted bits is the dominating factor behind the system's energy consumption. A closer look at the hardware...... specifications of common sensors reveals, however, that other equally important culprits exist, such as the reception and processing energy. Hence, there is a need for a more complete hardware abstraction of a sensor node to reduce effectively the total energy consumption of the network by designing energy......-efficient protocols that use such an abstraction, as well as mechanisms to optimize a communication protocol in terms of energy consumption. The problem is modeled for different feedback-based techniques, where sensors are connected to a base station, either directly or through relays. We show that for four example...

  10. Formal Methods for Abstract Specifications – A Comparison of Concepts

    DEFF Research Database (Denmark)

    Instenberg, Martin; Schneider, Axel; Schnetter, Sabine

    2006-01-01

    inspections and tests are usual means. To facilitate the introduction of formal methods in the development process of complex systems and protocols, two different tools evolved from research activities – UPPAAL and SpecEdit – have been investigated and compared regarding their concepts and functionality......In industry formal methods are becoming increasingly important for the verification of hardware and software designs. However current practice for specification of system and protocol functionality on high level of abstraction is textual description. For verification of the system behavior manual...

  11. Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    West African Journal of Industrial and Academic Research Vol.9 No.1 December 2013 62. After the design, it was coded using Visual basic 6.0, hyper text markup language (HTML) integrating Microsoft Agent and Microsoft Access at the back end .The general interface of the authoring system is as shown in the figure below.

  12. Abstract

    African Journals Online (AJOL)

    Getachew

    Keywords: Overbooking, Monte Carlo Simulation, Nelder Mead algorithm, Revenue management, Ethiopian ..... direct search algorithms, namely, the Nelder Mead and Genetic Algorithms were used to solve the .... MatLab codes used to calculate the optimal number of overbooking, expected net revenue, and probability of ...

  13. ABSTRACT

    African Journals Online (AJOL)

    Peters

    ABSTRACT. Many natural gums are employed as suspending agents in the formulation of pharmaceutical suspensions. The search to develop locally available natural gum from apparently a waste product as an alternative suspending agent stimulated the interest in this present study. Cola acuminata gum (CAG) extracted ...

  14. Abstract ~. ,

    African Journals Online (AJOL)

    Abstract ~. ,. A study was conducted to evaluate the extent of water adulteration of milk produced and marketed in. Morogoro municipality in Tanzania. 'A total of 90 milk samples were collec,ted from institutional, private and smallholder fdrms alid milk vendors, The-samples were analysed for lactometer reading.

  15. Abstract

    African Journals Online (AJOL)

    `123456789jkl''''#

    46. An Empirical Survey of Technology Application in Teaching Geography in Nigerian. Secondary Schools. 1Sofowora O. A. and 2Egbedokun A. Abstract. The main ... through stratified sampling techniques based on school types, location, Local Education Area and gender. .... children learn in two-ways, orally and visually.

  16. Abstract

    African Journals Online (AJOL)

    Francis

    Abstract. Aqueous, methanol and chloroform extracts from the leaves of Ficus religiosa, Thespesia populnea and Hibiscus tiliaceus were completely screened for antibacterial and antifungal activity. The chloroform extract of F. religiosa possessed a broad spectrum of antibacterial activity with a zone of inhibition of 10 to 21 ...

  17. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  18. Software Abstractions and Methodologies for HPC Simulation Codes on Future Architectures

    Directory of Open Access Journals (Sweden)

    Anshu Dubey

    2014-07-01

    Full Text Available Simulations with multi-physics modeling have become crucial to many science and engineering fields, and multi-physics capable scientific software is as important to these fields as instruments and facilities are to experimental sciences. The current generation of mature multi-physics codes would have sustainably served their target communities with modest amount of ongoing investment for enhancing capabilities. However, the revolution occurring in the hardware architecture has made it necessary to tackle the parallelism and performance management in these codes at multiple levels. The requirements of various levels are often at cross-purposes with one another, and therefore hugely complicate the software design. All of these considerations make it essential to approach this challenge cooperatively as a community. We conducted a series of workshops under an NSF-SI2 conceptualization grant to get input from various stakeholders, and to identify broad approaches that might lead to a solution. In this position paper we detail the major concerns articulated by the application code developers, and emerging trends in utilization of programming abstractions that we found through these workshops.

  19. The Formal Specification of an Abstract Database: Design and Implementation.

    Science.gov (United States)

    1985-12-01

    manageable. For example, although we can not put the object STUDENT into a database, it is no problem to store the characterstring ’ STUDENT ’ as a conceptual...his attention into one specific direction, since our methodology €I focuses on representation independence. The only reason for choosing this approach...dblist.iritlst: -~dap; dblist.madlst: -*tap; dblist.memblst: -4rap; /* database part * isbaal: -~ bap ; isnat: -~ bap ; 225 isint: -~bop; ischar: -*bop; isstr.char

  20. Optimization Specifications for CUDA Code Restructuring Tool

    KAUST Repository

    Khan, Ayaz

    2017-03-13

    In this work we have developed a restructuring software tool (RT-CUDA) following the proposed optimization specifications to bridge the gap between high-level languages and the machine dependent CUDA environment. RT-CUDA takes a C program and convert it into an optimized CUDA kernel with user directives in a configuration file for guiding the compiler. RTCUDA also allows transparent invocation of the most optimized external math libraries like cuSparse and cuBLAS enabling efficient design of linear algebra solvers. We expect RT-CUDA to be needed by many KSA industries dealing with science and engineering simulation on massively parallel computers like NVIDIA GPUs.

  1. The nature of abstract orthographic codes: evidence from masked priming and magnetoencephalography.

    Directory of Open Access Journals (Sweden)

    Liina Pylkkänen

    Full Text Available What kind of mental objects are letters? Research on letter perception has mainly focussed on the visual properties of letters, showing that orthographic representations are abstract and size/shape invariant. But given that letters are, by definition, mappings between symbols and sounds, what is the role of sound in orthographic representation? We present two experiments suggesting that letters are fundamentally sound-based representations. To examine the role of sound in orthographic representation, we took advantage of the multiple scripts of Japanese. We show two types of evidence that if a Japanese word is presented in a script it never appears in, this presentation immediately activates the ("actual" visual word form of that lexical item. First, equal amounts of masked repetition priming are observed for full repetition and when the prime appears in an atypical script. Second, visual word form frequency affects neuromagnetic measures already at 100-130 ms whether the word is presented in its conventional script or in a script it never otherwise appears in. This suggests that Japanese orthographic codes are not only shape-invariant, but also script invariant. The finding that two characters belonging to different writing systems can activate the same form representation suggests that sound identity is what determines orthographic identity: as long as two symbols express the same sound, our minds represent them as part of the same character/letter.

  2. Validation of International Classification of Diseases coding for bone metastases in electronic health records using technology-enabled abstraction

    Directory of Open Access Journals (Sweden)

    Liede A

    2015-11-01

    Full Text Available Alexander Liede,1 Rohini K Hernandez,1 Maayan Roth,2 Geoffrey Calkins,2 Katherine Larrabee,2 Leo Nicacio21Center for Observational Research, Amgen Inc., South San Francisco and Thousand Oaks, CA, 2Flatiron Health, New York, NY, USAObjective: The accuracy of bone metastases diagnostic coding based on International Classification of Diseases, ninth revision (ICD-9 is unknown for most large databases used for epidemiologic research in the US. Electronic health records (EHR are the preferred source of data, but often clinically relevant data occur only as unstructured free text. We examined the validity of bone metastases ICD-9 coding in structured EHR and administrative claims relative to the complete (structured and unstructured patient chart obtained through technology-enabled chart abstraction.Patients and methods: Female patients with breast cancer with ≥1 visit after November 2010 were identified from three community oncology practices in the US. We calculated sensitivity, specificity, positive predictive value (PPV, and negative predictive value (NPV of bone metastases ICD-9 code 198.5. The technology-enabled abstraction displays portions of the chart to clinically trained abstractors for targeted review, thereby maximizing efficiency. We evaluated effects of misclassification of patients developing skeletal complications or treated with bone-targeting agents (BTAs, and timing of BTA.Results: Among 8,796 patients with breast cancer, 524 had confirmed bone metastases using chart abstraction. Sensitivity was 0.67 (95% confidence interval [CI] =0.63–0.71 based on structured EHR, and specificity was high at 0.98 (95% CI =0.98–0.99 with corresponding PPV of 0.71 (95% CI =0.67–0.75 and NPV of 0.98 (95% CI =0.98–0.98. From claims, sensitivity was 0.78 (95% CI =0.74–0.81, and specificity was 0.98 (95% CI =0.98–0.98 with PPV of 0.72 (95% CI =0.68–0.76 and NPV of 0.99 (95% CI =0.98–0.99. Structured data and claims missed 17% of bone

  3. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  4. Abstracts of digital computer code packages assembled by the Radiation Shielding Information Center

    Energy Technology Data Exchange (ETDEWEB)

    Carter, B.J.; Maskewitz, B.F.

    1985-04-01

    This publication, ORNL/RSIC-13, Volumes I to III Revised, has resulted from an internal audit of the first 168 packages of computing technology in the Computer Codes Collection (CCC) of the Radiation Shielding Information Center (RSIC). It replaces the earlier three documents published as single volumes between 1966 to 1972. A significant number of the early code packages were considered to be obsolete and were removed from the collection in the audit process and the CCC numbers were not reassigned. Others not currently being used by the nuclear R and D community were retained in the collection to preserve technology not replaced by newer methods, or were considered of potential value for reference purposes. Much of the early technology, however, has improved through developer/RSIC/user interaction and continues at the forefront of the advancing state-of-the-art.

  5. Interoperable domain-specific languages families for code generation

    Czech Academy of Sciences Publication Activity Database

    Malohlava, M.; Plášil, F.; Bureš, Tomáš; Hnětynka, P.

    2013-01-01

    Roč. 43, č. 5 (2013), s. 479-499 ISSN 0038-0644 R&D Projects: GA ČR GD201/09/H057 EU Projects: European Commission(XE) ASCENS 257414 Grant - others:GA AV ČR(CZ) GAP103/11/1489 Program:FP7 Institutional research plan: CEZ:AV0Z10300504 Keywords : code generation * domain specific languages * models reuse * extensible languages * specification * program synthesis Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.148, year: 2013

  6. Automatic Synthesis of Implementations for Abstract Data Types from Algebraic Specifications.

    Science.gov (United States)

    1982-06-01

    Implementations for Abstract Data Types from Algebraic Specifications Abstract Algebraic qxikczirm baire been used extensively to prove pwv~sof "W~c dotn...QUEUIlmseu1(. I)j)) , X(?rs 1) that satislies the following conditions: (1) XFNQUEUF(1wh1(i. i)j)) M 3,(?rbs2) is a theorem of PW (2) [.%QUlLLFlr(lacl j...two infcrence ,lus alled the synthesis nlek& Thc synthesis rules arc designed for gcncrating theorems or PW that havc the same lcfl hand sides, but

  7. Site-specific Probabilistic Analysis of DCGLs Using RESRAD Code

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jeongju; Yoon, Suk Bon; Sohn, Wook [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    In general, DCGLs can be conservative (screening DCGL) if they do not take into account site specific factors. Use of such conservative DCGLs can lead to additional remediation that would not be required if the effort was made to develop site-specific DCGLs. Therefore, the objective of this work is to provide an example on the use of the RESRAD 6.0 probabilistic (site-specific) dose analysis to compare with the screening DCGL. Site release regulations state that a site will be considered acceptable for unrestricted use if the residual radioactivity that is distinguishable from background radiation results in a Total Effective Dose Equivalent (TEDE) to an average member of the critical group of less than the site release criteria, for example 0.25 mSv per year in U.S. Utilities use computer dose modeling codes to establish an acceptable level of contamination, the derived concentration guideline level (DCGL) that will meet this regulatory limit. Since the DCGL value is the principal measure of residual radioactivity, it is critical to understand the technical basis of these dose modeling codes. The objective this work was to provide example on nuclear power plant decommissioning dose analysis in a probabilistic analysis framework. The focus was on the demonstration of regulatory compliance for surface soil contamination using the RESRAD 6.0 code. Both the screening and site-specific probabilistic dose analysis methodologies were examined. Example analyses performed with the screening probabilistic dose analysis confirmed the conservatism of the NRC screening values and indicated the effectiveness of probabilistic dose analysis in reducing the conservatism in DCGL derivation.

  8. CAS (CHEMICAL ABSTRACTS SOCIETY) PARAMETER CODES and Other Data from FIXED STATIONS and Other Platforms from 19890801 to 19891130 (NODC Accession 9700156)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Tissue, sediment, and Chemical Abstracts Society (CAS) parameter codes were collected from Columbia River Basin and other locations from 01 August 1989 to 30...

  9. Incentives facing UK-listed companies to comply with the risk reporting provisions of the UK corporate governance code â[euro] Abstract of the London Discussion

    National Research Council Canada - National Science Library

    2017-01-01

      This abstract relates to the following paper: Klumpes P. , Ledlie C. , Fahey F. , Kakar G. and Styles S. Incentives facing UK-listed companies to comply with the risk reporting provisions of the UK corporate governance code...

  10. CAS (CHEMICAL ABSTRACTS SOCIETY) PARAMETER CODES and Other Data from MULTIPLE SHIPS From Caribbean Sea and Others from 19790205 to 19890503 (NCEI Accession 9100017)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The accession contains Chemical Abstracts Society (CAS) parameter codes and Other Data from MULTIPLE SHIPS From Caribbean Sea and Gulf of Mexico from February 5,...

  11. Generating Safety-Critical PLC Code From a High-Level Application Software Specification

    Science.gov (United States)

    2008-01-01

    The benefits of automatic-application code generation are widely accepted within the software engineering community. These benefits include raised abstraction level of application programming, shorter product development time, lower maintenance costs, and increased code quality and consistency. Surprisingly, code generation concepts have not yet found wide acceptance and use in the field of programmable logic controller (PLC) software development. Software engineers at Kennedy Space Center recognized the need for PLC code generation while developing the new ground checkout and launch processing system, called the Launch Control System (LCS). Engineers developed a process and a prototype software tool that automatically translates a high-level representation or specification of application software into ladder logic that executes on a PLC. All the computer hardware in the LCS is planned to be commercial off the shelf (COTS), including industrial controllers or PLCs that are connected to the sensors and end items out in the field. Most of the software in LCS is also planned to be COTS, with only small adapter software modules that must be developed in order to interface between the various COTS software products. A domain-specific language (DSL) is a programming language designed to perform tasks and to solve problems in a particular domain, such as ground processing of launch vehicles. The LCS engineers created a DSL for developing test sequences of ground checkout and launch operations of future launch vehicle and spacecraft elements, and they are developing a tabular specification format that uses the DSL keywords and functions familiar to the ground and flight system users. The tabular specification format, or tabular spec, allows most ground and flight system users to document how the application software is intended to function and requires little or no software programming knowledge or experience. A small sample from a prototype tabular spec application is

  12. An automatic method to generate domain-specific investigator networks using PubMed abstracts

    Directory of Open Access Journals (Sweden)

    Gwinn Marta

    2007-06-01

    web-based prototype capable of creating domain-specific investigator networks based on an application that accurately generates detailed investigator profiles from PubMed abstracts combined with robust standard vocabularies. This approach could be used for other biomedical fields to efficiently establish domain-specific investigator networks.

  13. An Improved Abstract State Machine Based Choreography Specification and Execution Algorithm for Semantic Web Services

    Directory of Open Access Journals (Sweden)

    Shahin Mehdipour Ataee

    2018-01-01

    Full Text Available We identify significant weaknesses in the original Abstract State Machine (ASM based choreography algorithm of Web Service Modeling Ontology (WSMO, which make it impractical for use in semantic web service choreography engines. We present an improved algorithm which rectifies the weaknesses of the original algorithm, as well as a practical, fully functional choreography engine implementation in Flora-2 based on the improved algorithm. Our improvements to the choreography algorithm include (i the linking of the initial state of the ASM to the precondition of the goal, (ii the introduction of the concept of a final state in the execution of the ASM and its linking to the postcondition of the goal, and (iii modification to the execution of the ASM so that it stops when the final state condition is satisfied by the current configuration of the machine. Our choreography engine takes as input semantic web service specifications written in the Flora-2 dialect of F-logic. Furthermore, we prove the equivalence of ASMs (evolving algebras and evolving ontologies in the sense that one can simulate the other, a first in literature. Finally, we present a visual editor which facilitates the design and deployment of our F-logic based web service and goal specifications.

  14. Code Shift: Grid Specifications and Dynamic Wind Turbine Models

    DEFF Research Database (Denmark)

    Ackermann, Thomas; Ellis, Abraham; Fortmann, Jens

    2013-01-01

    Grid codes (GCs) and dynamic wind turbine (WT) models are key tools to allow increasing renewable energy penetration without challenging security of supply. In this article, the state of the art and the further development of both tools are discussed, focusing on the European and North American...

  15. The penelope code system. Specific features and recent improvements

    Science.gov (United States)

    Salvat, Francesc

    2014-06-01

    Since its first release, back in 1996, the Monte Carlo code system penelope has evolved into a flexible and reliable tool for describing coupled electron-photon transport in complex material structures. The present article contains an overview of the physical interaction models, particle tracking methods, geometry tools, and variance-reduction techniques implemented in penelope. Recent refinements aimed at improving the accuracy of the code, and its stability under variations of user-defined simulation parameters, are also described. These include the use of reliable cross sections for the ionization of inner atomic electron shells by electron/positron impact, a reformulation of the random-hinge method, and the use of fuzzy quadric surfaces in the description of the geometry.

  16. Reading RNA methylation codes through methyl-specific binding proteins.

    Science.gov (United States)

    Wang, Xiao; He, Chuan

    2014-01-01

    N (6)-methyladenosine (m (6)A) is a prevalent modification of eukaryotic mRNAs. It regulates yeast cell fate and is essential to the development and fertility of metazoans. Although its presence in mRNA has been known since the early 1970s, the function of m (6)A remained a mystery until the spate of discoveries in the past three years. Here, we focus on the discovery of m (6)A "readers" (proteins that specifically recognize m (6)A), and their functions in tuning mRNA stability, as well as the broader significance of such m (6)A-dependent regulation of gene expression.

  17. Are the products of statistical learning abstract or stimulus-specific?

    Directory of Open Access Journals (Sweden)

    Athena eVouloumanos

    2012-03-01

    Full Text Available Learners segment potential lexical units from syllable streams when statistically variable transitional probabilities between adjacent syllables are the only cues to word boundaries. Here we examine the nature of the representations that result from statistical learning by assessing learners’ ability to generalize across acoustically different stimuli. In three experiments, we investigate limitations on the outcome of statistical learning by considering two possibilities: that the products of statistical segmentation processes are abstract and generalizable representations, or, alternatively, that products of statistical learning are stimulus-bound and restricted to perceptually similar instances. In Experiment 1, learners segmented units from statistically predictable streams, and recognized these units when they were acoustically transformed by temporal reversals. In Experiment 2, learners were able to segment units from temporally reversed syllable streams, but were only able to generalize in conditions of mild acoustic transformation. In Experiment 3, learners were able to recognize statistically segmented units after a voice change but were unable to do so when the novel voice was mildly distorted. Together these results suggest that representations that result from statistical learning can be abstracted to some degree, but not in all listening conditions.

  18. Human communication of emotion via sweat : How specific is it? (abstract)

    NARCIS (Netherlands)

    Smeets, M.A.M.; Toet, A.; Duinkerken, R.; Groot, J. de; Kaldewaij, A.; Hout, M.A. van den; et al

    2011-01-01

    Females evaluate ambiguous facial expression – morphed between happy and fearful – faces as more fearful when exposed to fear sweat as compared to control odor (Zhou & Chen, 2009). We investigated the specificity of this effect, i.e. whether processing of fearful faces is affected specifically by

  19. Domain-specific modeling enabling full code generation

    CERN Document Server

    Kelly, Steven

    2007-01-01

    Domain-Specific Modeling (DSM) is the latest approach tosoftware development, promising to greatly increase the speed andease of software creation. Early adopters of DSM have been enjoyingproductivity increases of 500–1000% in production for over adecade. This book introduces DSM and offers examples from variousfields to illustrate to experienced developers how DSM can improvesoftware development in their teams. Two authorities in the field explain what DSM is, why it works,and how to successfully create and use a DSM solution to improveproductivity and quality. Divided into four parts, the book covers:background and motivation; fundamentals; in-depth examples; andcreating DSM solutions. There is an emphasis throughout the book onpractical guidelines for implementing DSM, including how toidentify the nece sary language constructs, how to generate fullcode from models, and how to provide tool support for a new DSMlanguage. The example cases described in the book are available thebook's Website, www.dsmbook....

  20. COMPETITIVE METAGENOMIC DNA HYBRIDIZATION IDENTIFIES HOST-SPECIFIC GENETIC MARKERS IN CATTLE FECAL SAMPLES - ABSTRACT

    Science.gov (United States)

    Several PCR methods have recently been developed to identify fecal contamination in surface waters. In all cases, researchers have relied on one gene or one microorganism for selection of host specific markers. Here, we describe the application of a genome fragment enrichment met...

  1. Rapid Learning of an Abstract Language-Specific Category: Polish Children's Acquisition of the Instrumental Construction

    Science.gov (United States)

    Dabrowska, Ewa; Tomasello, Michael

    2008-01-01

    Rapid acquisition of linguistic categories or constructions is sometimes regarded as evidence of innate knowledge. In this paper, we examine Polish children's early understanding of an idiosyncratic, language-specific construction involving the instrumental case--which could not be due to innate knowledge. Thirty Polish-speaking children aged 2; 6…

  2. Reaction rate constants of H-abstraction by OH from large ketones: measurements and site-specific rate rules.

    Science.gov (United States)

    Badra, Jihad; Elwardany, Ahmed E; Farooq, Aamir

    2014-06-28

    Reaction rate constants of the reaction of four large ketones with hydroxyl (OH) are investigated behind reflected shock waves using OH laser absorption. The studied ketones are isomers of hexanone and include 2-hexanone, 3-hexanone, 3-methyl-2-pentanone, and 4-methl-2-pentanone. Rate constants are measured under pseudo-first-order kinetics at temperatures ranging from 866 K to 1375 K and pressures near 1.5 atm. The reported high-temperature rate constant measurements are the first direct measurements for these ketones under combustion-relevant conditions. The effects of the position of the carbonyl group (C=O) and methyl (CH3) branching on the overall rate constant with OH are examined. Using previously published data, rate constant expressions covering, low-to-high temperatures, are developed for acetone, 2-butanone, 3-pentanone, and the hexanone isomers studied here. These Arrhenius expressions are used to devise rate rules for H-abstraction from various sites. Specifically, the current scheme is applied with good success to H-abstraction by OH from a series of n-ketones. Finally, general expressions for primary and secondary site-specific H-abstraction by OH from ketones are proposed as follows (the subscript numbers indicate the number of carbon atoms bonded to the next-nearest-neighbor carbon atom, the subscript CO indicates that the abstraction is from a site next to the carbonyl group (C=O), and the prime is used to differentiate different neighboring environments of a methylene group):

  3. C code generation from Petri-net-based logic controller specification

    Science.gov (United States)

    Grobelny, Michał; Grobelna, Iwona; Karatkevich, Andrei

    2017-08-01

    The article focuses on programming of logic controllers. It is important that a programming code of a logic controller is executed flawlessly according to the primary specification. In the presented approach we generate C code for an AVR microcontroller from a rule-based logical model of a control process derived from a control interpreted Petri net. The same logical model is also used for formal verification of the specification by means of the model checking technique. The proposed rule-based logical model and formal rules of transformation ensure that the obtained implementation is consistent with the already verified specification. The approach is validated by practical experiments.

  4. Reaction rate constants of H-abstraction by OH from large ketones: Measurements and site-specific rate rules

    KAUST Repository

    Badra, Jihad

    2014-01-01

    Reaction rate constants of the reaction of four large ketones with hydroxyl (OH) are investigated behind reflected shock waves using OH laser absorption. The studied ketones are isomers of hexanone and include 2-hexanone, 3-hexanone, 3-methyl-2-pentanone, and 4-methl-2-pentanone. Rate constants are measured under pseudo-first-order kinetics at temperatures ranging from 866 K to 1375 K and pressures near 1.5 atm. The reported high-temperature rate constant measurements are the first direct measurements for these ketones under combustion-relevant conditions. The effects of the position of the carbonyl group (CO) and methyl (CH3) branching on the overall rate constant with OH are examined. Using previously published data, rate constant expressions covering, low-to-high temperatures, are developed for acetone, 2-butanone, 3-pentanone, and the hexanone isomers studied here. These Arrhenius expressions are used to devise rate rules for H-abstraction from various sites. Specifically, the current scheme is applied with good success to H-abstraction by OH from a series of n-ketones. Finally, general expressions for primary and secondary site-specific H-abstraction by OH from ketones are proposed as follows (the subscript numbers indicate the number of carbon atoms bonded to the next-nearest-neighbor carbon atom, the subscript CO indicates that the abstraction is from a site next to the carbonyl group (CO), and the prime is used to differentiate different neighboring environments of a methylene group):P1,CO = 7.38 × 10-14 exp(-274 K/T) + 9.17 × 10-12 exp(-2499 K/T) (285-1355 K)S10,CO = 1.20 × 10-11 exp(-2046 K/T) + 2.20 × 10-13 exp(160 K/T) (222-1464 K)S11,CO = 4.50 × 10-11 exp(-3000 K/T) + 8.50 × 10-15 exp(1440 K/T) (248-1302 K)S11′,CO = 3.80 × 10-11 exp(-2500 K/T) + 8.50 × 10-15 exp(1550 K/T) (263-1370 K)S 21,CO = 5.00 × 10-11 exp(-2500 K/T) + 4.00 × 10-13 exp(775 K/T) (297-1376 K) © 2014 the Partner Organisations.

  5. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part II: Reduction Semantics and Abstract Machines

    DEFF Research Database (Denmark)

    Biernacka, Malgorzata; Danvy, Olivier

    2008-01-01

    We present a context-sensitive reduction semantics for a lambda-calculus with explicit substitutions and store and we show that the functional implementation of this small-step semantics mechanically corresponds to that of an abstract machine. This abstract machine is very close to the abstract m...

  6. Primate-specific Long Non-coding RNAs and MicroRNAs

    Directory of Open Access Journals (Sweden)

    Hassaan Mehboob Awan

    2017-06-01

    Full Text Available Non-coding RNAs (ncRNAs are critical regulators of gene expression in essentially all life forms. Long ncRNAs (lncRNAs and microRNAs (miRNAs are two important RNA classes possessing regulatory functions. Up to date, many primate-specific ncRNAs have been identified and investigated. Their expression specificity to primate lineage suggests primate-specific roles. It is thus critical to elucidate the biological significance of primate or even human-specific ncRNAs, and to develop potential ncRNA-based therapeutics. Here, we have summarized the studies regarding regulatory roles of some key primate-specific lncRNAs and miRNAs.

  7. Site-specific reaction rate constant measurements for various secondary and tertiary H-abstraction by OH radicals

    KAUST Repository

    Badra, Jihad

    2015-02-01

    Reaction rate constants for nine site-specific hydrogen atom (H) abstraction by hydroxyl radicals (OH) have been determined using experimental measurements of the rate constants of Alkane+OH→Products reactions. Seven secondary (S 20, S 21, S 22, S 30, S 31, S 32, and S 33) and two tertiary (T 100 and T 101) site-specific rate constants, where the subscripts refer to the number of carbon atoms (C) connected to the next-nearest-neighbor (N-N-N) C atom, were obtained for a wide temperature range (250-1450K). This was done by measuring the reaction rate constants for H abstraction by OH from a series of carefully selected large branched alkanes. The rate constant of OH with four different alkanes, namely 2,2-dimethyl-pentane, 2,4-dimethyl-pentane, 2,2,4-trimethyl-pentane (iso-octane), and 2,2,4,4-tetramethyl-pentane were measured at high temperatures (822-1367K) using a shock tube and OH absorption diagnostic. Hydroxyl radicals were detected using the narrow-line-width ring-dye laser absorption of the R1(5) transition of OH spectrum near 306.69nm.Previous low-temperature rate constant measurements are added to the current data to generate three-parameter rate expressions that successfully represent the available direct measurements over a wide temperature range (250-1450. K). Similarly, literature values of the low-temperature rate constants for the reaction of OH with seven normal and branched alkanes are combined with the recently measured high-temperature rate constants from our group [1]. Subsequent to that, site-specific rate constants for abstractions from various types of secondary and tertiary H atoms by OH radicals are derived and have the following modified Arrhenius expressions:. S20=8.49×10-17T1.52exp(73.4K/T)cm3molecule-1s-1(250-1450K) S21=1.07×10-15T1.07exp(208.3K/T)cm3molecule-1s-1(296-1440K) S22=2.88×10-13T0.41exp(-291.5K/T)cm3molecule-1s-1(272-1311K) S30=3.35×10-18T1.97exp(323.1K/T)cm3molecule-1s-1(250-1366K) S31=1.60×10-18T2.0exp(500.0K/T)cm3

  8. Genetic code in evolution: switching species-specific aminoacylation with a peptide transplant.

    Science.gov (United States)

    Wakasugi, K; Quinn, C L; Tao, N; Schimmel, P

    1998-01-02

    The genetic code is established in aminoacylation reactions whereby amino acids are joined to tRNAs bearing the anticodons of the genetic code. Paradoxically, while the code is universal there are many examples of species-specific aminoacylations, where a tRNA from one taxonomic domain cannot be acylated by a synthetase from another. Here we consider an example where a human, but not a bacterial, tRNA synthetase charges its cognate eukaryotic tRNA and where the bacterial, but not the human, enzyme charges the cognate bacterial tRNA. While the bacterial enzyme has less than 10% sequence identity with the human enzyme, transplantation of a 39 amino acid peptide from the human into the bacterial enzyme enabled the latter to charge its eukaryotic tRNA counterpart in vitro and in vivo. Conversely, substitution of the corresponding peptide of the bacterial enzyme for that of the human enabled the human enzyme to charge bacterial tRNA. This peptide element discriminates a base pair difference in the respective tRNA acceptor stems. Thus, functionally important co-adaptations of a synthetase to its tRNA act as small modular units that can be moved across taxonomic domains and thereby preserve the universality of the code.

  9. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part II: Reduction Semantics and Abstract Machines

    DEFF Research Database (Denmark)

    Biernacka, Malgorzata; Danvy, Olivier

    2009-01-01

    We present a context-sensitive reduction semantics for a lambmda-calculus with explicit substitutions and we show that the functional implementation of this small-step semantics mechanically corresponds to that of the abstract machine for Core Scheme presented by Clinger at PLDI'98, including first-class...... continuations.  Starting from this reduction semantics, (1) we refocus it into a small-step abstract machine; (2) we fuse the transition function of this abstract machine with its driver loop, obtaining a big-step abstract machine which is staged; (3) we compress its corridor transitions, obtaining an eval....../continue abstract machine; and (4) we unfold its ground closures, which yields an abstract machine that essentially coincides with Clinger's machine.  This lambda-calculus with explicit substitutions therefore aptly accounts for Core Scheme, including Clinger's permutations and unpermutations....

  10. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part I: Denotational Semantics, Natural Semantics, and Abstract Machines

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2009-01-01

    We derive two big-step abstract machines, a natural semantics, and the valuation function of a denotational semantics based on the small-step abstract machine for Core Scheme presented by Clinger at PLDI'98. Starting from a functional implementation of this small-step abstract machine, (1) we fus...... of a denotational semantics in continuation-passing style.  We then compare this valuation function with that of Clinger's original denotational semantics of Scheme....

  11. A human-specific de novo protein-coding gene associated with human brain functions.

    Directory of Open Access Journals (Sweden)

    Chuan-Yun Li

    2010-03-01

    Full Text Available To understand whether any human-specific new genes may be associated with human brain functions, we computationally screened the genetic vulnerable factors identified through Genome-Wide Association Studies and linkage analyses of nicotine addiction and found one human-specific de novo protein-coding gene, FLJ33706 (alternative gene symbol C20orf203. Cross-species analysis revealed interesting evolutionary paths of how this gene had originated from noncoding DNA sequences: insertion of repeat elements especially Alu contributed to the formation of the first coding exon and six standard splice junctions on the branch leading to humans and chimpanzees, and two subsequent substitutions in the human lineage escaped two stop codons and created an open reading frame of 194 amino acids. We experimentally verified FLJ33706's mRNA and protein expression in the brain. Real-Time PCR in multiple tissues demonstrated that FLJ33706 was most abundantly expressed in brain. Human polymorphism data suggested that FLJ33706 encodes a protein under purifying selection. A specifically designed antibody detected its protein expression across human cortex, cerebellum and midbrain. Immunohistochemistry study in normal human brain cortex revealed the localization of FLJ33706 protein in neurons. Elevated expressions of FLJ33706 were detected in Alzheimer's brain samples, suggesting the role of this novel gene in human-specific pathogenesis of Alzheimer's disease. FLJ33706 provided the strongest evidence so far that human-specific de novo genes can have protein-coding potential and differential protein expression, and be involved in human brain functions.

  12. Building disease-specific drug-protein connectivity maps from molecular interaction networks and PubMed abstracts.

    Directory of Open Access Journals (Sweden)

    Jiao Li

    2009-07-01

    Full Text Available The recently proposed concept of molecular connectivity maps enables researchers to integrate experimental measurements of genes, proteins, metabolites, and drug compounds under similar biological conditions. The study of these maps provides opportunities for future toxicogenomics and drug discovery applications. We developed a computational framework to build disease-specific drug-protein connectivity maps. We integrated gene/protein and drug connectivity information based on protein interaction networks and literature mining, without requiring gene expression profile information derived from drug perturbation experiments on disease samples. We described the development and application of this computational framework using Alzheimer's Disease (AD as a primary example in three steps. First, molecular interaction networks were incorporated to reduce bias and improve relevance of AD seed proteins. Second, PubMed abstracts were used to retrieve enriched drug terms that are indirectly associated with AD through molecular mechanistic studies. Third and lastly, a comprehensive AD connectivity map was created by relating enriched drugs and related proteins in literature. We showed that this molecular connectivity map development approach outperformed both curated drug target databases and conventional information retrieval systems. Our initial explorations of the AD connectivity map yielded a new hypothesis that diltiazem and quinidine may be investigated as candidate drugs for AD treatment. Molecular connectivity maps derived computationally can help study molecular signature differences between different classes of drugs in specific disease contexts. To achieve overall good data coverage and quality, a series of statistical methods have been developed to overcome high levels of data noise in biological networks and literature mining results. Further development of computational molecular connectivity maps to cover major disease areas will likely set

  13. STEEP4 code for computation of specific thermonuclear reaction rates from pointwise cross sections

    Energy Technology Data Exchange (ETDEWEB)

    Harris, D.R.; Dei, D.E.; Husseiny, A.A.; Sabri, Z.A.; Hale, G.M.

    1976-05-01

    A code module, STEEP4, is developed to calculate the fusion reaction rates in terms of the specific reactivity (sigma v) which is the product of cross section and relative velocity averaged over the actual ion distributions of the interacting particles in the plasma. The module is structured in a way suitable for incorporation in thermonuclear burn codes to provide rapid and yet relatively accurate on-line computation of (sigma v) as a function of plasma parameters. Ion distributions are modified to include slowing-down contributions which are characterized in terms of plasma parameters. Rapid and accurate algorithms are used for integrating (sigma v) from cross sections and spectra. The main program solves for (sigma v) by the method of steepest descent. However, options are provided to use Gauss-Hermite and dense trapezoidal quadrature integration techniques. Options are also provided for rapid calculation of screening effects on specific reaction rates. Although such effects are not significant in cases of plasmas of laboratory interest, the options are included to increase the range of applicability of the code. Gamow penetration form, log-log interpolation, and cubic interpolation routines are included to provide the interpolated values of cross sections.

  14. Alcohol misuse Y91 coding in ICD-11: rational terminology and logical coding specifically to encourage early identification and advice.

    Science.gov (United States)

    Touquet, Robin; Harris, Dan

    2012-01-01

    Alcohol misuse is a common presentation to the Emergency Department (ED). The International Classification of Diseases ICD-10 for alcohol misuse, both under F10 and Y90/Y91, is not straightforward. The practicalities of coding ED attendances reveal an increasing detachment from ICD-10 (currently under review). Early identification [sometimes using blood alcohol concentrations (BACs)] and brief advice (IBA) can reduce unscheduled alcohol-related ED re-attendance. The UK Government Department of Health has implemented use of the terms 'Hazardous Drinking', 'Harmful Drinking' and 'Dependent Drinking' in its Public Service Agreements aimed at reducing harm by alcohol. Simplifying coding might increase IBA usage. We suggest that coding improvements in ICD-11 should update Y91 (currently 'clinical assessment')-with ICD-10 Y90 remaining for BAC to classify a patient's 'alcohol status'. Y90 and Y91 together would indicate the urgency for early IBA and/or speciality referral, aiming to reduce the prevalence of 'Dependent Drinking'.

  15. H-Abstraction by OH from Large Branched Alkanes: Overall Rate Measurements and Site-Specific Tertiary Rate Calculations

    KAUST Repository

    Liu, Dapeng

    2017-01-10

    Reaction rate coefficients for the reaction of hydroxyl (OH) radicals with nine large branched alkanes (i.e., 2-methyl-3-ethyl-pentane, 2,3-dimethyl-pentane, 2,2,3-trimethylbutane, 2,2,3-trimethyl-pentane, 2,3,4-trimethyl-pentane, 3-ethyl-pentane, 2,2,3,4-tetramethyl-pentane, 2,2-dimethyl-3-ethyl-pentane, and 2,4-dimethyl-3-ethyl-pentane) are measured at high temperatures (900-1300 K) using a shock tube and narrow-line-width OH absorption diagnostic in the UV region. In addition, room-temperature measurements of six out of these nine rate coefficients are performed in a photolysis cell using high repetition laser-induced fluorescence of OH radicals. Our experimental results are combined with previous literature measurements to obtain three-parameter Arrhenius expressions valid over a wide temperature range (300-1300 K). The rate coefficients are analyzed using the next-nearest-neighbor (N-N-N) methodology to derive nine tertiary (T003, T012, T013, T022, T023, T111, T112, T113, and T122) site-specific rate coefficients for the abstraction of H atoms by OH radicals from branched alkanes. Derived Arrhenius expressions, valid over 950-1300 K, are given as (the subscripts denote the number of carbon atoms connected to the next-nearest-neighbor carbon): T003 = 1.80 × 10-10 exp(-2971 K/T) cm3 molecule-1 s-1; T012 = 9.36 × 10-11 exp(-3024 K/T) cm3 molecule-1 s-1; T013 = 4.40 × 10-10 exp(-4162 K/T) cm3 molecule-1 s-1; T022 = 1.47 × 10-10 exp(-3587 K/T) cm3 molecule-1 s-1; T023 = 6.06 × 10-11 exp(-3010 K/T) cm3 molecule-1 s-1; T111 = 3.98 × 10-11 exp(-1617 K/T) cm3 molecule-1 s-1; T112 = 9.08 × 10-12 exp(-3661 K/T) cm3 molecule-1 s-1; T113 = 6.74 × 10-9 exp(-7547 K/T) cm3 molecule-1 s-1; T122 = 3.47 × 10-11 exp(-1802 K/T) cm3 molecule-1 s-1.

  16. A molecular code dictates sequence-specific DNA recognition by homeodomains.

    Science.gov (United States)

    Damante, G; Pellizzari, L; Esposito, G; Fogolari, F; Viglino, P; Fabbro, D; Tell, G; Formisano, S; Di Lauro, R

    1996-09-16

    Most homeodomains bind to DNA sequences containing the motif 5'-TAAT-3'. The homeodomain of thyroid transcription factor 1 (TTF-1HD) binds to sequences containing a 5'-CAAG-3' core motif, delineating a new mechanism for differential DNA recognition by homeodomains. We investigated the molecular basis of the DNA binding specificity of TTF-1HD by both structural and functional approaches. As already suggested by the three-dimensional structure of TTF-1HD, the DNA binding specificities of the TTF-1, Antennapedia and Engrailed homeodomains, either wild-type or mutants, indicated that the amino acid residue in position 54 is involved in the recognition of the nucleotide at the 3' end of the core motif 5'-NAAN-3'. The nucleotide at the 5' position of this core sequence is recognized by the amino acids located in position 6, 7 and 8 of the TTF-1 and Antennapedia homeodomains. These data, together with previous suggestions on the role of amino acids in position 50, indicate that the DNA binding specificity of homeodomains can be determined by a combinatorial molecular code. We also show that some specific combinations of the key amino acid residues involved in DNA recognition do not follow a simple, additive rule.

  17. Non-coding cancer driver candidates identified with a sample- and position-specific model of the somatic mutation rate

    Science.gov (United States)

    Juul, Malene; Bertl, Johanna; Guo, Qianyun; Nielsen, Morten Muhlig; Świtnicki, Michał; Hornshøj, Henrik; Madsen, Tobias; Hobolth, Asger; Pedersen, Jakob Skou

    2017-01-01

    Non-coding mutations may drive cancer development. Statistical detection of non-coding driver regions is challenged by a varying mutation rate and uncertainty of functional impact. Here, we develop a statistically founded non-coding driver-detection method, ncdDetect, which includes sample-specific mutational signatures, long-range mutation rate variation, and position-specific impact measures. Using ncdDetect, we screened non-coding regulatory regions of protein-coding genes across a pan-cancer set of whole-genomes (n = 505), which top-ranked known drivers and identified new candidates. For individual candidates, presence of non-coding mutations associates with altered expression or decreased patient survival across an independent pan-cancer sample set (n = 5454). This includes an antigen-presenting gene (CD1A), where 5’UTR mutations correlate significantly with decreased survival in melanoma. Additionally, mutations in a base-excision-repair gene (SMUG1) correlate with a C-to-T mutational-signature. Overall, we find that a rich model of mutational heterogeneity facilitates non-coding driver identification and integrative analysis points to candidates of potential clinical relevance. DOI: http://dx.doi.org/10.7554/eLife.21778.001 PMID:28362259

  18. A new decay heat standard proposition based on a technical specifications guide for computation codes

    Energy Technology Data Exchange (ETDEWEB)

    Laugier, Frederic; Garzenne, Claude [EDF R and D SINETICS, 1 av. du Gal de Gaulle, 92141 Clamart Cedex (France); Diop, Cheikh [CEA Saclay, 91191 Gif-sur-Yvette (France); Ebalard, Sylvie [AREVA, 92084 Paris La Defense (France); Sargeni, Antonio [IRSN, B.P. 17, 92262 Fontenay aux Roses (France)

    2008-07-01

    The existing ISO international decay heat standard provides the basis for calculating the decay heat power of non-recycled nuclear fuel of light water reactors. Computing decay heat with this standard can be really efficient for standard uranium fuels. Though, for Mixed Oxide fuels, high Burn-Up uranium fuels or for non standard irradiation sequences, decay heat can only be estimated by more complex decay heat computation codes. Therefore, a new ISO international standard, a 'Technical specifications guide for decay heat computation' has been proposed to reflect the international way to compute decay heat in light water reactors. The aim of this article is to give the justifications for the methods that lead to simplified modelization of the decay heat and that will be put into this standard. These methods are useful for rapid and precise determination of reaction rates and for nuclide chains simplifications. We propose also a simple method to evaluate the sensitivity of decay heat computations with respect to nuclear data. (authors)

  19. Estimation of Photon Specific Absorbed Fractions in Digimouse Voxel Phantom using Monte Carlo Simulation Code FLUKA

    Directory of Open Access Journals (Sweden)

    Sinha A

    2016-12-01

    Full Text Available Background: Most preclinical studies are carried out on mice. For internal dose assessment of a mouse, specific absorbed fraction (SAF values play an important role. In most studies, SAF values are estimated using older standard human organ compositions and values for limited source target pairs. Objective: SAF values for monoenergetic photons of energies 15, 50, 100, 500, 1000 and 4000 keV were evaluated for the Digimouse voxel phantom incorporated in Monte Carlo code FLUKA. The organ sources considered in this study were lungs, skeleton, heart, bladder, testis, stomach, spleen, pancreas, liver, kidney, adrenal, eye and brain. The considered target organs were lungs, skeleton, heart, bladder, testis, stomach, spleen, pancreas, liver, kidney, adrenal and brain. Eye was considered as a target organ only for eye as a source organ. Organ compositions and densities were adopted from International Commission on Radiological Protection (ICRP publication number 110. Results: Evaluated organ masses and SAF values are presented in tabular form. It is observed that SAF values decrease with increasing the source-to-target distance. The SAF value for self-irradiation decreases with increasing photon energy. The SAF values are also found to be dependent on the mass of target in such a way that higher values are obtained for lower masses. The effect of composition is highest in case of target organ lungs where mass and estimated SAF values are found to have larger differences. Conclusion: These SAF values are very important for absorbed dose calculation for various organs of a mouse

  20. Lightweight Detection of Android-specific Code Smells : The aDoctor Project

    NARCIS (Netherlands)

    Palomba, F.; Di Nucci, D.; Panichella, Annibale; Zaidman, A.E.; De Lucia, Andrea; Pinzger, Martin; Bavota, Gabriele; Marcus, Andrian

    2017-01-01

    Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising approaches for detecting the traditional code smells defined by Fowler, little knowledge and support

  1. Technical Specifications of Structural Health Monitoring for Highway Bridges: New Chinese Structural Health Monitoring Code

    Directory of Open Access Journals (Sweden)

    Fernando Moreu

    2018-03-01

    Full Text Available Governments and professional groups related to civil engineering write and publish standards and codes to protect the safety of critical infrastructure. In recent decades, countries have developed codes and standards for structural health monitoring (SHM. During this same period, rapid growth in the Chinese economy has led to massive development of civil engineering infrastructure design and construction projects. In 2016, the Ministry of Transportation of the People’s Republic of China published a new design code for SHM systems for large highway bridges. This document is the first technical SHM code by a national government that enforces sensor installation on highway bridges. This paper summarizes the existing international technical SHM codes for various countries and compares them with the new SHM code required by the Chinese Ministry of Transportation. This paper outlines the contents of the new Chinese SHM code and explains its relevance for the safety and management of large bridges in China, introducing key definitions of the Chinese–United States SHM vocabulary and their technical significance. Finally, this paper discusses the implications for the design and implementation of a future SHM codes, with suggestions for similar efforts in United States and other countries.

  2. OSSMETER D3.4 – Language-Specific Source Code Quality Analysis

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim); H.J.S. Basten (Bas)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and prototypes of the tools that are needed for source code quality analysis in open source software projects. It builds upon the results of: • Deliverable 3.1 where infra-structure and

  3. Specific Ethical Codes for Mental Health Care Professionals: Do We Need to Annotate?

    Science.gov (United States)

    Bergman-Levy, Tal; Asman, Oren; Dahan, Eyal; Greenberg, Binyamin; Hirshmann, Shmuel; Strous, Rael

    2016-08-01

    In Israel a general code of ethics exists for physicians, drafted by the Israel Medical Association. The question arises whether psychiatrists require a separate set of ethical guidelines. To examine the positions of Israeli psychiatrists with regard to ethics in general and professional ethics in particular, and to explore opinions regarding a code of ethics or ethical guidelines for psychiatry.  Methods: A specially designed questionnaire was compiled and completed by psychiatrists recruited for the study. A specially designed questionnaire was compiled and completed by psychiatrists recruited for the study. Most participants reported low levels of perceived knowledge regarding ethics, professional ethics, and the general code of ethics. Older and more experienced professionals reported a higher level of knowledge. Most psychiatrists agreed or strongly agreed with the need for a distinct code of ethics/ethical guidelines for psychiatrists. This support was significantly higher among both psychiatrists under 50 years and residents. Our findings suggest that the existing code of ethics and position papers may not be sufficient, indicating a potential need to develop and implement a process to create the ethical code itself. In addition, the findings highlight the importance of ethics education, suggesting that the need for a code of ethics is more urgent in the early stages of professional training, as younger professionals may be more exposed to advanced media technology. While some may fear that a distinct code of ethics will distance psychiatry from modern medicine, others assert that the profession combines aspects from the humanities and social sciences that require a unique sort of management and thus this profession requires a distinct code of ethics.

  4. Abstract algebra

    CERN Document Server

    Deskins, W E

    1996-01-01

    This excellent textbook provides undergraduates with an accessible introduction to the basic concepts of abstract algebra and to the analysis of abstract algebraic systems. These systems, which consist of sets of elements, operations, and relations among the elements, and prescriptive axioms, are abstractions and generalizations of various models which evolved from efforts to explain or discuss physical phenomena.In Chapter 1, the author discusses the essential ingredients of a mathematical system, and in the next four chapters covers the basic number systems, decompositions of integers, diop

  5. Specific and Modular Binding Code for Cytosine Recognition in Pumilio/FBF (PUF) RNA-binding Domains

    Energy Technology Data Exchange (ETDEWEB)

    Dong, Shuyun; Wang, Yang; Cassidy-Amstutz, Caleb; Lu, Gang; Bigler, Rebecca; Jezyk, Mark R.; Li, Chunhua; Tanaka Hall, Traci M.; Wang, Zefeng (NIH); (Beijing U); (UNC)

    2011-10-28

    Pumilio/fem-3 mRNA-binding factor (PUF) proteins possess a recognition code for bases A, U, and G, allowing designed RNA sequence specificity of their modular Pumilio (PUM) repeats. However, recognition side chains in a PUM repeat for cytosine are unknown. Here we report identification of a cytosine-recognition code by screening random amino acid combinations at conserved RNA recognition positions using a yeast three-hybrid system. This C-recognition code is specific and modular as specificity can be transferred to different positions in the RNA recognition sequence. A crystal structure of a modified PUF domain reveals specific contacts between an arginine side chain and the cytosine base. We applied the C-recognition code to design PUF domains that recognize targets with multiple cytosines and to generate engineered splicing factors that modulate alternative splicing. Finally, we identified a divergent yeast PUF protein, Nop9p, that may recognize natural target RNAs with cytosine. This work deepens our understanding of natural PUF protein target recognition and expands the ability to engineer PUF domains to recognize any RNA sequence.

  6. Specificity Protein (Sp) Transcription Factors and Metformin Regulate Expression of the Long Non-coding RNA HULC

    Science.gov (United States)

    There is evidence that specificity protein 1 (Sp1) transcription factor (TF) regulates expression of long non-coding RNAs (lncRNAs) in hepatocellular carcinoma (HCC) cells. RNA interference (RNAi) studies showed that among several lncRNAs expressed in HepG2, SNU-449 and SK-Hep-1...

  7. Coding of meaningful concepts in lymphedema-specific questionnaires with the ICF

    NARCIS (Netherlands)

    Viehoff, P.B.; Hidding, J.T.; Heerkens, Y.H.; Ravensberg, C.D. van; Neumann, H.A.

    2013-01-01

    Abstract Purpose: To identify and quantify the meaningful concepts within questionnaires focusing on lymphedema using the International Classification of Functioning, Disability and Health (ICF). Methods: Electronic searches of Medline, EMBASE, CINAHL, CENtral and Pedro (2005-2010) were conducted.

  8. Specific structural probing of plasmid-coded ribosomal RNAs from Escherichia coli

    DEFF Research Database (Denmark)

    Aagaard, C; Rosendahl, G; Dam, M

    1991-01-01

    The preferred method for construction and in vivo expression of mutagenised Escherichia coli ribosomal RNAs (rRNAs) is via high copy number plasmids. Transcription of wild-type rRNA from the seven chromosomal rrn operons in strains harbouring plasmid-coded mutant rRNAs leads to a heterogeneous ri...

  9. Single nucleotide polymorphism-specific regulation of matrix metalloproteinase-9 by multiple miRNAs targeting the coding exon.

    Science.gov (United States)

    Duellman, Tyler; Warren, Christopher; Yang, Jay

    2014-05-01

    Microribonucleic acids (miRNAs) work with exquisite specificity and are able to distinguish a target from a non-target based on a single nucleotide mismatch in the core nucleotide domain. We questioned whether miRNA regulation of gene expression could occur in a single nucleotide polymorphism (SNP)-specific manner, manifesting as a post-transcriptional control of expression of genetic polymorphisms. In our recent study of the functional consequences of matrix metalloproteinase (MMP)-9 SNPs, we discovered that expression of a coding exon SNP in the pro-domain of the protein resulted in a profound decrease in the secreted protein. This missense SNP results in the N38S amino acid change and a loss of an N-glycosylation site. A systematic study demonstrated that the loss of secreted protein was due not to the loss of an N-glycosylation site, but rather an SNP-specific targeting by miR-671-3p and miR-657. Bioinformatics analysis identified 41 SNP-specific miRNA targeting MMP-9 SNPs, mostly in the coding exon and an extension of the analysis to chromosome 20, where the MMP-9 gene is located, suggesting that SNP-specific miRNAs targeting the coding exon are prevalent. This selective post-transcriptional regulation of a target messenger RNA harboring genetic polymorphisms by miRNAs offers an SNP-dependent post-transcriptional regulatory mechanism, allowing for polymorphic-specific differential gene regulation. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  10. Spook and Spookier code for stage-specific components of the ecdysone biosynthetic pathway in Diptera

    DEFF Research Database (Denmark)

    Ono, Hajime; Rewitz, Kim; Shinoda, Tetsu

    2006-01-01

    Ecdysteroids regulate many key developmental events in arthropods including molting and metamorphosis. Recently, members of the Drosophila Halloween group of genes, that are required for embryonic viability and cuticle deposition, have been shown to code for several cytochrome P450 enzymes...... of the ecdysone biosynthetic machinery. This hypothesis comes from the observation that Cyp307A1 is encoded by the Halloween gene spook (spo), but unlike other Halloween class genes, Dmspo is not expressed during the larval stages. In contrast, Cyp307a2, dubbed spookier (spok), is expressed primarily during...

  11. Non coding RNA: sequence-specific guide for chromatin modification and DNA damage signaling

    Directory of Open Access Journals (Sweden)

    Sofia eFrancia

    2015-11-01

    Full Text Available Chromatin conformation shapes the environment in which our genome is transcribed into RNA. Transcription is a source of DNA damage, thus it often occurs concomitantly to DNA damage signaling. Growing amounts of evidence suggest that different types of RNAs can, independently from their protein-coding properties, directly affect chromatin conformation, transcription and splicing, as well as promote the activation of the DNA damage response (DDR and DNA repair. Therefore, transcription paradoxically functions to both threaten and safeguard genome integrity. On the other hand, DNA damage signaling is known to modulate chromatin to suppress transcription of the surrounding genetic unit. It is thus intriguing to understand how transcription can modulate DDR signaling while, in turn, DDR signaling represses transcription of chromatin around the DNA lesion. An unexpected player in this field is the RNA interference (RNAi machinery, which play roles in transcription, splicing and chromatin modulation in several organisms. Non-coding RNAs (ncRNAs and several protein factors involved in the RNAi pathway are well known master regulators of chromatin while only recent reports suggest that ncRNAs are involved in DDR signaling and homology-mediated DNA repair. Here, we discuss the experimental evidence supporting the idea that ncRNAs act at the genomic loci from which they are transcribed to modulate chromatin, DDR signaling and DNA repair.

  12. Site-Specific Rate Constant Measurements for Primary and Secondary H- and D-Abstraction by OH Radicals: Propane and n -Butane

    KAUST Repository

    Badra, Jihad

    2014-07-03

    Site-specific rate constants for hydrogen (H) and deuterium (D) abstraction by hydroxyl (OH) radicals were determined experimentally by monitoring the reaction of OH with two normal and six deuterated alkanes. The studied alkanes include propane (C3H8), propane 2,2 D2 (CH 3CD2CH3), propane 1,1,1-3,3,3 D6 (CD 3CH2CD3), propane D8 (C3D 8), n-butane (n-C4H10), butane 2,2-3,3 D4 (CH3CD2CD2CH3), butane 1,1,1-4,4,4 D6 (CD3CH2CH2CD3), and butane D10 (C4D10). Rate constant measurements were carried out over 840-1470 K and 1.2-2.1 atm using a shock tube and OH laser absorption. Previous low-temperature data were combined with the current high-temperature measurements to generate three-parameter fits which were then used to determine the site-specific rate constants. Two primary (P1,H and P 1,D) and four secondary (S00,H, S00,D, S 01,H, and S01,D) H- and D-abstraction rate constants, in which the subscripts refer to the number of C atoms connected to the next-nearest-neighbor C atom, are obtained. The modified Arrhenius expressions for the six site-specific abstractions by OH radicals are P1,H = 1.90 × 10-18T2.00 exp(-340.87 K/T) cm 3molecule-1s-1 (210-1294 K); P1,D= 2.72 × 10-17 T1.60 exp(-895.57 K/T) cm 3molecule-1s-1 (295-1317 K); S00,H = 4.40 × 10-18 T1.93 exp(121.50 K/T) cm 3molecule-1s-1 (210-1294 K); S00,D = 1.45 × 10-20 T2.69 exp(282.36 K/T) cm 3molecule-1s-1 (295-1341 K); S01,H = 4.65 × 10-17 T1.60 exp(-236.98 K/T) cm 3molecule-1s-1 (235-1407 K); S01,D = 1.26 × 10-18 T2.07 exp(-77.00 K/T) cm 3molecule-1s-1 (294-1412 K). © 2014 American Chemical Society.

  13. Identity-specific coding of future rewards in the human orbitofrontal cortex.

    OpenAIRE

    Howard James D; Gottfried Jay A; Tobler Philippe N.; Kahnt Thorsten

    2015-01-01

    Nervous systems must encode information about the identity of expected outcomes to make adaptive decisions. However the neural mechanisms underlying identity specific value signaling remain poorly understood. By manipulating the value and identity of appetizing food odors in a pattern based imaging paradigm of human classical conditioning we were able to identify dissociable predictive representations of identity specific reward in orbitofrontal cortex (OFC) and identity general reward in ven...

  14. Identity-specific coding of future rewards in the human orbitofrontal cortex

    OpenAIRE

    Howard, James D.; Gottfried, Jay A; Tobler, Philippe N; Kahnt, Thorsten

    2015-01-01

    Nervous systems must encode information about the identity of expected outcomes to make adaptive decisions. However, the neural mechanisms underlying identity-specific value signaling remain poorly understood. By manipulating the value and identity of appetizing food odors in a pattern-based imaging paradigm of human classical conditioning, we were able to identify dissociable predictive representations of identity-specific reward in orbitofrontal cortex (OFC) and identity-general reward in v...

  15. Long non-coding RNA ROR decoys gene-specific histone methylation to promote tumorigenesis.

    Science.gov (United States)

    Fan, Jiayan; Xing, Yue; Wen, Xuyang; Jia, Renbin; Ni, Hongyan; He, Jie; Ding, Xia; Pan, Hui; Qian, Guanxiang; Ge, Shengfang; Hoffman, Andrew R; Zhang, He; Fan, Xianqun

    2015-07-14

    Long non-coding RNAs (lncRNAs) are not translated into proteins and were initially considered to be part of the 'dark matter' of the genome. Recently, it has been shown that lncRNAs play a role in the recruitment of chromatin modifying complexes and can influence gene expression. However, it is unknown if lncRNAs function in a similar way in cancer. Here, we show that the lncRNA ROR occupies and activates the TESC promoter by repelling the histone G9A methyltransferase and promoting the release of histone H3K9 methylation. Suppression of ROR in tumors results in silencing of TESC expression, and G9A-mediated histone H3K9 methylation in the TESC promoter is restored, which significantly reduces tumor growth and metastasis. Without ROR silencing, TESC knockdown presents consistent and significant reductions in tumor progression. Our results reveal a novel mechanism by which ROR may serve as a decoy oncoRNA that blocks binding surfaces, preventing the recruitment of histone modifying enzymes, thereby specifying a new pattern of histone modifications that promote tumorigenesis.

  16. Recognizing cognates and interlingual homographs: Effects of code similarity in language specific and generalized lexical decision

    NARCIS (Netherlands)

    Lemhöfer, K.M.L.; Dijkstra, A.F.J.

    2004-01-01

    Four experiments investigated how cross-linguistic overlap in semantics, orthography, and phonology affects bilingual word recognition in different variants of the lexical decision task. Dutch-English bilinguals performed a language-specific or a generalized lexical decision task including words

  17. Modelling Metamorphism by Abstract Interpretation

    Science.gov (United States)

    Dalla Preda, Mila; Giacobazzi, Roberto; Debray, Saumya; Coogan, Kevin; Townsend, Gregg M.

    Metamorphic malware apply semantics-preserving transformations to their own code in order to foil detection systems based on signature matching. In this paper we consider the problem of automatically extract metamorphic signatures from these malware. We introduce a semantics for self-modifying code, later called phase semantics, and prove its correctness by showing that it is an abstract interpretation of the standard trace semantics. Phase semantics precisely models the metamorphic code behavior by providing a set of traces of programs which correspond to the possible evolutions of the metamorphic code during execution. We show that metamorphic signatures can be automatically extracted by abstract interpretation of the phase semantics, and that regular metamorphism can be modelled as finite state automata abstraction of the phase semantics.

  18. N-BLR, a primate-specific non-coding transcript leads to colorectal cancer invasion and migration.

    Science.gov (United States)

    Rigoutsos, Isidore; Lee, Sang Kil; Nam, Su Youn; Anfossi, Simone; Pasculli, Barbara; Pichler, Martin; Jing, Yi; Rodriguez-Aguayo, Cristian; Telonis, Aristeidis G; Rossi, Simona; Ivan, Cristina; Catela Ivkovic, Tina; Fabris, Linda; Clark, Peter M; Ling, Hui; Shimizu, Masayoshi; Redis, Roxana S; Shah, Maitri Y; Zhang, Xinna; Okugawa, Yoshinaga; Jung, Eun Jung; Tsirigos, Aristotelis; Huang, Li; Ferdin, Jana; Gafà, Roberta; Spizzo, Riccardo; Nicoloso, Milena S; Paranjape, Anurag N; Shariati, Maryam; Tiron, Aida; Yeh, Jen Jen; Teruel-Montoya, Raul; Xiao, Lianchun; Melo, Sonia A; Menter, David; Jiang, Zhi-Qin; Flores, Elsa R; Negrini, Massimo; Goel, Ajay; Bar-Eli, Menashe; Mani, Sendurai A; Liu, Chang Gong; Lopez-Berestein, Gabriel; Berindan-Neagoe, Ioana; Esteller, Manel; Kopetz, Scott; Lanza, Giovanni; Calin, George A

    2017-05-24

    Non-coding RNAs have been drawing increasing attention in recent years as functional data suggest that they play important roles in key cellular processes. N-BLR is a primate-specific long non-coding RNA that modulates the epithelial-to-mesenchymal transition, facilitates cell migration, and increases colorectal cancer invasion. We performed multivariate analyses of data from two independent cohorts of colorectal cancer patients and show that the abundance of N-BLR is associated with tumor stage, invasion potential, and overall patient survival. Through in vitro and in vivo experiments we found that N-BLR facilitates migration primarily via crosstalk with E-cadherin and ZEB1. We showed that this crosstalk is mediated by a pyknon, a short ~20 nucleotide-long DNA motif contained in the N-BLR transcript and is targeted by members of the miR-200 family. In light of these findings, we used a microarray to investigate the expression patterns of other pyknon-containing genomic loci. We found multiple such loci that are differentially transcribed between healthy and diseased tissues in colorectal cancer and chronic lymphocytic leukemia. Moreover, we identified several new loci whose expression correlates with the colorectal cancer patients' overall survival. The primate-specific N-BLR is a novel molecular contributor to the complex mechanisms that underlie metastasis in colorectal cancer and a potential novel biomarker for this disease. The presence of a functional pyknon within N-BLR and the related finding that many more pyknon-containing genomic loci in the human genome exhibit tissue-specific and disease-specific expression suggests the possibility of an alternative class of biomarkers and therapeutic targets that are primate-specific.

  19. Emergence and Evolution of Hominidae-Specific Coding and Noncoding Genomic Sequences.

    Science.gov (United States)

    Saber, Morteza Mahmoudi; Adeyemi Babarinde, Isaac; Hettiarachchi, Nilmini; Saitou, Naruya

    2016-07-12

    Family Hominidae, which includes humans and great apes, is recognized for unique complex social behavior and intellectual abilities. Despite the increasing genome data, however, the genomic origin of its phenotypic uniqueness has remained elusive. Clade-specific genes and highly conserved noncoding sequences (HCNSs) are among the high-potential evolutionary candidates involved in driving clade-specific characters and phenotypes. On this premise, we analyzed whole genome sequences along with gene orthology data retrieved from major DNA databases to find Hominidae-specific (HS) genes and HCNSs. We discovered that Down syndrome critical region 4 (DSCR4) is the only experimentally verified gene uniquely present in Hominidae. DSCR4 has no structural homology to any known protein and was inferred to have emerged in several steps through LTR/ERV1, LTR/ERVL retrotransposition, and transversion. Using the genomic distance as neutral evolution threshold, we identified 1,658 HS HCNSs. Polymorphism coverage and derived allele frequency analysis of HS HCNSs showed that these HCNSs are under purifying selection, indicating that they may harbor important functions. They are overrepresented in promoters/untranslated regions, in close proximity of genes involved in sensory perception of sound and developmental process, and also showed a significantly lower nucleosome occupancy probability. Interestingly, many ancestral sequences of the HS HCNSs showed very high evolutionary rates. This suggests that new functions emerged through some kind of positive selection, and then purifying selection started to operate to keep these functions. © The Author(s) 2016. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  20. A novel prenyl-polybasic domain code determines lipid-binding specificity of the K-Ras membrane anchor.

    Science.gov (United States)

    Zhou, Yong; Hancock, John F

    2018-01-15

    Ras proteins must localize to the plasma membrane (PM) for biological function. The membrane anchor of the K-Ras4B isoform comprises a farnesylated and methylated C-terminal cysteine together with an adjacent hexa-lysine polybasic domain (PBD). Traditionally, polybasic sequences have been thought to interact electrostatically with negatively charged membranes showing no specificity for anionic lipid head groups. By contrast we recently showed that the K-Ras membrane anchor actually exhibits a very high degree of specificity for phosphatidylserine (PtdSer). The selectivity for PtdSer is determined by a combinatorial code comprising the PBD sequence plus the prenyl anchor. Lipid binding specificity is therefore altered by PBD point mutations that in turn modulate signaling output. For example, mutating Lys177 or Lys178 to glutamine switches K-Ras4B lipid affinity from PtdSer to phosphoinositol 4,5-bisphosphate (PIP2). Changing the lipid anchor from farnesyl to geranylgeranyl or the PBD lysines to arginines also changes lipid binding specificity. All-atom molecular dynamics simulations reveal the structural basis for these K-Ras anchor lipid-binding preferences. Here we examine the PM interactions of a series of geranylgeranylated PBD mutants and provide further evidence that the precise PBD sequence and prenyl lipid determines lipid sorting specificity of the K-Ras anchor and hence biological function.

  1. Abstract algebra structure and application

    CERN Document Server

    Finston, David R

    2014-01-01

    This text seeks to generate interest in abstract algebra by introducing each new structure and topic via a real-world application. The down-to-earth presentation is accessible to a readership with no prior knowledge of abstract algebra. Students are led to algebraic concepts and questions in a natural way through their everyday experiences. Applications include: Identification numbers and modular arithmetic (linear) error-correcting codes, including cyclic codes ruler and compass constructions cryptography symmetry of patterns in the real plane Abstract Algebra: Structure and Application is suitable as a text for a first course on abstract algebra whose main purpose is to generate interest in the subject, or as a supplementary text for more advanced courses. The material paves the way to subsequent courses that further develop the theory of abstract algebra and will appeal to students of mathematics, mathematics education, computer science, and engineering interested in applications of algebraic concepts.

  2. RNA sequencing identifies specific PIWI-interacting small non-coding RNA expression patterns in breast cancer.

    Science.gov (United States)

    Hashim, Adnan; Rizzo, Francesca; Marchese, Giovanna; Ravo, Maria; Tarallo, Roberta; Nassa, Giovanni; Giurato, Giorgio; Santamaria, Gianluca; Cordella, Angela; Cantarella, Concita; Weisz, Alessandro

    2014-10-30

    PIWI-interacting small non-coding RNAs (piRNAs) are genetic and epigenetic regulatory factors in germline cells, where they maintain genome stability, are involved in RNA silencing and regulate gene expression. We found that the piRNA biogenesis and effector pathway are present in human breast cancer (BC) cells and, analyzing smallRNA-Seq data generated from BC cell lines and tumor biopsies, we identified >100 BC piRNAs, including some very abundant and/or differentially expressed in mammary epithelial compared to BC cells, where this was influenced by estrogen or estrogen receptor β, and in cancer respect to normal breast tissues. A search for mRNAs targeted by the BC piRNome revealed that eight piRNAs showing a specific expression pattern in breast tumors target key cancer cell pathways. Evidence of an active piRNA pathway in BC suggests that these small non-coding RNAs do exert transcriptional and post-transcriptional gene regulatory actions also in cancer cells.

  3. Humor, Abstraction, and Disbelief

    Science.gov (United States)

    Hoicka, Elena; Jutsum, Sarah; Gattis, Merideth

    2008-01-01

    We investigated humor as a context for learning about abstraction and disbelief. More specifically, we investigated how parents support humor understanding during book sharing with their toddlers. In Study 1, a corpus analysis revealed that in books aimed at 1- to 2-year-olds, humor is found more often than other forms of doing the wrong thing…

  4. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  5. Task-specific codes for face recognition: how they shape the neural representation of features for detection and individuation.

    Science.gov (United States)

    Nestor, Adrian; Vettel, Jean M; Tarr, Michael J

    2008-01-01

    The variety of ways in which faces are categorized makes face recognition challenging for both synthetic and biological vision systems. Here we focus on two face processing tasks, detection and individuation, and explore whether differences in task demands lead to differences both in the features most effective for automatic recognition and in the featural codes recruited by neural processing. Our study appeals to a computational framework characterizing the features representing object categories as sets of overlapping image fragments. Within this framework, we assess the extent to which task-relevant information differs across image fragments. Based on objective differences we find among task-specific representations, we test the sensitivity of the human visual system to these different face descriptions independently of one another. Both behavior and functional magnetic resonance imaging reveal effects elicited by objective task-specific levels of information. Behaviorally, recognition performance with image fragments improves with increasing task-specific information carried by different face fragments. Neurally, this sensitivity to the two tasks manifests as differential localization of neural responses across the ventral visual pathway. Fragments diagnostic for detection evoke larger neural responses than non-diagnostic ones in the right posterior fusiform gyrus and bilaterally in the inferior occipital gyrus. In contrast, fragments diagnostic for individuation evoke larger responses than non-diagnostic ones in the anterior inferior temporal gyrus. Finally, for individuation only, pattern analysis reveals sensitivity to task-specific information within the right "fusiform face area". OUR RESULTS DEMONSTRATE: 1) information diagnostic for face detection and individuation is roughly separable; 2) the human visual system is independently sensitive to both types of information; 3) neural responses differ according to the type of task-relevant information

  6. DNA vaccine coding for the rhesus prostate specific antigen delivered by intradermal electroporation in patients with relapsed prostate cancer.

    Science.gov (United States)

    Eriksson, Fredrik; Tötterman, Thomas; Maltais, Anna-Karin; Pisa, Pavel; Yachnin, Jeffrey

    2013-08-20

    We tested safety, clinical efficacy and immunogenicity of a DNA vaccine coding for rhesus prostate specific antigen (PSA) delivered by intradermal injection and skin electroporation. Fifteen patients with biochemical relapse of prostate cancer without macroscopic disease participated in this phase I study. Patients were started on a 1 month course of androgen deprivation therapy (ADT) prior to treatment. Vaccine doses ranged from 50 to 1,600 μg. Study subjects received five vaccinations at four week intervals. All patients have had at least one year of follow-up. No systemic toxicity was observed. Discomfort from electroporation did not require analgesia or topical anesthetic. No clinically significant changes in PSA kinetics were observed as all patients required antiandrogen therapy shortly after completion of the 5 months of vaccination due to rising PSA. Immunogenicity, as measured by T-cell reactivity to the modified PSA peptide and to a mix of overlapping PSA peptides representing the full length protein, was observed in some patients. All but one patient had pre-study PSA specific T-cell reactivity. ADT alone resulted in increases in T-cell reactivity in most patients. Intradermal vaccination with skin electroporation is easily performed with only minor discomfort for the patient. Patients with biochemical relapse of prostate cancer are a good model for testing immune therapies. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Software Security - The Dangers of Abstraction

    Science.gov (United States)

    Gollmann, Dieter

    Software insecurity can be explained as a potpourri of hacking methods, ranging from the familiar, e.g. buffer overruns, to the exotic, e.g. code insertion with Chinese characters. From such an angle software security would just be a collection of specific countermeasures. We will observe a common principle that can guide a structured presentation of software security and give guidance for future research directions: There exists a discrepancy between the abstract programming concepts used by software developers and their concrete implementation on the given execution platform. In support of this thesis, five case studies will be discussed, viz characters, integers, variables, atomic transactions, and double linked lists.

  8. Preference vs. Authority: A Comparison of Student Searching in a Subject-Specific Indexing and Abstracting Database and a Customized Discovery Layer

    Science.gov (United States)

    Dahlen, Sarah P. C.; Hanson, Kathlene

    2017-01-01

    Discovery layers provide a simplified interface for searching library resources. Libraries with limited finances make decisions about retaining indexing and abstracting databases when similar information is available in discovery layers. These decisions should be informed by student success at finding quality information as well as satisfaction…

  9. Genetic Code Expansion- and Click Chemistry-Based Site-Specific Protein Labeling for Intracellular DNA-PAINT Imaging.

    Science.gov (United States)

    Nikić-Spiegel, Ivana

    2018-01-01

    Super-resolution microscopy allows imaging of cellular structures at nanometer resolution. This comes with a demand for small labels which can be attached directly to the structures of interest. In the context of protein labeling, one way to achieve this is by using genetic code expansion (GCE) and click chemistry. With GCE, small labeling handles in the form of noncanonical amino acids (ncAAs) are site-specifically introduced into a target protein. In a subsequent step, these amino acids can be directly labeled with small organic dyes by click chemistry reactions. Click chemistry labeling can also be combined with other methods, such as DNA-PAINT in which a "clickable" oligonucleotide is first attached to the ncAA-bearing target protein and then labeled with complementary fluorescent oligonucleotides. This protocol will cover both aspects: I describe (1) how to encode ncAAs and perform intracellular click chemistry-based labeling with an improved GCE system for eukaryotic cells and (2) how to combine click chemistry-based labeling with DNA-PAINT super-resolution imaging. As an example, I show click-PAINT imaging of vimentin and low-abundance nuclear protein, nucleoporin 153.

  10. Content Differences for Abstract and Concrete Concepts

    National Research Council Canada - National Science Library

    Katja Wiemer‐Hastings, Katja; Xu, Xu

    2005-01-01

    ... number. Abstract concepts were predominantly related to social aspects of situations. Properties were significantly less specific for abstract than for concrete concepts. Thus, abstractness emerged as a function of several, both qualitative and quantitative, factors.

  11. From Abstract Art to Abstracted Artists

    Directory of Open Access Journals (Sweden)

    Romi Mikulinsky

    2016-11-01

    Full Text Available What lineage connects early abstract films and machine-generated YouTube videos? Hans Richter’s famous piece Rhythmus 21 is considered to be the first abstract film in the experimental tradition. The Webdriver Torso YouTube channel is composed of hundreds of thousands of machine-generated test patterns designed to check frequency signals on YouTube. This article discusses geometric abstraction vis-à-vis new vision, conceptual art and algorithmic art. It argues that the Webdriver Torso is an artistic marvel indicative of a form we call mathematical abstraction, which is art performed by computers and, quite possibly, for computers.

  12. Towards Composable Concurrency Abstractions

    Directory of Open Access Journals (Sweden)

    Janwillem Swalens

    2014-06-01

    Full Text Available In the past decades, many different programming models for managing concurrency in applications have been proposed, such as the actor model, Communicating Sequential Processes, and Software Transactional Memory. The ubiquity of multi-core processors has made harnessing concurrency even more important. We observe that modern languages, such as Scala, Clojure, or F#, provide not one, but multiple concurrency models that help developers manage concurrency. Large end-user applications are rarely built using just a single concurrency model. Programmers need to manage a responsive UI, deal with file or network I/O, asynchronous workflows, and shared resources. Different concurrency models facilitate different requirements. This raises the issue of how these concurrency models interact, and whether they are composable. After all, combining different concurrency models may lead to subtle bugs or inconsistencies. In this paper, we perform an in-depth study of the concurrency abstractions provided by the Clojure language. We study all pairwise combinations of the abstractions, noting which ones compose without issues, and which do not. We make an attempt to abstract from the specifics of Clojure, identifying the general properties of concurrency models that facilitate or hinder composition.

  13. Allele-specific repression of Sox2 through the long non-coding RNA Sox2ot

    NARCIS (Netherlands)

    Messemaker, T.C. (Tobias); Leeuwen, S.M. (Selina) van; Berg, P.R. (Patrick) van den; Jong, A.E.J.T. (Anke E.J.T.); R.-J.T.S. Palstra (Robert-Jan); R.C. Hoeben (Rob); S. Semrau (Stefan); H. Mikkers (H.)

    2018-01-01

    textabstractThe transcription factor Sox2 controls the fate of pluripotent stem cells and neural stem cells. This gatekeeper function requires well-regulated Sox2 levels. We postulated that Sox2 regulation is partially controlled by the Sox2 overlapping long non-coding RNA (lncRNA) gene Sox2ot. Here

  14. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  15. Abstract Interpretation and Attribute Gramars

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    The objective of this thesis is to explore the connections between abstract interpretation and attribute grammars as frameworks in program analysis. Abstract interpretation is a semantics-based program analysis method. A large class of data flow analysis problems can be expressed as non-standard ...... is presented in the thesis. Methods from abstract interpretation can also be used in correctness proofs of attribute grammars. This proof technique introduces a new class of attribute grammars based on domain theory. This method is illustrated with examples.......The objective of this thesis is to explore the connections between abstract interpretation and attribute grammars as frameworks in program analysis. Abstract interpretation is a semantics-based program analysis method. A large class of data flow analysis problems can be expressed as non......-standard semantics where the ``meaning'' contains information about the runtime behaviour of programs. In an abstract interpretation the analysis is proved correct by relating it to the usual semantics for the language. Attribute grammars provide a method and notation to specify code generation and program analysis...

  16. PRISMA for Abstracts

    DEFF Research Database (Denmark)

    Beller, Elaine M; Glasziou, Paul P; Altman, Douglas G

    2013-01-01

    Elaine Beller and colleagues from the PRISMA for Abstracts group provide a reporting guidelines for reporting abstracts of systematic reviews in journals and at conferences.......Elaine Beller and colleagues from the PRISMA for Abstracts group provide a reporting guidelines for reporting abstracts of systematic reviews in journals and at conferences....

  17. Contrasting properties of gene-specific regulatory, coding, and copy number mutations in Saccharomyces cerevisiae: frequency, effects, and dominance.

    Directory of Open Access Journals (Sweden)

    Jonathan D Gruber

    2012-02-01

    Full Text Available Genetic variation within and between species can be shaped by population-level processes and mutation; however, the relative impact of "survival of the fittest" and "arrival of the fittest" on phenotypic evolution remains unclear. Assessing the influence of mutation on evolution requires understanding the relative rates of different types of mutations and their genetic properties, yet little is known about the functional consequences of new mutations. Here, we examine the spectrum of mutations affecting a focal gene in Saccharomyces cerevisiae by characterizing 231 novel haploid genotypes with altered activity of a fluorescent reporter gene. 7% of these genotypes had a nonsynonymous mutation in the coding sequence for the fluorescent protein and were classified as "coding" mutants; 2% had a change in the S. cerevisiae TDH3 promoter sequence controlling expression of the fluorescent protein and were classified as "cis-regulatory" mutants; 10% contained two copies of the reporter gene and were classified as "copy number" mutants; and the remaining 81% showed altered fluorescence without a change in the reporter gene itself and were classified as "trans-acting" mutants. As a group, coding mutants had the strongest effect on reporter gene activity and always decreased it. By contrast, 50%-95% of the mutants in each of the other three classes increased gene activity, with mutants affecting copy number and cis-regulatory sequences having larger median effects on gene activity than trans-acting mutants. When made heterozygous in diploid cells, coding, cis-regulatory, and copy number mutant genotypes all had significant effects on gene activity, whereas 88% of the trans-acting mutants appeared to be recessive. These differences in the frequency, effects, and dominance among functional classes of mutations might help explain why some types of mutations are found to be segregating within or fixed between species more often than others.

  18. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  19. Transplantation as an abstract good

    DEFF Research Database (Denmark)

    Hoeyer, Klaus; Jensen, Anja Marie Bornø; Olejaz, Maria

    2015-01-01

    a more general salience in the organ transplant field by way of facilitating a perception of organ transplantation as an abstract moral good rather than a specific good for specific people. Furthermore, we suggest that multiple forms of ignorance sustain each other: a desire for ignorance with respect...

  20. Structure of Moves in Research Article Abstracts in Applied Linguistics

    Directory of Open Access Journals (Sweden)

    Seden Can

    2016-07-01

    Full Text Available An abstract summarizes the accompanying article in order to promote it. While many move-analysis studies of abstracts in applied linguistics (AL have used similar coding frameworks and demonstrated similar rhetorical organizations, their findings have not yet been aggregated to show the overall picture. The present study aimed to both examine move structures in AL abstracts and compare the results with previous studies both synchronically and diachronically. Fifty abstracts were collected from articles published in the journal English for Specific Purposes (ESP between 2011 and 2013. Sentences were coded using a five-move scheme adapted from previous studies. Combining the results from previous research and the present study showed that most AL abstracts give information on the purpose, methodology, and findings of the associated article, while about half of the articles omit introduction of the topic and discussion of the findings. It was also found that authors frequently violate the move sequence expected by current schemes. These findings consistent with previous research suggest that future researchers informed by move analyses should explore the connection between the findings of move analyses and teaching materials for academic writing.

  1. Towards provably correct code generation for a hard real-time programming language

    DEFF Research Database (Denmark)

    Fränzle, Martin; Müller-Olm, Markus

    1994-01-01

    This paper sketches a hard real-time programming language featuring operators for expressing timeliness requirements in an abstract, implementation-independent way and presents parts of the design and verification of a provably correct code generator for that language. The notion of implementatio...... correctness used as an implicit specification of the code generator pays attention to timeliness requirements. Hence, formal verification of the code generator design is a guarantee of meeting all deadlines when executing generated code....

  2. Computational Abstraction Steps

    DEFF Research Database (Denmark)

    Thomsen, Lone Leth; Thomsen, Bent; Nørmark, Kurt

    2010-01-01

    and class instantiations. Our teaching experience shows that many novice programmers find it difficult to write programs with abstractions that materialise to concrete objects later in the development process. The contribution of this paper is the idea of initiating a programming process by creating...... the exploratory phase of a program development process. In some specific niches it is also expected that our approach will benefit professional programmers....... or capturing concrete values, objects, or actions. As the next step, some of these are lifted to a higher level by computational means. In the object-oriented paradigm the target of such steps is classes. We hypothesise that the proposed approach primarily will be beneficial to novice programmers or during...

  3. Stellar Presentations (Abstract)

    Science.gov (United States)

    Young, D.

    2015-12-01

    (Abstract only) The AAVSO is in the process of expanding its education, outreach and speakers bureau program. powerpoint presentations prepared for specific target audiences such as AAVSO members, educators, students, the general public, and Science Olympiad teams, coaches, event supervisors, and state directors will be available online for members to use. The presentations range from specific and general content relating to stellar evolution and variable stars to specific activities for a workshop environment. A presentation—even with a general topic—that works for high school students will not work for educators, Science Olympiad teams, or the general public. Each audience is unique and requires a different approach. The current environment necessitates presentations that are captivating for a younger generation that is embedded in a highly visual and sound-bite world of social media, twitter and U-Tube, and mobile devices. For educators, presentations and workshops for themselves and their students must support the Next Generation Science Standards (NGSS), the Common Core Content Standards, and the Science Technology, Engineering and Mathematics (STEM) initiative. Current best practices for developing relevant and engaging powerpoint presentations to deliver information to a variety of targeted audiences will be presented along with several examples.

  4. A dynamic Gli code interprets Hh signals to regulate induction, patterning, and endocrine cell specification in the zebrafish pituitary.

    Science.gov (United States)

    Devine, Christine A; Sbrogna, Jennifer L; Guner, Burcu; Osgood, Marcey; Shen, Meng-Chieh; Karlstrom, Rolf O

    2009-02-01

    Hedgehog (Hh) signaling is necessary for the induction and functional patterning of the pituitary placode, however the mechanisms by which Hh signals are interpreted by placodal cells are unknown. Here we show distinct temporal requirements for Hh signaling in endocrine cell differentiation and describe a dynamic Gli transcriptional response code that interprets these Hh signals within the developing adenohypophysis. Gli1 is required for the differentiation of selected endocrine cell types and acts as the major activator of Hh-mediated pituitary induction, while Gli2a and Gli2b contribute more minor activator functions. Intriguingly, this Gli response code changes as development proceeds. Gli1 continues to be required for the activation of the Hh response anteriorly in the pars distalis. In contrast, Gli2b is required to repress Hh target gene expression posteriorly in the pars intermedia. Consistent with these changing roles, gli1, gli2a, and gli2b, but not gli3, are expressed in pituitary precursor cells at the anterior neural ridge. Later in development, gli1 expression is maintained throughout the adenohypophysis while gli2a and gli2b expression are restricted to the pars intermedia. Given the link between Hh signaling and pituitary adenomas in humans, our data suggest misregulation of Gli function may contribute to these common pituitary tumors.

  5. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  6. Introduction to abstract algebra

    CERN Document Server

    Nicholson, W Keith

    2012-01-01

    Praise for the Third Edition ". . . an expository masterpiece of the highest didactic value that has gained additional attractivity through the various improvements . . ."-Zentralblatt MATH The Fourth Edition of Introduction to Abstract Algebra continues to provide an accessible approach to the basic structures of abstract algebra: groups, rings, and fields. The book's unique presentation helps readers advance to abstract theory by presenting concrete examples of induction, number theory, integers modulo n, and permutations before the abstract structures are defined. Readers can immediately be

  7. Role of non-specific DNA in reducing coding DNA requirement for transient gene expression with CHO and HEK-293E cells.

    Science.gov (United States)

    Rajendra, Yashas; Kiseljak, Divor; Manoli, Sagar; Baldi, Lucia; Hacker, David L; Wurm, Florian M

    2012-09-01

    Transient gene expression (TGE) is a rapid method for the production of recombinant proteins in mammalian cells. While the TGE volumetric productivity has improved significantly over the past decade, the amount of plasmid DNA (pDNA) needed for transfection remains very high. Here, we examined the use of non-specific (filler) DNA to partially replace the transgene-bearing plasmid DNA (coding pDNA) in transfections of Chinese hamster ovary (CHO) and human embryo kidney (HEK-293E) cells. When the optimal amount of coding pDNA for either host was reduced by 67% and replaced with filler DNA, the recombinant protein yield decreased by only 25% relative to the yield in control transfections. Filler DNA did not affect the cellular uptake or intracellular stability of coding pDNA, but its presence lead to increases of the percentage of transfected cells and the steady-state level of transgene mRNA compared to control transfections. Studies of the physicochemical properties of DNA-polyethyleneimine (PEI) complexes with or without filler DNA did not reveal any differences in their size or surface charge. The results suggest that filler DNA allows the coding pDNA to be distributed over a greater number of DNA-PEI complexes, leading to a higher percentage of transfected cells. The co-assembly of filler DNA and coding pDNA within complexes may also allow the latter to be more efficiently utilized by the cell's transcription machinery, resulting in a higher level of transgene mRNA. Copyright © 2012 Wiley Periodicals, Inc.

  8. Identification of LZP gene from Mus musculus and Rattus norvegicus coding for a novel liver-specific ZP domain-containing secretory protein.

    Science.gov (United States)

    Xu, Zhi-Gang; Du, Jian-Jun; Cui, Shu-Jian; Wang, Zhi-Qin; Huo, Ke-Ke; Li, Yu-Yang; Han, Ze-Guang

    2004-04-01

    Zona pellucida (ZP) domain has been recognized in a number of receptor-like eukaryotic glycoproteins, which involved in many important biological processes, such as signal transduction, development, differentiation and so on. Here we report the identification of Mus musculus and Rattus norvegicus orthologues of Homo sapiens LZP gene which codes for a novel ZP domain-containing protein. Sequence analysis revealed that human, rat and mouse LZP proteins are highly conserved. Mouse LZP gene has two transcripts, 2.4 and 2.8 KB long respectively, coding for identical protein. Mouse LZP mRNA is expressed specifically in hepatocytes. Our data also showed that mouse LZP localizes mostly on nuclear envelope, and at the same time, it can be secreted into blood in a truncated form.

  9. Incremental data compression -extended abstract-

    NARCIS (Netherlands)

    Jeuring, J.T.

    1992-01-01

    Data may be compressed using textual substitution. Textual substitution identifies repeated substrings and replaces some or all substrings by pointers to another copy. We construct an incremental algorithm for a specific textual substitution method: coding a text with respect to a dictionary. With

  10. Compilation of Theses Abstracts

    National Research Council Canada - National Science Library

    2005-01-01

    This publication contains unclassified/unrestricted abstracts of classified or restricted theses submitted for the degrees of Doctor of Philosophy, Master of Business Administration, Master of Science...

  11. Electrosensory processing in Apteronotus albifrons: implications for general and specific neural coding strategies across wave-type weakly electric fish species.

    Science.gov (United States)

    Martinez, Diana; Metzen, Michael G; Chacron, Maurice J

    2016-12-01

    Understanding how the brain processes sensory input to generate behavior remains an important problem in neuroscience. Towards this end, it is useful to compare results obtained across multiple species to gain understanding as to the general principles of neural coding. Here we investigated hindbrain pyramidal cell activity in the weakly electric fish Apteronotus albifrons We found strong heterogeneities when looking at baseline activity. Additionally, ON- and OFF-type cells responded to increases and decreases of sinusoidal and noise stimuli, respectively. While both cell types displayed band-pass tuning, OFF-type cells were more broadly tuned than their ON-type counterparts. The observed heterogeneities in baseline activity as well as the greater broadband tuning of OFF-type cells were both similar to those previously reported in other weakly electric fish species, suggesting that they constitute general features of sensory processing. However, we found that peak tuning occurred at frequencies ∼15 Hz in A. albifrons, which is much lower than values reported in the closely related species Apteronotus leptorhynchus and the more distantly related species Eigenmannia virescens In response to stimuli with time-varying amplitude (i.e., envelope), ON- and OFF-type cells displayed similar high-pass tuning curves characteristic of fractional differentiation and possibly indicate optimized coding. These tuning curves were qualitatively similar to those of pyramidal cells in the closely related species A. leptorhynchus In conclusion, comparison between our and previous results reveals general and species-specific neural coding strategies. We hypothesize that differences in coding strategies, when observed, result from different stimulus distributions in the natural/social environment. Copyright © 2016 the American Physiological Society.

  12. Completeness of Lyapunov Abstraction

    Directory of Open Access Journals (Sweden)

    Rafael Wisniewski

    2013-08-01

    Full Text Available In this work, we continue our study on discrete abstractions of dynamical systems. To this end, we use a family of partitioning functions to generate an abstraction. The intersection of sub-level sets of the partitioning functions defines cells, which are regarded as discrete objects. The union of cells makes up the state space of the dynamical systems. Our construction gives rise to a combinatorial object - a timed automaton. We examine sound and complete abstractions. An abstraction is said to be sound when the flow of the time automata covers the flow lines of the dynamical systems. If the dynamics of the dynamical system and the time automaton are equivalent, the abstraction is complete. The commonly accepted paradigm for partitioning functions is that they ought to be transversal to the studied vector field. We show that there is no complete partitioning with transversal functions, even for particular dynamical systems whose critical sets are isolated critical points. Therefore, we allow the directional derivative along the vector field to be non-positive in this work. This considerably complicates the abstraction technique. For understanding dynamical systems, it is vital to study stable and unstable manifolds and their intersections. These objects appear naturally in this work. Indeed, we show that for an abstraction to be complete, the set of critical points of an abstraction function shall contain either the stable or unstable manifold of the dynamical system.

  13. Low oxygen tension reveals distinct HOX codes in human cord blood-derived stromal cells associated with specific endochondral ossification capacities in vitro and in vivo.

    Science.gov (United States)

    Liedtke, Stefanie; Sacchetti, Benedetto; Laitinen, Anita; Donsante, Samantha; Klöckers, Robert; Laitinen, Saara; Riminucci, Mara; Kogler, Gesine

    2017-10-01

    Effects of oxygen tension on the generation, expansion, proliferation and differentiation of stromal cell types is widely described in the literature. However, data on the internal heterogeneity of applied cell populations at different O 2 levels and possible impacts on differentiation potentials are controversial. Here, the expression of 39 human HOX genes was determined in neonatal cord blood stromal cells and linked to differentiation-associated signatures. In cord blood, unrestricted somatic stromal cells (USSCs), lacking HOX gene expression, and cord blood-derived multipotent stromal cells (CB-MSCs), expressing about 20 HOX genes, are distinguished by their specific HOX code. Interestingly, 74% of the clones generated at 21% O 2 were HOX-negative USSCs, whereas 73% of upcoming clones at 3% O 2 were HOX-positive CB-MSCs. In order to better categorize distinct cell lines generated at 3% O 2 , the expression of all 39 HOX genes within HOX clusters A, B, C and D were tested and new subtypes defined: cells negative in all four HOX clusters (USSCs); cells positive in all four clusters (CB-MSCs ABCD ); and subpopulations missing a single cluster (CB-MSCs ACD and CB-MSCs BCD ). Comprehensive qPCR analyses of established chondro-osteomarkers revealed subtype-specific signatures verifiably associated with in vitro and in vivo differentiation capacity. The data presented here underline the necessity of better characterizing distinct cell populations at a clonal level, taking advantage of the inherent specific HOX code as a distinguishing feature between individual subtypes. Moreover, the correlation of subtype-specific molecular signatures with in vitro and in vivo bone formation is discussed. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  14. Mathematical games, abstract games

    CERN Document Server

    Neto, Joao Pedro

    2013-01-01

    User-friendly, visually appealing collection offers both new and classic strategic board games. Includes abstract games for two and three players and mathematical games such as Nim and games on graphs.

  15. The deleuzian abstract machines

    DEFF Research Database (Denmark)

    Werner Petersen, Erik

    2005-01-01

    To most people the concept of abstract machines is connected to the name of Alan Turing and the development of the modern computer. The Turing machine is universal, axiomatic and symbolic (E.g. operating on symbols). Inspired by Foucault, Deleuze and Guattari extended the concept of abstract...... machines to singular, non-axiomatic and diagrammatic machines. That is: Machines which constitute becomings. This presentation gives a survey of the development of the concept of abstract machines in the philosophy of Deleuze and Guatari and the function of these abstract machines in the creation of works...... of art. From Difference and Repetition to Anti-Oedipus, the machines are conceived as binary machines based on the exclusive or inclusive use respectively of the three syntheses: conexa, disjuncta and conjuncta. The machines have a twofold embedment: In the desiring-production and in the social...

  16. Abstracts of contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    1994-08-01

    This volume contains 571 abstracts of contributed papers to be presented during the Twelfth US National Congress of Applied Mechanics. Abstracts are arranged in the order in which they fall in the program -- the main sessions are listed chronologically in the Table of Contents. The Author Index is in alphabetical order and lists each paper number (matching the schedule in the Final Program) with its corresponding page number in the book.

  17. Introduction to abstract algebra

    CERN Document Server

    Smith, Jonathan D H

    2008-01-01

    Taking a slightly different approach from similar texts, Introduction to Abstract Algebra presents abstract algebra as the main tool underlying discrete mathematics and the digital world. It helps students fully understand groups, rings, semigroups, and monoids by rigorously building concepts from first principles. A Quick Introduction to Algebra The first three chapters of the book show how functional composition, cycle notation for permutations, and matrix notation for linear functions provide techniques for practical computation. The author also uses equivalence relations to introduc

  18. Codes in the codons: construction of a codon/amino acid periodic table and a study of the nature of specific nucleic acid-protein interactions.

    Science.gov (United States)

    Benyo, B; Biro, J C; Benyo, Z

    2004-01-01

    The theory of "codon-amino acid coevolution" was first proposed by Woese in 1967. It suggests that there is a stereochemical matching - that is, affinity - between amino acids and certain of the base triplet sequences that code for those amino acids. We have constructed a common periodic table of codons and amino acids, where the nucleic acid table showed perfect axial symmetry for codons and the corresponding amino acid table also displayed periodicity regarding the biochemical properties (charge and hydrophobicity) of the 20 amino acids and the position of the stop signals. The table indicates that the middle (2/sup nd/) amino acid in the codon has a prominent role in determining some of the structural features of the amino acids. The possibility that physical contact between codons and amino acids might exist was tested on restriction enzymes. Many recognition site-like sequences were found in the coding sequences of these enzymes and as many as 73 examples of codon-amino acid co-location were observed in the 7 known 3D structures (December 2003) of endonuclease-nucleic acid complexes. These results indicate that the smallest possible units of specific nucleic acid-protein interaction are indeed the stereochemically compatible codons and amino acids.

  19. Writing good abstracts.

    Science.gov (United States)

    Alexandrov, Andrei V; Hennerici, Michael G

    2007-01-01

    Writing an abstract means to extract and summarize (AB - absolutely, STR - straightforward, ACT - actual data presentation and interpretation). Thousands of abstracts are submitted to stroke conferences each year. The following suggestions may improve the chances of your work being selected for presentation, and to communicate results in the most efficient and unambiguous way. TITLE AND STRUCTURE: Make the title dynamic and informative, rather than descriptive. Structure the abstract following the IMRaD (Introduction, Methods, Results and Discussion) principle for your future original paper where background would become Introduction and conclusions would enter Discussion. Select the appropriate category for submission carefully. This determines which experts grade the abstract and the session where your competitors represent their work. If selected appropriately, your abstract is more likely to be graded by peers with similar interests and familiarity with your work or field. Methods should describe the study design and tools of data acquisition shortly, not data. Provide data that answer the research question. Describe most important data with numbers and statistics. Make your point with data, not speculations and opinions. Abbreviations should be avoided and only be used after they have been spelled out or defined. Common mistakes include failure to state the hypothesis, rationale for the study, sample size and conclusions. Highlight the novelty of your work by carefully chosen straightforward wording. Conclusions have to be based on the present study findings. Make sure your abstract is clear, concise and follows all rules. Show your draft to colleagues for critique, and if you are not a native English speaker show it to a person who can improve/correct your text. Remember that accepted abstracts of completed original research should be followed by published original papers - if this is not intended or fails, it may indicate an impaired ability to succeed in

  20. Leptin receptor isoform 219.1: an example of protein evolution by LINE-1-mediated human-specific retrotransposition of a coding SVA element.

    Science.gov (United States)

    Damert, Annette; Löwer, Johannes; Löwer, Roswitha

    2004-04-01

    Phylogenetically new insertions of repetitive sequences may contribute to genome evolution by altering the function of preexisting proteins. One example is the SVA sequence, which forms the C-terminal coding exon of the human leptin receptor isoform 219.1. Here, we report that the SVA insertion into the LEPR locus has occurred after divergence of humans and chimpanzees. The SVA element was inserted into a Hal-1/LINE element present in all monkeys and apes tested. Structural features point toward an integration event that was mediated by the L1 protein machinery acting in trans. Thus, our findings add evidence to the hypothesis that retrotransposition events are a driving force in genomic evolution and that the presence or absence of specific retroelements are one distinguishing feature that separates humans from chimpanzees.

  1. Combinatorial Abstractions of Dynamical Systems

    Directory of Open Access Journals (Sweden)

    Rafael Wisniewski

    2013-08-01

    Full Text Available Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems. However, the verification of system properties, such as safety, is based on reachability calculations, which are the sources of insurmountable complexity. This talk addresses indirect verification methods, which are based on abstracting the dynamical systems by models of reduced complexity and preserving central properties of the original systems.

  2. Abstract 1. Introduction

    African Journals Online (AJOL)

    Maseh

    School of Information Sciences, Eldoret,. Kenya. Second affiliation: Research collaborator,. InterPARES Africa, coordinated by the. University of South Africa, Pretoria, South. Africa. Email: jmaseh@gmail.com. Abstract. Increasingly, governments all over the world are adopting e-government by deploying Information and.

  3. Full Abstraction for HOPLA

    DEFF Research Database (Denmark)

    Nygaard, Mikkel; Winskel, Glynn

    2003-01-01

    A fully abstract denotational semantics for the higher-order process language HOPLA is presented. It characterises contextual and logical equivalence, the latter linking up with simulation. The semantics is a clean, domain-theoretic description of processes as downwards-closed sets of computation...

  4. Poster Session- Extended Abstracts

    Science.gov (United States)

    Jack D. Alexander III; Jean Findley; Brenda K. Kury; Jan L. Beyers; Douglas S. Cram; Terrell T. Baker; Jon C. Boren; Carl Edminster; Sue A. Ferguson; Steven McKay; David Nagel; Trent Piepho; Miriam Rorig; Casey Anderson; Jeanne Hoadley; Paulette L. Ford; Mark C. Andersen; Ed L. Fredrickson; Joe Truett; Gary W. Roemer; Brenda K. Kury; Jennifer Vollmer; Christine L. May; Danny C. Lee; James P. Menakis; Robert E. Keane; Zhi-Liang Zhu; Carol Miller; Brett Davis; Katharine Gray; Ken Mix; William P. Kuvlesky Jr.; D. Lynn Drawe; Marcia G. Narog; Roger D. Ottmar; Robert E. Vihnanek; Clinton S. Wright; Timothy E. Paysen; Burton K. Pendleton; Rosemary L. Pendleton; Carleton S. White; John Rogan; Doug Stow; Janet Franklin; Jennifer Miller; Lisa Levien; Chris Fischer; Emma Underwood; Robert Klinger; Peggy Moore; Clinton S. Wright

    2008-01-01

    Titles found within Poster Session-Extended Abstracts include:Assessment of emergency fire rehabilitation of four fires from the 2000 fire season on the Vale, Oregon, BLM district: review of the density sampling materials and methods: p. 329 Growth of regreen, seeded for erosion control, in the...

  5. Abstract Film and Beyond.

    Science.gov (United States)

    Le Grice, Malcolm

    A theoretical and historical account of the main preoccupations of makers of abstract films is presented in this book. The book's scope includes discussion of nonrepresentational forms as well as examination of experiments in the manipulation of time in films. The ten chapters discuss the following topics: art and cinematography, the first…

  6. SPR 2015. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-04-01

    The volume contains the abstracts of the SPR (society for pediatric radiology) 2015 meeting covering the following issues: fetal imaging, muscoskeletal imaging, cardiac imaging, chest imaging, oncologic imaging, tools for process improvement, child abuse, contrast enhanced ultrasound, image gently - update of radiation dose recording/reporting/monitoring - meaningful or useless meaning?, pediatric thoracic imaging, ALARA.

  7. 2002 NASPSA Conference Abstracts.

    Science.gov (United States)

    Journal of Sport & Exercise Psychology, 2002

    2002-01-01

    Contains abstracts from the 2002 conference of the North American Society for the Psychology of Sport and Physical Activity. The publication is divided into three sections: the preconference workshop, "Effective Teaching Methods in the Classroom;" symposia (motor development, motor learning and control, and sport psychology); and free…

  8. The Abstraction Engine

    DEFF Research Database (Denmark)

    Fortescue, Michael David

    The main thesis of this book is that abstraction, far from being confined to higher forms of cognition, language and logical reasoning, has actually been a major driving force throughout the evolution of creatures with brains. It is manifest in emotive as well as rational thought. Wending its way...

  9. Seismic Consequence Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    M. Gross

    2004-10-25

    The primary purpose of this model report is to develop abstractions for the response of engineered barrier system (EBS) components to seismic hazards at a geologic repository at Yucca Mountain, Nevada, and to define the methodology for using these abstractions in a seismic scenario class for the Total System Performance Assessment - License Application (TSPA-LA). A secondary purpose of this model report is to provide information for criticality studies related to seismic hazards. The seismic hazards addressed herein are vibratory ground motion, fault displacement, and rockfall due to ground motion. The EBS components are the drip shield, the waste package, and the fuel cladding. The requirements for development of the abstractions and the associated algorithms for the seismic scenario class are defined in ''Technical Work Plan For: Regulatory Integration Modeling of Drift Degradation, Waste Package and Drip Shield Vibratory Motion and Seismic Consequences'' (BSC 2004 [DIRS 171520]). The development of these abstractions will provide a more complete representation of flow into and transport from the EBS under disruptive events. The results from this development will also address portions of integrated subissue ENG2, Mechanical Disruption of Engineered Barriers, including the acceptance criteria for this subissue defined in Section 2.2.1.3.2.3 of the ''Yucca Mountain Review Plan, Final Report'' (NRC 2003 [DIRS 163274]).

  10. Building Safe Concurrency Abstractions

    DEFF Research Database (Denmark)

    Madsen, Ole Lehrmann

    2014-01-01

    as well as programming, and we describe how this has had an impact on the design of the language. Although Beta supports the definition of high-level concurrency abstractions, the use of these rely on the discipline of the programmer as is the case for Java and other mainstream OO languages. We introduce...

  11. An introduction to abstract algebra

    CERN Document Server

    Robinson, Derek JS

    2003-01-01

    This is a high level introduction to abstract algebra which is aimed at readers whose interests lie in mathematics and in the information and physical sciences. In addition to introducing the main concepts of modern algebra, the book contains numerous applications, which are intended to illustrate the concepts and to convince the reader of the utility and relevance of algebra today. In particular applications to Polya coloring theory, latin squares, Steiner systems and error correcting codes are described. Another feature of the book is that group theory and ring theory are carried further than is often done at this level. There is ample material here for a two semester course in abstract algebra. The importance of proof is stressed and rigorous proofs of almost all results are given. But care has been taken to lead the reader through the proofs by gentle stages. There are nearly 400 problems, of varying degrees of difficulty, to test the reader''s skill and progress. The book should be suitable for students ...

  12. The place of 'codes' in nonlinear neurodynamics.

    Science.gov (United States)

    Freeman, Walter J

    2007-01-01

    A key problem in cognitive science is to explain the neural mechanisms of the rapid transposition between stimulus energy and abstract concept--between the specific and the generic--in both material and conceptual aspects, not between neural and psychic aspects. Three approaches by researchers to a solution in terms of neural codes are considered. Materialists seek rate and frequency codes in the interspike intervals of trains of action potentials induced by stimuli and carried by topologically organized axonal lines. Cognitivists refer to the symbol grounding problem and search for symbolic codes in firings of hierarchically organized feature-detector neurons of phonemes, lines, odorants, pressures, etc., that object-detector neurons bind into representations of probabilities of stimulus occurrence. Dynamicists seek neural correlates of stimuli and associated behaviors in spatial patterns of oscillatory fields of dendritic activity that self-organize and evolve as trajectories through high-dimensional brain state space; the codes are landscapes of chaotic attractors. Unlike codes in DNA and the periodic table, these codes have neither alphabet nor syntax. They are epistemological metaphors required by experimentalists to measure neural activity and by engineers to model brain functions. Here I review the central neural mechanisms of olfaction as a paradigm for use of codes to explain how brains create cortical activities that mediate sensation, perception, comprehension, prediction, decision, and action or inaction.

  13. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  14. A Novel Family in Medicago truncatula Consisting of More Than 300 Nodule-Specific Genes Coding for Small, Secreted Polypeptides with Conserved Cysteine Motifs1[w

    Science.gov (United States)

    Mergaert, Peter; Nikovics, Krisztina; Kelemen, Zsolt; Maunoury, Nicolas; Vaubert, Danièle; Kondorosi, Adam; Kondorosi, Eva

    2003-01-01

    Transcriptome analysis of Medicago truncatula nodules has led to the discovery of a gene family named NCR (nodule-specific cysteine rich) with more than 300 members. The encoded polypeptides were short (60–90 amino acids), carried a conserved signal peptide, and, except for a conserved cysteine motif, displayed otherwise extensive sequence divergence. Family members were found in pea (Pisum sativum), broad bean (Vicia faba), white clover (Trifolium repens), and Galega orientalis but not in other plants, including other legumes, suggesting that the family might be specific for galegoid legumes forming indeterminate nodules. Gene expression of all family members was restricted to nodules except for two, also expressed in mycorrhizal roots. NCR genes exhibited distinct temporal and spatial expression patterns in nodules and, thus, were coupled to different stages of development. The signal peptide targeted the polypeptides in the secretory pathway, as shown by green fluorescent protein fusions expressed in onion (Allium cepa) epidermal cells. Coregulation of certain NCR genes with genes coding for a potentially secreted calmodulin-like protein and for a signal peptide peptidase suggests a concerted action in nodule development. Potential functions of the NCR polypeptides in cell-to-cell signaling and creation of a defense system are discussed. PMID:12746522

  15. Null mutation of the MdACS3 gene, coding for a ripening-specific 1-aminocyclopropane-1-carboxylate synthase, leads to long shelf life in apple fruit.

    Science.gov (United States)

    Wang, Aide; Yamakake, Junko; Kudo, Hisayuki; Wakasa, Yuhya; Hatsuyama, Yoshimichi; Igarashi, Megumi; Kasai, Atsushi; Li, Tianzhong; Harada, Takeo

    2009-09-01

    Expression of MdACS1, coding for 1-aminocyclopropane-1-carboxylate synthase (ACS), parallels the level of ethylene production in ripening apple (Malus domestica) fruit. Here we show that expression of another ripening-specific ACS gene (MdACS3) precedes the initiation of MdACS1 expression by approximately 3 weeks; MdACS3 expression then gradually decreases as MdACS1 expression increases. Because MdACS3 expression continues in ripening fruit treated with 1-methylcyclopropene, its transcription appears to be regulated by a negative feedback mechanism. Three genes in the MdACS3 family (a, b, and c) were isolated from a genomic library, but two of them (MdACS3b and MdACS3c) possess a 333-bp transposon-like insertion in their 5' flanking region that may prevent transcription of these genes during ripening. A single nucleotide polymorphism in the coding region of MdACS3a results in an amino acid substitution (glycine-289 --> valine) in the active site that inactivates the enzyme. Furthermore, another null allele of MdACS3a, Mdacs3a, showing no ability to be transcribed, was found by DNA sequencing. Apple cultivars homozygous or heterozygous for both null allelotypes showed no or very low expression of ripening-related genes and maintained fruit firmness. These results suggest that MdACS3a plays a crucial role in regulation of fruit ripening in apple, and is a possible determinant of ethylene production and shelf life in apple fruit.

  16. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  17. Beyond the abstractions?

    DEFF Research Database (Denmark)

    Olesen, Henning Salling

    2006-01-01

    the abstractions by broadening it's scope of interest, by focussing on differences of learners, by age, gender, ethnicity, social experience, and differences in context, by socioeconomic environment, culture etc. Practically, it is argued, this means to embrace the new focus on informal learning and work related......  The anniversary of the International Journal of Lifelong Education takes place in the middle of a conceptual landslide from lifelong education to lifelong learning. Contemporary discourses of lifelong learning etc are however abstractions behind which new functions and agendas for adult education...... are set. The ideological discourse of recent policies seems to neglect the fact that history and resources for lifelong learning are different across Europe, and also neglects the multiplicity of adult learners. Instead of refusing the new agendas, however, adult education research should try to dissolve...

  18. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...... of such a representation are considered: the denotations of that-phrases are objects representing propositions, generic noun phrases denote objects standing for sorts, and infinitivals are viewed as denoting objects representing attributes, i.e., the "ordinary'' meanings of verb phrases....

  19. Learning abstract algebra with ISETL

    CERN Document Server

    Dubinsky, Ed

    1994-01-01

    Most students in abstract algebra classes have great difficulty making sense of what the instructor is saying. Moreover, this seems to remain true almost independently of the quality of the lecture. This book is based on the constructivist belief that, before students can make sense of any presentation of abstract mathematics, they need to be engaged in mental activities which will establish an experiential base for any future verbal explanation. No less, they need to have the opportunity to reflect on their activities. This approach is based on extensive theoretical and empirical studies as well as on the substantial experience of the authors in teaching astract algebra. The main source of activities in this course is computer constructions, specifically, small programs written in the mathlike programming language ISETL; the main tool for reflections is work in teams of 2-4 students, where the activities are discussed and debated. Because of the similarity of ISETL expressions to standard written mathematics...

  20. Research Abstracts of 1979.

    Science.gov (United States)

    1979-12-01

    Rat.0 (Abstract #886). a. LEONE’, S. A., YEAGER, J. S., WOODRUFF, L. L. and CLARK, G. S. - ’An In Vitro Evaluation of the Cytotoxicity of Dental...Evaluation of sixteen dyes, with aqueous and ethanol bases, using white and ultraviolet light has been conducted in vitro and in vivo. Naturally...mandibular incisors in 8 adult Rhesus monkeys. Doubled I/8", medium force orthodontic elastics were placed around the teeth and changed every two weeks for

  1. DEGRO 2017. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2017-06-15

    The volume includes abstracts of the Annual DEGRO Meeting 2017 covering lectures and poster sessions with the following issues: lymphoma, biology, physics, radioimmunotherapy, sarcomas and rare tumors, prostate carcinoma, lung tumors, benign lesions and new media, mamma carcinoma, gastrointestinal tumors, quality of life, care science and quality assurance, high-technology methods and palliative situation, head-and-neck tumors, brain tumors, central nervous system metastases, guidelines, radiation sensitivity, radiotherapy, radioimmunotherapy.

  2. SPR 2014. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-05-15

    The proceedings of the SPR 2014 meeting include abstracts on the following topics: Body imaging techniques: practical advice for clinic work; thoracic imaging: focus on the lungs; gastrointestinal imaging: focus on the pancreas and bowel; genitourinary imaging: focus on gonadal radiology; muscoskeletal imaging; focus on oncology; child abuse and nor child abuse: focus on radiography; impact of NMR and CT imaging on management of CHD; education and communication: art and practice in pediatric radiology.

  3. Types: A data abstraction package in FORTRAN

    Science.gov (United States)

    Youssef, Saul

    1990-08-01

    TYPES is a collection of Fortran programs which allow the creation and manipulation of abstract ``data objects'' without the need for a preprocessor. Each data object is assigned a ``type'' as it is created which implies participation in a set of characteristic operations. Available types include scalars, logicals, ordered sets, stacks, queues, sequences, trees, arrays, character strings, block text, histograms, virtual and allocatable memories. A data object may contain integers, reals, or other data objects in any combination. In addition to the type specific operations, a set of universal utilities allows for copying input/output to disk, naming, editing, displaying, user input, interactive creation, tests for equality of contents or structure, machine to machine translation or source code creation for and data object. TYPES is available on VAX/VMS, SUN 3, SPARC, DEC/Ultrix, Silicon Graphics 4D and Cray/Unicos machines. The capabilities of the package are discussed together with characteristic applications and experience in writing the GVerify package.

  4. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  5. EBS Radionuclide Transport Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    J. Prouty

    2006-07-14

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment (TSPA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport model considers advective transport and diffusive transport

  6. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  7. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  8. Cyclone Codes

    OpenAIRE

    Schindelhauer, Christian; Jakoby, Andreas; Köhler, Sven

    2016-01-01

    We introduce Cyclone codes which are rateless erasure resilient codes. They combine Pair codes with Luby Transform (LT) codes by computing a code symbol from a random set of data symbols using bitwise XOR and cyclic shift operations. The number of data symbols is chosen according to the Robust Soliton distribution. XOR and cyclic shift operations establish a unitary commutative ring if data symbols have a length of $p-1$ bits, for some prime number $p$. We consider the graph given by code sym...

  9. IPR 2016. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-05-15

    The volume on the meeting of pediatric radiology includes abstract on the following issues: chest, cardiovascular system, neuroradiology, CT radiation DRs (diagnostic reference levels) and dose reporting guidelines, genitourinary imaging, gastrointestinal radiology, oncology an nuclear medicine, whole body imaging, fetal/neonates imaging, child abuse, oncology and hybrid imaging, value added imaging, muscoskeletal imaging, dose and radiation safety, imaging children - immobilization and distraction techniques, information - education - QI and healthcare policy, ALARA, the knowledge skills and competences for a technologist/radiographer in pediatric radiology, full exploitation of new technological features in pediatric CT, image quality issues in pediatrics, abdominal imaging, interventional radiology, MR contrast agents, tumor - mass imaging, cardiothoracic imaging, ultrasonography.

  10. SPR 2017. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2017-05-15

    The conference proceedings SPR 2017 include abstracts on the following issues: gastrointestinal radiography - inflammatory bowel diseases, cardiovascular CTA, general muscoskeletal radiology, muscoskeletal congenital development diseases, general pediatric radiology - chest, muscoskeletal imaging - marrow and infectious disorders, state-of-the-art body MR imaging, practical pediatric sonography, quality and professionalism, CT imaging in congenital heart diseases, radiographic courses, body MT techniques, contrast enhanced ultrasound, machine learning, forensic imaging, the radiation dos conundrum - reconciling imaging, imagining and managing, the practice of radiology, interventional radiology, neuroradiology, PET/MR.

  11. ESPR 2015. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-05-10

    The volume includes the abstracts of the ESPR 2015 covering the following topics: PCG (post graduate courses): Radiography; fluoroscopy and general issue; nuclear medicine, interventional radiology and hybrid imaging, pediatric CT, pediatric ultrasound; MRI in childhood. Scientific sessions and task force sessions: International aspects; neuroradiology, neonatal imaging, engineering techniques to simulate injury in child abuse, CT - dose and quality, challenges in the chest, cardiovascular and chest, muscoskeletal, oncology, pediatric uroradiology and abdominal imaging, fetal and postmortem imaging, education and global challenges, neuroradiology - head and neck, gastrointestinal and genitourinary.

  12. ABSTRACTION OF DRIFT SEEPAGE

    Energy Technology Data Exchange (ETDEWEB)

    Michael L. Wilson

    2001-02-08

    Drift seepage refers to flow of liquid water into repository emplacement drifts, where it can potentially contribute to degradation of the engineered systems and release and transport of radionuclides within the drifts. Because of these important effects, seepage into emplacement drifts is listed as a ''principal factor for the postclosure safety case'' in the screening criteria for grading of data in Attachment 1 of AP-3.15Q, Rev. 2, ''Managing Technical Product Inputs''. Abstraction refers to distillation of the essential components of a process model into a form suitable for use in total-system performance assessment (TSPA). Thus, the purpose of this analysis/model is to put the information generated by the seepage process modeling in a form appropriate for use in the TSPA for the Site Recommendation. This report also supports the Unsaturated-Zone Flow and Transport Process Model Report. The scope of the work is discussed below. This analysis/model is governed by the ''Technical Work Plan for Unsaturated Zone Flow and Transport Process Model Report'' (CRWMS M&O 2000a). Details of this activity are in Addendum A of the technical work plan. The original Work Direction and Planning Document is included as Attachment 7 of Addendum A. Note that the Work Direction and Planning Document contains tasks identified for both Performance Assessment Operations (PAO) and Natural Environment Program Operations (NEPO). Only the PAO tasks are documented here. The planning for the NEPO activities is now in Addendum D of the same technical work plan and the work is documented in a separate report (CRWMS M&O 2000b). The Project has been reorganized since the document was written. The responsible organizations in the new structure are the Performance Assessment Department and the Unsaturated Zone Department, respectively. The work plan for the seepage abstraction calls for determining an appropriate abstraction methodology

  13. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... of such a representation are considered: the denotations of that-phrases are objects representing propositions, generic noun phrases denote objects standing for sorts, and infinitivals are viewed as denoting objects representing attributes, i.e., the "ordinary'' meanings of verb phrases....

  14. Operating System Abstraction Layer (OSAL)

    Science.gov (United States)

    Yanchik, Nicholas J.

    2007-01-01

    This viewgraph presentation reviews the concept of the Operating System Abstraction Layer (OSAL) and its benefits. The OSAL is A small layer of software that allows programs to run on many different operating systems and hardware platforms It runs independent of the underlying OS & hardware and it is self-contained. The benefits of OSAL are that it removes dependencies from any one operating system, promotes portable, reusable flight software. It allows for Core Flight software (FSW) to be built for multiple processors and operating systems. The presentation discusses the functionality, the various OSAL releases, and describes the specifications.

  15. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  16. EBS Radionuclide Transport Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    J.D. Schreiber

    2005-08-25

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in ''Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration'' (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment for the license application (TSPA-LA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA-LA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport

  17. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class......Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class...

  18. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  19. IEEE conference record -- Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-01

    This conference covers the following areas: computational plasma physics; vacuum electronic; basic phenomena in fully ionized plasmas; plasma, electron, and ion sources; environmental/energy issues in plasma science; space plasmas; plasma processing; ball lightning/spherical plasma configurations; plasma processing; fast wave devices; magnetic fusion; basic phenomena in partially ionized plasma; dense plasma focus; plasma diagnostics; basic phenomena in weakly ionized gases; fast opening switches; MHD; fast z-pinches and x-ray lasers; intense ion and electron beams; laser-produced plasmas; microwave plasma interactions; EM and ETH launchers; solid state plasmas and switches; intense beam microwaves; and plasmas for lighting. Separate abstracts were prepared for 416 papers in this conference.

  20. Problems in abstract algebra

    CERN Document Server

    Wadsworth, A R

    2017-01-01

    This is a book of problems in abstract algebra for strong undergraduates or beginning graduate students. It can be used as a supplement to a course or for self-study. The book provides more variety and more challenging problems than are found in most algebra textbooks. It is intended for students wanting to enrich their learning of mathematics by tackling problems that take some thought and effort to solve. The book contains problems on groups (including the Sylow Theorems, solvable groups, presentation of groups by generators and relations, and structure and duality for finite abelian groups); rings (including basic ideal theory and factorization in integral domains and Gauss's Theorem); linear algebra (emphasizing linear transformations, including canonical forms); and fields (including Galois theory). Hints to many problems are also included.

  1. Use of the FLUKA Monte Carlo code for 3D patient-specific dosimetry on PET-CT and SPECT-CT images*

    Science.gov (United States)

    Botta, F; Mairani, A; Hobbs, R F; Vergara Gil, A; Pacilio, M; Parodi, K; Cremonesi, M; Coca Pérez, M A; Di Dia, A; Ferrari, M; Guerriero, F; Battistoni, G; Pedroli, G; Paganelli, G; Torres Aroche, L A; Sgouros, G

    2014-01-01

    Patient-specific absorbed dose calculation for nuclear medicine therapy is a topic of increasing interest. 3D dosimetry at the voxel level is one of the major improvements for the development of more accurate calculation techniques, as compared to the standard dosimetry at the organ level. This study aims to use the FLUKA Monte Carlo code to perform patient-specific 3D dosimetry through direct Monte Carlo simulation on PET-CT and SPECT-CT images. To this aim, dedicated routines were developed in the FLUKA environment. Two sets of simulations were performed on model and phantom images. Firstly, the correct handling of PET and SPECT images was tested under the assumption of homogeneous water medium by comparing FLUKA results with those obtained with the voxel kernel convolution method and with other Monte Carlo-based tools developed to the same purpose (the EGS-based 3D-RD software and the MCNP5-based MCID). Afterwards, the correct integration of the PET/SPECT and CT information was tested, performing direct simulations on PET/CT images for both homogeneous (water) and non-homogeneous (water with air, lung and bone inserts) phantoms. Comparison was performed with the other Monte Carlo tools performing direct simulation as well. The absorbed dose maps were compared at the voxel level. In the case of homogeneous water, by simulating 108 primary particles a 2% average difference with respect to the kernel convolution method was achieved; such difference was lower than the statistical uncertainty affecting the FLUKA results. The agreement with the other tools was within 3–4%, partially ascribable to the differences among the simulation algorithms. Including the CT-based density map, the average difference was always within 4% irrespective of the medium (water, air, bone), except for a maximum 6% value when comparing FLUKA and 3D-RD in air. The results confirmed that the routines were properly developed, opening the way for the use of FLUKA for patient-specific, image

  2. Use of the FLUKA Monte Carlo code for 3D patient-specific dosimetry on PET-CT and SPECT-CT images

    Science.gov (United States)

    Botta, F.; Mairani, A.; Hobbs, R. F.; Vergara Gil, A.; Pacilio, M.; Parodi, K.; Cremonesi, M.; Coca Pérez, M. A.; Di Dia, A.; Ferrari, M.; Guerriero, F.; Battistoni, G.; Pedroli, G.; Paganelli, G.; Torres Aroche, L. A.; Sgouros, G.

    2013-11-01

    Patient-specific absorbed dose calculation for nuclear medicine therapy is a topic of increasing interest. 3D dosimetry at the voxel level is one of the major improvements for the development of more accurate calculation techniques, as compared to the standard dosimetry at the organ level. This study aims to use the FLUKA Monte Carlo code to perform patient-specific 3D dosimetry through direct Monte Carlo simulation on PET-CT and SPECT-CT images. To this aim, dedicated routines were developed in the FLUKA environment. Two sets of simulations were performed on model and phantom images. Firstly, the correct handling of PET and SPECT images was tested under the assumption of homogeneous water medium by comparing FLUKA results with those obtained with the voxel kernel convolution method and with other Monte Carlo-based tools developed to the same purpose (the EGS-based 3D-RD software and the MCNP5-based MCID). Afterwards, the correct integration of the PET/SPECT and CT information was tested, performing direct simulations on PET/CT images for both homogeneous (water) and non-homogeneous (water with air, lung and bone inserts) phantoms. Comparison was performed with the other Monte Carlo tools performing direct simulation as well. The absorbed dose maps were compared at the voxel level. In the case of homogeneous water, by simulating 108 primary particles a 2% average difference with respect to the kernel convolution method was achieved; such difference was lower than the statistical uncertainty affecting the FLUKA results. The agreement with the other tools was within 3-4%, partially ascribable to the differences among the simulation algorithms. Including the CT-based density map, the average difference was always within 4% irrespective of the medium (water, air, bone), except for a maximum 6% value when comparing FLUKA and 3D-RD in air. The results confirmed that the routines were properly developed, opening the way for the use of FLUKA for patient-specific, image

  3. Exoplanets and Multiverses (Abstract)

    Science.gov (United States)

    Trimble, V.

    2016-12-01

    (Abstract only) To the ancients, the Earth was the Universe, of a size to be crossed by a god in a day, by boat or chariot, and by humans in a lifetime. Thus an exoplanet would have been a multiverse. The ideas gradually separated over centuries, with gradual acceptance of a sun-centered solar system, the stars as suns likely to have their own planets, other galaxies beyond the Milky Way, and so forth. And whenever the community divided between "just one' of anything versus "many," the "manies" have won. Discoveries beginning in 1991 and 1995 have gradually led to a battalion or two of planets orbiting other stars, very few like our own little family, and to moderately serious consideration of even larger numbers of other universes, again very few like our own. I'm betting, however, on habitable (though not necessarily inhabited) exoplanets to be found, and habitable (though again not necessarily inhabited) universes. Only the former will yield pretty pictures.

  4. Judgement of abstract paintings

    Directory of Open Access Journals (Sweden)

    Dakulović Sandra

    2006-01-01

    Full Text Available In two experiments the judgement of twenty one abstract paintings was investigated. In Experiment 1, subjects were asked to make similarity judgements of 210 pairs of paintings on a 7 step bipolar scale (similar-dissimilar. The Multi-dimensional scaling (MDS method was used for data analysis. The distribution of paintings within MDS 2-D space suggested two grouping criteria: colorfullness (e.g. from Klee to Kline and geometrization (e.g. from Vasarely to Kandinsky. In Experiment 2, subjects were asked to judge the same paintings on three factors of the instrument SDF 9 (Marković et al., 2002b: Evaluation, Arousal and Regularity. The purpose of this experiment was to specify the subjective criteria on which the (dissimilarity judgements were based. In the regression analysis the three factors of SDF 9 were defined as predictors, whereas the x and y coordinates of MDS 2-D space were defined as dependent variables. The results have shown that the dimension x was reducible to the Evaluation factor, and dimension y is reducible to the Regularity factor.

  5. Automated Supernova Discovery (Abstract)

    Science.gov (United States)

    Post, R. S.

    2015-12-01

    (Abstract only) We are developing a system of robotic telescopes for automatic recognition of Supernovas as well as other transient events in collaboration with the Puckett Supernova Search Team. At the SAS2014 meeting, the discovery program, SNARE, was first described. Since then, it has been continuously improved to handle searches under a wide variety of atmospheric conditions. Currently, two telescopes are used to build a reference library while searching for PSN with a partial library. Since data is taken every night without clouds, we must deal with varying atmospheric and high background illumination from the moon. Software is configured to identify a PSN, reshoot for verification with options to change the run plan to acquire photometric or spectrographic data. The telescopes are 24-inch CDK24, with Alta U230 cameras, one in CA and one in NM. Images and run plans are sent between sites so the CA telescope can search while photometry is done in NM. Our goal is to find bright PSNs with magnitude 17.5 or less which is the limit of our planned spectroscopy. We present results from our first automated PSN discoveries and plans for PSN data acquisition.

  6. Interdisciplinary perspectives on abstracts for information retrieval

    Directory of Open Access Journals (Sweden)

    Soon Keng Chan

    2004-10-01

    Full Text Available The paper examines the abstract genre from the perspectives of English for Specific Purposes (ESP practitioners and information professionals. It aims to determine specific interdisciplinary interests in the abstract, and to explore areas of collaboration in terms of research and pedagogical practices. A focus group (FG comprising information professionals from the Division of Information Studies, Nanyang Technological University, Singapore, convened for a discussion on the subject of abstracts and abstracting. Two major issues that have significant implications for ESP practices emerged during the discussion. While differences in terms of approach to and objectives of the abstract genre are apparent between information professionals and language professionals, the demands for specific cognitive processes involved in abstracting proved to be similar. This area of similarity provides grounds for awareness raising and collaboration between the two disciplines. While ESP practitioners need to consider adding the dimension of information science to the rhetorical and linguistic scaffolding that they have been providing to novice-writers, information professionals can contribute useful insights about the qualities of abstracts that have the greatest impact in meeting the end-users' needs in information search.

  7. Abstract and concrete sentences, embodiment and languages

    Directory of Open Access Journals (Sweden)

    Claudia eScorolli

    2011-09-01

    Full Text Available One of the main challenges of embodied theories is accounting for meanings of abstract words. The most common explanation is that abstract words, like concrete ones, are grounded in perception and action systems. According to other explanations, abstract words, differently from concrete ones, would activate situations and introspection; alternatively, they would be represented through metaphoric mapping. However, evidence provided so far pertains to specific domains. To be able to account for abstract words in their variety we argue it is necessary to take into account not only the fact that language is grounded in the sensorimotor system, but also that language represents a linguistic-social experience. To study abstractness as a continuum we combined a concrete (C verb with both a concrete and an abstract (A noun; and an abstract verb with the same nouns previously used (grasp vs. describe a flower vs. a concept. To disambiguate between the semantic meaning and the grammatical class of the words, we focused on two syntactically different languages: German and Italian. Compatible combinations (CC, AA were processed faster than mixed ones (CA, AC. This is in line with the idea that abstract and concrete words are processed preferentially in parallel systems - abstract in the language system and concrete more in the motor system, thus costs of processing within one system are the lowest. This parallel processing takes place most probably within different anatomically predefined routes. With mixed combinations, when the concrete word preceded the abstract one (CA, participants were faster, regardless of the grammatical class and the spoken language. This is probably due to the peculiar mode of acquisition of abstract words, as they are acquired more linguistically than perceptually. Results confirm embodied theories which assign a crucial role to both perception-action and linguistic experience for abstract words.

  8. Abstraction of Drift Seepage

    Energy Technology Data Exchange (ETDEWEB)

    J.T. Birkholzer

    2004-11-01

    This model report documents the abstraction of drift seepage, conducted to provide seepage-relevant parameters and their probability distributions for use in Total System Performance Assessment for License Application (TSPA-LA). Drift seepage refers to the flow of liquid water into waste emplacement drifts. Water that seeps into drifts may contact waste packages and potentially mobilize radionuclides, and may result in advective transport of radionuclides through breached waste packages [''Risk Information to Support Prioritization of Performance Assessment Models'' (BSC 2003 [DIRS 168796], Section 3.3.2)]. The unsaturated rock layers overlying and hosting the repository form a natural barrier that reduces the amount of water entering emplacement drifts by natural subsurface processes. For example, drift seepage is limited by the capillary barrier forming at the drift crown, which decreases or even eliminates water flow from the unsaturated fractured rock into the drift. During the first few hundred years after waste emplacement, when above-boiling rock temperatures will develop as a result of heat generated by the decay of the radioactive waste, vaporization of percolation water is an additional factor limiting seepage. Estimating the effectiveness of these natural barrier capabilities and predicting the amount of seepage into drifts is an important aspect of assessing the performance of the repository. The TSPA-LA therefore includes a seepage component that calculates the amount of seepage into drifts [''Total System Performance Assessment (TSPA) Model/Analysis for the License Application'' (BSC 2004 [DIRS 168504], Section 6.3.3.1)]. The TSPA-LA calculation is performed with a probabilistic approach that accounts for the spatial and temporal variability and inherent uncertainty of seepage-relevant properties and processes. Results are used for subsequent TSPA-LA components that may handle, for example, waste package

  9. Sharing code.

    Science.gov (United States)

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  10. Analog Coding.

    Science.gov (United States)

    CODING, ANALOG SYSTEMS), INFORMATION THEORY, DATA TRANSMISSION SYSTEMS , TRANSMITTER RECEIVERS, WHITE NOISE, PROBABILITY, ERRORS, PROBABILITY DENSITY FUNCTIONS, DIFFERENTIAL EQUATIONS, SET THEORY, COMPUTER PROGRAMS

  11. The Triconnected Abstraction of Process Models

    Science.gov (United States)

    Polyvyanyy, Artem; Smirnov, Sergey; Weske, Mathias

    Companies use business process models to represent their working procedures in order to deploy services to markets, to analyze them, and to improve upon them. Competitive markets necessitate complex procedures, which lead to large process specifications with sophisticated structures. Real world process models can often incorporate hundreds of modeling constructs. While a large degree of detail complicates the comprehension of the processes, it is essential to many analysis tasks. This paper presents a technique to abstract, i.e., to simplify process models. Given a detailed model, we introduce abstraction rules which generalize process fragments in order to bring the model to a higher abstraction level. The approach is suited for the abstraction of large process specifications in order to aid model comprehension as well as decomposing problems of process model analysis. The work is based on process structure trees that have recently been introduced to the field of business process management.

  12. Generating Customized Verifiers for Automatically Generated Code

    Science.gov (United States)

    Denney, Ewen; Fischer, Bernd

    2008-01-01

    Program verification using Hoare-style techniques requires many logical annotations. We have previously developed a generic annotation inference algorithm that weaves in all annotations required to certify safety properties for automatically generated code. It uses patterns to capture generator- and property-specific code idioms and property-specific meta-program fragments to construct the annotations. The algorithm is customized by specifying the code patterns and integrating them with the meta-program fragments for annotation construction. However, this is difficult since it involves tedious and error-prone low-level term manipulations. Here, we describe an annotation schema compiler that largely automates this customization task using generative techniques. It takes a collection of high-level declarative annotation schemas tailored towards a specific code generator and safety property, and generates all customized analysis functions and glue code required for interfacing with the generic algorithm core, thus effectively creating a customized annotation inference algorithm. The compiler raises the level of abstraction and simplifies schema development and maintenance. It also takes care of some more routine aspects of formulating patterns and schemas, in particular handling of irrelevant program fragments and irrelevant variance in the program structure, which reduces the size, complexity, and number of different patterns and annotation schemas that are required. The improvements described here make it easier and faster to customize the system to a new safety property or a new generator, and we demonstrate this by customizing it to certify frame safety of space flight navigation code that was automatically generated from Simulink models by MathWorks' Real-Time Workshop.

  13. Divergence coding for convolutional codes

    Directory of Open Access Journals (Sweden)

    Valery Zolotarev

    2017-01-01

    Full Text Available In the paper we propose a new coding/decoding on the divergence principle. A new divergent multithreshold decoder (MTD for convolutional self-orthogonal codes contains two threshold elements. The second threshold element decodes the code with the code distance one greater than for the first threshold element. Errorcorrecting possibility of the new MTD modification have been higher than traditional MTD. Simulation results show that the performance of the divergent schemes allow to approach area of its effective work to channel capacity approximately on 0,5 dB. Note that we include the enough effective Viterbi decoder instead of the first threshold element, the divergence principle can reach more. Index Terms — error-correcting coding, convolutional code, decoder, multithreshold decoder, Viterbi algorithm.

  14. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...

  15. The Drosophila genes CG14593 and CG30106 code for G-protein-coupled receptors specifically activated by the neuropeptides CCHamide-1 and CCHamide-2

    DEFF Research Database (Denmark)

    Hansen, Karina K; Hauser, Frank; Williamson, Michael

    2011-01-01

    Recently, a novel neuropeptide, CCHamide, was discovered in the silkworm Bombyx mori (L. Roller et al., Insect Biochem. Mol. Biol. 38 (2008) 1147-1157). We have now found that all insects with a sequenced genome have two genes, each coding for a different CCHamide, CCHamide-1 and -2. We have also...

  16. Expression profiles of long non-coding RNAs located in autoimmune disease-associated regions reveal immune cell-type specificity

    NARCIS (Netherlands)

    Hrdlickova, Barbara; Kumar, Vinod; Kanduri, Kartiek; Zhernakova, Daria V.; Tripathi, Subhash; Karjalainen, Juha; Lund, Riikka J.; Li, Yang; Ullah, Ubaid; Modderman, Rutger; Abdulahad, Wayel; Lahdesmaki, Harri; Franke, Lude; Lahesmaa, Riitta; Wijmenga, Cisca; Withoff, Sebo

    2014-01-01

    Background: Although genome-wide association studies (GWAS) have identified hundreds of variants associated with a risk for autoimmune and immune-related disorders (AID), our understanding of the disease mechanisms is still limited. In particular, more than 90% of the risk variants lie in non-coding

  17. Coded nanoscale self-assembly

    Indian Academy of Sciences (India)

    the number of starting particles. Figure 6. Coded self-assembly results in specific shapes. When the con- stituent particles are coded to only combine in a certain defined rules, it al- ways manages to generate the same shape. The simplest case of linear coding with multiseed option is presented here. in place the resultant ...

  18. Program and abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1994-10-01

    The increasing scale-up of fast pyrolysis in North America and Europe, as well as the exploration and expansion of markets for the energy use of biocrude oils that now needs to take place, suggested that it was timely to convene an international meeting on the properties and combustion behavior of these oils. A common understanding of the state-of-the-art and technical and other challenges which need to be met during the commercialization of biocrude fuel use, can be achieved. The technical issues and understanding of combustion of these oils are rapidly being advanced through R&D in the United States, Canada, Europe and Scandinavia. It is obvious that for the maximum economic impact of biocrude, it will be necessary to have a common set of specifications so that oils can be used interchangeably with engines and combustors which require minimal modification to use these renewable fuels. Fundamental and applied studies being pursued in several countries are brought together in this workshop so that we can arrive at common strategies. In this way, both the science and the commercialization are advanced to the benefit of all, without detracting from the competitive development of both the technology and its applications. This United States-Canada-Finland collaboration has led to the two and one half day specialists meeting at which the technical basis for advances in biocrude development is discussed. The goal is to arrive at a common agenda on issues that cross national boundaries in this area. Examples of agenda items are combustion phenomena, the behavior of trace components . of the oil (N, alkali metals), the formation of NO{sub x}, in combustion, the need for common standards and environmental safety and health issues in the handling, storage and transportation of biocrudes.

  19. Multirate Filter Bank Representations of RS and BCH Codes

    Directory of Open Access Journals (Sweden)

    Van Meerbergen Geert

    2008-01-01

    Full Text Available Abstract This paper addresses the use of multirate filter banks in the context of error-correction coding. An in-depth study of these filter banks is presented, motivated by earlier results and applications based on the filter bank representation of Reed-Solomon (RS codes, such as Soft-In Soft-Out RS-decoding or RS-OFDM. The specific structure of the filter banks (critical subsampling is an important aspect in these applications. The goal of the paper is twofold. First, the filter bank representation of RS codes is now explained based on polynomial descriptions. This approach allows us to gain new insight in the correspondence between RS codes and filter banks. More specifically, it allows us to show that the inherent periodically time-varying character of a critically subsampled filter bank matches remarkably well with the cyclic properties of RS codes. Secondly, an extension of these techniques toward the more general class of BCH codes is presented. It is demonstrated that a BCH code can be decomposed into a sum of critically subsampled filter banks.

  20. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  1. Coding labour

    National Research Council Canada - National Science Library

    McCosker, Anthony; Milne, Esther

    2014-01-01

    ... software. Code encompasses the laws that regulate human affairs and the operation of capital, behavioural mores and accepted ways of acting, but it also defines the building blocks of life as DNA...

  2. Grounding abstractness: Abstract concepts and the activation of the mouth

    Directory of Open Access Journals (Sweden)

    Anna M Borghi

    2016-10-01

    Full Text Available One key issue for theories of cognition is how abstract concepts, such as freedom, are represented. According to the WAT (Words As social Tools proposal, abstract concepts activate both sensorimotor and linguistic/social information, and their acquisition modality involves the linguistic experience more than the acquisition of concrete concepts. We report an experiment in which participants were presented with abstract and concrete definitions followed by concrete and abstract target-words. When the definition and the word matched, participants were required to press a key, either with the hand or with the mouth. Response times and accuracy were recorded. As predicted, we found that abstract definitions and abstract words yielded slower responses and more errors compared to concrete definitions and concrete words. More crucially, there was an interaction between the target-words and the effector used to respond (hand, mouth. While responses with the mouth were overall slower, the advantage of the hand over the mouth responses was more marked with concrete than with abstract concepts. The results are in keeping with grounded and embodied theories of cognition and support the WAT proposal, according to which abstract concepts evoke linguistic-social information, hence activate the mouth. The mechanisms underlying the mouth activation with abstract concepts (re-enactment of acquisition experience, or re-explanation of the word meaning, possibly through inner talk are discussed. To our knowledge this is the first behavioral study demonstrating with real words that the advantage of the hand over the mouth is more marked with concrete than with abstract concepts, likely because of the activation of linguistic information with abstract concepts.

  3. Grounding Abstractness: Abstract Concepts and the Activation of the Mouth.

    Science.gov (United States)

    Borghi, Anna M; Zarcone, Edoardo

    2016-01-01

    One key issue for theories of cognition is how abstract concepts, such as freedom, are represented. According to the WAT (Words As social Tools) proposal, abstract concepts activate both sensorimotor and linguistic/social information, and their acquisition modality involves the linguistic experience more than the acquisition of concrete concepts. We report an experiment in which participants were presented with abstract and concrete definitions followed by concrete and abstract target-words. When the definition and the word matched, participants were required to press a key, either with the hand or with the mouth. Response times and accuracy were recorded. As predicted, we found that abstract definitions and abstract words yielded slower responses and more errors compared to concrete definitions and concrete words. More crucially, there was an interaction between the target-words and the effector used to respond (hand, mouth). While responses with the mouth were overall slower, the advantage of the hand over the mouth responses was more marked with concrete than with abstract concepts. The results are in keeping with grounded and embodied theories of cognition and support the WAT proposal, according to which abstract concepts evoke linguistic-social information, hence activate the mouth. The mechanisms underlying the mouth activation with abstract concepts (re-enactment of acquisition experience, or re-explanation of the word meaning, possibly through inner talk) are discussed. To our knowledge this is the first behavioral study demonstrating with real words that the advantage of the hand over the mouth is more marked with concrete than with abstract concepts, likely because of the activation of linguistic information with abstract concepts.

  4. Transcriptome profiling of chemosensory appendages in the malaria vector Anopheles gambiae reveals tissue- and sex-specific signatures of odor coding

    OpenAIRE

    Rokas Antonis; Jones Patrick L; Rinker David C; Pitts R; Zwiebel Laurence J

    2011-01-01

    Abstract Background Chemosensory signal transduction guides the behavior of many insects, including Anopheles gambiae, the major vector for human malaria in sub-Saharan Africa. To better understand the molecular basis of mosquito chemosensation we have used whole transcriptome RNA sequencing (RNA-seq) to compare transcript expression profiles between the two major chemosensory tissues, the antennae and maxillary palps, of adult female and male An. gambiae. Results We compared chemosensory tis...

  5. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  6. Abstract shape analysis of RNA.

    Science.gov (United States)

    Janssen, Stefan; Giegerich, Robert

    2014-01-01

    Abstract shape analysis abstract shape analysis is a method to learn more about the complete Boltzmann ensemble of the secondary structures of a single RNA molecule. Abstract shapes classify competing secondary structures into classes that are defined by their arrangement of helices. It allows us to compute, in addition to the structure of minimal free energy, a set of structures that represents relevant and interesting structural alternatives. Furthermore, it allows to compute probabilities of all structures within a shape class. This allows to ensure that our representative subset covers the complete Boltzmann ensemble, except for a portion of negligible probability. This chapter explains the main functions of abstract shape analysis, as implemented in the tool RNA shapes. RNA shapes It reports on some other types of analysis that are based on the abstract shapes idea and shows how you can solve novel problems by creating your own shape abstractions.

  7. Abstract Interpretation as a Programming Language

    Directory of Open Access Journals (Sweden)

    Mads Rosendahl

    2013-09-01

    Full Text Available In David Schmidt's PhD work he explored the use of denotational semantics as a programming language. It was part of an effort to not only treat formal semantics as specifications but also as interpreters and input to compiler generators. The semantics itself can be seen as a program and one may examine different programming styles and ways to represent states. Abstract interpretation is primarily a technique for derivation and specification of program analysis. As with denotational semantics we may also view abstract interpretations as programs and examine the implementation. The main focus in this paper is to show that results from higher-order strictness analysis may be used more generally as fixpoint operators for higher-order functions over lattices and thus provide a technique for immediate implementation of a large class of abstract interpretations. Furthermore, it may be seen as a programming paradigm and be used to write programs in a circular style.

  8. Recognition memory for concrete, regular abstract, and diverse abstract pictures.

    Science.gov (United States)

    Bellhouse-King, Mathew W; Standing, Lionel G

    2007-06-01

    Based on previous research by Goldstein and Chance in which poor recognition memory for abstract visual patterns was reported, this study compared recognition memory for pictures of everyday concrete objects, regular abstract stimuli as employed by Goldstein and Chance, and diverse abstract stimuli. A (3) x 2 design (stimulus type x test order) analysis of variance design was used. The subjects (N = 31) first viewed 30 target stimuli, followed by an immediate recognition test in which for 30 paired target and distractor stimuli shown they indicated which one they had seen previously. Concrete pictures were recognized with near perfect accuracy, and above the level for diverse abstract pictures; these in turn were better identified than regular abstract items, on which performance resembled that found by Goldstein and Chance. It is concluded that stimulus discriminability, rather than representational meaningfulness, may be crucial in picture recognition.

  9. SOVIET ABSTRACTS ON POWDER METALLURGY

    Science.gov (United States)

    CERMETS, * POWDER METALLURGY , ABSTRACTS, CERAMIC MATERIALS, HEAT RESISTANT ALLOYS, INDUSTRIAL PRODUCTION, MECHANICAL PROPERTIES, PIEZOELECTRIC CRYSTALS, POLARIZATION, POROUS METALS, POWDER ALLOYS, POWDER METALS, SINTERING.

  10. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  11. Abstract

    African Journals Online (AJOL)

    circles are further broken down in the zones, for convenience and effective supervision training and visit. The blocks are made up of many communities with the block extension supervisor resident and controlling all field visits in the block. The Extension Agents (EAs) are resident in the circle, and each circle consist of about ...

  12. abstract

    Directory of Open Access Journals (Sweden)

    . user

    2016-02-01

    Full Text Available Introduction: One of the microbiological preparations used for this study was Effective Microorganisms (EM, being a commercial mixture of photosynthesizing bacteria, Actinomycetes, lactic acid bacteria, yeasts and fermenting fungi. The microbiological composition of the EM concentrateincludesStreptomyces albus, Propioni bacterium freudenreichil, Streptococcus lactis, Aspergillus oryzae, Mucor hiemalis, Saccharomycescerevisiae and Candida utilis. Moreover, EM also contains an unspecified amount of Lactobacillus sp. Rhodo pseudomonas sp. and Streptomyces griseus. Effective Microorganisms have a positive effect on the decomposition of organic matter, limiting putrefaction, increasing nitrogen content in the root medium of plants, phosphorus, improving soil fertility and as a result contributing to the growth and development of the root systems of plants. Selection of almond vegetative rootstocks for water stress tolerance is important for almond crop production in arid and semi-arid regions. The study of the eco-morphological characteristics that determine the success of a rootstock in a particular environment is a powerful tool for both agricultural management and breeding purposes. The aim of this work was to select the new rootstocks for water shortage tolerance, impact of water stress as well as Effective Microorganism (EM on morphological characteristics of almond rootstocks. Materials and Methods: In order to select the new rootstocks for water shortage tolerance, impact of water stress as well as EMonmorphologicalcharacteristics of almondrootstocks were studiedin thedepartment ofHorticulture, Ferdowsi University of Mashhad, in 2011-2012. The experiment was carried out with four replications in a completely random blockdesign to study the effects of two concentrations of EM (0 and 1%, three irrigation levels (normal irrigation 100%-control-and irrigation after depletion of 33 and 66% of available water, and four almond rootstocks including GF677 and selected natural hybrid of peach × almond (H1and H2, and almond vegetative rootstock (local control.In this study,EMtreatments for 60 days before stress treatments were applied so that in each irrigation, EM solution to a concentration of one percent was given to half of the experiment pots. Other pots were irrigated equally with normal water. Stress levels were applied from July as follow: full irrigation, watering after unloading 33% and 66% soil moisture availability. In order to evaluate the performance, seedling survival, plant growth, number of leaves, leaf area, root fresh and dry weight and leaves and root length were measured. Results and Discussion: Analysis of variance showed that between rootstock levels across all treatments were significantly differences at 0.01 level of probability. Comparison of means showed that the highest fresh and dry weight and leaf are awere observed forGF677and H1.Rootstockannualgrowth rate was also different. Most of the growth was related to the H1 Rootstocks. Thes urvival ratewas significantly different from the Rootstocks ofGF677,andH1showedthe highestpercentage of survival. The degree of adaptation to drought in varieties of almonds is different. The results showed that changes ingrowthparametersinGF677and H1were observed less often than other rootstocks. Because of strong roots,GF677and H1continue to attract more minerals under stress conditions. Analysis of variance showed that the between irrigation levels for all treatments were significantly different at 0.01 level of probability. Comparison of means showed that among the study traits, the highest amount was obtained from complete irrigation, while irrigationat66 percenthad the least amount. Water stress may directly affect photosyn thesis, through leaf photochemicalprocessorindirectly,byclosing stomata, reducingleaf area and growth. The results showed that the levels of(EM on the leaf surface, leaf number, annual growth, root dry weight and volume were significantly different (p

  13. ABSTRACT

    Directory of Open Access Journals (Sweden)

    Michelle de Stefano Sabino

    2011-12-01

    Full Text Available This paper aims to describe and to analyze the integration observed in the Sintonia project with respect to the comparison of project management processes to the model of the Stage-Gate ®. The literature addresses these issues conceptually, but lack an alignment between them that is evident in practice. As a method was used single case study. The report is as if the Sintonia project, developed by PRODESP - Data Processing Company of São Paulo. The results show the integration of project management processes with the Stage-Gate model developed during the project life cycle. The formalization of the project was defined in stages in which allowed the exploitation of economies of repetition and recombination to the development of new projects. This study contributes to the technical vision in dealing with the integration of project management processes. It was concluded that this system represents an attractive way, in terms of creating economic value and technological innovation for the organization.

  14. Abstract

    African Journals Online (AJOL)

    concern include peer counselling and meetings with local community leaders or local cultural representatives. ... Dr Kyriaki Mystakidou is Associate Professor at the Department of Radiology, Areteion Hospital, University of Athens and in charge of the Pain ... and developing new strategies for treatment and prevention.

  15. ABSTRACT

    African Journals Online (AJOL)

    result of traumatic injury to the thoracic duct, the cisterna chyli, or the retroperitoneal lymphatic vessels. We report a case of a 56 year old female with thoracic spine disc prolapses with cord compression. She had chylous leakage following anterior .... or via nasogastric tube. This induces a change in the colour or the fluid ...

  16. abstract

    African Journals Online (AJOL)

    Deterioration of seed quality after harvest may occur as a result of chemical reactions brought ... It is an evidence of spoilage. ... food reserves. Early August may therefore be the best time to collect seeds for storage. Transportation ' ' '. Care should be taken in transporting seeds from the site of collection, in order to ensure.

  17. Abstract

    Indian Academy of Sciences (India)

    18

    -friendly method of preservation and has been extensively studied to extend the shelf-life of food products. For example it has also been used to protect the grain and seeds from insect infestation and microbial contamination during storage ...

  18. ABSTRACT

    African Journals Online (AJOL)

    concluded that financing of these enterprises on gender basis would not significantly improve the contribution of ruminants to farm household net income and loan repayment capacity. It was recommended, among others, that the constraints imposed by factors such as poor marketing and research systems be addressed in ...

  19. Abstracts

    National Research Council Canada - National Science Library

    2016-01-01

    ... نوع المؤسسة التي تدعموها. وتتفاقم عواقب انعدام الاستقرار الاقتصادي المُستمر بحجم الدوران الوظيفي غير الاعتيادي للقيادات المكتبية، ولذلك يتطلب هذا الدوران إمدادات...

  20. ABSTRACT

    African Journals Online (AJOL)

    farmers in Ondo Statel Nigeria and its implication for food security. A .... has fertile soils, a tropical climate, abundant land and rain, and a staple diet based on ... domestic productive labour interface by diverting women's labour to care for .... HIV/AIDS thereby limiting their access to information about the deadly disease.

  1. Abstract

    African Journals Online (AJOL)

    Maureen L Chirwa is a Senior Lecturer, University of Malawi, specialising in health management and health systems. ..... and job satisfaction. The HASI-N was inductively derived and measures the stigma experienced and enacted by nurses (Uys et al., 2009). 3. HASI-P (HIV/AIDS Stigma Instrument – People Living With.

  2. abstract

    African Journals Online (AJOL)

    development in Nigeria. Nevertheless, having attempted yo' conceptualize the ' terms cooperatives and rural development, the paper'reveals that attempts by government to mobilize cooperatives to achieve rural development have not worked out. This, the paper attributed to government involvement in cooperatives, role of ...

  3. Abstract

    DEFF Research Database (Denmark)

    Tafdrup, Oliver

    2013-01-01

    Udgivet som en del af Tidskrifts specialudgivelse om Adorno. http://tidskrift.dk/data/50/Aforismesamling.pdf......Udgivet som en del af Tidskrifts specialudgivelse om Adorno. http://tidskrift.dk/data/50/Aforismesamling.pdf...

  4. abstract

    African Journals Online (AJOL)

    variables associated with technology changes and information needs. it is important to put into perspective the roles of information, communication and institutions activities in removing constraints which impede the acceptance and continued usage of technologies. Part of the solution to the earlier mentioned constraint is ...

  5. ABSTRACT

    African Journals Online (AJOL)

    that trip generation and trip attraction can be significantly season- detenwned. ... recommendations were then made, sequel to highlighting of policy implications of .... It is recommended that bus operator should increase their fleet size yearly to take advantage of the secular rend of growing annual demand for bus travel.

  6. Abstract

    African Journals Online (AJOL)

    From 2008 she has been working as a physician at the Pain Relief and Palliative Care Unit of Areteion Hospital, Department of Athens University Medical. School. .... Organizations of Medical Sciences (CIOMS, 2002): disclosure of all relevant ... to sex, relationship to older persons, and the caregiving arrangement (Shaibu ...

  7. Abstract

    African Journals Online (AJOL)

    Dr Osondu

    2011-10-26

    Oct 26, 2011 ... average travel cost between demand locations and facilities. a) Center problems (minimax problems): ... median problem, minimum travel cost is substituted with distance and waste generation points can then be allocated ... demand distributed in space. Several GIS software packages such as ArcInfo and ...

  8. abstract

    Directory of Open Access Journals (Sweden)

    abstract abstract

    2016-07-01

    Full Text Available Introduction: Strawberry (fragaria×ananassa Duch. fruit characterized by short storage life, often estimated last less than one week even under optimum conditions at 8°C. The loss of fruit quality is often caused by gray mold (Botrytis cinerea that is the most frequent reported postharvest disease in strawberry during storage (6. In recent years, considerable attention has given to elimination of synthetic chemical and fungicides application and development of various alternative strategies for controlling fruit and vegetables diseases (2. One strategy is replacement of natural products with plant origin such as essential oil and methyl salicylate (MeSA. Essential oils are volatile, natural and complex compounds characterized by a strong odor formed by aromatic plants in form of secondary metabolites. In nature, essential similar oils that extract from lavender (Lavandula angustifolia play an important role in protection of the plants against pathogen incidence that can be replaced by synthetic fungicides (1, 4 and 14. MeSA is also a volatile natural compound synthesized from salicylic acid which has an important role in the plant defense-mechanism, as well as plant growth and development (5, 19 and 20. Therefore, the main objective of this research was to study the effects of MeSA and lavender essential oil (LEO on decay control caused by Botrytis cinerea as well as post-harvest quality indices of strawberry fruits during cold storage. Material and Methods: First, antifungal activity was studied by using a contact assay (in vitro, which produces hyphal growth inhibition. Briefly, potato dextrose agar (PDA plates were prepared using 8 cm diameter glass petri dishes and inhibitory percentage was determined. For in-vivo assessment of LEO and MeSA effects on Botrytis-caused fungal disease control, the experiment was conducted as factorial in completely randomized design (CRD with 3 replicates. The treatments were 3 concentration of LEO including 0, 500 and 1000 µl L-1 and 3 level of MeSA including 0, 0.1 and 0.2 mM. After treatment, the fruits were inoculated by Botrytis suspension and transferred to storage and quality parameters were evaluated after 7, 14 and 21 days. At each sampling time, disease incidence, weight loss, titratable acidity, pH, soluble solids content, vitamin C and antioxidant activity were measured. Results and Discussion: The results showed that both LEO and MeSA treatments had significant effects on inhibition of mycelium growth within in-vitro condition (p < 0.05. Inhibition rate of mycelium growth significantly improved by LEO and MeSA concentration increase of, (Table 1. At in-vivo assessment, diseases incidence of treated fruits with 500 µl L-1 LEO and 0.1 mM MeSA were 32% and 64% lower than untreated fruits, respectively (Fig. 1 and 2. During storage period, the percentage of infected fruits increased. In addition, LEO and MeSA treatments affected quality parameters of strawberry fruits including titratable acidity, soluble solids content, vitamin C and antioxidant activity. Treated fruits had a high content of soluble solids, vitamin C and antioxidant activity in comparison to untreated fruits (Table 3 and 4. Probably ascorbic acid decreased through fungal infection duo to cell wall break down during storage. Any factors such as essential oil and salicylate that inhibit fungal growth can help preserving vitamin C in stored products. High level of vitamin C and antioxidant activity was observed in treated fruits with 0.1 mM MeSA and 500 µl L-1 LEO. In controlling weight loss of fruits, 0.2 mM of MeSA and 500 µl L-1 of LEO had significant effects, although MeSA was more effective than LEO treatments, possibly due to elimination of respiration rates and fungi infection (Table 4. Therefore, LEO and MeSA with fungicide effects could be replaced with synthetic fungicides in controlling fungal diseases of strawberry and maintain fruits quality during storage. Conclusion: In conclusion, our results showed that LEO and MeSA treatments could be safe and used to prevent infection of strawberry during storage, although LEO was more effective than MeSA treatments. Concentration of 500 μl L-1 of LEO and 0.1 mM MeSA could control fungal infection of fruits during storage. Also, LEO and MeSA treatments can extend shelf life for over the minimum period required to transit strawberries to foreign markets and without affecting quality, adversely. However, future studies are necessary to fully understand the mechanisms by which LEO and MeSA treatments may act as a fungicide and increase their postharvest life.

  9. Abstracts

    National Research Council Canada - National Science Library

    2012-01-01

    ... المكتبات والمعلومات على المستوى العالمي. يتناول المقال ثلاث فترات: الأولى من عام 1947م إلى عام م1977، عندما عملت الإفلا عن قرب مع قسم المكتبات التابع لليونسكو (الذي...

  10. Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    forms and be delivered on different platform. (computer, mobile phone and printed document). They usually ... (Manipulative and observant). When learning about things in natural contexts, humans interact with ..... should also be geared towards developing authoring systems that will handle Simulation and Virtual Reality:.

  11. Abstracts

    National Research Council Canada - National Science Library

    2014-01-01

    ... الإنترنت كبديل، الذي يُقدم طرق أرخص وأسرع وأسهل كي تقوم المكتبات بالدعاية لأفضل مُقتنياتها، ولكن ما دور هذه المُجلدات وما مدى نجاحها في أن تكون محتوياتها مؤشرًّا...

  12. ABSTRACT

    African Journals Online (AJOL)

    Dr Obe

    The function of the frame system in a structure is to carry loads (dead, imposed and wind) acting on the structure. The frames ... structure's subsequent behaviour on the sub-base (soil) which is elastic in nature (5) has more to be desired: The paper investigates the ..... Building and Architecture Publisher,. Warsaw, 1996 ...

  13. Abstract

    African Journals Online (AJOL)

    The advances in electronic technology have created opportunities for new ... the necessary knowledge (both practical) on people to enable them survive in a ... Implementing this collaborative e-learning environment on a Linux thin-client ...

  14. Abstract

    African Journals Online (AJOL)

    ­E¢b

    (emotional stability and independence). So, the reviewed literature showed both the prevalence and the non-prevalence of gender differences on entrepreneurship. Methodology. Sampling: This study focused on privately owned pharmaceutical retail outlets that are found in Addis Ababa. According to. Ministry of Health ...

  15. ABSTRACT

    African Journals Online (AJOL)

    BSN

    pods and closed. It has been claimed that milk pn .. :.erved for 1-3 days maintains its original texture. taste and odour. Cowpca is an indigenous crop of Africa where it is eaten as processed dry grain. green pods. and tender green leaves. Co" pea grain has high protein content up to 24 percent. It is a seasonal plant with ...

  16. ABSTRACT

    Indian Academy of Sciences (India)

    During the last three decades or so research on rock art in several parts of the world has assumed great proportions. The study has progressed from the stage of discovery of rock shelters, identification of animals depicted in, animal distribution pattern during the periods of depiction and their extensions in the past ...

  17. ABSTRACT

    African Journals Online (AJOL)

    found that employment and education were the major reasons for rural- urban migration. It was also found that the migration affected various agricultural activities seriously. The study found that with the absence of youths in the area, agriculture labour force is continually costly and this has a negative effect on agricultural ...

  18. Abstracts

    National Research Council Canada - National Science Library

    2017-01-01

    ...، ويستكشف مُتطلبات النساء في هذه المناطق من المعلومات المُتعلقة بالصحة الإنجابية، إن أكثر من800 امرأة تموت كل يوم لأسباب مُتعلقة بالحمل، 99% منهم في الدول النامية، كان...

  19. Abstracts

    National Research Council Canada - National Science Library

    2013-01-01

    ...قتطفات وأد وثيقة الحق في المعلومات في بتسوانا:ًّ Emmanuel Kopang Botlhale Kaelo Molefhe العدد 39 (2013) من مجلة الإفلا المُتخصصة، رقم 3، ص.:204–213 تُناقش هذه...

  20. Abstract

    African Journals Online (AJOL)

    Getachew

    revenue management in the airline industry. The first overbooking model proposed by. Beckmann was a single leg single fare-class problem, which is a very simplified form of the actual overbooking problem that airline faces. His model tries to determine the optimal overbooking level by balancing the spoilage cost (lost ...

  1. Abstract

    African Journals Online (AJOL)

    dell

    work substituting the classroom teacher, students will practice for 8 weeks like that of practicum III. 1.6. Practicum V (Research. Project) (Prac 302) [3 cr. hrs]. This is the last phase of the practicum courses. During this course the student teacher finalizes his or her action research that was started during practicum two. Hence.

  2. Abstract

    Directory of Open Access Journals (Sweden)

    Maria Jose Carvalho de Souza Domingues

    2003-01-01

    Full Text Available The practice of teaching, in actuality, shows the necessity of teachers and students coming together to form a behavior that is different from the traditional model of teaching. The unity formed from various types of knowledge and the relation between theory and practice show themselves to be fundamental. Starting in 2002, and in search of this unity, a project that hoped to unify the disciplines taught in the second semester of the course in Administration was implemented. During the semester, a single work sought to relate the theories studied with the reality of an organization. Each professor evaluated the works from the point of view of his discipline, as well as the presentation, in general, of the group. It can be affirmed that seeking to bring together various types of knowledge necessarily passes to a rethinking of the postures of teachers and students.

  3. Abstracts

    OpenAIRE

    2017-01-01

    Antoine Gaudin. “Fantastique” as a principle of composing: a question of narrative poetics The main goal of this paper is to state precisely the notion of “Fantastique” (as to call Horror Movies) in the theorical sphere, in order to build up a definition of the genre within the field of fiction arts. As an aesthetical category, Fantastique mainly consists in narrative poetics. This paper suggests a definition of the genre as a principle of composing. Keywords: horror movie, genre, narration, ...

  4. Abstract

    African Journals Online (AJOL)

    ATTAMAH C. O

    Climate change has been a major natural challenge facing entrepreneurship in agriculture especially livestock production (Anyadike, 2009), mainly arising from its impact on grassland and productivity. Heat stress suffered by animals will reduce the rate of animal feed intake and result in poor growth performance ...

  5. Abstracts

    National Research Council Canada - National Science Library

    2015-01-01

    ... Pearlstein العدد رقم 41،1 من مجلة الإفلا المُتخصصة: 5-12 لقد أعاقت الشبكات التي تُتيح قواعد بيانات النصوص الكاملة، عملية البحث في المكتبات الأكاديمية والمُشتركة، وقد...

  6. Abstracts

    National Research Council Canada - National Science Library

    2013-01-01

    ...–120 يُلقي هذا المقال نظرة شاملة على مشهد تطور المكتبات في سنغافورة. فقد لعبت مكتبة سنغافورة الوطنية وجامعة سنغافورة الوطنية دورًّا هامًّا في تأسيس المكتبات في هذه...

  7. Abstracts

    National Research Council Canada - National Science Library

    2015-01-01

    ... نقدية بأفكار مُستقبلية: Loriene Roy العدد رقم 41،3 من مجلة الإفلا المُتخصصة: تعرض هذه المُراجعة النقدية خبرات حفظ التراث الثقافي الخاص بالشعوب الأصلية في المكتبات...

  8. Abstracts

    National Research Council Canada - National Science Library

    2016-01-01

    ... مجلة الإفلا: المُلخص: تعمل الإدارة الوطنية لدراسة المحيطات والغلاف الجوي (NOAA) والمُنظمة الأوروبية لاستغلال السواتل المُخصصة للأرصاد الجوية (EUMETSAT) في ثلاثة...

  9. Abstract

    Indian Academy of Sciences (India)

    2017-03-10

    Mar 10, 2017 ... Genomic DNA from whole blood was extracted from peripheral blood leukocytes samples taken from patients and controls by standard methods (Gustincich et al. 1991). The rs6457617 and rs13192471 were genotyped with a TaqMan 5' allelic discrimination assay on an Applied Biosystems StepOne™ ...

  10. Abstract

    African Journals Online (AJOL)

    the Hyper Text Markup Language (HTML). This portal enabled the users of the collaborative e-learning environment to have access to the needed tools. 1 6.0 Implementation, Methodology and Updates. After 2X ThinClientOS has booted from the client's hard disk, it obtains the IP address of 2X ThinClientServer from the.

  11. Abstracts

    National Research Council Canada - National Science Library

    2013-01-01

    ... الورقة البحثية كون الحق في المعلومة أحد حقوق الإنسان الأساسية مُتبنية في ذلك منهجًّا قائمًّا على الحقوق. لذا؛ فالحكومات مُلزَمة بإتاحة المعلومات للمواطنين والتوقيع...

  12. Abstract

    African Journals Online (AJOL)

    unique firstlady

    The study hypothesized that the withdrawal of subsidy or increase in the price of Premium motor spirit (P.M.S) ... many substances mainly carbon and hydrogen usually referred to as hydrocarbon. Crude oil often called ... petrol in Nigeria, is used in sparking ignition engines, to dive pleasure cars and transport vehicles.

  13. ABSTRACT

    African Journals Online (AJOL)

    De DARWIN au géographe allemand RATZEL en passant par le zoologiste HEACKEL fondateur de l'Ecologie, il y ... Cette mondialisation qui a débuté au cours des années 80 se distingue par une activité accrue des ... d'origine allemande a même fondé en 1954 la "société par l'étude du système général". Il entendait par ...

  14. ABSTRACT

    African Journals Online (AJOL)

    According to Tindall (1989) the commercial production of vegetables is ... Growing vegetables is an old art in the West African sub region. Joy (1980) .... H. 111 в в. В в в о. 0н m. □^^^^^^^^^. □ щщщв. ^и^ш. □. □. ^^^п. N. (0. «л с га. § 2 £ ф. CL. 4-. (0. Ф га E £ 2. (А je. N га о>. О) со ф о». О. S ф r> со «s ^. E *. □о. O. Ф.

  15. Abstract

    African Journals Online (AJOL)

    UDS-CAPTURED

    difficult financial terrain in rural settings characterized by high covariant risks, missing markets for ... mining sector. This created the need to seek alternatives for the largely rural, non-business public who are also largely rural people, who were unbanked and outside of the commercial/investment banking system.

  16. NSF-RANN trace contaminants abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Copenhaver, E.D.; Harnden, D.S. (eds.)

    1976-10-01

    Specific areas of interest of the Environmental Aspects of Trace Contaminants Program are organic chemicals of commerce, metals and organometallic compounds, air-borne contaminants, and environmental assay methodology. Fifty-three abstracts of literature on trace contaminants are presented. Author, keyword, and permuted title indexes are included. (HLW)

  17. Managed data: modular strategies for data abstraction

    NARCIS (Netherlands)

    A. Loh; T. van der Storm (Tijs); W.R. Cook

    2012-01-01

    htmlabstractManaged Data is a two-level approach to data abstraction in which programmers first define data description and manipulation mechanisms, and then use these mechanisms to define specific kinds of data. Managed Data allows programmers to take control of many important aspects of data,

  18. Managed Data: Modular Strategies for Data Abstraction

    NARCIS (Netherlands)

    A. Loh; T. van der Storm (Tijs); W.R. Cook

    2012-01-01

    htmlabstractManaged Data is a two-level approach to data abstraction in which programmers first define data description and manipulation mechanisms, and then use these mechanisms to define specific kinds of data. Managed Data allows programmers to take control of many important aspects of data,

  19. Converting One Type-Based Abstract Domain to Another

    DEFF Research Database (Denmark)

    Gallagher, John Patrick; Puebla, German; Albert, Elvira

    2006-01-01

    The specific problem that motivates this paper is how to obtain abstract descriptions of the meanings of imported predicates (such as built-ins) that can be used when analysing a module of a logic program with respect to some abstract domain. We assume that abstract descriptions of the imported...

  20. Women in HIV conference research: trends and content analysis of abstracts presented at 17 HIV/AIDS conferences from 2003 to 2010.

    Science.gov (United States)

    Lunny, Carole; Shearer, Brenna D; Cruikshank, James; Thomas, Kim; Smith, Ashley

    2011-01-01

    HIV/AIDS conferences provide an opportunity to review current research from around the world. Conferences are a good gauge of the amount of research conducted on HIV/AIDS and women because papers are disseminated widely and publicly, and can represent published or unpublished material. The objective of this study was to conduct content analysis and data coding to quantify trends in women-specific research in HIV/AIDS abstracts at the International AIDS Conferences (AIDS), the Canadian Association for HIV Research (CAHR) Conferences, and the Conferences on Retroviruses and Opportunistic Infections (CROI) over a 7-year time period. Abstracts titles and text containing female keywords were retrieved from the AIDS, CAHR, and CROI conferences between 2003 and 2009 and coded according to research category using content analysis. Over 34,000 abstracts were searched. A total of 5,221 abstracts related to women (13.7%) were found over 7 years. Women-specific abstracts represented 16.2% (n = 4,245/26,175) at AIDS, 13.7% (n = 257/1,876) at CAHR, and 11.1% (n = 719/6,370) at CROI. The AIDS and CAHR conferences demonstrated a slightly increasing trend in women-specific abstracts over 7 years. In categorical coding, the most prevalent research category was reproductive health, and the most infrequent was policy and program evaluation. The AIDS conferences showed an increase in women-specific abstracts over time, probably owing to a gender policy implemented in 2008 and a women's research award. The CAHR conference instituted a gender policy in 2011, and the CROI conference should follow suit. Conference abstracts should include breakdown and analysis by gender. Copyright © 2011 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  1. Domain Specific Language Support for Exascale

    Energy Technology Data Exchange (ETDEWEB)

    Sadayappan, Ponnuswamy [The Ohio State Univ., Columbus, OH (United States)

    2017-02-24

    Domain-Specific Languages (DSLs) offer an attractive path to Exascale software since they provide expressive power through appropriate abstractions and enable domain-specific optimizations. But the advantages of a DSL compete with the difficulties of implementing a DSL, even for a narrowly defined domain. The DTEC project addresses how a variety of DSLs can be easily implemented to leverage existing compiler analysis and transformation capabilities within the ROSE open source compiler as part of a research program focusing on Exascale challenges. The OSU contributions to the DTEC project are in the area of code generation from high-level DSL descriptions, as well as verification of the automatically-generated code.

  2. Abstract models of transfinite reductions

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2010-01-01

    We investigate transfinite reductions in abstract reduction systems. To this end, we study two abstract models for transfinite reductions: a metric model generalising the usual metric approach to infinitary term rewriting and a novel partial order model. For both models we distinguish between a w...

  3. Abstract concepts in grounded cognition

    NARCIS (Netherlands)

    Lakens, D.|info:eu-repo/dai/nl/298811855

    2010-01-01

    When people think about highly abstract concepts, they draw upon concrete experiences to structure their thoughts. For example, black knights in fairytales are evil, and knights in shining armor are good. The sensory experiences black and white are used to represent the abstract concepts of good and

  4. Technical abstracts: Mechanical engineering, 1990

    Energy Technology Data Exchange (ETDEWEB)

    Broesius, J.Y. (comp.)

    1991-03-01

    This document is a compilation of the published, unclassified abstracts produced by mechanical engineers at Lawrence Livermore National Laboratory (LLNL) during the calendar year 1990. Many abstracts summarize work completed and published in report form. These are UCRL-JC series documents, which include the full text of articles to be published in journals and of papers to be presented at meetings, and UCID reports, which are informal documents. Not all UCIDs contain abstracts: short summaries were generated when abstracts were not included. Technical Abstracts also provides descriptions of those documents assigned to the UCRL-MI (miscellaneous) category. These are generally viewgraphs or photographs presented at meetings. An author index is provided at the back of this volume for cross referencing.

  5. Metaphor: bridging embodiment to abstraction

    Science.gov (United States)

    Jamrozik, Anja; McQuire, Marguerite; Cardillo, Eileen R.; Chatterjee, Anjan

    2016-01-01

    Embodied cognition accounts posit that concepts are grounded in our sensory and motor systems. An important challenge for these accounts is explaining how abstract concepts, which do not directly call upon sensory or motor information, can be informed by experience. We propose that metaphor is one important vehicle guiding the development and use of abstract concepts. Metaphors allow us to draw on concrete, familiar domains to acquire and reason about abstract concepts. Additionally, repeated metaphoric use drawing on particular aspects of concrete experience can result in the development of new abstract representations. These abstractions, which are derived from embodied experience but lack much of the sensorimotor information associated with it, can then be flexibly applied to understand new situations. PMID:27294425

  6. The Mystery Behind the Code: Differentiated Instruction with Quick Response Codes in Secondary Physical Education

    Science.gov (United States)

    Adkins, Megan; Wajciechowski, Misti R.; Scantling, Ed

    2013-01-01

    Quick response codes, better known as QR codes, are small barcodes scanned to receive information about a specific topic. This article explains QR code technology and the utility of QR codes in the delivery of physical education instruction. Consideration is given to how QR codes can be used to accommodate learners of varying ability levels as…

  7. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  8. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  9. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621. Keywords.

  10. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  11. Argument structure and the representation of abstract semantics.

    Science.gov (United States)

    Rodríguez-Ferreiro, Javier; Andreu, Llorenç; Sanz-Torrent, Mònica

    2014-01-01

    According to the dual coding theory, differences in the ease of retrieval between concrete and abstract words are related to the exclusive dependence of abstract semantics on linguistic information. Argument structure can be considered a measure of the complexity of the linguistic contexts that accompany a verb. If the retrieval of abstract verbs relies more on the linguistic codes they are associated to, we could expect a larger effect of argument structure for the processing of abstract verbs. In this study, sets of length- and frequency-matched verbs including 40 intransitive verbs, 40 transitive verbs taking simple complements, and 40 transitive verbs taking sentential complements were presented in separate lexical and grammatical decision tasks. Half of the verbs were concrete and half were abstract. Similar results were obtained in the two tasks, with significant effects of imageability and transitivity. However, the interaction between these two variables was not significant. These results conflict with hypotheses assuming a stronger reliance of abstract semantics on linguistic codes. In contrast, our data are in line with theories that link the ease of retrieval with availability and robustness of semantic information.

  12. Argument structure and the representation of abstract semantics.

    Directory of Open Access Journals (Sweden)

    Javier Rodríguez-Ferreiro

    Full Text Available According to the dual coding theory, differences in the ease of retrieval between concrete and abstract words are related to the exclusive dependence of abstract semantics on linguistic information. Argument structure can be considered a measure of the complexity of the linguistic contexts that accompany a verb. If the retrieval of abstract verbs relies more on the linguistic codes they are associated to, we could expect a larger effect of argument structure for the processing of abstract verbs. In this study, sets of length- and frequency-matched verbs including 40 intransitive verbs, 40 transitive verbs taking simple complements, and 40 transitive verbs taking sentential complements were presented in separate lexical and grammatical decision tasks. Half of the verbs were concrete and half were abstract. Similar results were obtained in the two tasks, with significant effects of imageability and transitivity. However, the interaction between these two variables was not significant. These results conflict with hypotheses assuming a stronger reliance of abstract semantics on linguistic codes. In contrast, our data are in line with theories that link the ease of retrieval with availability and robustness of semantic information.

  13. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  14. Biocards and Level of Abstraction

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Keshwani, Sonal; Chakrabarti, Amaresh

    2015-01-01

    Biocards are formal descriptions of biological phenomena and their underlying functional principles. They are used in bioinspired design to document search results and to communicate the findings for use in the further design process. The present study explored the effect of abstraction level used...... with concrete descriptions. The novelty of found solutions was evaluated by the students by rating novelty of each solution on a scale from 1 to 5. Mean values for abstract descriptions were 0,3 higher than for concrete descriptions indicating that more innovative solutions were found when students used...... biocards with abstract descriptions compared to concrete descriptions. The difference in mean value is significant with a confidence level better than 1%. It seems likely that more abstract descriptions in biocards helps avoiding design fixation in biomimetic design work....

  15. An ERP study of recognition memory for concrete and abstract pictures in school-aged children

    OpenAIRE

    Boucher, Olivier; Chouinard-Leclaire, Christine; Muckle, Gina; Westerlund, Alissa; Burden, Matthew J.; Jacobson, Sandra W.; Jacobson, Joseph L.

    2016-01-01

    Recognition memory for concrete, nameable pictures is typically faster and more accurate than for abstract pictures. A dual-coding account for these findings suggests that concrete pictures are processed into verbal and image codes, whereas abstract pictures are encoded in image codes only. Recognition memory relies on two successive and distinct processes, namely familiarity and recollection. Whether these two processes are similarly or differently affected by stimulus concreteness remains u...

  16. Polar Codes

    Science.gov (United States)

    2014-12-01

    added by the decoder is K/ρ+Td. By the last assumption, Td and Te are both ≤ K/ρ, so the total latency added is between 2K/ρ and 4K /ρ. For example...better resolution near the decision point. Reference [12] showed that in decoding a (1024, 512) polar code, using 6-bit LLRs resulted in per- formance

  17. Spatial language and abstract concepts.

    Science.gov (United States)

    Casasanto, Daniel; Bottini, Roberto

    2014-03-01

    What is the relationship between spatial language and abstract concepts? When people talk about abstract things that they can never see or touch, they often use spatial metaphors (e.g., a long vacation, a high price, a close friendship). According to theories of metaphorical mental representation, linguistic metaphors reflect underlying mental metaphors. Yet, behavioral experiments show that this is only one of the possible relationships between spatial metaphors in language and our spatial conceptualizations of abstract domains. In some cases, linguistic metaphors not only reflect speakers' thoughts, they also change those thoughts, such that people who use different linguistic metaphors rely on correspondingly different mental metaphors. Alternatively, spatial metaphors in language may reflect the way people conceptualize an abstract domain in some circumstances, but not in others. Finally, spatial language may reflect the way an abstract domain is typically conceptualized by some people, but not by others. There is no single relationship between spatial language and abstract concepts. Discovering whether (and under what conditions) a linguistic metaphor corresponds to a mental metaphor can illuminate the ways in which our interactions with the physical and social environment shape our mental lives. WIREs Cogn Sci 2014, 5:139-149. doi: 10.1002/wcs.1271 CONFLICT OF INTEREST: The authors have declared no conflicts of interest for this article. For further resources related to this article, please visit the WIREs website. © 2013 John Wiley & Sons, Ltd.

  18. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  19. A Novel Y-Specific Long Non-Coding RNA Associated with Cellular Lipid Accumulation in HepG2 cells and Atherosclerosis-related Genes.

    Science.gov (United States)

    Molina, Elsa; Chew, Guat S; Myers, Stephen A; Clarence, Elyse M; Eales, James M; Tomaszewski, Maciej; Charchar, Fadi J

    2017-12-01

    There is an increasing appreciation for the role of the human Y chromosome in phenotypic differences between the sexes in health and disease. Previous studies have shown that genetic variation within the Y chromosome is associated with cholesterol levels, which is an established risk factor for atherosclerosis, the underlying cause of coronary artery disease (CAD), a major cause of morbidity and mortality worldwide. However, the exact mechanism and potential genes implicated are still unidentified. To date, Y chromosome-linked long non-coding RNAs (lncRNAs) are poorly characterized and the potential link between these new regulatory RNA molecules and hepatic function in men has not been investigated. Advanced technologies of lncRNA subcellular localization and silencing were used to identify a novel intergenic Y-linked lncRNA, named lnc-KDM5D-4, and investigate its role in fatty liver-associated atherosclerosis. We found that lnc-KDM5D-4 is retained within the nucleus in hepatocytes. Its knockdown leads to changes in genes leading to increased lipid droplets formation in hepatocytes resulting in a downstream effect contributing to the chronic inflammatory process that underpin CAD. Our findings provide the first evidence for the implication of lnc-KDM5D-4 in key processes related to fatty liver and cellular inflammation associated with atherosclerosis and CAD in men.

  20. FCG: a code generator for lazy functional languages

    NARCIS (Netherlands)

    Kastens, U.; Langendoen, K.G.; Hartel, Pieter H.; Pfahler, P.

    1992-01-01

    The FCGcode generator produces portable code that supports efficient two-space copying garbage collection. The code generator transforms the output of the FAST compiler front end into an abstract machine code. This code explicitly uses a call stack, which is accessible to the garbage collector. In

  1. Indices for Testing Neural Codes

    OpenAIRE

    Jonathan D. Victor; Nirenberg, Sheila

    2008-01-01

    One of the most critical challenges in systems neuroscience is determining the neural code. A principled framework for addressing this can be found in information theory. With this approach, one can determine whether a proposed code can account for the stimulus-response relationship. Specifically, one can compare the transmitted information between the stimulus and the hypothesized neural code with the transmitted information between the stimulus and the behavioral response. If the former is ...

  2. 'Localimania' revisited: guidelines for the formation of specific epithets for names of prokaryotes based on names of institutions or their acronyms. A proposal for emendation of Appendix 9 to the International Code of Nomenclature of Prokaryotes.

    Science.gov (United States)

    Oren, Aharon; Garrity, George M; Schink, Bernhard; Ventura, Stefano

    2017-05-01

    We here present a survey of the increasing use of the -ensis (-ense) ending for the formation of specific epithets that do not refer to geographical locations but to names of research institutes or their acronyms. To our opinion the use of the -ensis (-ense) ending must be discouraged for such purposes, the formation of nouns in the genitive case being preferred for the formation of such arbitrary epithets. Emendation of Appendix 9 - Orthography to the International Code of Nomenclature of Prokaryotes is proposed with guidelines for the formation of such names.

  3. Potential value of color-coded dynamic breast-specific gamma-imaging; comparing {sup 99m}Tc-(V)-DMSA, {sup 99m}Tc-MIBI, and {sup 99m}Tc-HDP in a mouse mammary tumor model

    Energy Technology Data Exchange (ETDEWEB)

    Leeuwen, Fijs W.B. van, E-mail: fw.v.leeuwen@nki.n [Departments of Radiology and Nuclear Medicine, Netherlands Cancer Institute, Antoni van Leeuwenhoek Hospital, 1066 CX Amsterdam (Netherlands); Buckle, Tessa; Batteau, Lukas; Pool, Bert; Sinaasappel, Michiel [Departments of Radiology and Nuclear Medicine, Netherlands Cancer Institute, Antoni van Leeuwenhoek Hospital, 1066 CX Amsterdam (Netherlands); Jonkers, Jos [Department of Molecular Biology, Netherlands Cancer Institute, Antoni van Leeuwenhoek Hospital, 1066 CX Amsterdam (Netherlands); Gilhuijs, Kenneth G.A. [Departments of Radiology and Nuclear Medicine, Netherlands Cancer Institute, Antoni van Leeuwenhoek Hospital, 1066 CX Amsterdam (Netherlands)

    2010-12-15

    Using a mouse mammary tumor model based on orthotopic transplantation of luciferase-expressing mouse ILC cells (KEP1-Luc cells), we evaluated the diagnostic value of three clinically applied tracers: {sup 99m}Tc-(V)-DMSA, {sup 99m}Tc-MIBI, and {sup 99m}Tc-HDP. Uptake of the tracers is compared using static and dynamic imaging procedures. We found that dynamic imaging in combination with pixel-by-pixel color coding has an added value over (high resolution) static imaging procedures. Such dynamic imaging procedures could enhance the potential of breast-specific gamma-imaging.

  4. Serkalem Eshetie Adinew Abstract This article explores the ...

    African Journals Online (AJOL)

    LAW: LEGAL ANALYSIS. Serkalem Eshetie Adinew. *. Abstract. This article explores the Commercial Code and other laws of Ethiopia regarding founders – who they are, liabilities and benefits - who are also called 'promoters' by many other company laws. To some extent, it also looks into the business practice based on ...

  5. Transcriptome profiling of chemosensory appendages in the malaria vector Anopheles gambiae reveals tissue- and sex-specific signatures of odor coding

    Directory of Open Access Journals (Sweden)

    Rokas Antonis

    2011-05-01

    Full Text Available Abstract Background Chemosensory signal transduction guides the behavior of many insects, including Anopheles gambiae, the major vector for human malaria in sub-Saharan Africa. To better understand the molecular basis of mosquito chemosensation we have used whole transcriptome RNA sequencing (RNA-seq to compare transcript expression profiles between the two major chemosensory tissues, the antennae and maxillary palps, of adult female and male An. gambiae. Results We compared chemosensory tissue transcriptomes to whole body transcriptomes of each sex to identify chemosensory enhanced genes. In the six data sets analyzed, we detected expression of nearly all known chemosensory genes and found them to be highly enriched in both olfactory tissues of males and females. While the maxillary palps of both sexes demonstrated strict chemosensory gene expression overlap, we observed acute differences in sensory specialization between male and female antennae. The relatively high expression levels of chemosensory genes in the female antennae reveal its role as an organ predominately assigned to chemosensation. Remarkably, the expression of these genes was highly conserved in the male antennae, but at much lower relative levels. Alternatively, consistent with a role in mating, the male antennae displayed significant enhancement of genes involved in audition, while the female enhancement of these genes was observed, but to a lesser degree. Conclusions These findings suggest that the chemoreceptive spectrum, as defined by gene expression profiles, is largely similar in female and male An. gambiae. However, assuming sensory receptor expression levels are correlated with sensitivity in each case, we posit that male and female antennae are perceptive to the same stimuli, but possess inverse receptive prioritizations and sensitivities. Here we have demonstrated the use of RNA-seq to characterize the sensory specializations of an important disease vector and

  6. Code lists for interoperability - Principles and best practices in INSPIRE

    Science.gov (United States)

    Lutz, M.; Portele, C.; Cox, S.; Murray, K.

    2012-04-01

    external vocabulary. In the former case, for each value, an external identifier, one or more labels (possibly in different languages), a definition and other metadata should be specified. In the latter case, the external vocabulary should be characterised, e.g. by specifying the version to be used, the format(s) in which the vocabulary is available, possible constraints (e.g. if only as specific part of the external list is to be used), rules for using values in the encoding of instance data, and the maintenance rules applied to the external vocabulary. This information is crucial for enabling implementation and interoperability in distributed systems (such as SDIs) and should be made available through a code list registry. While thus the information on allowed code list values is usually managed outside the UML application schema, we recommend inclusion of «codeList»-stereotyped classes in the model for semantic clarity. Information on the obligation, extensibility and a reference to the specified values should be provided through tagged values. Acknowledgements: The authors would like to thank the INSPIRE Thematic Working Groups, the Data Specifications Drafting Team and the JRC Contact Points for their contributions to the discussions on code lists in INSPIRE and to this abstract.

  7. Model Checking, Abstraction, and Compositional Verification

    Science.gov (United States)

    1993-07-01

    a mathematical model of the design is proved to satisfy a precise specification. Model checking is one formal verification technique. It consists of...involving the sequencing of events in time. One of the main drawbacks of model checking is the state explosion problem. This problem occurs in systems...considers two methods for avoiding the state explosion problem in the context of model checking : compositional verification and abstraction

  8. Intern Abstract for Spring 2016

    Science.gov (United States)

    Gibson, William

    2016-01-01

    The Human Interface Branch - EV3 - is evaluating Organic lighting-emitting diodes (OLEDs) as an upgrade for current displays on future spacecraft. OLEDs have many advantages over current displays. Conventional displays require constant backlighting which draws a lot of power, but with OLEDs they generate light themselves. OLEDs are lighter, and weight is always a concern with space launches. OLEDs also grant greater viewing angles. OLEDs have been in the commercial market for almost ten years now. What is not known is how they will perform in a space-like environment; specifically deep space far away from the Earth's magnetosphere. In this environment, the OLEDs can be expected to experience vacuum and galactic radiation. The intern's responsibility has been to prepare the OLED for a battery of tests. Unfortunately, it will not be ready for testing at the end of the internship. That being said much progress has been made: a) Developed procedures to safely disassemble the tablet. b) Inventoried and identified critical electronic components. c) 3D printed a testing apparatus. d) Wrote software in Python that will test the OLED screen while being radiated. e) Built circuits to restart the tablet and the test pattern, and ensure it doesn't fall asleep during radiation testing. f) Built enclosure that will house all of the electronics Also, the intern has been working on a way to take messages from a simulated Caution and Warnings system, process said messages into packets, send audio packets to a multicast address that audio boxes are listening to, and output spoken audio. Currently, Cautions and Warnings use a tone to alert crew members of a situation, and then crew members have to read through their checklists to determine what the tone means. In urgent situations, EV3 wants to deliver concise and specific alerts to the crew to facilitate any mitigation efforts on their part. Significant progress was made on this project: a) Open channel with the simulated Caution

  9. Structured LDPC Codes over Integer Residue Rings

    Directory of Open Access Journals (Sweden)

    Mo Elisa

    2008-01-01

    Full Text Available Abstract This paper presents a new class of low-density parity-check (LDPC codes over represented by regular, structured Tanner graphs. These graphs are constructed using Latin squares defined over a multiplicative group of a Galois ring, rather than a finite field. Our approach yields codes for a wide range of code rates and more importantly, codes whose minimum pseudocodeword weights equal their minimum Hamming distances. Simulation studies show that these structured codes, when transmitted using matched signal sets over an additive-white-Gaussian-noise channel, can outperform their random counterparts of similar length and rate.

  10. Mechanical Engineering Department technical abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1984-07-01

    The Mechanical Engineering Department publishes abstracts twice a year to inform readers of the broad range of technical activities in the Department, and to promote an exchange of ideas. Details of the work covered by an abstract may be obtained by contacting the author(s). General information about the current role and activities of each of the Department's seven divisions precedes the technical abstracts. Further information about a division's work may be obtained from the division leader, whose name is given at the end of each divisional summary. The Department's seven divisions are as follows: Nuclear Test Engineering Division, Nuclear Explosives Engineering Division, Weapons Engineering Division, Energy Systems Engineering Division, Engineering Sciences Division, Magnetic Fusion Engineering Division and Materials Fabrication Division.

  11. Elements of abstract harmonic analysis

    CERN Document Server

    Bachman, George

    2013-01-01

    Elements of Abstract Harmonic Analysis provides an introduction to the fundamental concepts and basic theorems of abstract harmonic analysis. In order to give a reasonably complete and self-contained introduction to the subject, most of the proofs have been presented in great detail thereby making the development understandable to a very wide audience. Exercises have been supplied at the end of each chapter. Some of these are meant to extend the theory slightly while others should serve to test the reader's understanding of the material presented. The first chapter and part of the second give

  12. Abstracts from Rambam Research Day

    Directory of Open Access Journals (Sweden)

    Shraga Blazer

    2015-01-01

    Full Text Available [Extract] This Supplement of Rambam Maimonides Medical Journal presents the abstracts from the Eleventh Rambam Research Day. These abstracts represent the newest basic and clinical research coming out of Rambam Health Care Campus—research that is the oxygen for education and development of today’s generation of physicians. Hence, the research presented on Rambam Research Day is a foundation for future generations to understand patient needs and improve treatment modalities. Bringing research from the bench to the bedside and from the bedside to the community is at the heart of Maimonides’ scholarly and ethical legacy.

  13. Static Analysis Using Abstract Interpretation

    Science.gov (United States)

    Arthaud, Maxime

    2017-01-01

    Short presentation about static analysis and most particularly abstract interpretation. It starts with a brief explanation on why static analysis is used at NASA. Then, it describes the IKOS (Inference Kernel for Open Static Analyzers) tool chain. Results on NASA projects are shown. Several well known algorithms from the static analysis literature are then explained (such as pointer analyses, memory analyses, weak relational abstract domains, function summarization, etc.). It ends with interesting problems we encountered (such as C++ analysis with exception handling, or the detection of integer overflow).

  14. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble...... of concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  15. Functional characterization of the ABCG2 5' non-coding exon variants: Stem cell specificity, translation efficiency and the influence of drug selection.

    Science.gov (United States)

    Sándor, Sára; Jordanidisz, Theodora; Schamberger, Anita; Várady, György; Erdei, Zsuzsa; Apáti, Ágota; Sarkadi, Balázs; Orbán, Tamás I

    2016-07-01

    ABCG2 is a multidrug transporter with wide substrate specificity, and is believed to protect several cell types from various xenobiotics and endobiotics. This "guardian" function is important in numerous cell types and tissue barriers but becomes disadvantageous by being responsible for the multidrug resistance phenotype in certain tumor cells. ABCG2 regulation at the protein level has already been extensively studied, however, regulation at the mRNA level, especially the functional role of the various 5' untranslated exon variants (5' UTRs) has been elusive. In the present work, we describe a comprehensive characterization of four ABCG2 mRNA variants with different exon 1 sequences, investigate drug inducibility, stem cell specificity, mRNA stability, and translation efficiency. Although certain variants (E1B and E1C) are considered as "constitutive" mRNA isoforms, we show that chemotoxic drugs significantly alter the expression pattern of distinct ABCG2 mRNA isoforms. When examining human embryonic stem cell lines, we provide evidence that variant E1A has an expression pattern coupled to undifferentiated stem cell stage, as its transcript level is regulated parallel to mRNAs of Oct4 and Nanog pluripotency marker genes. When characterizing the four exon 1 variants we found no significant differences in terms of mRNA stabilities and half-lives of the isoforms. In contrast, variant E1U showed markedly lower translation efficiency both at the total protein level or regarding the functional presence in the plasma membrane. Taken together, these results indicate that the different 5' UTR variants play an important role in cell type specific regulation and fine tuning of ABCG2 expression. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Intraspleen Delivery of a DNA Vaccine Coding for Superoxide Dismutase (SOD) of Brucella abortus Induces SOD-Specific CD4+ and CD8+ T Cells

    Science.gov (United States)

    Muñoz-Montesino, Carola; Andrews, Edilia; Rivers, Rodolfo; González-Smith, Andrés; Moraga-Cid, Gustavo; Folch, Hugo; Céspedes, Sandra; Oñate, Angel A.

    2004-01-01

    In the development of vaccines capable of providing immunity against brucellosis, Cu-Zn superoxide dismutase (SOD) has been demonstrated to be one of the protective immunogens of Brucella abortus. In an earlier study, we provided strong evidence that intramuscular injection with a plasmid DNA carrying the SOD gene (pcDNA-SOD) was able to induce a protective immune response. The present study was designed to characterize T-cell immune responses after an intraspleen (i.s.) vaccination of BALB/c mice with pcDNA-SOD. Animals vaccinated with pcDNA-SOD did not develop SOD-specific antibodies, at least until week 4 after immunization (the end of the experiment), and in vitro stimulation of their splenocytes with either recombinant Cu-Zn SOD or crude Brucella protein induced the secretion of gamma interferon (IFN-γ), but not interleukin-4, and elicited the induction of cytotoxic-T-lymphocyte activity. Upon analyzing the SOD-specific T-cell responses, the pcDNA-SOD vaccination was found to be stimulating both CD4+- and CD8+-T-cell populations. However, only the CD4+ population was able to produce IFN-γ and only the CD8+ population was able to induce cytotoxic activity. Nevertheless, although i.s. route vaccination induces a significant level of protection in BALB/c mice against challenge with the virulent B. abortus strain 2308, vaccination by the intramuscular route with a similar amount of plasmid DNA does not protect. Based on these results, we conclude that i.s. immunization with pcDNA-SOD vaccine efficiently induced a Th1 type of immune response and a protective response that could be related to IFN-γ production and cytotoxic activity against infected cells by SOD-specific CD4+ and CD8+ T cells, respectively. PMID:15039330

  17. Some partial-unit-memory convolutional codes

    Science.gov (United States)

    Abdel-Ghaffar, K.; Mceliece, R. J.; Solomon, G.

    1991-01-01

    The results of a study on a class of error correcting codes called partial unit memory (PUM) codes are presented. This class of codes, though not entirely new, has until now remained relatively unexplored. The possibility of using the well developed theory of block codes to construct a large family of promising PUM codes is shown. The performance of several specific PUM codes are compared with that of the Voyager standard (2, 1, 6) convolutional code. It was found that these codes can outperform the Voyager code with little or no increase in decoder complexity. This suggests that there may very well be PUM codes that can be used for deep space telemetry that offer both increased performance and decreased implementational complexity over current coding systems.

  18. Abstract Résumé

    African Journals Online (AJOL)

    Journal des spects ociaux du VIH/ ID . 17. Article Original. Abstract. Discrimination against persons living with HIV/AIDS in hospital settings has been documented. This study examined the attitude of health care workers (HCWs) to nurses, doctors and patients infected with HIV. A total of 345 respondents selected by ...

  19. Understanding software through linguistic abstraction

    NARCIS (Netherlands)

    Visser, E.

    2013-01-01

    Preprint submitted to "Science of Computer Programming", Elsevier, http://dx.doi.org/10.1016/j.scico.2013.12.001 In this essay, I argue that linguistic abstraction should be used systematically as a tool to capture our emerging understanding of domains of computation. Moreover, to enable that

  20. Handedness Shapes Children's Abstract Concepts

    Science.gov (United States)

    Casasanto, Daniel; Henetz, Tania

    2012-01-01

    Can children's handedness influence how they represent abstract concepts like "kindness" and "intelligence"? Here we show that from an early age, right-handers associate rightward space more strongly with positive ideas and leftward space with negative ideas, but the opposite is true for left-handers. In one experiment, children indicated where on…

  1. Rolloff Roof Observatory Construction (Abstract)

    Science.gov (United States)

    Ulowetz, J. H.

    2015-12-01

    (Abstract only) Lessons learned about building an observatory by someone with limited construction experience, and the advantages of having one for imaging and variable star studies. Sample results shown of composite light curves for cataclysmic variables UX UMa and V1101 Aql with data from my observatory combined with data from others around the world.

  2. Teaching abstraction in introductory courses

    NARCIS (Netherlands)

    Koppelman, Hermannus; van Dijk, Elisabeth M.A.G.

    Abstraction is viewed as a key concept in computer science. It is not only an important concept but also one that is difficult to master. This paper focuses on the problems that novices experience when they first encounter this concept. Three assignments from introductory courses are analyzed, to

  3. Abstract Machines for Polymorphous Computing

    Science.gov (United States)

    2007-12-01

    4. TITLE AND SUBTITLE ABSTRACT MACHINES FOR POLYMORPHOUS COMPUTING (AMP) 5c. PROGRAM ELEMENT NUMBER 62712E 5d. PROJECT NUMBER AMPC 5e. TASK...since pathological communication patterns could incur higher overhead. To measure the performance of the communication APIs on more realistic mixes of

  4. Does "Social Work Abstracts" Work?

    Science.gov (United States)

    Holden, Gary; Barker, Kathleen; Covert-Vail, Lucinda; Rosenberg, Gary; Cohen, Stephanie A.

    2008-01-01

    Objective: The current study seeks to provide estimates of the adequacy of journal coverage in the Social Work Abstracts (SWA) database. Method: A total of 23 journals listed in the Journal Citation Reports social work category during the 1997 to 2005 period were selected for study. Issue-level coverage estimates were obtained for SWA and…

  5. Abstract Interpretation of Mobile Ambients

    DEFF Research Database (Denmark)

    Hansen, René Rydhof; Jensen, J. G.; Nielson, Flemming

    1999-01-01

    We demonstrate that abstract interpretation is useful for analysing calculi of computation such as the ambient calculus (which is based on the p-calculus); more importantly, we show that the entire development can be expressed in a constraint-based formalism that is becoming exceedingly popular...

  6. Norddesign 2012 - Book of Abstract

    DEFF Research Database (Denmark)

    received more than 140 abstracts and through the review process this have resulted in approximately 70 accepted papers. One of the new research fields included in this conference is the area of Biomechanics – hence the cover graphics of the conference proceedings. With this short introduction we encourage...

  7. The Complexity of Abstract Machines

    Directory of Open Access Journals (Sweden)

    Beniamino Accattoli

    2017-01-01

    Full Text Available The lambda-calculus is a peculiar computational model whose definition does not come with a notion of machine. Unsurprisingly, implementations of the lambda-calculus have been studied for decades. Abstract machines are implementations schema for fixed evaluation strategies that are a compromise between theory and practice: they are concrete enough to provide a notion of machine and abstract enough to avoid the many intricacies of actual implementations. There is an extensive literature about abstract machines for the lambda-calculus, and yet—quite mysteriously—the efficiency of these machines with respect to the strategy that they implement has almost never been studied. This paper provides an unusual introduction to abstract machines, based on the complexity of their overhead with respect to the length of the implemented strategies. It is conceived to be a tutorial, focusing on the case study of implementing the weak head (call-by-name strategy, and yet it is an original re-elaboration of known results. Moreover, some of the observation contained here never appeared in print before.

  8. Functions of code switching in multilingual classrooms

    National Research Council Canada - National Science Library

    Ondene van Dulm; Suzanne Rose

    2011-01-01

    .... Within each of these types of code switching, a number of specific functions of code switching in the classrooms observed are identified, such as expansion, clarification, and identity marking...

  9. Retinal degeneration slow (rds) in mouse results from simple insertion of a t haplotype-specific element into protein-coding exon II

    Energy Technology Data Exchange (ETDEWEB)

    Ma, J.; Norton, J.C.; Allen, A.C.; Burns, J.L.; Travis, G.H. [Univ. of Texas Southwestern Medical Center, Dallas, TX (United States)] [and others

    1995-07-20

    Retinal degeneration slow (rds) is a semidominant mutation of mice that causes dysplasia and degeneration of rod and cone photoreceptors. Mutations in RDS, the human ortholog of the rds gene, are responsible for several inherited retinal dystrophies including a subset of retinitis pigmentosa. The normal rds locus encodes rds/peripherin, an integral membrane glycoprotein present in outer segment discs. Genomic libraries form wildtype and rds/rds mice were screened with an rds cDNA, and phage {lambda} clones that span the normal and mutant loci were mapped. We show that in mice, rds is caused by the insertion into exon II of a 9.2-kb repetitive genomic element that is very similar to the t haplotype-specific element in the H-2 complex. The entire element is included in the RNA products of the mutant locus. We present evidence that rds in mice represents a null allele. 40 refs., 4 figs.

  10. Compendium of Abstracts. Volume 2

    Science.gov (United States)

    2011-08-01

    detection of mTBI symptoms within 2 h of blast exposure can greatly reduce or eliminate permanent neurological damage by advising Soldiers to avoid... exposure to ballistic threats. The software that the Army currently uses for this task is not without its limitations. A path is hard-coded into the...Microstructures in Mercury Cadmium Telluride Pattison, James Inductively coupled plasma (ICP) etching was applied to create anti-reflective (AR) structures in

  11. Memory Abstractions for Data Transactions

    OpenAIRE

    Herman, Nathaniel

    2015-01-01

    This thesis presents STO, a software transactional memory (STM) based not on low-level reads and writes on memory, but on datatypes—arrays, lists, queues, hash tables, and so forth—that explicitly support transactional operations. Conventional STMs allow programmers to write concurrent code in much the same way as sequential code—thereby more easily taking advantage of multiple CPU cores. However, these conventional STMs track every memory word accessed during a transaction, so even simple op...

  12. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  13. P-code versus C/A-code GPS for range tracking applications

    Science.gov (United States)

    Hoefener, Carl E.; van Wechel, Bob

    This article compares the use of P-code and C/A-code GPS receivers on test and training ranges. The requirements on many ranges for operation under conditions of jamming preclude the use of C/A-code receivers because of their relatively low jamming immunity as compared with P-code receivers. Also, C/A-code receivers present some problems when used with pseudolites on ranges. The cost of P-code receivers is customarily much higher than that of C/A-code receivers. However, most of this difference is caused by factors other than P-code, particularly the parts screening specifications applied to military programs.

  14. The microRNAs in an ancient protist repress the variant-specific surface protein expression by targeting the entire coding sequence.

    Directory of Open Access Journals (Sweden)

    Ashesh A Saraiya

    2014-02-01

    Full Text Available microRNAs (miRNA have been detected in the deeply branched protist, Giardia lamblia, and shown to repress expression of the family of variant-specific surface proteins (VSPs, only one of which is expressed in Giardia trophozoite at a given time. Three next-generation sequencing libraries of Giardia Argonaute-associated small RNAs were constructed and analyzed. Analysis of the libraries identified a total of 99 new putative miRNAs with a size primarily in the 26 nt range similar to the size previously predicted by the Giardia Dicer crystal structure and identified by our own studies. Bioinformatic analysis identified multiple putative miRNA target sites in the mRNAs of all 73 VSPs. The effect of miRNA target sites within a defined 3'-region were tested on two vsp mRNAs. All the miRNAs showed partial repression of the corresponding vsp expression and were additive when the targeting sites were separately located. But the combined repression still falls short of 100%. Two other relatively short vsp mRNAs with 15 and 11 putative miRNA target sites identified throughout their ORFs were tested with their corresponding miRNAs. The results indicate that; (1 near 100% repression of vsp mRNA expression can be achieved through the combined action of multiple miRNAs on target sites located throughout the ORF; (2 the miRNA machinery could be instrumental in repressing the expression of vsp genes in Giardia; (3 this is the first time that all the miRNA target sites in the entire ORF of a mRNA have been tested and shown to be functional.

  15. Phylogenetic and transcriptomic analysis of chemosensory receptors in a pair of divergent ant species reveals sex-specific signatures of odor coding.

    Directory of Open Access Journals (Sweden)

    Xiaofan Zhou

    Full Text Available Ants are a highly successful family of insects that thrive in a variety of habitats across the world. Perhaps their best-known features are complex social organization and strict division of labor, separating reproduction from the day-to-day maintenance and care of the colony, as well as strict discrimination against foreign individuals. Since these social characteristics in ants are thought to be mediated by semiochemicals, a thorough analysis of these signals, and the receptors that detect them, is critical in revealing mechanisms that lead to stereotypic behaviors. To address these questions, we have defined and characterized the major chemoreceptor families in a pair of behaviorally and evolutionarily distinct ant species, Camponotus floridanus and Harpegnathos saltator. Through comprehensive re-annotation, we show that these ant species harbor some of the largest yet known repertoires of odorant receptors (Ors among insects, as well as a more modest number of gustatory receptors (Grs and variant ionotropic glutamate receptors (Irs. Our phylogenetic analyses further demonstrate remarkably rapid gains and losses of ant Ors, while Grs and Irs have also experienced birth-and-death evolution to different degrees. In addition, comparisons of antennal transcriptomes between sexes identify many chemoreceptors that are differentially expressed between males and females and between species. We have also revealed an agonist for a worker-enriched OR from C. floridanus, representing the first case of a heterologously characterized ant tuning Or. Collectively, our analysis reveals a large number of ant chemoreceptors exhibiting patterns of differential expression and evolution consistent with sex/species-specific functions. These differentially expressed genes are likely associated with sex-based differences, as well as the radically different social lifestyles observed between C. floridanus and H. saltator, and thus are targets for further functional

  16. Theoretical studies of a hydrogen abstraction tool for nanotechnology

    OpenAIRE

    Musgrave, Charles B.; Perry, Jason K.; Merkle, Ralph C.; Goddard, William A.

    1991-01-01

    In the design of a nanoscale, site-specific hydrogen abstraction tool, the authors suggest the use of an alkynyl radical tip. Using ab initio quantum-chemistry techniques including electron correlation they model the abstraction of hydrogen from dihydrogen, methane, acetylene, benzene and isobutane by the acetylene radical. By conservative estimates, the abstraction barrier is small (less than 7.7 kcal mol^-1) in all cases except for acetylene and zero in the case of isobutane. Thermal vibrat...

  17. Old Romanian pluralized mass and abstract nouns

    Directory of Open Access Journals (Sweden)

    Gabriela Pană Dindelegan

    2017-09-01

    Full Text Available The analysis of a rich old Romanian corpus shows that the ‘pluralization’ of mass and abstract nouns is extremely frequent in old Romanian. The semantic effects of pluralization are similar for mass and abstract nouns, consisting in the creation of denotative and/or connotative semantic variants. Of the plural endings, –uri is specialized for the pluralization of mass nouns in Daco-Romanian. The evolution of the ending –uri illustrates the specific process by which a grammatical (plural morpheme is converted into a lexical morpheme (the so-called ‘lexical plurals’. ‘Lexical plurals’ have isolated occurrences in other Romance languages, but they have not reached the spread and regularity they display in Romanian.

  18. Abstract Interpretation Using Attribute Grammar

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    1990-01-01

    This paper deals with the correctness proofs of attribute grammars using methods from abstract interpretation. The technique will be described by defining a live-variable analysis for a small flow-chart language and proving it correct with respect to a continuation style semantics. The proof...... technique is based on fixpoint induction and introduces an extended class of attribute grammars as to express a standard semantics....

  19. Modal abstractions of concurrent behavior

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nanz, Sebastian; Nielson, Hanne Riis

    2011-01-01

    as refutation of safety and liveness properties. However, the algorithmic construction of finite abstractions from potentially infinite concurrent processes is a missing link that prevents their more widespread usage for model checking of concurrent systems. Our algorithm is a worklist algorithm using concepts...... and that supports the definition of a 3-valued modal logic for validating as well as refuting properties of systems. The construction is illustrated on a few examples, including the Ingemarsson-Tang-Wong key agreement protocol. © 2011 ACM....

  20. Abstraction Techniques for Parameterized Verification

    Science.gov (United States)

    2006-11-01

    Processes. Journal of the ACM, 39, 1992. [44] Steven German. Cache Coherence Examples, 2006. [45] Thomas Henzinger, Ranjit Jhala, and Rupak Majumdar...46] Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Kenneth L. McMillan. Abstractions from Proofs. In Proceedings of the 31st ACM Symposium on...Principles of Programming Languages (POPL), pages 232–244, 2004. [47] Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Gregoire Sutre. Soft

  1. Verification Based on Set-Abstraction Using the AIF Framework

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander

    The AIF framework is a novel method for analyzing advanced security protocols, web services, and APIs, based a new abstract interpretation method. It consists of the specification language AIF and a translation/abstraction processes that produces a set of first-order Horn clauses. These can...

  2. Understanding perception through neural "codes".

    Science.gov (United States)

    Freeman, Walter J

    2011-07-01

    A major challenge for cognitive scientists is to deduce and explain the neural mechanisms of the rapid transposition between stimulus energy and recalled memory-between the specific (sensation) and the generic (perception)-in both material and mental aspects. Researchers are attempting three explanations in terms of neural codes. The microscopic code: cellular neurobiologists correlate stimulus properties with the rates and frequencies of trains of action potentials induced by stimuli and carried by topologically organized axons. The mesoscopic code: cognitive scientists formulate symbolic codes in trains of action potentials from feature-detector neurons of phonemes, lines, odorants, vibrations, faces, etc., that object-detector neurons bind into representations of stimuli. The macroscopic code: neurodynamicists extract neural correlates of stimuli and associated behaviors in spatial patterns of oscillatory fields of dendritic activity, which self-organize and evolve on trajectories through high-dimensional brain state space. This multivariate code is expressed in landscapes of chaotic attractors. Unlike other scientific codes, such as DNA and the periodic table, these neural codes have no alphabet or syntax. They are epistemological metaphors that experimentalists need to measure neural activity and engineers need to model brain functions. My aim is to describe the main properties of the macroscopic code and the grand challenge it poses: how do very large patterns of textured synchronized oscillations form in cortex so quickly? © 2010 IEEE

  3. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  4. IEEE conference record--Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1992-01-01

    The following topics were covered in this meeting: basic plasma phenomena and plasma waves; plasma diagnostics; space plasma diagnostics; magnetic fusion; electron, ion and plasma sources; intense electron and ion beams; intense beam microwaves; fast wave M/W devices; microwave plasma interactions; plasma focus; ultrafast Z-pinches; plasma processing; electrical gas discharges; fast opening switches; magnetohydrodynamics; electromagnetic and electrothermal launchers; x-ray lasers; computational plasma science; solid state plasmas and switches; environmental/energy issues in plasma science; vacuum electronics; plasmas for lighting; gaseous electronics; and ball lightning and other spherical plasmas. Separate abstracts were prepared for 278 papers of this conference.

  5. Abstraction by Set-Membership

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander

    2010-01-01

    The abstraction and over-approximation of protocols and web services by a set of Horn clauses is a very successful method in practice. It has however limitations for protocols and web services that are based on databases of keys, contracts, or even access rights, where revocation is possible, so...... language to standard Horn clauses and use the verifier ProVerif and the theorem prover SPASS to solve them. We show by a number of examples that this approach is practically feasible for wide variety of verification problems of security protocols and web services....

  6. Process mining meets abstract interpretation

    OpenAIRE

    Carmona Vargas, Josep; Cortadella Fortuny, Jordi

    2010-01-01

    The discovery of process models out of system traces is an interesting problem that has received significant attention in the last years. In this work, a theory for the derivation of a Petri net from a set of traces is presented. The method is based on the theory of abstract interpretation, which has been applied successfully in other areas. The principal application of the theory presented is Process Mining, an area that tries to incorporate the use of formal models both in the design and us...

  7. In-Package Chemistry Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    P.S. Domski

    2003-07-21

    The work associated with the development of this model report was performed in accordance with the requirements established in ''Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA'' (BSC 2002a). The in-package chemistry model and in-package chemistry model abstraction are developed to predict the bulk chemistry inside of a failed waste package and to provide simplified expressions of that chemistry. The purpose of this work is to provide the abstraction model to the Performance Assessment Project and the Waste Form Department for development of geochemical models of the waste package interior. The scope of this model report is to describe the development and validation of the in-package chemistry model and in-package chemistry model abstraction. The in-package chemistry model will consider chemical interactions of water with the waste package materials and the waste form for commercial spent nuclear fuel (CSNF) and codisposed high-level waste glass (HLWG) and N Reactor spent fuel (CDNR). The in-package chemistry model includes two sub-models, the first a water vapor condensation (WVC) model, where water enters a waste package as vapor and forms a film on the waste package components with subsequent film reactions with the waste package materials and waste form--this is a no-flow model, the reacted fluids do not exit the waste package via advection. The second sub-model of the in-package chemistry model is the seepage dripping model (SDM), where water, water that may have seeped into the repository from the surrounding rock, enters a failed waste package and reacts with the waste package components and waste form, and then exits the waste package with no accumulation of reacted water in the waste package. Both of the submodels of the in-package chemistry model are film models in contrast to past in-package chemistry models where all of the waste package pore space was filled with water. The

  8. Abstract decomposition theorem and applications

    CERN Document Server

    Grossberg, R; Grossberg, Rami; Lessmann, Olivier

    2005-01-01

    Let K be an Abstract Elementary Class. Under the asusmptions that K has a nicely behaved forking-like notion, regular types and existence of some prime models we establish a decomposition theorem for such classes. The decomposition implies a main gap result for the class K. The setting is general enough to cover \\aleph_0-stable first-order theories (proved by Shelah in 1982), Excellent Classes of atomic models of a first order tehory (proved Grossberg and Hart 1987) and the class of submodels of a large sequentially homogenuus \\aleph_0-stable model (which is new).

  9. Indico CONFERENCE: Define the Call for Abstracts

    CERN Multimedia

    CERN. Geneva; Ferreira, Pedro

    2017-01-01

    In this tutorial, you will learn how to define and open a call for abstracts. When defining a call for abstracts, you will be able to define settings related to the type of questions asked during a review of an abstract, select the users who will review the abstracts, decide when to open the call for abstracts, and more.

  10. Energy information data base: report number codes

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-09-01

    Each report processed by the US DOE Technical Information Center is identified by a unique report number consisting of a code plus a sequential number. In most cases, the code identifies the originating installation. In some cases, it identifies a specific program or a type of publication. Listed in this publication are all codes that have been used by DOE in cataloging reports. This compilation consists of two parts. Part I is an alphabetical listing of report codes identified with the issuing installations that have used the codes. Part II is an alphabetical listing of installations identified with codes each has used. (RWR)

  11. A review on synchronous CDMA systems: optimum overloaded codes, channel capacity, and power control

    Directory of Open Access Journals (Sweden)

    Hosseini Seyed Amirhossein

    2011-01-01

    Full Text Available Abstract This paper is a tutorial review on important issues related to code-division multiple-access (CDMA systems such as channel capacity, power control, and optimum codes; specifically, we consider optimum overloaded codes that achieve errorless transmission in the absence of noise for the binary and nonbinary cases. A survey of lower and upper bounds for the sum channel capacity of such systems is given in the presence and absence of channel noise. The asymptotic results for the channel capacity are also investigated. The channel capacity, errorless transmission codes, and power estimation for near-far effects are also explored. The emphasis of this tutorial review is on the overloaded CDMA systems.

  12. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  13. Task-specific style verification

    Science.gov (United States)

    Pataki, Norbert; Cséri, Tamás; Szügyi, Zalán

    2012-09-01

    Programming antipatterns are commonly used patterns that make the code unnecessary complex and unmaintainable. However, beginner programmers such as students, often use them. Usage of antipatterns should be eliminated from source code. Many antipatterns can be detected at compilation-time with an appropriate parser tool. In this paper we argue for a new lint-like tool that does detect typical programming antipatterns, and it is extensible to task-specific verifications. This tool mainly developed to evaluate students' programs, however it can be used in industrial projects as well. Our approach based on pattern matching on abstract syntax tree provided by Clang parser. We present our description language that specifies the antipatterns.

  14. MOTIVATIONS FOR CODE-SWITCHING AMONG IGBO- ENGLISH ...

    African Journals Online (AJOL)

    user

    ENGLISH BILINGUALS: A LINGUISTIC AND SOCIO-. PSYCHOLOGICAL SURVEY. Greg O. Obiamalu & Davidson U. Mbagwu. Abstract. Code-switching and code-mixing are known to be universal phenomena among bilinguals. Not until recently, code- switching/mixing was seen as evidence of “internal mental confusion ...

  15. Spectrophotometry of Symbiotic Stars (Abstract)

    Science.gov (United States)

    Boyd, D.

    2017-12-01

    (Abstract only) Symbiotic stars are fascinating objects - complex binary systems comprising a cool red giant star and a small hot object, often a white dwarf, both embedded in a nebula formed by a wind from the giant star. UV radiation from the hot star ionizes the nebula, producing a range of emission lines. These objects have composite spectra with contributions from both stars plus the nebula and these spectra can change on many timescales. Being moderately bright, they lend themselves well to amateur spectroscopy. This paper describes the symbiotic star phenomenon, shows how spectrophotometry can be used to extract astrophysically useful information about the nature of these systems, and gives results for three symbiotic stars based on the author's observations.

  16. ICC-CLASS: isotopically-coded cleavable crosslinking analysis software suite

    Directory of Open Access Journals (Sweden)

    Borchers Christoph H

    2010-01-01

    Full Text Available Abstract Background Successful application of crosslinking combined with mass spectrometry for studying proteins and protein complexes requires specifically-designed crosslinking reagents, experimental techniques, and data analysis software. Using isotopically-coded ("heavy and light" versions of the crosslinker and cleavable crosslinking reagents is analytically advantageous for mass spectrometric applications and provides a "handle" that can be used to distinguish crosslinked peptides of different types, and to increase the confidence of the identification of the crosslinks. Results Here, we describe a program suite designed for the analysis of mass spectrometric data obtained with isotopically-coded cleavable crosslinkers. The suite contains three programs called: DX, DXDX, and DXMSMS. DX searches the mass spectra for the presence of ion signal doublets resulting from the light and heavy isotopic forms of the isotopically-coded crosslinking reagent used. DXDX searches for possible mass matches between cleaved and uncleaved isotopically-coded crosslinks based on the established chemistry of the cleavage reaction for a given crosslinking reagent. DXMSMS assigns the crosslinks to the known protein sequences, based on the isotopically-coded and un-coded MS/MS fragmentation data of uncleaved and cleaved peptide crosslinks. Conclusion The combination of these three programs, which are tailored to the analytical features of the specific isotopically-coded cleavable crosslinking reagents used, represents a powerful software tool for automated high-accuracy peptide crosslink identification. See: http://www.creativemolecules.com/CM_Software.htm

  17. Identification of an ortholog of the eukaryotic RNA polymerase III subunit RPC34 in Crenarchaeota and Thaumarchaeota suggests specialization of RNA polymerases for coding and non-coding RNAs in Archaea

    Directory of Open Access Journals (Sweden)

    Siebers Bettina

    2009-10-01

    Full Text Available Abstract One of the hallmarks of eukaryotic information processing is the co-existence of 3 distinct, multi-subunit RNA polymerase complexes that are dedicated to the transcription of specific classes of coding or non-coding RNAs. Archaea encode only one RNA polymerase that resembles the eukaryotic RNA polymerase II with respect to the subunit composition. Here we identify archaeal orthologs of the eukaryotic RNA polymerase III subunit RPC34. Genome context analysis supports a function of this archaeal protein in the transcription of non-coding RNAs. These findings suggest that functional separation of RNA polymerases for protein-coding genes and non-coding RNAs might predate the origin of the Eukaryotes. Reviewers: This article was reviewed by Andrei Osterman and Patrick Forterre (nominated by Purificación López-García

  18. A Cluster of Ring Stage–specific Genes Linked to a Locus Implicated in Cytoadherence in Plasmodium falciparum Codes for PEXEL-negative and PEXEL-positive Proteins Exported into the Host Cell

    Science.gov (United States)

    Hawthorne, Paula L.; Dixon, Matthew W.A.; Hannemann, Mandy; Klotz, Kathleen; Kemp, David J.; Klonis, Nectarios; Tilley, Leann; Trenholme, Katharine R.

    2006-01-01

    Blood stages of Plasmodium falciparum export proteins into their erythrocyte host, thereby inducing extensive host cell modifications that become apparent after the first half of the asexual development cycle (ring stage). This is responsible for a major part of parasite virulence. Export of many parasite proteins depends on a sequence motif termed Plasmodium export element (PEXEL) or vacuolar transport signal (VTS). This motif has allowed the prediction of the Plasmodium exportome. Using published genome sequence, we redetermined the boundaries of a previously studied region linked to P. falciparum virulence, reducing the number of candidate genes in this region to 13. Among these, we identified a cluster of four ring stage-specific genes, one of which is known to encode an exported protein. We demonstrate that all four genes code for proteins exported into the host cell, although only two genes contain an obvious PEXEL/VTS motif. We propose that the systematic analysis of ring stage-specific genes will reveal a cohort of exported proteins not present in the currently predicted exportome. Moreover, this provides further evidence that host cell remodeling is a major task of this developmental stage. Biochemical and photobleaching studies using these proteins reveal new properties of the parasite-induced membrane compartments in the host cell. This has important implications for the biogenesis and connectivity of these structures. PMID:16760427

  19. Mechanism of allele specific assembly and disruption of master regulator transcription factor complexes of NF-KBp50, NF-KBp65 and HIF1a on a non-coding FAS SNP.

    Science.gov (United States)

    Awah, Chidiebere U; Tamm, Stephanie; Hedtfeld, Silke; Steinemann, Doris; Tümmler, Burkhard; Tsiavaliaris, Georgios; Stanke, Frauke

    2016-11-01

    A challenging question in genetics is to understand the molecular function of non-coding variants of the genome. By using differential EMSA, ChIP and functional genome analysis, we have found that changes in transcription factors (TF) apparent binding affinity and dissociation rates are responsible for allele specific assembly or disruption of master TFs: we observed that NF-KBp50, NF-KBp65 and HIF1a bind with an affinity of up to 10 fold better to the C-allele than to the T-allele of rs7901656 both in vivo and in vitro. Furthermore, we showed that NF-KBp50, p65 and HIF1a form higher order heteromultimeric complexes overlapping rs7901656, implying synergism of action among TFs governing cellular response to infection and hypoxia. With rs7901656 on the FAS gene as a paradigm, we show how allele specific transcription factor complex assembly and disruption by a causal variant contributes to disease and phenotypic diversity. This finding provides the highly needed mechanistic insight into how the molecular etiology of regulatory SNPs can be understood in functional terms. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Null Mutation of the MdACS3 Gene, Coding for a Ripening-Specific 1-Aminocyclopropane-1-Carboxylate Synthase, Leads to Long Shelf Life in Apple Fruit1[W][OA

    Science.gov (United States)

    Wang, Aide; Yamakake, Junko; Kudo, Hisayuki; Wakasa, Yuhya; Hatsuyama, Yoshimichi; Igarashi, Megumi; Kasai, Atsushi; Li, Tianzhong; Harada, Takeo

    2009-01-01

    Expression of MdACS1, coding for 1-aminocyclopropane-1-carboxylate synthase (ACS), parallels the level of ethylene production in ripening apple (Malus domestica) fruit. Here we show that expression of another ripening-specific ACS gene (MdACS3) precedes the initiation of MdACS1 expression by approximately 3 weeks; MdACS3 expression then gradually decreases as MdACS1 expression increases. Because MdACS3 expression continues in ripening fruit treated with 1-methylcyclopropene, its transcription appears to be regulated by a negative feedback mechanism. Three genes in the MdACS3 family (a, b, and c) were isolated from a genomic library, but two of them (MdACS3b and MdACS3c) possess a 333-bp transposon-like insertion in their 5′ flanking region that may prevent transcription of these genes during ripening. A single nucleotide polymorphism in the coding region of MdACS3a results in an amino acid substitution (glycine-289 → valine) in the active site that inactivates the enzyme. Furthermore, another null allele of MdACS3a, Mdacs3a, showing no ability to be transcribed, was found by DNA sequencing. Apple cultivars homozygous or heterozygous for both null allelotypes showed no or very low expression of ripening-related genes and maintained fruit firmness. These results suggest that MdACS3a plays a crucial role in regulation of fruit ripening in apple, and is a possible determinant of ethylene production and shelf life in apple fruit. PMID:19587104

  1. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show...

  2. Structured hints : extracting and abstracting domain expertise.

    Energy Technology Data Exchange (ETDEWEB)

    Hereld, M.; Stevens, R.; Sterling, T.; Gao, G. R.; Mathematics and Computer Science; California Inst. of Tech.; Louisiana State Univ.; Univ. of Delaware

    2009-03-16

    We propose a new framework for providing information to help optimize domain-specific application codes. Its design addresses problems that derive from the widening gap between the domain problem statement by domain experts and the architectural details of new and future high-end computing systems. The design is particularly well suited to program execution models that incorporate dynamic adaptive methodologies for live tuning of program performance and resource utilization. This new framework, which we call 'structured hints', couples a vocabulary of annotations to a suite of performance metrics. The immediate target is development of a process by which a domain expert describes characteristics of objects and methods in the application code that would not be readily apparent to the compiler; the domain expert provides further information about what quantities might provide the best indications of desirable effect; and the interactive preprocessor identifies potential opportunities for the domain expert to evaluate. Our development of these ideas is progressing in stages from case study, through manual implementation, to automatic or semi-automatic implementation. In this paper we discuss results from our case study, an examination of a large simulation of a neural network modeled after the neocortex.

  3. Efficient abstractions for visualization and interaction

    NARCIS (Netherlands)

    van der Ploeg, A.J.

    2015-01-01

    Abstractions, such as functions and methods, are an essential tool for any programmer. Abstractions encapsulate the details of a computation: the programmer only needs to know what the abstraction achieves, not how it achieves it. However, using abstractions can come at a cost: the resulting program

  4. An abstract approach to music.

    Energy Technology Data Exchange (ETDEWEB)

    Kaper, H. G.; Tipei, S.

    1999-04-19

    In this article we have outlined a formal framework for an abstract approach to music and music composition. The model is formulated in terms of objects that have attributes, obey relationships, and are subject to certain well-defined operations. The motivation for this approach uses traditional terms and concepts of music theory, but the approach itself is formal and uses the language of mathematics. The universal object is an audio wave; partials, sounds, and compositions are special objects, which are placed in a hierarchical order based on time scales. The objects have both static and dynamic attributes. When we realize a composition, we assign values to each of its attributes: a (scalar) value to a static attribute, an envelope and a size to a dynamic attribute. A composition is then a trajectory in the space of aural events, and the complex audio wave is its formal representation. Sounds are fibers in the space of aural events, from which the composer weaves the trajectory of a composition. Each sound object in turn is made up of partials, which are the elementary building blocks of any music composition. The partials evolve on the fastest time scale in the hierarchy of partials, sounds, and compositions. The ideas outlined in this article are being implemented in a digital instrument for additive sound synthesis and in software for music composition. A demonstration of some preliminary results has been submitted by the authors for presentation at the conference.

  5. Attracting Girls into Physics (abstract)

    Science.gov (United States)

    Gadalla, Afaf

    2009-04-01

    A recent international study of women in physics showed that enrollment in physics and science is declining for both males and females and that women are severely underrepresented in careers requiring a strong physics background. The gender gap begins early in the pipeline, from the first grade. Girls are treated differently than boys at home and in society in ways that often hinder their chances for success. They have fewer freedoms, are discouraged from accessing resources or being adventurous, have far less exposure to problem solving, and are not encouraged to choose their lives. In order to motivate more girl students to study physics in the Assiut governorate of Egypt, the Assiut Alliance for the Women and Assiut Education District collaborated in renovating the education of physics in middle and secondary school classrooms. A program that helps in increasing the number of girls in science and physics has been designed in which informal groupings are organized at middle and secondary schools to involve girls in the training and experiences needed to attract and encourage girls to learn physics. During implementation of the program at some schools, girls, because they had not been trained in problem-solving as boys, appeared not to be as facile in abstracting the ideas of physics, and that was the primary reason for girls dropping out of science and physics. This could be overcome by holding a topical physics and technology summer school under the supervision of the Assiut Alliance for the Women.

  6. ABSTRACT MODELS FOR SYSTEM VIRTUALIZATION

    Directory of Open Access Journals (Sweden)

    M. G. Koveshnikov

    2015-05-01

    Full Text Available The paper is dedicated to issues of system objects securing (system files and user system or application configuration files against unauthorized access including denial of service attacks. We have suggested the method and developed abstract system virtualization models, which are used toresearch attack scenarios for different virtualization modes. Estimation for system tools virtualization technology effectiveness is given. Suggested technology is based on redirection of access requests to system objects shared among access subjects. Whole and partial system virtualization modes have been modeled. The difference between them is the following: in the whole virtualization mode all copies of access system objects are created whereon subjects’ requests are redirected including corresponding application objects;in the partial virtualization mode corresponding copies are created only for part of a system, for example, only system objects for applications. Alternative solutions effectiveness is valued relating to different attack scenarios. We consider proprietary and approved technical solution which implements system virtualization method for Microsoft Windows OS family. Administrative simplicity and capabilities of correspondingly designed system objects security tools are illustrated on this example. Practical significance of the suggested security method has been confirmed.

  7. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is propose...... including an outer BCH code correcting a few bit errors.......The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  8. Schrödinger's code-script: not a genetic cipher but a code of development.

    Science.gov (United States)

    Walsby, A E; Hodge, M J S

    2017-06-01

    In his book What is Life? Erwin Schrödinger coined the term 'code-script', thought by some to be the first published suggestion of a hereditary code and perhaps a forerunner of the genetic code. The etymology of 'code' suggests three meanings relevant to 'code-script which we distinguish as 'cipher-code', 'word-code' and 'rule-code'. Cipher-codes and word-codes entail translation of one set of characters into another. The genetic code comprises not one but two cipher-codes: the first is the DNA 'base-pairing cipher'; the second is the 'nucleotide-amino-acid cipher', which involves the translation of DNA base sequences into amino-acid sequences. We suggest that Schrödinger's code-script is a form of 'rule-code', a set of rules that, like the 'highway code' or 'penal code', requires no translation of a message. Schrödinger first relates his code-script to chromosomal genes made of protein. Ignorant of its properties, however, he later abandons 'protein' and adopts in its place a hypothetical, isomeric 'aperiodic solid' whose atoms he imagines rearranged in countless different conformations, which together are responsible for the patterns of ontogenetic development. In an attempt to explain the large number of combinations required, Schrödinger referred to the Morse code (a cipher) but in doing so unwittingly misled readers into believing that he intended a cipher-code resembling the genetic code. We argue that the modern equivalent of Schrödinger's code-script is a rule-code of organismal development based largely on the synthesis, folding, properties and interactions of numerous proteins, each performing a specific task. Copyright © 2016. Published by Elsevier Ltd.

  9. Use of the Coding Causes of Death in HIV in the classification of deaths in Northeastern Brazil

    National Research Council Canada - National Science Library

    Diana Neves Alves; Cristiane Campello Bresani-Salvi; Joanna d’Arc Lyra Batista; Ricardo Arraes de Alencar Ximenes; Demócrito de Barros Miranda-Filho; Heloísa Ramos Lacerda de Melo; Maria de Fátima Pessoa Militão de Albuquerque

    2017-01-01

    ABSTRACT OBJECTIVE Describe the coding process of death causes for people living with HIV/AIDS, and classify deaths as related or unrelated to immunodeficiency by applying the Coding Causes of Death in HIV (CoDe) system...

  10. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  11. Generalized concatenated quantum codes

    Science.gov (United States)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng, Bei

    2009-05-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  12. Patient-Centered Research Abstracts

    Science.gov (United States)

    Szerlip, MI; Desalvo, KB; Szerlip, HM

    2000-01-01

    PURPOSE Providing clinicians with predictors to aid in the diagnosis of HIV disease in older adults should facilitate the identification of infected individuals. METHODS A retrospective case-control study was conducted comparing 53 HIV-positive patients over the age of 55 who were age, gender, and race matched to 106 controls. The patients were drawn from the New Orleans Veterans Affairs Medical Center and a public hospital. Both institutions serve predominantly African-American, inner-city, indigent patients. Clinical predictors of interest were abstracted from medical records onto standardized data collection sheets by the authors. RESULTS The mean age of the cases and controls was 62 (55–74), 60% were African-American, and 97% percent were male. Several positive findings in the past medical history were associated with an increased odds of testing HIV-positive. The mean values for several routinely tested laboratory studies were significantly different between the two groups. The mean globulin level for HIV-positive patients was 4.8 g/dL vs. 3.7 g/dL for HIV-negative patients (p = .001). The mean serum sodium for HIV-positive patients was 137 mg/dL vs. 140 mg/dL for HIV negative patients (p = .003) and the mean albumin was 3.0 g/dL vs. 3.6 g/dL (p < .001). Hemoglobin was significantly different between HIV-positive and HIV-negative individuals(mean 12.0 g/dL vs. 13.9 g/dL, p = .029). CONCLUSION This data suggests that for patients over the age of 55, certain routine laboratory and medical history parameters may be useful in predicting patients at increased risk of being HIV-positive. A prospective study validating this data would be necessary to confirm this.

  13. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  14. Functions of code switching in multilingual classrooms

    Directory of Open Access Journals (Sweden)

    Ondene van Dulm

    2011-08-01

    Full Text Available The research reported in this paper focuses on the functions of code switching between English and Afrikaans in the classroom interactions of a secondary school in the Western Cape. The data comprising audio recordings of classroom interactions are analysed within the framework of Myers-Scotton’s (1993a Markedness Model, according to which there are four types of code switching, namely marked, unmarked, sequential unmarked, and exploratory code switching. Within each of these types of code switching, a number of specific functions of code switching in the classrooms observed are identified, such as expansion, clarification, and identity marking. The study concludes that the Markedness Model offers a useful framework within which to analyse types of code switching, and that code switching has a specific functional role to play within multicultural and multilingual classrooms.

  15. Superconductor lunar telescopes --Abstract only

    Science.gov (United States)

    Chen, P. C.; Pitts, R.; Shore, S.; Oliversen, R.; Stolarik, J.; Segal, K.; Hojaji, H.

    1994-01-01

    We propose a new type of telescope designed specifically for the lunar environment of high vacuum and low temperature. Large area UV-Visible-IR telescope arrays can be built with ultra-light-weight replica optics. High T(sub c) superconductors provide support, steering, and positioning. Advantages of this approach are light-weight payload compatible with existing launch vehicles, configurable large area optical arrays, no excavation or heavy construction, and frictionless electronically controlled mechanisms. We have built a prototype and will be demonstarting some of its working characteristics.

  16. Model Checking Abstract PLEXIL Programs with SMART

    Science.gov (United States)

    Siminiceanu, Radu I.

    2007-01-01

    We describe a method to automatically generate discrete-state models of abstract Plan Execution Interchange Language (PLEXIL) programs that can be analyzed using model checking tools. Starting from a high-level description of a PLEXIL program or a family of programs with common characteristics, the generator lays the framework that models the principles of program execution. The concrete parts of the program are not automatically generated, but require the modeler to introduce them by hand. As a case study, we generate models to verify properties of the PLEXIL macro constructs that are introduced as shorthand notation. After an exhaustive analysis, we conclude that the macro definitions obey the intended semantics and behave as expected, but contingently on a few specific requirements on the timing semantics of micro-steps in the concrete executive implementation.

  17. MacWilliams Identity for Codes with the Rank Metric

    Directory of Open Access Journals (Sweden)

    Gadouleau Maximilien

    2008-01-01

    Full Text Available Abstract The MacWilliams identity, which relates the weight distribution of a code to the weight distribution of its dual code, is useful in determining the weight distribution of codes. In this paper, we derive the MacWilliams identity for linear codes with the rank metric, and our identity has a different form than that by Delsarte. Using our MacWilliams identity, we also derive related identities for rank metric codes. These identities parallel the binomial and power moment identities derived for codes with the Hamming metric.

  18. Conveying Communicative Intent: Moves and Metadiscourse in Abstract Writing

    Directory of Open Access Journals (Sweden)

    Chuah Ek Lon

    2012-11-01

    Full Text Available Abstracts form the first reading contact of extended discourse in pursuance of a meaningful engagement with a report. An abstract possesses distinct features drawn from a specific genre of academic writing that communicates its discourse intent to any academic or professional community. Among the discourse conventions is the use of a move pattern and metadiscourse elements which together, establishes logical connections with the reader. This paper investigates good communication practice in abstract writing, a significant preliminary that fronts a report. The effectiveness of an abstract specifically, can be tied to the realization of a peculiar move structure that is accompanied by a judicious choice of words and phrases that relates to and involves the reader both interactively and interactionally. A content analysis of the move structure and its underlying metadiscourse in 100 randomly selected abstracts gives petite indication of how students manage abstract writing in a technical report. The results will have a bearing on situating appropriate pedagogical approaches for the teaching of a salient feature in academic writing and will also inform students of related genre expectations towards abstract writing. It is a skill that they may not have sufficient contact with in their university writing experience, though, nonetheless, one that needs to be accomplished to fulfill communicative intent that serves both local and international purposes insofar as academic writing is concerned.

  19. A domain specific language for performance portable molecular dynamics algorithms

    Science.gov (United States)

    Saunders, William Robert; Grant, James; Müller, Eike Hermann

    2018-03-01

    Developers of Molecular Dynamics (MD) codes face significant challenges when adapting existing simulation packages to new hardware. In a continuously diversifying hardware landscape it becomes increasingly difficult for scientists to be experts both in their own domain (physics/chemistry/biology) and specialists in the low level parallelisation and optimisation of their codes. To address this challenge, we describe a "Separation of Concerns" approach for the development of parallel and optimised MD codes: the science specialist writes code at a high abstraction level in a domain specific language (DSL), which is then translated into efficient computer code by a scientific programmer. In a related context, an abstraction for the solution of partial differential equations with grid based methods has recently been implemented in the (Py)OP2 library. Inspired by this approach, we develop a Python code generation system for molecular dynamics simulations on different parallel architectures, including massively parallel distributed memory systems and GPUs. We demonstrate the efficiency of the auto-generated code by studying its performance and scalability on different hardware and compare it to other state-of-the-art simulation packages. With growing data volumes the extraction of physically meaningful information from the simulation becomes increasingly challenging and requires equally efficient implementations. A particular advantage of our approach is the easy expression of such analysis algorithms. We consider two popular methods for deducing the crystalline structure of a material from the local environment of each atom, show how they can be expressed in our abstraction and implement them in the code generation framework.

  20. Converging modalities ground abstract categories: the case of politics.

    Science.gov (United States)

    Farias, Ana Rita; Garrido, Margarida V; Semin, Gün R

    2013-01-01

    Three studies are reported examining the grounding of abstract concepts across two modalities (visual and auditory) and their symbolic representation. A comparison of the outcomes across these studies reveals that the symbolic representation of political concepts and their visual and auditory modalities is convergent. In other words, the spatial relationships between specific instances of the political categories are highly overlapping across the symbolic, visual and auditory modalities. These findings suggest that abstract categories display redundancy across modal and amodal representations, and are multimodal.

  1. Design and optimization of a portable LQCD Monte Carlo code using OpenACC

    Science.gov (United States)

    Bonati, Claudio; Coscetti, Simone; D'Elia, Massimo; Mesiti, Michele; Negro, Francesco; Calore, Enrico; Schifano, Sebastiano Fabio; Silvi, Giorgio; Tripiccione, Raffaele

    The present panorama of HPC architectures is extremely heterogeneous, ranging from traditional multi-core CPU processors, supporting a wide class of applications but delivering moderate computing performance, to many-core Graphics Processor Units (GPUs), exploiting aggressive data-parallelism and delivering higher performances for streaming computing applications. In this scenario, code portability (and performance portability) become necessary for easy maintainability of applications; this is very relevant in scientific computing where code changes are very frequent, making it tedious and prone to error to keep different code versions aligned. In this work, we present the design and optimization of a state-of-the-art production-level LQCD Monte Carlo application, using the directive-based OpenACC programming model. OpenACC abstracts parallel programming to a descriptive level, relieving programmers from specifying how codes should be mapped onto the target architecture. We describe the implementation of a code fully written in OpenAcc, and show that we are able to target several different architectures, including state-of-the-art traditional CPUs and GPUs, with the same code. We also measure performance, evaluating the computing efficiency of our OpenACC code on several architectures, comparing with GPU-specific implementations and showing that a good level of performance-portability can be reached.

  2. Organizational Principles of Abstract Words in the Human Brain.

    Science.gov (United States)

    Wang, Xiaosha; Wu, Wei; Ling, Zhenhua; Xu, Yangwen; Fang, Yuxing; Wang, Xiaoying; Binder, Jeffrey R; Men, Weiwei; Gao, Jia-Hong; Bi, Yanchao

    2017-11-23

    words constitute nearly half of the human lexicon and are critically associated with human abstract thoughts, yet little is known about how they are represented in the brain. We tested the neural basis of 2 classical cognitive notions of abstract meaning representation: by linguistic contexts and by semantic features. We collected fMRI BOLD responses for 360 abstract words and built theoretical representational models from state-of-the-art corpus-based natural language processing models and behavioral ratings of semantic features. Representational similarity analyses revealed that both linguistic contextual and semantic feature similarity affected the representation of abstract concepts, but in distinct neural levels. The corpus-based similarity was coded in the high-level linguistic processing system, whereas semantic feature information was reflected in distributed brain regions and in the principal component space derived from whole-brain activation patterns. These findings highlight the multidimensional organization and the neural dissociation between linguistic contextual and featural aspects of abstract concepts. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  3. 2013 SYR Accepted Poster Abstracts.

    Science.gov (United States)

    2013-01-01

    SYR 2013 Accepted Poster abstracts: 1. Benefits of Yoga as a Wellness Practice in a Veterans Affairs (VA) Health Care Setting: If You Build It, Will They Come? 2. Yoga-based Psychotherapy Group With Urban Youth Exposed to Trauma. 3. Embodied Health: The Effects of a Mind�Body Course for Medical Students. 4. Interoceptive Awareness and Vegetable Intake After a Yoga and Stress Management Intervention. 5. Yoga Reduces Performance Anxiety in Adolescent Musicians. 6. Designing and Implementing a Therapeutic Yoga Program for Older Women With Knee Osteoarthritis. 7. Yoga and Life Skills Eating Disorder Prevention Among 5th Grade Females: A Controlled Trial. 8. A Randomized, Controlled Trial Comparing the Impact of Yoga and Physical Education on the Emotional and Behavioral Functioning of Middle School Children. 9. Feasibility of a Multisite, Community based Randomized Study of Yoga and Wellness Education for Women With Breast Cancer Undergoing Chemotherapy. 10. A Delphi Study for the Development of Protocol Guidelines for Yoga Interventions in Mental Health. 11. Impact Investigation of Breathwalk Daily Practice: Canada�India Collaborative Study. 12. Yoga Improves Distress, Fatigue, and Insomnia in Older Veteran Cancer Survivors: Results of a Pilot Study. 13. Assessment of Kundalini Mantra and Meditation as an Adjunctive Treatment With Mental Health Consumers. 14. Kundalini Yoga Therapy Versus Cognitive Behavior Therapy for Generalized Anxiety Disorder and Co-Occurring Mood Disorder. 15. Baseline Differences in Women Versus Men Initiating Yoga Programs to Aid Smoking Cessation: Quitting in Balance Versus QuitStrong. 16. Pranayam Practice: Impact on Focus and Everyday Life of Work and Relationships. 17. Participation in a Tailored Yoga Program is Associated With Improved Physical Health in Persons With Arthritis. 18. Effects of Yoga on Blood Pressure: Systematic Review and Meta-analysis. 19. A Quasi-experimental Trial of a Yoga based Intervention to Reduce Stress and

  4. Non-random retention of protein-coding overlapping genes in Metazoa

    Directory of Open Access Journals (Sweden)

    Bork Peer

    2008-04-01

    Full Text Available Abstract Background Although the overlap of transcriptional units occurs frequently in eukaryotic genomes, its evolutionary and biological significance remains largely unclear. Here we report a comparative analysis of overlaps between genes coding for well-annotated proteins in five metazoan genomes (human, mouse, zebrafish, fruit fly and worm. Results For all analyzed species the observed number of overlapping genes is always lower than expected assuming functional neutrality, suggesting that gene overlap is negatively selected. The comparison to the random distribution also shows that retained overlaps do not exhibit random features: antiparallel overlaps are significantly enriched, while overlaps lying on the same strand and those involving coding sequences are highly underrepresented. We confirm that overlap is mostly species-specific and provide evidence that it frequently originates through the acquisition of terminal, non-coding exons. Finally, we show that overlapping genes tend to be significantly co-expressed in a breast cancer cDNA library obtained by 454 deep sequencing, and that different overlap types display different patterns of reciprocal expression. Conclusion Our data suggest that overlap between protein-coding genes is selected against in Metazoa. However, when retained it may be used as a species-specific mechanism for the reciprocal regulation of neighboring genes. The tendency of overlaps to involve non-coding regions of the genes leads to the speculation that the advantages achieved by an overlapping arrangement may be optimized by evolving regulatory non-coding transcripts.

  5. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  6. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  7. Decoding LDPC Convolutional Codes on Markov Channels

    Directory of Open Access Journals (Sweden)

    Kashyap Manohar

    2008-01-01

    Full Text Available Abstract This paper describes a pipelined iterative technique for joint decoding and channel state estimation of LDPC convolutional codes over Markov channels. Example designs are presented for the Gilbert-Elliott discrete channel model. We also compare the performance and complexity of our algorithm against joint decoding and state estimation of conventional LDPC block codes. Complexity analysis reveals that our pipelined algorithm reduces the number of operations per time step compared to LDPC block codes, at the expense of increased memory and latency. This tradeoff is favorable for low-power applications.

  8. Abstract methods in partial differential equations

    CERN Document Server

    Carroll, Robert W

    2012-01-01

    Detailed, self-contained treatment examines modern abstract methods in partial differential equations, especially abstract evolution equations. Suitable for graduate students with some previous exposure to classical partial differential equations. 1969 edition.

  9. Algebraic geometric codes

    Science.gov (United States)

    Shahshahani, M.

    1991-01-01

    The performance characteristics are discussed of certain algebraic geometric codes. Algebraic geometric codes have good minimum distance properties. On many channels they outperform other comparable block codes; therefore, one would expect them eventually to replace some of the block codes used in communications systems. It is suggested that it is unlikely that they will become useful substitutes for the Reed-Solomon codes used by the Deep Space Network in the near future. However, they may be applicable to systems where the signal to noise ratio is sufficiently high so that block codes would be more suitable than convolutional or concatenated codes.

  10. Monomial-like codes

    CERN Document Server

    Martinez-Moro, Edgar; Ozbudak, Ferruh; Szabo, Steve

    2010-01-01

    As a generalization of cyclic codes of length p^s over F_{p^a}, we study n-dimensional cyclic codes of length p^{s_1} X ... X p^{s_n} over F_{p^a} generated by a single "monomial". Namely, we study multi-variable cyclic codes of the form in F_{p^a}[x_1...x_n] / . We call such codes monomial-like codes. We show that these codes arise from the product of certain single variable codes and we determine their minimum Hamming distance. We determine the dual of monomial-like codes yielding a parity check matrix. We also present an alternative way of constructing a parity check matrix using the Hasse derivative. We study the weight hierarchy of certain monomial like codes. We simplify an expression that gives us the weight hierarchy of these codes.

  11. Minimalism in architecture: Abstract conceptualization of architecture

    OpenAIRE

    Vasilski Dragana

    2015-01-01

    Minimalism in architecture contains the idea of the minimum as a leading creative tend to be considered and interpreted in working through phenomena of empathy and abstraction. In the Western culture, the root of this idea is found in empathy of Wilhelm Worringer and abstraction of Kasimir Malevich. In his dissertation, 'Abstraction and Empathy' Worringer presented his thesis on the psychology of style through which he explained the two opposing basic forms: abstraction and empathy. His concl...

  12. Introduction to abstract algebra, solutions manual

    CERN Document Server

    Nicholson, W Keith

    2012-01-01

    Praise for the Third Edition ". . . an expository masterpiece of the highest didactic value that has gained additional attractivity through the various improvements . . ."-Zentralblatt MATH The Fourth Edition of Introduction to Abstract Algebra continues to provide an accessible approach to the basic structures of abstract algebra: groups, rings, and fields. The book's unique presentation helps readers advance to abstract theory by presenting concrete examples of induction, number theory, integers modulo n, and permutations before the abstract structures are defined. Readers can immediately be

  13. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  14. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and implementing abstractions will improve the applicability of model checking in practice....

  15. Graph Subsumption in Abstract State Space Exploration

    NARCIS (Netherlands)

    Zambon, Eduardo; Rensink, Arend; Wijs, A.; Bosnacki, D.; Edelkamp, S.

    In this paper we present the extension of an existing method for abstract graph-based state space exploration, called neighbourhood abstraction, with a reduction technique based on subsumption. Basically, one abstract state subsumes another when it covers more concrete states; in such a case, the

  16. A Macro for Reusing Abstract Functions and Theorems

    Directory of Open Access Journals (Sweden)

    Sebastiaan J. C. Joosten

    2013-04-01

    Full Text Available Even though the ACL2 logic is first order, the ACL2 system offers several mechanisms providing users with some operations akin to higher order logic ones. In this paper, we propose a macro, named instance-of-defspec, to ease the reuse of abstract functions and facts proven about them. Defspec is an ACL2 book allowing users to define constrained functions and their associated properties. It contains macros facilitating the definition of such abstract specifications and instances thereof. Currently, lemmas and theorems derived from these abstract functions are not automatically instantiated. This is exactly the purpose of our new macro. instance-of-defspec will not only instantiate functions and theorems within a specification but also many more functions and theorems built on top of the specification. As a working example, we describe various fold functions over monoids, which we gradually built from arbitrary functions.

  17. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  18. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  19. Structural reliability codes for probabilistic design

    DEFF Research Database (Denmark)

    Ditlevsen, Ove Dalager

    1997-01-01

    difficulties of ambiguity and definition show up when attempting to make the transition from a given authorized partial safety factor code to a superior probabilistic code. For any chosen probabilistic code format there is a considerable variation of the reliability level over the set of structures defined....... The last problem must be accepted as the state of the matter and it seems that it can only be solved pragmatically by standardizing a specific code format as reference format for constant reliability. By an example this paper illustrates that a presently valid partial safety factor code imposes a quite...... is suggested for guiding the choice of the reference probabilistic code format for constant reliability. In the author's opinion there is an urgent need for establishing a standard probabilistic reliability code. This paper presents some considerations that may be debatable, but nevertheless point...

  20. Tiling as a Durable Abstraction for Parallelism and Data Locality

    Energy Technology Data Exchange (ETDEWEB)

    Unat, Didem [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chan, Cy P. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zhang, Weiqun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Bell, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Shalf, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-11-18

    Tiling is a useful loop transformation for expressing parallelism and data locality. Automated tiling transformations that preserve data-locality are increasingly important due to hardware trends towards massive parallelism and the increasing costs of data movement relative to the cost of computing. We propose TiDA as a durable tiling abstraction that centralizes parameterized tiling information within array data types with minimal changes to the source code. The data layout information can be used by the compiler and runtime to automatically manage parallelism, optimize data locality, and schedule tasks intelligently. In this study, we present the design features and early interface of TiDA along with some preliminary results.

  1. Pacifier Overuse and Conceptual Relations of Abstract and Emotional Concepts

    Science.gov (United States)

    Barca, Laura; Mazzuca, Claudia; Borghi, Anna M.

    2017-01-01

    This study explores the impact of the extensive use of an oral device since infancy (pacifier) on the acquisition of concrete, abstract, and emotional concepts. While recent evidence showed a negative relation between pacifier use and children's emotional competence (Niedenthal et al., 2012), the possible interaction between use of pacifier and processing of emotional and abstract language has not been investigated. According to recent theories, while all concepts are grounded in sensorimotor experience, abstract concepts activate linguistic and social information more than concrete ones. Specifically, the Words As Social Tools (WAT) proposal predicts that the simulation of their meaning leads to an activation of the mouth (Borghi and Binkofski, 2014; Borghi and Zarcone, 2016). Since the pacifier affects facial mimicry forcing mouth muscles into a static position, we hypothesize its possible interference on acquisition/consolidation of abstract emotional and abstract not-emotional concepts, which are mainly conveyed during social and linguistic interactions, than of concrete concepts. Fifty-nine first grade children, with a history of different frequency of pacifier use, provided oral definitions of the meaning of abstract not-emotional, abstract emotional, and concrete words. Main effect of concept type emerged, with higher accuracy in defining concrete and abstract emotional concepts with respect to abstract not-emotional concepts, independently from pacifier use. Accuracy in definitions was not influenced by the use of pacifier, but correspondence and hierarchical clustering analyses suggest that the use of pacifier differently modulates the conceptual relations elicited by abstract emotional and abstract not-emotional. While the majority of the children produced a similar pattern of conceptual relations, analyses on the few (6) children who overused the pacifier (for more than 3 years) showed that they tend to distinguish less clearly between concrete and

  2. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  3. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  4. Minimalism in architecture: Abstract conceptualization of architecture

    Directory of Open Access Journals (Sweden)

    Vasilski Dragana

    2015-01-01

    Full Text Available Minimalism in architecture contains the idea of the minimum as a leading creative tend to be considered and interpreted in working through phenomena of empathy and abstraction. In the Western culture, the root of this idea is found in empathy of Wilhelm Worringer and abstraction of Kasimir Malevich. In his dissertation, 'Abstraction and Empathy' Worringer presented his thesis on the psychology of style through which he explained the two opposing basic forms: abstraction and empathy. His conclusion on empathy as a psychological basis of observation expression is significant due to the verbal congruence with contemporary minimalist expression. His intuition was enhenced furthermore by figure of Malevich. Abstraction, as an expression of inner unfettered inspiration, has played a crucial role in the development of modern art and architecture of the twentieth century. Abstraction, which is one of the basic methods of learning in psychology (separating relevant from irrelevant features, Carl Jung is used to discover ideas. Minimalism in architecture emphasizes the level of abstraction to which the individual functions are reduced. Different types of abstraction are present: in the form as well as function of the basic elements: walls and windows. The case study is an example of Sou Fujimoto who is unequivocal in its commitment to the autonomy of abstract conceptualization of architecture.

  5. Analysis of complex networks using aggressive abstraction.

    Energy Technology Data Exchange (ETDEWEB)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  6. Automata Learning through Counterexample Guided Abstraction Refinement

    DEFF Research Database (Denmark)

    Aarts, Fides; Heidarian, Faranak; Kuppens, Harco

    2012-01-01

    Abstraction is the key when learning behavioral models of realistic systems. Hence, in most practical applications where automata learning is used to construct models of software components, researchers manually define abstractions which, depending on the history, map a large set of concrete events...... to a small set of abstract events that can be handled by automata learning tools. In this article, we show how such abstractions can be constructed fully automatically for a restricted class of extended finite state machines in which one can test for equality of data parameters, but no operations on data...... automatically – models of several realistic software components, including the biometric passport and the SIP protocol....

  7. Injecting Abstract Interpretations into Linear Cost Models

    Directory of Open Access Journals (Sweden)

    David Cachera

    2010-06-01

    Full Text Available We present a semantics based framework for analysing the quantitative behaviour of programs with regard to resource usage. We start from an operational semantics equipped with costs. The dioid structure of the set of costs allows for defining the quantitative semantics as a linear operator. We then present an abstraction technique inspired from abstract interpretation in order to effectively compute global cost information from the program. Abstraction has to take two distinct notions of order into account: the order on costs and the order on states. We show that our abstraction technique provides a correct approximation of the concrete cost computations.

  8. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  9. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  10. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  11. A Simple Decoder for Topological Codes

    Directory of Open Access Journals (Sweden)

    James Wootton

    2015-04-01

    Full Text Available Here we study an efficient algorithm for decoding topological codes. It is a simple form of HDRG decoder, which could be straightforwardly generalized to complex decoding problems. Specific results are obtained for the planar code with both i.i.d. and spatially correlated errors. The method is shown to compare well with existing ones, despite its simplicity.

  12. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  13. Abstract: Magnitude and Outcome of Resuscitation Activities at ...

    African Journals Online (AJOL)

    Abstract: Magnitude and Outcome of Resuscitation Activities at Rwanda Military Hospital for the Period of April 2013-September 2013. ... Lack of compliance with drug administration guidelines was noted, particularly in the lack of initiating administration of specific drugs, despite the drug being available (59%). Conclusion

  14. MeGARA: Menu-based Game Abstraction and Abstraction Refinement of Markov Automata

    OpenAIRE

    Braitling, Bettina; Fioriti, Luis María Ferrer; Hatefi, Hassan; Wimmer, Ralf; Becker, Bernd; Hermanns, Holger

    2014-01-01

    Markov automata combine continuous time, probabilistic transitions, and nondeterminism in a single model. They represent an important and powerful way to model a wide range of complex real-life systems. However, such models tend to be large and difficult to handle, making abstraction and abstraction refinement necessary. In this paper we present an abstraction and abstraction refinement technique for Markov automata, based on the game-based and menu-based abstraction of probabilistic automata...

  15. Writing business research article abstracts: A genre approach

    Directory of Open Access Journals (Sweden)

    Carmen Piqué-Noguera

    2012-10-01

    Full Text Available A great deal has been published about oral and written genres in business (e.g., letters, research articles, oral presentations, etc., and less attention has been paid to business research article abstracts as a written genre, as many experts would argue. This research intends to raise rhetorical awareness about the role of abstracts in today’s academic world. To this effect, the abstracts of two official publications of the Association of Business Communication, Journal of Business Communication and Business Communication Quarterly, have been analyzed and compared in terms of structure and content according to models published in the specialized literature. The results show an irregular and inconsistent presentation of abstracts, a good number of them following no set pattern and thus lacking in important information for researchers. These findings suggest, first of all, that abstracts have a specific mission to fulfil and should not be disregarded; and, secondly, that journal guidelines for authors should be more explicit in their instructions on how to write and structure abstracts.

  16. Superior abstract-concept learning by Clark's nutcrackers (Nucifraga columbiana).

    Science.gov (United States)

    Magnotti, John F; Katz, Jeffrey S; Wright, Anthony A; Kelly, Debbie M

    2015-05-01

    The ability to learn abstract relational concepts is fundamental to higher level cognition. In contrast to item-specific concepts (e.g. pictures containing trees versus pictures containing cars), abstract relational concepts are not bound to particular stimulus features, but instead involve the relationship between stimuli and therefore may be extrapolated to novel stimuli. Previous research investigating the same/different abstract concept has suggested that primates might be specially adapted to extract relations among items and would require fewer exemplars of a rule to learn an abstract concept than non-primate species. We assessed abstract-concept learning in an avian species, Clark's nutcracker (Nucifraga columbiana), using a small number of exemplars (eight pairs of the same rule, and 56 pairs of the different rule) identical to that previously used to compare rhesus monkeys, capuchin monkeys and pigeons. Nutcrackers as a group (N = 9) showed more novel stimulus transfer than any previous species tested with this small number of exemplars. Two nutcrackers showed full concept learning and four more showed transfer considerably above chance performance, indicating partial concept learning. These results show that the Clark's nutcracker, a corvid species well known for its amazing feats of spatial memory, learns the same/different abstract concept better than any non-human species (including non-human primates) yet tested on this same task. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  17. Coding theory and cryptography the essentials

    CERN Document Server

    Hankerson, DC; Leonard, DA; Phelps, KT; Rodger, CA; Wall, JR; Wall, J R

    2000-01-01

    Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an ""easy-to-use"" manner appropriate for students with only a basic background in mathematics offering revised and updated material on the Berlekamp-Massey decoding algorithm and convolutional codes. Introducing the mathematics as it is needed and providing exercises with solutions, this edition includes an extensive section on cryptography, desig

  18. Data Abstraction Mechanisms in Sina/st

    NARCIS (Netherlands)

    Meyrowitz, N.K.; Aksit, Mehmet; Tripathi, Anand

    1988-01-01

    This paper describes a new data abstraction mechanism in an object-oriented model of computing. The data abstraction mechanism described here has been devised in the context of the design of Sina/st language. In Sina/st no language constructs have been adopted for specifying inheritance or

  19. Visual Abstraction and Stylisation of Maps

    NARCIS (Netherlands)

    Isenberg, Tobias

    We explore visual map abstraction for the generation of stylized renderings of 2D map data. We employ techniques that are centred around the concept of shape simplification and graph layout and that allow iterative abstraction of 2D maps. We use data from publicly available sources and show how we

  20. Abstract algebra an introduction with applications

    CERN Document Server

    Robinson, Derek JS

    2015-01-01

    This is the second edition of the introduction to abstract algebra. In addition to introducing the main concepts of modern algebra, the book contains numerous applications, which are intended to illustrate the concepts and to convince the reader of the utility and relevance of algebra today. There is ample material here for a two semester course in abstract algebra.

  1. Foundations of the Bandera Abstraction Tools

    Science.gov (United States)

    Hatcliff, John; Dwyer, Matthew B.; Pasareanu, Corina S.; Robby

    2003-01-01

    Current research is demonstrating that model-checking and other forms of automated finite-state verification can be effective for checking properties of software systems. Due to the exponential costs associated with model-checking, multiple forms of abstraction are often necessary to obtain system models that are tractable for automated checking. The Bandera Tool Set provides multiple forms of automated support for compiling concurrent Java software systems to models that can be supplied to several different model-checking tools. In this paper, we describe the foundations of Bandera's data abstraction mechanism which is used to reduce the cardinality (and the program's state-space) of data domains in software to be model-checked. From a technical standpoint, the form of data abstraction used in Bandera is simple, and it is based on classical presentations of abstract interpretation. We describe the mechanisms that Bandera provides for declaring abstractions, for attaching abstractions to programs, and for generating abstracted programs and properties. The contributions of this work are the design and implementation of various forms of tool support required for effective application of data abstraction to software components written in a programming language like Java which has a rich set of linguistic features.

  2. Abstract Machines for Programming Language Implementation

    NARCIS (Netherlands)

    Diehl, Stephan; Hartel, Pieter H.; Sestoft, Peter

    We present an extensive, annotated bibliography of the abstract machines designed for each of the main programming paradigms (imperative, object oriented, functional, logic and concurrent). We conclude that whilst a large number of efficient abstract machines have been designed for particular

  3. Geometry of abstraction in quantum computation

    NARCIS (Netherlands)

    Pavlovic, Dusko; Abramsky, S.; Mislove, M.W.

    2012-01-01

    Quantum algorithms are sequences of abstract operations, per formed on non-existent computers. They are in obvious need of categorical semantics. We present some steps in this direction, following earlier contribu tions of Abramsky, Goecke and Selinger. In particular, we analyze function abstraction

  4. Interactional Metadiscourse in Research Article Abstracts

    Science.gov (United States)

    Gillaerts, Paul; Van de Velde, Freek

    2010-01-01

    This paper deals with interpersonality in research article abstracts analysed in terms of interactional metadiscourse. The evolution in the distribution of three prominent interactional markers comprised in Hyland's (2005a) model, viz. hedges, boosters and attitude markers, is investigated in three decades of abstract writing in the field of…

  5. Abstraction Power in Computer Science Education

    DEFF Research Database (Denmark)

    Bennedsen, Jens Benned; Caspersen, Michael Edelgaard

    2006-01-01

    The paper is a discussion of the hypothesis that a person’s abstraction power (or ability) has a positive influence on their ability to program.......The paper is a discussion of the hypothesis that a person’s abstraction power (or ability) has a positive influence on their ability to program....

  6. Review of codes, standards, and regulations for natural gas locomotives.

    Science.gov (United States)

    2014-06-01

    This report identified, collected, and summarized relevant international codes, standards, and regulations with potential : applicability to the use of natural gas as a locomotive fuel. Few international or country-specific codes, standards, and regu...

  7. Water evaporation over sump surface in nuclear containment studies: CFD and LP codes validation on TOSQAN tests

    Energy Technology Data Exchange (ETDEWEB)

    Malet, J., E-mail: jeanne.malet@irsn.fr [Institut de Radioprotection et de Sûreté Nucléaire (IRSN), PSN-RES/SCA BP 68, 91192 Gif-sur-Yvette (France); Degrees du Lou, O. [Institut de Radioprotection et de Sûreté Nucléaire (IRSN), PSN-RES/SCA BP 68, 91192 Gif-sur-Yvette (France); Arts et Métiers ParisTech, DynFluid Lab. EA92, 151, boulevard de l’Hôpital, 75013 Paris (France); Gelain, T. [Institut de Radioprotection et de Sûreté Nucléaire (IRSN), PSN-RES/SCA BP 68, 91192 Gif-sur-Yvette (France)

    2013-10-15

    Highlights: • Simulations of evaporative TOSQAN sump tests are performed. • These tests are under air–steam gas conditions with addition of He, CO{sub 2} and SF{sub 6}. • ASTEC-CPA LP and TONUS-CFD codes with UDF for sump model are used. • Validation of sump models of both codes show good results. • The code–experiment differences are attributed to turbulent gas mixing modeling. -- Abstract: During the course of a severe accident in a Nuclear Power Plant, water can be collected in the sump containment through steam condensation on walls and spray systems activation. The objective of this paper is to present code validation on evaporative sump tests performed on TOSQAN facility. The ASTEC-CPA code is used as a lumped-parameter code and specific user-defined-functions are developed for the TONUS-CFD code. The seven tests are air–steam tests, as well as tests with other non-condensable gases (He, CO{sub 2} and SF{sub 6}) under steady and transient conditions (two depressurization tests). The results show a good agreement between codes and experiments, indicating a good behavior of the sump models in both codes. The sump model developed as User-Defined Functions (UDF) for TONUS is considered as well validated and is ‘ready-to-use’ for all CFD codes in which such UDF can be added. The remaining discrepancies between codes and experiments are caused by turbulent transport and gas mixing, especially in the presence of non-condensable gases other than air, so that code validation on this important topic for hydrogen safety analysis is still recommended.

  8. Improving the Automated Detection and Analysis of Secure Coding Violations

    Science.gov (United States)

    2014-06-01

    vulnerabilities in the National Vulnerability Database in 2004 were caused by programming errors. The CERT Division’s Source Code Analysis Laboratory (SCALe...was as follows: 1. Modify SCALe workflow, infrastructure, and database (s) to support data collection and in- strumentation, such as the measurement of...12A DISTRIBUTION/AVAILABILITY STATEMENT Unclassified/Unlimited, DTIC, NTIS 12B DISTRIBUTION CODE 13. ABSTRACT (MAXIMUM 200 WORDS) Coding errors

  9. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  10. Factors Affecting Accuracy of Data Abstracted from Medical Records.

    Directory of Open Access Journals (Sweden)

    Meredith N Zozus

    Full Text Available Medical record abstraction (MRA is often cited as a significant source of error in research data, yet MRA methodology has rarely been the subject of investigation. Lack of a common framework has hindered application of the extant literature in practice, and, until now, there were no evidence-based guidelines for ensuring data quality in MRA. We aimed to identify the factors affecting the accuracy of data abstracted from medical records and to generate a framework for data quality assurance and control in MRA.Candidate factors were identified from published reports of MRA. Content validity of the top candidate factors was assessed via a four-round two-group Delphi process with expert abstractors with experience in clinical research, registries, and quality improvement. The resulting coded factors were categorized into a control theory-based framework of MRA. Coverage of the framework was evaluated using the recent published literature.Analysis of the identified articles yielded 292 unique factors that affect the accuracy of abstracted data. Delphi processes overall refuted three of the top factors identified from the literature based on importance and five based on reliability (six total factors refuted. Four new factors were identified by the Delphi. The generated framework demonstrated comprehensive coverage. Significant underreporting of MRA methodology in recent studies was discovered.The framework generated from this research provides a guide for planning data quality assurance and control for studies using MRA. The large number and variability of factors indicate that while prospective quality assurance likely increases the accuracy of abstracted data, monitoring the accuracy during the abstraction process is also required. Recent studies reporting research results based on MRA rarely reported data quality assurance or control measures, and even less frequently reported data quality metrics with research results. Given the demonstrated

  11. On Abstraction Levels For Software Architecture Viewpoints

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2005-01-01

    In the field of software architecture the abstraction level of a viewpoint has often been defined on a scale from low to high. However, the definition of abstraction levels on a scale from low to high makes it very subjective what is at each level. This makes it difficult to apply the different...... abstraction levels defined in this paper, viewpoints can be described more accurately and applied more consistently. This can help developers easier gain proficiency in the use of viewpoints to describe software architectures of systems. In this paper concepts which clarify the relation between the defined...... abstraction levels and viewpoints are also defined. Use of the three abstraction levels in practice will be illustrated by a case study which will present examples of viewpoints at the different levels. The role of the levels in connection with novice architects will also be discussed....

  12. CODE: Description Language for Wireless Collaborating Objects

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.

    2005-01-01

    This paper introduces CODE, a Description Language for Wireless Collaborating Objects (WCO), with the specific aim of enabling service management in smart environments. WCO extend the traditional model of wireless sensor networks by transferring additional intelligence and responsibility from the

  13. Critical Lengths of Error Events in Convolutional Codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Andersen, Jakob Dahl

    1996-01-01

    If the calculation of the critical length is based on the expurgated exponent, the length becomes nonzero for low error probabilitites. This result applies to typical long codes, but it may also be useful for modelling error events in specific codes......If the calculation of the critical length is based on the expurgated exponent, the length becomes nonzero for low error probabilitites. This result applies to typical long codes, but it may also be useful for modelling error events in specific codes...

  14. Critical lengths of error events in convolutional codes

    DEFF Research Database (Denmark)

    Justesen, Jørn

    1994-01-01

    If the calculation of the critical length is based on the expurgated exponent, the length becomes nonzero for low error probabilities. This result applies to typical long codes, but it may also be useful for modeling error events in specific codes......If the calculation of the critical length is based on the expurgated exponent, the length becomes nonzero for low error probabilities. This result applies to typical long codes, but it may also be useful for modeling error events in specific codes...

  15. Critical Lengths of Error Events in Convolutional Codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Andersen, Jakob Dahl

    1998-01-01

    If the calculation of the critical length is based on the expurgated exponent, the length becomes nonzero for low error probabilities. This result applies to typical long codes, but it may also be useful for modeling error events in specific codes......If the calculation of the critical length is based on the expurgated exponent, the length becomes nonzero for low error probabilities. This result applies to typical long codes, but it may also be useful for modeling error events in specific codes...

  16. Ecoacoustic codes and ecological complexity.

    Science.gov (United States)

    Farina, Almo

    2018-02-01

    Multi-layer communication and sensing network assures the exchange of relevant information between animals and their umwelten, imparting complexity to the ecological systems. Individual soniferous species, the acoustic community, and soundscape are the three main operational levels that comprise this multi-layer network. Acoustic adaptation and acoustic niche are two more important mechanisms that regulate the acoustic performances at the first level while the acoustic community model explains the complexity of the interspecific acoustic network at the second level. Acoustic habitat and ecoacoustic events are two of the most relevant mechanisms that operate at the third level. The exchange of ecoacoustic information on each of these levels is assured by ecoacoustic codes. At the level of individual sonifeorus species, a dyadic intraspecific exchange of information is established between an emitter and a receiver. Ecoacoustic codes discriminate, identify, and label specific signals that pertain to the theme, variation, motif repetition, and intensity of signals. At the acoustic community level, a voluntarily or involuntarily communication is established between networks of interspecific emitters and receivers. Ecoacoustic codes at this level transmit information (e.g., recognition of predators, location of food sources, availability and location of refuges) between one species and the acoustically interacting community and impart cohesion to interspecific assemblages. At the soundscape level, acoustic information is transferred from a mosaic of geophonies, biophonies, and technophonies to different species that discriminate meaningful ecoacoustic events and their temporal dynamics during habitat selection processes. Ecoacoustic codes at this level operate on a limited set of signals from the environmental acoustic dynamic that are heterogeneous in time and space, and these codes are interpreted differently according to the species during habitat selection and the

  17. MeGARA: Menu-based Game Abstraction and Abstraction Refinement of Markov Automata

    Directory of Open Access Journals (Sweden)

    Bettina Braitling

    2014-06-01

    Full Text Available Markov automata combine continuous time, probabilistic transitions, and nondeterminism in a single model. They represent an important and powerful way to model a wide range of complex real-life systems. However, such models tend to be large and difficult to handle, making abstraction and abstraction refinement necessary. In this paper we present an abstraction and abstraction refinement technique for Markov automata, based on the game-based and menu-based abstraction of probabilistic automata. First experiments show that a significant reduction in size is possible using abstraction.

  18. Abstract spatial reasoning as an autistic strength.

    Directory of Open Access Journals (Sweden)

    Jennifer L Stevenson

    Full Text Available Autistic individuals typically excel on spatial tests that measure abstract reasoning, such as the Block Design subtest on intelligence test batteries and the Raven's Progressive Matrices nonverbal test of intelligence. Such well-replicated findings suggest that abstract spatial processing is a relative and perhaps absolute strength of autistic individuals. However, previous studies have not systematically varied reasoning level--concrete vs. abstract--and test domain--spatial vs. numerical vs. verbal, which the current study did. Autistic participants (N = 72 and non-autistic participants (N = 72 completed a battery of 12 tests that varied by reasoning level (concrete vs. abstract and domain (spatial vs. numerical vs. verbal. Autistic participants outperformed non-autistic participants on abstract spatial tests. Non-autistic participants did not outperform autistic participants on any of the three domains (spatial, numerical, and verbal or at either of the two reasoning levels (concrete and abstract, suggesting similarity in abilities between autistic and non-autistic individuals, with abstract spatial reasoning as an autistic strength.

  19. Abstract Spatial Reasoning as an Autistic Strength

    Science.gov (United States)

    Stevenson, Jennifer L.; Gernsbacher, Morton Ann

    2013-01-01

    Autistic individuals typically excel on spatial tests that measure abstract reasoning, such as the Block Design subtest on intelligence test batteries and the Raven’s Progressive Matrices nonverbal test of intelligence. Such well-replicated findings suggest that abstract spatial processing is a relative and perhaps absolute strength of autistic individuals. However, previous studies have not systematically varied reasoning level – concrete vs. abstract – and test domain – spatial vs. numerical vs. verbal, which the current study did. Autistic participants (N = 72) and non-autistic participants (N = 72) completed a battery of 12 tests that varied by reasoning level (concrete vs. abstract) and domain (spatial vs. numerical vs. verbal). Autistic participants outperformed non-autistic participants on abstract spatial tests. Non-autistic participants did not outperform autistic participants on any of the three domains (spatial, numerical, and verbal) or at either of the two reasoning levels (concrete and abstract), suggesting similarity in abilities between autistic and non-autistic individuals, with abstract spatial reasoning as an autistic strength. PMID:23533615

  20. HIFSuite: Tools for HDL Code Conversion and Manipulation

    Directory of Open Access Journals (Sweden)

    Bombieri Nicola

    2010-01-01

    Full Text Available Abstract HIFSuite ia a set of tools and application programming interfaces (APIs that provide support for modeling and verification of HW/SW systems. The core of HIFSuite is the HDL Intermediate Format (HIF language upon which a set of front-end and back-end tools have been developed to allow the conversion of HDL code into HIF code and vice versa. HIFSuite allows designers to manipulate and integrate heterogeneous components implemented by using different hardware description languages (HDLs. Moreover, HIFSuite includes tools, which rely on HIF APIs, for manipulating HIF descriptions in order to support code abstraction/refinement and postrefinement verification.

  1. Experience and abstract reasoning in learning backward induction

    Directory of Open Access Journals (Sweden)

    Daniel R. Hawes

    2012-02-01

    Full Text Available Backward induction is a benchmark of game theoretic rationality, yet surprisingly little is known as to how humans discover and initially learn to apply this abstract solution concept in experimental settings. We use behavioral and functional magnetic resonance imaging (fMRI data to study the way in which subjects playing in a sequential game of perfect information learn the optimal backward induction strategy for the game. Experimental data from our two studies support two main findings:First, subjects converge to a common process of recursive inference similar to the backward induction procedure for solving the game. The process is recursive because earlier insights and conclusions are used as inputs in later steps of the inference. This process is matched by a similar pattern in brain activation, which also proceeds backward, following the prediction error: brain activity initially codes the responses to losses in final positions; in later trials this activity shifts to the starting position.Second, the learning process is not exclusively cognitive, but instead combines experience based learning and abstract reasoning. Critical experiences leading to the adoption of an improved solution strategy appear to be stimulated by brain activity in the reward system. This indicates that the negative affect induced by initial failures facilitates the switch to a different method of solving the problem. Abstract reasoning is combined with this response, and is expressed by activation in the ventrolateral prefrontal cortex. Differences in brain activation match differences in performance between subjects who show different learning speeds.

  2. Abstract Generation based on Rhetorical Structure Extraction

    CERN Document Server

    Ono, K; Ono, Kenji; Sumita, Kazuo

    1994-01-01

    We have developed an automatic abstract generation system for Japanese expository writings based on rhetorical structure extraction. The system first extracts the rhetorical structure, the compound of the rhetorical relations between sentences, and then cuts out less important parts in the extracted structure to generate an abstract of the desired length. Evaluation of the generated abstract showed that it contains at maximum 74\\% of the most important sentences of the original text. The system is now utilized as a text browser for a prototypical interactive document retrieval system.

  3. Collected abstracts on particle beam diagnostic systems

    Energy Technology Data Exchange (ETDEWEB)

    Hickok, R.L.

    1979-01-01

    This report contains a compilation of abstracts on work related to particle beam diagnostics for high temperature plasmas. The abstracts were gathered in early 1978 and represent the status of the various programs as of that date. It is not suggested that this is a comprehensive list of all the work that is going on in the development of particle beam diagnostics, but it does provide a representative view of the work in this field. For example, no abstracts were received from the U.S.S.R. even though they have considerable activity in particle beam diagnostics.

  4. Abstraction in artificial intelligence and complex systems

    CERN Document Server

    Saitta, Lorenza

    2013-01-01

    Abstraction is a fundamental mechanism underlying both human and artificial perception, representation of knowledge, reasoning and learning. This mechanism plays a crucial role in many disciplines, notably Computer Programming, Natural and Artificial Vision, Complex Systems, Artificial Intelligence and Machine Learning, Art, and Cognitive Sciences. This book first provides the reader with an overview of the notions of abstraction proposed in various disciplines by comparing both commonalities and differences.  After discussing the characterizing properties of abstraction, a formal model, the K

  5. Class Representation of Shapes Using Qualitative-codes

    Directory of Open Access Journals (Sweden)

    Ashraf Fouad Hafez Ismail

    2001-01-01

    Full Text Available This paper introduces our qualitative shape representation formalism that is devised to overcome, as we have argued, the class abstraction problems created by numeric schemes. The numeric shape representation method used in conventional geometric modeling systems reveals difficulties in several aspects of architectural designing. Firstly, numeric schemes strongly require complete and detailed information for any simple task of object modeling. This requirement of information completeness makes it hard to apply numeric schemes to shapes in sketch level drawings that are characteristically ambiguous and have non-specific limitations on shape descriptions. Secondly, Cartesian coordinate-based quantitative shape representation schemes show restrictions in the task of shape comparison and classification that are inevitably involved in abstract concepts related to shape characteristics. One of the reasons why quantitative schemes are difficult to apply to the abstraction of individual shape information into its classes and categories is the uniqueness property, meaning that an individual description in a quantitative scheme should refer to only one object in the domain of representation. A class representation, however, should be able to indicate not only one but also a group of objects sharing common characteristics. Thirdly, it is difficult or inefficient to apply numeric shape representation schemes based on the Cartesian coordinate system to preliminary shape analysis and modeling tasks because of their emphasis on issues, such as detail, completeness, uniqueness and individuality, which can only be accessed in the final stages of designing. Therefore, we face the need for alternative shape representation schemes that can handle class representation of objects in order to manage the shapes in the early stages of designing. We consider shape as a boundary description consisting of a set of connected and closed lines. Moreover, we need to consider

  6. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  7. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  8. Overview of Code Verification

    Science.gov (United States)

    1983-01-01

    The verified code for the SIFT Executive is not the code that executes on the SIFT system as delivered. The running versions of the SIFT Executive contain optimizations and special code relating to the messy interface to the hardware broadcast interface and to packing of data to conserve space in the store of the BDX930 processors. The running code was in fact developed prior to and without consideration of any mechanical verification. This was regarded as necessary experimentation with the SIFT hardware and special purpose Pascal compiler. The Pascal code sections cover: the selection of a schedule from the global executive broadcast, scheduling, dispatching, three way voting, and error reporting actions of the SIFT Executive. Not included in these sections of Pascal code are: the global executive, five way voting, clock synchronization, interactive consistency, low level broadcasting, and program loading, initialization, and schedule construction.

  9. Validity of code based algorithms to identify primary open angle glaucoma (POAG) in Veterans Affairs (VA) administrative databases.

    Science.gov (United States)

    Biggerstaff, K S; Frankfort, B J; Orengo-Nania, S; Garcia, J; Chiao, E; Kramer, J R; White, D

    2017-09-25

    The validity of the International Classification of Diseases, 9th revision, Clinical Modification (ICD-9) code for primary open angle glaucoma (POAG) in the Department of Veterans Affairs (VA) electronic medical record has not been examined. We determined the accuracy of the ICD-9 code for POAG and developed diagnostic algorithms for the detection of POAG. We conducted a retrospective study of abstracted data from the Michael E. DeBakey VA Medical Center's medical records of 334 unique patients with at least one visit to the Eye Clinic between 1999 and 2013. Algorithms were developed to validly identify POAG using ICD-9 codes and pharmacy data. The positive predictive value (PPV), negative predictive value (NPV), sensitivity, specificity and percent agreement of the various algorithms were calculated. For the ICD-9 code 365.1x, the PPV was 65.9%, NPV was 95.2%, sensitivity was 100%, specificity was 82.6%, and percent agreement was 87.8%. The algorithm with the highest PPV was 76.3%, using pharmacy data in conjunction with two or more ICD-9 codes for POAG, but this algorithm also had the lowest NPV at 88.2%. Various algorithms for identifying POAG in the VA administrative databases have variable validity. Depending on the type of research being done, the ICD-9 code 365.1x can be used for epidemiologic or health services database research.

  10. Methods for Coding Tobacco-Related Twitter Data: A Systematic Review.

    Science.gov (United States)

    Lienemann, Brianna A; Unger, Jennifer B; Cruz, Tess Boley; Chu, Kar-Hai

    2017-03-31

    As Twitter has grown in popularity to 313 million monthly active users, researchers have increasingly been using it as a data source for tobacco-related research. The objective of this systematic review was to assess the methodological approaches of categorically coded tobacco Twitter data and make recommendations for future studies. Data sources included PsycINFO, Web of Science, PubMed, ABI/INFORM, Communication Source, and Tobacco Regulatory Science. Searches were limited to peer-reviewed journals and conference proceedings in English from January 2006 to July 2016. The initial search identified 274 articles using a Twitter keyword and a tobacco keyword. One coder reviewed all abstracts and identified 27 articles that met the following inclusion criteria: (1) original research, (2) focused on tobacco or a tobacco product, (3) analyzed Twitter data, and (4) coded Twitter data categorically. One coder extracted data collection and coding methods. E-cigarettes were the most common type of Twitter data analyzed, followed by specific tobacco campaigns. The most prevalent data sources were Gnip and Twitter's Streaming application programming interface (API). The primary methods of coding were hand-coding and machine learning. The studies predominantly coded for relevance, sentiment, theme, user or account, and location of user. Standards for data collection and coding should be developed to be able to more easily compare and replicate tobacco-related Twitter results. Additional recommendations include the following: sample Twitter's databases multiple times, make a distinction between message attitude and emotional tone for sentiment, code images and URLs, and analyze user profiles. Being relatively novel and widely used among adolescents and black and Hispanic individuals, Twitter could provide a rich source of tobacco surveillance data among vulnerable populations.

  11. Methods for Coding Tobacco-Related Twitter Data: A Systematic Review

    Science.gov (United States)

    Unger, Jennifer B; Cruz, Tess Boley; Chu, Kar-Hai

    2017-01-01

    Background As Twitter has grown in popularity to 313 million monthly active users, researchers have increasingly been using it as a data source for tobacco-related research. Objective The objective of this systematic review was to assess the methodological approaches of categorically coded tobacco Twitter data and make recommendations for future studies. Methods Data sources included PsycINFO, Web of Science, PubMed, ABI/INFORM, Communication Source, and Tobacco Regulatory Science. Searches were limited to peer-reviewed journals and conference proceedings in English from January 2006 to July 2016. The initial search identified 274 articles using a Twitter keyword and a tobacco keyword. One coder reviewed all abstracts and identified 27 articles that met the following inclusion criteria: (1) original research, (2) focused on tobacco or a tobacco product, (3) analyzed Twitter data, and (4) coded Twitter data categorically. One coder extracted data collection and coding methods. Results E-cigarettes were the most common type of Twitter data analyzed, followed by specific tobacco campaigns. The most prevalent data sources were Gnip and Twitter’s Streaming application programming interface (API). The primary methods of coding were hand-coding and machine learning. The studies predominantly coded for relevance, sentiment, theme, user or account, and location of user. Conclusions Standards for data collection and coding should be developed to be able to more easily compare and replicate tobacco-related Twitter results. Additional recommendations include the following: sample Twitter’s databases multiple times, make a distinction between message attitude and emotional tone for sentiment, code images and URLs, and analyze user profiles. Being relatively novel and widely used among adolescents and black and Hispanic individuals, Twitter could provide a rich source of tobacco surveillance data among vulnerable populations. PMID:28363883

  12. Phonological coding during reading

    Science.gov (United States)

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  13. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  14. Identifying Codes on Directed De Bruijn Graphs

    Science.gov (United States)

    2015-08-27

    JOURNAL ARTICLE (POST PRINT) 3. DATES COVERED (From - To) JUN 2013 – AUG 2015 4. TITLE AND SUBTITLE IDENTIFYING CODES ON DIRECTED DE BRUIJN GRAPHS 5a...owner. 14. ABSTRACT For a directed graph G, a t-identifying code is a subset S ⊆ V (G) with the property that for each vertex v ∈ V (G) the set of...vertices of S reachable from v by a directed path of length at most t is both non-empty and unique. A graph is called t- identifiable if there exists a

  15. On tentative decommissioning cost analysis with specific authentic cost calculations with the application of the Omega code on a case linked to the Intermediate storage facility for spent fuel in Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Vasko, Marek; Daniska, Vladimir; Ondra, Frantisek; Bezak, Peter; Kristofova, Kristina; Tatransky, Peter; Zachar, Matej [DECOM Slovakia, spol. s.r.o., J. Bottu 2, SK-917 01 Trnava (Slovakia); Lindskog, Staffan [Swedish Nuclear Power Inspectorate, Stockholm (Sweden)

    2007-03-15

    The presented report is focused on tentative calculations of basic decommissioning parameters such as costs, manpower and exposure of personnel for activities of older nuclear facility decommissioning in Sweden represented by Intermediate storage facility for spent fuel in Studsvik, by means of calculation code OMEGA. This report continuously follows up two previous projects, which described methodology of cost estimates of decommissioning with an emphasis to derive cost functions for alpha contaminated material and implementation of the advanced decommissioning costing methodology for Intermediate Storage facility for Spent Fuel in Studsvik. The main purpose of the presented study is to demonstrate the trial application of the advanced costing methodology using OMEGA code for Intermediate Storage Facility for Spent Fuel in Studsvik. Basic work packages presented in report are as follows: 1. Analysis and validation input data on Intermediate Storage Facility for Spent Fuel and assemble a database suitable for standardised decommissioning cost calculations including radiological parameters, 2. Proposal of range of decommissioning calculations and define an extent of decommissioning activities, 3. Defining waste management scenarios for particular material waste streams from Intermediate Storage Facility for Spent Fuel, 4. Developing standardised cost calculation structure applied for Intermediate Storage Facility for Spent Fuel decommissioning calculation and 5. Performing tentative decommissioning calculations for Intermediate Storage Facility for Spent Fuel by OMEGA code. Calculated parameters of decommissioning are presented in structure according to Proposed Standardized List of Items for Costing Purposes. All parameters are documented and summed up in both table and graphic forms in text and Annexes. The presented report documents availability and applicability of methodology for evaluation of costs and other parameters of decommissioning in a form implemented

  16. GIBS Geospatial Data Abstraction Library (GDAL)

    Data.gov (United States)

    National Aeronautics and Space Administration — GDAL is an open source translator library for raster geospatial data formats that presents a single abstract data model to the calling application for all supported...

  17. Complex of abstract cubes and median problem

    Directory of Open Access Journals (Sweden)

    Sergiu Cataranciuc

    2011-06-01

    Full Text Available In this paper a special complex $\\mathcal{K}^{n}$ of abstract cubes [2, 3], which contains only $n$-dimensional cubes is examined. The border of this complex is an abstract $(n-1$-dimensional sphere. It is proved that the abstract sphere contains at least one $0$-dimensional cube, which belongs to exactly $n$ cubes with dimension $1$, if the complex is a homogeneous $n$-dimensional tree. This result allows to solve, in an efficient way, the problem of median for a skeleton of size $1$ of the tree with weighted vertices and edges. The algorithm to calculate the median without using any metric is described. The proposed algorithm can be applied with some modifications, for arbitrary complex of abstract cubes. Mathematics subject classification: 18F15, 32Q60, 68R10

  18. Pulmonary toxicology of respirable particles. [Lead abstract

    Energy Technology Data Exchange (ETDEWEB)

    Sanders, C.L.; Cross, F.T.; Dagle, G.E.; Mahaffey, J.A. (eds.)

    1980-09-01

    Separate abstracts were prepared for the 44 papers presented in these proceedings. The last paper (Stannard) in the proceedings is an historical review of the field of inhalation toxicology and is not included in the analytics. (DS)

  19. Management plan abstract and keyword generator

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This fill-in-the-blank Word form will generate abstracts for common management plans including: cropland management, disease contingency, fire management, fishing,...

  20. Writing a research abstract: eloquence in miniature.

    Science.gov (United States)

    Papanas, N; Georgiadis, G S; Maltezos, E; Lazarides, M K

    2012-06-01

    Abstracts are summaries, usually of a full article or conference presentation, and may be classified into structured and unstructured ones. The former have a predefined layout necessitating the use of headings. Most journals and conferences now use the structured abstract format. Research abstracts are increasingly vital for scientific communication and are expected to continue playing a key role for the dissemination of medicine in the near future. Abstracts take time and need meticulous preparation. They must aptly summarise the content of the study or presentation and avoid vague statements and poor style. Moreover, they must comply with provided instructions. Finally, they should be pleasant to read and encourage study of the corresponding full work.

  1. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  2. Decoding of Cyclic Codes,

    Science.gov (United States)

    INFORMATION THEORY, *DECODING), (* DATA TRANSMISSION SYSTEMS , DECODING), STATISTICAL ANALYSIS, STOCHASTIC PROCESSES, CODING, WHITE NOISE, NUMBER THEORY, CORRECTIONS, BINARY ARITHMETIC, SHIFT REGISTERS, CONTROL SYSTEMS, USSR

  3. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  4. Diameter Perfect Lee Codes

    CERN Document Server

    Horak, Peter

    2011-01-01

    Lee codes have been intensively studied for more than 40 years. Interest in these codes has been triggered by the Golomb-Welch conjecture on the existence of perfect error-correcting Lee codes. In this paper we deal with the existence and enumeration of diameter perfect Lee codes. As main results we determine all q for which there exists a linear diameter-4 perfect Lee code of word length n over Z_{q}, and prove that for each n\\geq3 there are unaccountably many diameter-4 perfect Lee codes of word length n over Z. This is in a strict contrast with perfect error-correcting Lee codes of word length n over Z as there is a unique such code for n=3, and its is conjectured that this is always the case when 2n+1 is a prime. Diameter perfect Lee codes will be constructed by an algebraic construction that is based on a group homomorphism. This will allow us to design an efficient algorithm for their decoding.

  5. Expander chunked codes

    Science.gov (United States)

    Tang, Bin; Yang, Shenghao; Ye, Baoliu; Yin, Yitong; Lu, Sanglu

    2015-12-01

    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance, where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 % of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.

  6. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  7. Earth Sciences Division collected abstracts: 1980

    Energy Technology Data Exchange (ETDEWEB)

    Henry, A.L.; Hornady, B.F. (eds.)

    1981-10-15

    This report is a compilation of abstracts of papers, reports, and talks presented during 1980 at national and international meetings by members of the Earth Sciences Division, Lawrence Livermore National Laboratory. The arrangement is alphabetical (by author). For a given report, a bibliographic reference appears under the name of each coauthor, but the abstract itself is given only under the name of the first author (indicated in capital letters) or the first Earth Sciences Division author.

  8. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  9. Mathematical Abstraction: Constructing Concept of Parallel Coordinates

    Science.gov (United States)

    Nurhasanah, F.; Kusumah, Y. S.; Sabandar, J.; Suryadi, D.

    2017-09-01

    Mathematical abstraction is an important process in teaching and learning mathematics so pre-service mathematics teachers need to understand and experience this process. One of the theoretical-methodological frameworks for studying this process is Abstraction in Context (AiC). Based on this framework, abstraction process comprises of observable epistemic actions, Recognition, Building-With, Construction, and Consolidation called as RBC + C model. This study investigates and analyzes how pre-service mathematics teachers constructed and consolidated concept of Parallel Coordinates in a group discussion. It uses AiC framework for analyzing mathematical abstraction of a group of pre-service teachers consisted of four students in learning Parallel Coordinates concepts. The data were collected through video recording, students’ worksheet, test, and field notes. The result shows that the students’ prior knowledge related to concept of the Cartesian coordinate has significant role in the process of constructing Parallel Coordinates concept as a new knowledge. The consolidation process is influenced by the social interaction between group members. The abstraction process taken place in this group were dominated by empirical abstraction that emphasizes on the aspect of identifying characteristic of manipulated or imagined object during the process of recognizing and building-with.

  10. Variability Abstractions: Trading Precision for Speed in Family-Based Analyses

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Brabrand, Claus; Wasowski, Andrzej

    2015-01-01

    Family-based (lifted) data-flow analysis for Software Product Lines (SPLs) is capable of analyzing all valid products (variants) without generating any of them explicitly. It takes as input only the common code base, which encodes all variants of a SPL, and produces analysis results corresponding...... transformation that translates any SPL program into an abstracted version of it, such that the analysis of the abstracted SPL coincides with the corresponding abstracted analysis of the original SPL. We implement the transformation in a tool, that works on Object-Oriented Java program families, and evaluate...

  11. On {\\sigma}-LCD codes

    OpenAIRE

    Carlet, Claude; Mesnager, Sihem; Tang, Chunming; Qi, Yanfeng

    2017-01-01

    Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with $\\sigma$ complementary dual ($\\sigma$-LCD), which includes known Euclidean LCD codes, Hermitian LCD codes, and Galois LCD codes. As Euclidean LCD codes, $\\sigma$-LCD ...

  12. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  13. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  14. Reusable State Machine Code Generator

    Science.gov (United States)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  15. Code Properties from Holographic Geometries

    Directory of Open Access Journals (Sweden)

    Fernando Pastawski

    2017-05-01

    Full Text Available Almheiri, Dong, and Harlow [J. High Energy Phys. 04 (2015 163.JHEPFG1029-847910.1007/JHEP04(2015163] proposed a highly illuminating connection between the AdS/CFT holographic correspondence and operator algebra quantum error correction (OAQEC. Here, we explore this connection further. We derive some general results about OAQEC, as well as results that apply specifically to quantum codes that admit a holographic interpretation. We introduce a new quantity called price, which characterizes the support of a protected logical system, and find constraints on the price and the distance for logical subalgebras of quantum codes. We show that holographic codes defined on bulk manifolds with asymptotically negative curvature exhibit uberholography, meaning that a bulk logical algebra can be supported on a boundary region with a fractal structure. We argue that, for holographic codes defined on bulk manifolds with asymptotically flat or positive curvature, the boundary physics must be highly nonlocal, an observation with potential implications for black holes and for quantum gravity in AdS space at distance scales that are small compared to the AdS curvature radius.

  16. Code Properties from Holographic Geometries

    Science.gov (United States)

    Pastawski, Fernando; Preskill, John

    2017-04-01

    Almheiri, Dong, and Harlow [J. High Energy Phys. 04 (2015) 163., 10.1007/JHEP04(2015)163] proposed a highly illuminating connection between the AdS /CFT holographic correspondence and operator algebra quantum error correction (OAQEC). Here, we explore this connection further. We derive some general results about OAQEC, as well as results that apply specifically to quantum codes that admit a holographic interpretation. We introduce a new quantity called price, which characterizes the support of a protected logical system, and find constraints on the price and the distance for logical subalgebras of quantum codes. We show that holographic codes defined on bulk manifolds with asymptotically negative curvature exhibit uberholography, meaning that a bulk logical algebra can be supported on a boundary region with a fractal structure. We argue that, for holographic codes defined on bulk manifolds with asymptotically flat or positive curvature, the boundary physics must be highly nonlocal, an observation with potential implications for black holes and for quantum gravity in AdS space at distance scales that are small compared to the AdS curvature radius.

  17. Abstracts and abstracting a genre and set of skills for the twenty-first century

    CERN Document Server

    Koltay, Tibor

    2010-01-01

    Despite their changing role, abstracts remain useful in the digital world. Highly beneficial to information professionals and researchers who work and publish in different fields, this book summarizes the most important and up-to-date theory of abstracting, as well as giving advice and examples for the practice of writing different kinds of abstracts. The book discusses the length, the functions and basic structure of abstracts, outlining a new approach to informative and indicative abstracts. The abstractors' personality, their linguistic and non-linguistic knowledge and skills are also discu

  18. Identifying personal microbiomes using metagenomic codes.

    Science.gov (United States)

    Franzosa, Eric A; Huang, Katherine; Meadow, James F; Gevers, Dirk; Lemon, Katherine P; Bohannan, Brendan J M; Huttenhower, Curtis

    2015-06-02

    Community composition within the human microbiome varies across individuals, but it remains unknown if this variation is sufficient to uniquely identify individuals within large populations or stable enough to identify them over time. We investigated this by developing a hitting set-based coding algorithm and applying it to the Human Microbiome Project population. Our approach defined body site-specific metagenomic codes: sets of microbial taxa or genes prioritized to uniquely and stably identify individuals. Codes capturing strain variation in clade-specific marker genes were able to distinguish among 100s of individuals at an initial sampling time point. In comparisons with follow-up samples collected 30-300 d later, ∼30% of individuals could still be uniquely pinpointed using metagenomic codes from a typical body site; coincidental (false positive) matches were rare. Codes based on the gut microbiome were exceptionally stable and pinpointed >80% of individuals. The failure of a code to match its owner at a later time point was largely explained by the loss of specific microbial strains (at current limits of detection) and was only weakly associated with the length of the sampling interval. In addition to highlighting patterns of temporal variation in the ecology of the human microbiome, this work demonstrates the feasibility of microbiome-based identifiability-a result with important ethical implications for microbiome study design. The datasets and code used in this work are available for download from huttenhower.sph.harvard.edu/idability.

  19. Evidence for abundant transcription of non-coding regions in the Saccharomyces cerevisiae genome

    Directory of Open Access Journals (Sweden)

    Lerman Galia

    2005-06-01

    Full Text Available Abstract Background Recent studies in a growing number of organisms have yielded accumulating evidence that a significant portion of the non-coding region in the genome is transcribed. We address this issue in the yeast Saccharomyces cerevisiae. Results Taking into account the absence of a significantly large yeast EST database, we use microarray expression data collected for genomic regions erroneously believed to be coding to study the expression pattern of non-coding regions in the Saccharomyces cerevisiae genome. We find that at least 164 out of 589 (28% such regions are expressed under specific biological conditions. In particular, looking at the probes that are located opposing other known genes at the same genomic locus, we find that 88 out of 341 (26% of these genes support antisense transcription. The expression patterns of these antisense genes are positively correlated. We validate these results using RT-PCR on a sample of 6 non-coding transcripts. Conclusion 1. The yeast genome is transcribed on a scale larger than previously assumed. 2. Correlated transcription of antisense genes is abundant in the yeast genome. 3. Antisense genes in yeast are non-coding.

  20. Uncovering the roles of long non-coding RNAs in cancer stem cells

    Directory of Open Access Journals (Sweden)

    Xiaoxing Huang

    2017-02-01

    Full Text Available Abstract Cancer has been a major public health problem that has threatened human life worldwide throughout history. The main causes that contribute to the poor prognosis of cancer are metastasis and recurrence. Cancer stem cells are a group of tumor cells that possess self-renewal and differentiation ability, which is a vital cause of cancer metastasis and recurrence. Long non-coding RNAs refer to a class of RNAs that are longer than 200 nt and have no potential to code proteins, some of which can be specifically expressed in different tissues and different tumors. Long non-coding RNAs have great biological significance in the occurrence and progression of cancers. However, how long non-coding RNAs interact with cancer stem cells and then affect cancer metastasis and recurrence is not yet clear. Therefore, this review aims to summarize recent studies that focus on how long non-coding RNAs impact tumor occurrence and progression by affecting cancer stem cell self-renewal and differentiation in liver cancer, prostate cancer, breast cancer, and glioma.

  1. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  2. Error Correcting Codes

    Indian Academy of Sciences (India)

    be fixed to define codes over such domains). New decoding schemes that take advantage of such connections can be devised. These may soon show up in a technique called code division multiple access (CDMA) which is proposed as a basis for digital cellular communication. CDMA provides a facility for many users to ...

  3. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  4. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March 1997 pp 33-47. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/002/03/0033-0047 ...

  5. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, Albert; Katoen, Joost P.; Westra, Ymte; Alblas, H.; Gyimóthy, Tibor

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived

  6. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  7. Informal control code logic

    NARCIS (Netherlands)

    Bergstra, J.A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical

  8. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  9. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alexandre

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  10. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 1. Error Correcting Codes The Hamming Codes. Priti Shankar. Series Article Volume 2 Issue 1 January ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  11. Particle Tracking Model and Abstraction of Transport Processes

    Energy Technology Data Exchange (ETDEWEB)

    B. Robinson

    2000-04-07

    The purpose of the transport methodology and component analysis is to provide the numerical methods for simulating radionuclide transport and model setup for transport in the unsaturated zone (UZ) site-scale model. The particle-tracking method of simulating radionuclide transport is incorporated into the FEHM computer code and the resulting changes in the FEHM code are to be submitted to the software configuration management system. This Analysis and Model Report (AMR) outlines the assumptions, design, and testing of a model for calculating radionuclide transport in the unsaturated zone at Yucca Mountain. In addition, methods for determining colloid-facilitated transport parameters are outlined for use in the Total System Performance Assessment (TSPA) analyses. Concurrently, process-level flow model calculations are being carrier out in a PMR for the unsaturated zone. The computer code TOUGH2 is being used to generate three-dimensional, dual-permeability flow fields, that are supplied to the Performance Assessment group for subsequent transport simulations. These flow fields are converted to input files compatible with the FEHM code, which for this application simulates radionuclide transport using the particle-tracking algorithm outlined in this AMR. Therefore, this AMR establishes the numerical method and demonstrates the use of the model, but the specific breakthrough curves presented do not necessarily represent the behavior of the Yucca Mountain unsaturated zone.

  12. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  13. Quantum Synchronizable Codes From Quadratic Residue Codes and Their Supercodes

    OpenAIRE

    Xie, Yixuan; Yuan, Jinhong; Fujiwara, Yuichiro

    2014-01-01

    Quantum synchronizable codes are quantum error-correcting codes designed to correct the effects of both quantum noise and block synchronization errors. While it is known that quantum synchronizable codes can be constructed from cyclic codes that satisfy special properties, only a few classes of cyclic codes have been proved to give promising quantum synchronizable codes. In this paper, using quadratic residue codes and their supercodes, we give a simple construction for quantum synchronizable...

  14. Source Code Review Using Static Analysis Tools

    OpenAIRE

    Moiras, Stavros; Lüders, Stefan; Tsouvelekakis, Aimilios

    2015-01-01

    Abstract Many teams at CERN, develop their own software to solve their tasks. This software may be public or it may be used for internal purposes. It is of major importance for developers to know that their software is secure. Humans are able to detect bugs and vulnerabilities but it is impossible to discover everything when they need to read hundreds’ lines of code. As a result, computer scientists have developed tools which complete efficiently and within minut...

  15. Non‐coding RNAs in cardiac hypertrophy

    Science.gov (United States)

    Ottaviani, Lara

    2017-01-01

    Abstract Heart failure is one of the largest contributors to disease burden and healthcare outflow in the Western world. Despite significant progress in the treatment of heart failure, disease prognosis remains very poor, with the only curative therapy still being heart transplantation. To counteract the current situation, efforts have been made to better understand the underlying molecular pathways in the progression of cardiac disease towards heart failure, and to link the disease to novel therapeutic targets such as non‐coding RNAs. The non‐coding part of the genome has gained prominence over the last couple of decades, opening a completely new research field and establishing different non‐coding RNAs species as fundamental regulators of cellular functions. Not surprisingly, their dysregulation is increasingly being linked to pathology, including to cardiac disease. Pre‐clinically, non‐coding RNAs have been shown to be of great value as therapeutic targets in pathological cardiac remodelling and also as diagnostic/prognostic biomarkers for heart failure. Therefore, it is to be expected that non‐coding RNA‐based therapeutic strategies will reach the bedside in the future and provide new and more efficient treatments for heart failure. Here, we review recent discoveries linking the function and molecular interactions of non‐coding RNAs with the pathophysiology of cardiac hypertrophy and heart failure. PMID:28233323

  16. Differentiation of ileostomy from colostomy procedures: assessing the accuracy of current procedural terminology codes and the utility of natural language processing.

    Science.gov (United States)

    Vo, Elaine; Davila, Jessica A; Hou, Jason; Hodge, Krystle; Li, Linda T; Suliburk, James W; Kao, Lillian S; Berger, David H; Liang, Mike K

    2013-08-01

    Large databases provide a wealth of information for researchers, but identifying patient cohorts often relies on the use of current procedural terminology (CPT) codes. In particular, studies of stoma surgery have been limited by the accuracy of CPT codes in identifying and differentiating ileostomy procedures from colostomy procedures. It is important to make this distinction because the prevalence of complications associated with stoma formation and reversal differ dramatically between types of stoma. Natural language processing (NLP) is a process that allows text-based searching. The Automated Retrieval Console is an NLP-based software that allows investigators to design and perform NLP-assisted document classification. In this study, we evaluated the role of CPT codes and NLP in differentiating ileostomy from colostomy procedures. Using CPT codes, we conducted a retrospective study that identified all patients undergoing a stoma-related procedure at a single institution between January 2005 and December 2011. All operative reports during this time were reviewed manually to abstract the following variables: formation or reversal and ileostomy or colostomy. Sensitivity and specificity for validation of the CPT codes against the mastery surgery schedule were calculated. Operative reports were evaluated by use of NLP to differentiate ileostomy- from colostomy-related procedures. Sensitivity and specificity for identifying patients with ileostomy or colostomy procedures were calculated for CPT codes and NLP for the entire cohort. CPT codes performed well in identifying stoma procedures (sensitivity 87.4%, specificity 97.5%). A total of 664 stoma procedures were identified by CPT codes between 2005 and 2011. The CPT codes were adequate in identifying stoma formation (sensitivity 97.7%, specificity 72.4%) and stoma reversal (sensitivity 74.1%, specificity 98.7%), but they were inadequate in identifying ileostomy (sensitivity 35.0%, specificity 88.1%) and colostomy (75

  17. Approximate Controllability of Abstract Discrete-Time Systems

    Directory of Open Access Journals (Sweden)

    Cuevas Claudio

    2010-01-01

    Full Text Available Approximate controllability for semilinear abstract discrete-time systems is considered. Specifically, we consider the semilinear discrete-time system , , where are bounded linear operators acting on a Hilbert space , are -valued bounded linear operators defined on a Hilbert space , and is a nonlinear function. Assuming appropriate conditions, we will show that the approximate controllability of the associated linear system implies the approximate controllability of the semilinear system.

  18. Performance Measures of Diagnostic Codes for Detecting Opioid Overdose in the Emergency Department.

    Science.gov (United States)

    Rowe, Christopher; Vittinghoff, Eric; Santos, Glenn-Milo; Behar, Emily; Turner, Caitlin; Coffin, Phillip O

    2017-04-01

    Opioid overdose mortality has tripled in the United States since 2000 and opioids are responsible for more than half of all drug overdose deaths, which reached an all-time high in 2014. Opioid overdoses resulting in death, however, represent only a small fraction of all opioid overdose events and efforts to improve surveillance of this public health problem should include tracking nonfatal overdose events. International Classification of Disease (ICD) diagnosis codes, increasingly used for the surveillance of nonfatal drug overdose events, have not been rigorously assessed for validity in capturing overdose events. The present study aimed to validate the use of ICD, 9th revision, Clinical Modification (ICD-9-CM) codes in identifying opioid overdose events in the emergency department (ED) by examining multiple performance measures, including sensitivity and specificity. Data on ED visits from January 1, 2012, to December 31, 2014, including clinical determination of whether the visit constituted an opioid overdose event, were abstracted from electronic medical records for patients prescribed long-term opioids for pain from any of six safety net primary care clinics in San Francisco, California. Combinations of ICD-9-CM codes were validated in the detection of overdose events as determined by medical chart review. Both sensitivity and specificity of different combinations of ICD-9-CM codes were calculated. Unadjusted logistic regression models with robust standard errors and accounting for clustering by patient were used to explore whether overdose ED visits with certain characteristics were more or less likely to be assigned an opioid poisoning ICD-9-CM code by the documenting physician. Forty-four (1.4%) of 3,203 ED visits among 804 patients were determined to be opioid overdose events. Opioid-poisoning ICD-9-CM codes (E850.2-E850.2, 965.00-965.09) identified overdose ED visits with a sensitivity of 25.0% (95% confidence interval [CI] = 13.6% to 37.8%) and

  19. A matrix ring description for cyclic convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, Heide.; Tsang, Fai. -Lung.

    In this paper, we study convolutional codes with a specific cyclic structure. By definition, these codes are left ideals in a certain skew polynomial ring. Using that the skew polynomial ring is isomorphic to a matrix ring we can describe the algebraic parameters of the codes in a more accessible

  20. Code of ethics for dental researchers.

    Science.gov (United States)

    2014-01-01

    The International Association for Dental Research, in 2009, adopted a code of ethics. The code applies to members of the association and is enforceable by sanction, with the stated requirement that members are expected to inform the association in cases where they believe misconduct has occurred. The IADR code goes beyond the Belmont and Helsinki statements by virtue of covering animal research. It also addresses issues of sponsorship of research and conflicts of interest, international collaborative research, duty of researchers to be informed about applicable norms, standards of publication (including plagiarism), and the obligation of "whistleblowing" for the sake of maintaining the integrity of the dental research enterprise as a whole. The code is organized, like the ADA code, into two sections. The IADR principles are stated, but not defined, and number 12, instead of the ADA's five. The second section consists of "best practices," which are specific statements of expected or interdicted activities. The short list of definitions is useful.

  1. Fall Meeting abstract submission inspires science poetry

    Science.gov (United States)

    Balcerak, Ernie

    2011-08-01

    When the 4 August deadline for submitting Fall Meeting abstracts passed, AGU had received more than 20,000 abstracts, a record-breaking number. The submission process had an unexpected by-product: It inspired some scientists to write haiku on Twitter. (Haiku is a form of Japanese poetry typically having three lines, the first with five syllables, the second with seven, and the third with five.) The following are examples of the haiku tweets, with the hashtag #AGU11AbstractHaiku. (For those who want to keep updated about the Fall Meeting on Twitter, the hashtag is #AGU11.) For more information about the meeting, including registration and housing, visit http://sites.agu.org/fallmeeting/.

  2. A first graduate course in abstract algebra

    CERN Document Server

    Wickless, WJ

    2004-01-01

    Since abstract algebra is so important to the study of advanced mathematics, it is critical that students have a firm grasp of its principles and underlying theories before moving on to further study. To accomplish this, they require a concise, accessible, user-friendly textbook that is both challenging and stimulating. A First Graduate Course in Abstract Algebra is just such a textbook.Divided into two sections, this book covers both the standard topics (groups, modules, rings, and vector spaces) associated with abstract algebra and more advanced topics such as Galois fields, noncommutative rings, group extensions, and Abelian groups. The author includes review material where needed instead of in a single chapter, giving convenient access with minimal page turning. He also provides ample examples, exercises, and problem sets to reinforce the material. This book illustrates the theory of finitely generated modules over principal ideal domains, discusses tensor products, and demonstrates the development of det...

  3. Processing of abstract rule violations in audition.

    Directory of Open Access Journals (Sweden)

    Erich Schröger

    Full Text Available The ability to encode rules and to detect rule-violating events outside the focus of attention is vital for adaptive behavior. Our brain recordings reveal that violations of abstract auditory rules are processed even when the sounds are unattended. When subjects performed a task related to the sounds but not to the rule, rule violations impaired task performance and activated a network involving supratemporal, parietal and frontal areas although none of the subjects acquired explicit knowledge of the rule or became aware of rule violations. When subjects tried to behaviorally detect rule violations, the brain's automatic violation detection facilitated intentional detection. This shows the brain's capacity for abstraction - an important cognitive function necessary to model the world. Our study provides the first evidence for the task-independence (i.e. automaticity of this ability to encode abstract rules and for its immediate consequences for subsequent mental processes.

  4. 05421 Abstracts Collection - Data Always and Everywhere

    DEFF Research Database (Denmark)

    Alonso, G.; Jensen, Christian Søndergaard; Mitschang, B.

    2006-01-01

    From 16.10.05 to 21.10.05, the Dagstuhl Seminar 05421, Data Always and Everywhere - Management of Mobile, Ubiquitous, Pervasive, and Sensor Data, was held in the International Conference and Research Center, Schloss Dagstuhl. During the seminar, all participants were given the opportunity...... to present their current research, and ongoing activities and open problems were discussed. This document is a collection of the abstracts of the presentations given during the seminar. Some abstracts offer links to extended abstracts, full papers, and other supporting documents. A separate companion...... document summarizes the seminar. The authors wish to acknowledge Victor Teixeira de Almeida, who served as collector for the seminar and thus played a key role in collecting materials from the seminar participants...

  5. Abstracts – eine facettenreiche Textsorte der Wissenschaft

    Directory of Open Access Journals (Sweden)

    Ines Busch-Lauer

    2012-01-01

    Full Text Available Der Beitrag beschreibt die Relevanz der informationsverdichtenden Textsorte Abstract in der Wissenschaftskommunikation. Im Mittelpunkt stehen die Definition, die Klassifikation und die Struktur sowie ausgewählte Merkmale dieser Textsorte.Im ersten Teil des Beitrags werden die unterschiedlichen Arten von Abstracts anhand von Textbeispielen aus der Linguistik, der Medizin und den Technikwissenschaften expliziert. Im zweiten Teil untersucht der Beitrag anhand von Abstracts, die von deutschen Studierenden der Technik- und Ingenieurwissenschaften im Rahmen ihrer fachbezogenen Englischausbildung verfasst wurden, inwieweit die textsortenimmanenten Merkmale auch von Lernenden in der Textproduktion in der Fremdsprache umgesetzt wurden. Mit dieser qualitativ beschreibenden Untersuchung trägt die Studie zur kontrastiven Fachtextsortenbeschreibung und andererseits als Praxisbericht zur Vermittlung von Textsorten im fachbezogenen Fremdsprachenunterricht an Hochschulen bei.

  6. A Message Without a Code?

    Directory of Open Access Journals (Sweden)

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  7. Transduplication resulted in the incorporation of two protein-coding sequences into the Turmoil-1 transposable element of C. elegans

    Directory of Open Access Journals (Sweden)

    Pupko Tal

    2008-10-01

    Full Text Available Abstract Transposable elements may acquire unrelated gene fragments into their sequences in a process called transduplication. Transduplication of protein-coding genes is common in plants, but is unknown of in animals. Here, we report that the Turmoil-1 transposable element in C. elegans has incorporated two protein-coding sequences into its inverted terminal repeat (ITR sequences. The ITRs of Turmoil-1 contain a conserved RNA recognition motif (RRM that originated from the rsp-2 gene and a fragment from the protein-coding region of the cpg-3 gene. We further report that an open reading frame specific to C. elegans may have been created as a result of a Turmoil-1 insertion. Mutations at the 5' splice site of this open reading frame may have reactivated the transduplicated RRM motif. Reviewers This article was reviewed by Dan Graur and William Martin. For the full reviews, please go to the Reviewers' Reports section.

  8. Generalizations of the Abstract Boundary singularity theorem

    CERN Document Server

    Whale, Ben E; Scott, Susan M

    2015-01-01

    The Abstract Boundary singularity theorem was first proven by Ashley and Scott. It links the existence of incomplete causal geodesics in strongly causal, maximally extended spacetimes to the existence of Abstract Boundary essential singularities, i.e., non-removable singular boundary points. We give two generalizations of this theorem: the first to continuous causal curves and the distinguishing condition, the second to locally Lipschitz curves in manifolds such that no inextendible locally Lipschitz curve is totally imprisoned. To do this we extend generalized affine parameters from $C^1$ curves to locally Lipschitz curves.

  9. Arche papers on the mathematics of abstraction

    CERN Document Server

    Cook, Roy T

    2007-01-01

    This volume collects together a number of important papers concerning both the method of abstraction generally and the use of particular abstraction principles to reconstruct central areas of mathematics along logicist lines. Gottlob Frege's original logicist project was, in effect, refuted by Russell's paradox. Crispin Wright has recently revived Frege's enterprise, however, providing a philosophical and technical framework within which a reconstruction of arithmetic is possible. While the Neo-Fregean project has recieved extensive attention and discussion, the present volume is unique in pre

  10. Certifying Auto-Generated Flight Code

    Science.gov (United States)

    Denney, Ewen

    2008-01-01

    Model-based design and automated code generation are being used increasingly at NASA. Many NASA projects now use MathWorks Simulink and Real-Time Workshop for at least some of their modeling and code development. However, there are substantial obstacles to more widespread adoption of code generators in safety-critical domains. Since code generators are typically not qualified, there is no guarantee that their output is correct, and consequently the generated code still needs to be fully tested and certified. Moreover, the regeneration of code can require complete recertification, which offsets many of the advantages of using a generator. Indeed, manual review of autocode can be more challenging than for hand-written code. Since the direct V&V of code generators is too laborious and complicated due to their complex (and often proprietary) nature, we have developed a generator plug-in to support the certification of the auto-generated code. Specifically, the AutoCert tool supports certification by formally verifying that the generated code is free of different safety violations, by constructing an independently verifiable certificate, and by explaining its analysis in a textual form suitable for code reviews. The generated documentation also contains substantial tracing information, allowing users to trace between model, code, documentation, and V&V artifacts. This enables missions to obtain assurance about the safety and reliability of the code without excessive manual V&V effort and, as a consequence, eases the acceptance of code generators in safety-critical contexts. The generation of explicit certificates and textual reports is particularly well-suited to supporting independent V&V. The primary contribution of this approach is the combination of human-friendly documentation with formal analysis. The key technical idea is to exploit the idiomatic nature of auto-generated code in order to automatically infer logical annotations. The annotation inference algorithm

  11. Optimized reversible binary-coded decimal adders

    DEFF Research Database (Denmark)

    Thomsen, Michael Kirkedal; Glück, Robert

    2008-01-01

    Abstract Babu and Chowdhury [H.M.H. Babu, A.R. Chowdhury, Design of a compact reversible binary coded decimal adder circuit, Journal of Systems Architecture 52 (5) (2006) 272-282] recently proposed, in this journal, a reversible adder for binary-coded decimals. This paper corrects and optimizes....... Keywords: Reversible logic circuit; Full-adder; Half-adder; Parallel adder; Binary-coded decimal; Application of reversible logic synthesis......) BCD addition, the circuit delay of 49 gates is significantly lower than is the number of bits used for the BCD representation. A complete set of reversible half- and full-adders for n-bit binary numbers and m-decimal BCD numbers is presented. The results show that special-purpose design pays off...

  12. Pyramid image codes

    Science.gov (United States)

    Watson, Andrew B.

    1990-01-01

    All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

  13. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  14. Quantum coding theorems

    Science.gov (United States)

    Holevo, A. S.

    1998-12-01

    ContentsI. IntroductionII. General considerations § 1. Quantum communication channel § 2. Entropy bound and channel capacity § 3. Formulation of the quantum coding theorem. Weak conversionIII. Proof of the direct statement of the coding theorem § 1. Channels with pure signal states § 2. Reliability function § 3. Quantum binary channel § 4. Case of arbitrary states with bounded entropyIV. c-q channels with input constraints § 1. Coding theorem § 2. Gauss channel with one degree of freedom § 3. Classical signal on quantum background noise Bibliography

  15. Results of investigation of adaptive speech codes

    Science.gov (United States)

    Nekhayev, A. L.; Pertseva, V. A.; Sitnyakovskiy, I. V.

    1984-06-01

    A search for ways of increasing the effectiveness of speech signals in digital form lead to the appearance of various methods of encoding, to reduce the excessiveness of specific properties of the speech signal. It is customary to divide speech codes into two large classes: codes of signal parameters (or vocoders), and codes of the signal form (CSF. In telephony, preference is given to a second class of systems, which maintains naturalness of sound. The class of CSF expanded considerably because of the development of codes based on the frequency representation of a signal. The greatest interest is given to such methods of encoding as pulse modulation (PCM), differential PCM (DPCM), and delta modulation (DM). However, developers of digital transmission systems find it difficult to compile a complete pattern of the applicability of specific types of codes. The best known versions of the codes are evaluated by means of subjective-statistical measurements of their characteristics. The results obtained help developers to draw conclusions regarding the applicability of the codes considered in various communication systems.

  16. On Coding Non-Contiguous Letter Combinations

    Directory of Open Access Journals (Sweden)

    Frédéric eDandurand

    2011-06-01

    Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.

  17. Geometric Abstract Art and Public Health Data

    Centers for Disease Control (CDC) Podcasts

    2016-10-18

    Dr. Salaam Semaan, a CDC behavioral scientist, discusses the similarities between geometric abstract art and public health data analysis.  Created: 10/18/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 10/18/2016.

  18. Simulation, Design Abstraction, and SystemC

    Science.gov (United States)

    Harcourt, Ed

    2007-01-01

    SystemC is a system-level design and simulation language based on C++. We've been using SystemC for computer organization and design projects for the past several years. Because SystemC is embedded in C++ it contains the powerful abstraction mechanisms of C++ not found in traditional hardware description languages, such as support for…

  19. A Sound Abstraction of the Parsing Problem

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Katsoris, Georgios

    2014-01-01

    In formal verification, cryptographic messages are often represented by algebraic terms. This abstracts not only from the intricate details of the real cryptography, but also from the details of the non-cryptographic aspects: the actual formatting and structuring of messages. We introduce a new...

  20. Object-oriented programming with gradual abstraction

    DEFF Research Database (Denmark)

    Nørmark, Kurt; Thomsen, Lone Leth; Thomsen, Bent

    2013-01-01

    We describe an experimental object-oriented programming language, ASL2, that supports program development by means of a series of abstraction steps. The language allows immediate object construction, and it is possible to use the constructed objects for concrete problem solving tasks. Classes...

  1. OVERVIEW OF CORPORATE GOVERNANCE IN ETHIOPIA: Abstract

    African Journals Online (AJOL)

    eliasn

    Abstract. Good corporate governance is an important pillar of the market economy and it enhances investor confidence. A strong and balanced board of directors is necessary as a supervising body for the executive management of a company with dispersed ownership. The Ethiopian company law does not have adequate.

  2. Navigating abstract virtual environment : an eeg study

    NARCIS (Netherlands)

    Mahdizadeh Hakak, A.; Bhattacharya, J; Biloria, N.M.; de Kleijn, R.; Shah-Mohammadi, F.

    2016-01-01

    Perceptions of different environments are different for different people. An abstract designed environment, with a degree of freedom from any visual reference in the physical world requests a completely different perception than a fully or semi-designed environment that has some correlation with

  3. Global Citizenship: Abstraction or Framework for Action?

    Science.gov (United States)

    Davies, Lynn

    2006-01-01

    This paper explores whether the notion of "global citizenship" is too abstract to be valuable in driving curriculum policy and active citizenship for students. The paper looks firstly at three of the key aspects of an active role: a concern for social justice; rights; and culture and cultural conflict. It then examines actual curricula and…

  4. Language abstraction in word of mouth

    NARCIS (Netherlands)

    Schellekens, G.A.C.; Verlegh, P.W.J.; Smidts, A.

    2010-01-01

    This research examines the language that consumers use in word of mouth. For both positive and negative product experiences, we demonstrate that consumers use more abstract terms when they describe experiences that are in line with the valence of their product attitude. This effect cannot be

  5. Abstraction of man-made shapes

    KAUST Repository

    Mehra, Ravish

    2009-01-01

    Man-made objects are ubiquitous in the real world and in virtual environments. While such objects can be very detailed, capturing every small feature, they are often identified and characterized by a small set of defining curves. Compact, abstracted shape descriptions based on such curves are often visually more appealing than the original models, which can appear to be visually cluttered. We introduce a novel algorithm for abstracting three-dimensional geometric models using characteristic curves or contours as building blocks for the abstraction. Our method robustly handles models with poor connectivity, including the extreme cases of polygon soups, common in models of man-made objects taken from online repositories. In our algorithm, we use a two-step procedure that first approximates the input model using a manifold, closed envelope surface and then extracts from it a hierarchical abstraction curve network along with suitable normal information. The constructed curve networks form a compact, yet powerful, representation for the input shapes, retaining their key shape characteristics while discarding minor details and irregularities. © 2009 ACM.

  6. Abstraction of Dynamical Systems by Timed Automata

    DEFF Research Database (Denmark)

    Wisniewski, Rafael; Sloth, Christoffer

    2011-01-01

    To enable formal verification of a dynamical system, given by a set of differential equations, it is abstracted by a finite state model. This allows for application of methods for model checking. Consequently, it opens the possibility of carrying out the verification of reachability and timing re...

  7. Sounding Relationships. Conference programme & Book of abstracts

    DEFF Research Database (Denmark)

    2009-01-01

    Content: Welcome to Aalborg.  Inge Nygaard Pedersen: Welcome from the chair of the organizing committee Tony Wigram Wlcome from the chair of the scientific committee Rita Cancino: Welcome from the head of faculty Hanne Mette Ridder: Welcome from the Danish Association of Music Therapists (MTL) So......) Sounding Relationships General Information Daily Program Social Program List of Participants Scientific Program Book of Abstracts...

  8. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... Abstract. The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have ...

  9. ANNUAL REPORT-AUTOMATIC INDEXING AND ABSTRACTING.

    Science.gov (United States)

    Lockheed Missiles and Space Co., Palo Alto, CA. Electronic Sciences Lab.

    THE INVESTIGATION IS CONCERNED WITH THE DEVELOPMENT OF AUTOMATIC INDEXING, ABSTRACTING, AND EXTRACTING SYSTEMS. BASIC INVESTIGATIONS IN ENGLISH MORPHOLOGY, PHONETICS, AND SYNTAX ARE PURSUED AS NECESSARY MEANS TO THIS END. IN THE FIRST SECTION THE THEORY AND DESIGN OF THE "SENTENCE DICTIONARY" EXPERIMENT IN AUTOMATIC EXTRACTION IS OUTLINED. SOME OF…

  10. Abstract algebra an inquiry based approach

    CERN Document Server

    Hodge, Jonathan K; Sundstrom, Ted

    2013-01-01

    ""This book arose from the authors' approach to teaching abstract algebra. They place an emphasis on active learning and on developing students' intuition through their investigation of examples. … The text is organized in such a way that it is possible to begin with either rings or groups.""-Florentina Chirtes, Zentralblatt MATH 1295

  11. Cool Cats: Feline Fun with Abstract Art.

    Science.gov (United States)

    Lambert, Phyllis Gilchrist

    2002-01-01

    Presents a lesson that teaches students about abstract art in a fun way. Explains that students draw cats, learn about the work of Pablo Picasso, and, in the style of Picasso, combine the parts of the cats (tail, legs, head, body) together in unconventional ways. (CMK)

  12. Abstracts of Research Papers 1977 AAHPER Convention.

    Science.gov (United States)

    Sage, George H., Ed.

    This volume of abstracts describes papers written on the following topics: (1) Strength Physiology; (2) Learning Disabilities (motor); (3) Physiology - General; (4) Work Capacity; (5) Measurement and Recreation; (6) Biomechanics; (7) Professional Preparation (physical education); (8) Muscle Performance; (9) Sociology of Sport; (10) History of…

  13. Using Group Explorer in Teaching Abstract Algebra

    Science.gov (United States)

    Schubert, Claus; Gfeller, Mary; Donohue, Christopher

    2013-01-01

    This study explores the use of Group Explorer in an undergraduate mathematics course in abstract algebra. The visual nature of Group Explorer in representing concepts in group theory is an attractive incentive to use this software in the classroom. However, little is known about students' perceptions on this technology in learning concepts in…

  14. Carbon Monoxide, A Bibliography With Abstracts.

    Science.gov (United States)

    Cooper, Anna Grossman

    Included is a review of the carbon monoxide related literature published from 1880 to 1966. The 983 references with abstracts are grouped into these broad categories: Analysis, Biological Effects, Blood Chemistry, Control, Criteria and Standards, Instruments and Techniques, Sampling and Network Operations, and Sources. The Biological Effects group…

  15. Abstract Résumé Introduction

    African Journals Online (AJOL)

    Abstract. Although in Ghana information on HIV infection and prevention, both in terms of quality and quantity, has increased considerably within the past few years, available literature indicates that behaviour change is yet to correspond with the amount of information and education provided. The objective of this study is to ...

  16. Bilingual Education for Children: An Abstract Bibliography.

    Science.gov (United States)

    ERIC Clearinghouse on Early Childhood Education, Champaign, IL.

    This selective abstract bibliography prepared by ERIC Clearinghouse on Early Childhood Education is a guide to recent ERIC documents on bilingual education of children. Citations have been divided into four sections: (1) selected ethnic groups (Spanish speaking, native Americans, Chinese, Portuguese and Filipino); (2) migrants; (3) second language…

  17. Effect of Groundwater Abstraction on Fen Ecosystems

    DEFF Research Database (Denmark)

    Johansen, Ole; Pedersen, Morten Lauge; Jensen, Jacob Birk

    2011-01-01

    Quantifying the effects of groundwater abstraction on fen ecosystems located in discharge areas can be complicated. The water level in fens is close to the terrain surface most of the year and it is controlled by a relatively constant groundwater exfiltration. It is difficult to measure the exfil......Quantifying the effects of groundwater abstraction on fen ecosystems located in discharge areas can be complicated. The water level in fens is close to the terrain surface most of the year and it is controlled by a relatively constant groundwater exfiltration. It is difficult to measure...... the exfiltration fluxes and thus water level data is typically used to evaluate if the ecosystem is affected. The paper presents collected data and analysis from a case study, where the hydrological effect of groundwater abstraction on rich fens and springs in a Danish river valley has been studied. The natural...... of the monitored ecosystems and the response towards groundwater abstraction and forms a solid foundation for hydrological modelling....

  18. A Mediator Architecture for Abstract Data Access

    Science.gov (United States)

    1990-02-23

    available include, retirees includes consultants Abstraction grain personal income versus family income from employ mcnt for taxation Temporal basis...Rosser, confluent and canonical [Hin 72]. Somewhere < ezpr > (and < ezpr’ >) is a conjunctive query. of these properties help us identify equivalence

  19. Geometry of abstraction in quantum computation

    NARCIS (Netherlands)

    Pavlovic, Dusko; Abramsky, S.; Mislove, M.W.

    2012-01-01

    Quantum algorithms are sequences of abstract operations, per­ formed on non-existent computers. They are in obvious need of categorical semantics. We present some steps in this direction, following earlier contribu­ tions of Abramsky, Goecke and Selinger. In particular, we analyze function

  20. Abstract Résumé Introduction

    African Journals Online (AJOL)

    134 Journal of Social Aspects of HIV/AIDS. VOL. 6 NO. 3 NOVEMBEr 2009. Original Article. Abstract. HIV prevalence in central Mozambique is the highest in the country with high urban rates impacting on the rural areas. To identify potential factors influencing the spread of HIV in three sparsely populated districts in ...