WorldWideScience

Sample records for asms2004 session code

  1. An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game

    Directory of Open Access Journals (Sweden)

    Zhuoqun Xia

    2012-02-01

    Full Text Available There are some selfish nodes in wireless mesh networks multi-path inter-session network coding; and all selfish nodes maximize their earnings through the game. In this paper, a stimulus scheme is proposed which is suit for selfish nodes game in a multi-path inter-session network coding game. In the multi-path transmission, we use the watch dog checks the existence of selfish nodes. After selfish nodes are detected, we modified the multi-path protocols. For multi-path selfish nodes, we adopt non-cooperation method to punish it; and that the priority forwarding is used to active cooperation nodes. It is proved that Nash equilibrium is acquired for all players to obey the incentive scheme honestly. Experiments verify the theoretical analysis.

  2. Code-switching across brainstorming sessions: implications for the revised hierarchical model of bilingual language processing.

    Science.gov (United States)

    Blot, Kevin J; Zárate, Michael A; Paulus, Paul B

    2003-01-01

    The revised hierarchical model (RHM) of bilingual language processing posits independent word form representations for the dominant language (L1) and the nondominant language (L2), facilitated translation from L2 words to L1 words, access to common concepts for L1 and L2, and stronger activation of concepts for L1 than for L2. Spanish-English and English-Spanish bilinguals brainstormed for two sessions; half switched languages (L1-L2 or L2-L1) and half stayed in the same language (L1-L1 or L2-L2) across sessions. In both sessions, L1 brainstorming resulted in more efficient idea productivity than L2 brainstorming, supporting stronger concept activation for L1, consistent with the RHM. Switching languages from L2 to L1 resulted in the most efficient idea productivity in Session 2, suggesting that switching to L1 not only permits strong concept activation, but also the activation of concepts that are relatively different than those activated by L2, inconsistent with the RHM. Switching languages increased the proportion of Session 1 ideas repeated during Session 2, despite instructions not to repeat. This finding suggests that there is activation of concepts as well as word forms in same language brainstorming and that this dual activation aids in following instructions not to repeat, consistent with the RHM. It is suggested that the RHM be re-specified to accommodate the notion that L1 and L2 access relatively different concepts.

  3. Twenty-fifth water reactor safety information meeting: Proceedings. Volume 1: Plenary sessions; Pressure vessel research; BWR strainer blockage and other generic safety issues; Environmentally assisted degradation of LWR components; Update on severe accident code improvements and applications

    International Nuclear Information System (INIS)

    This three-volume report contains papers presented at the conference. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Japan, Norway, and Russia. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume contains the following information: (1) plenary sessions; (2) pressure vessel research; (3) BWR strainer blockage and other generic safety issues; (4) environmentally assisted degradation of LWR components; and (5) update on severe accident code improvements and applications. Selected papers have been indexed separately for inclusion in the Energy Science and Technology Database

  4. Poster Session

    Science.gov (United States)

    1997-01-01

    In this session, Poster Session, the discussion focuses on the following topics: Development of correlative measures for the assessment of attention and memory; Biodynamical Responses of the Crewmember Head/Neck System During Emergence Ejection; Fecundation in the Sky, a Ten Years Old Experiment in Microgravity; A Modified Botex Incubator as a Transport System For Developing Crickets into Space; Chromosomal Aberrations in Peripheral Lymphocytes of Cosmonauts and Astronauts after Space Flights; Method for Establishing Long term Bone Marrow; Cultures Under Microgravity Conditions Reproduction Under Simulated Weightlessness --Mammalian in vivo Experiments Under Suspension; Towards Human Movement Analysis Without the Use of Markers; Habitability Requirements For a Cogent Mars Mission; The Saucer Concept for Space Habitats; New Way In Modeling the Growth of the Organism; The Fractionation of Hydrogen and Oxygen Stable Isotopes By Life Support Systems of Space Station "MIR"; and Effect of Space Flight on Neutrophil Function.

  5. Session Introduction

    Science.gov (United States)

    Eliane Lessner, Co-Chair:

    2009-03-01

    A panel discussion session providing a worldwide assessment of the status and experiences of women in physics, paying attention to the different cultures and environments they work in and to how the age of the physicist affects their perspective. We will hear about women physicists in Korea in particular and Asia in general, in Egypt in particular and Africa in general, and in the Caribbean. Six invited speakers will present analyses of the progress being made in promoting women in physics from their personal experiences and as assessed from their participation in the Third International Conference on Women In Physics (ICWIP2008) convened in Seoul, Korea in October 2008. From Albania to Zimbabwe, with representation of all the continents, ICWIP2008 congregated 283 women and men physicists from 57 countries to share the participants' scientific accomplishments and evaluate international progress in improving the status of women in physics. This three-hour session is organized jointly by the Committee on the Status of Women in Physics of the APS (CSWP) and the Forum on International Physics of the APS (FIP). Audience participation in the panel discussion will be strongly encouraged.

  6. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session....... In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication...

  7. Team Exploratory Testing Sessions

    OpenAIRE

    Soili Saukkoriipi; Ilkka Tervonen

    2012-01-01

    Exploratory testing (ET) is popular, especially among agile development teams. In this paper, we study the team aspect in the ET context and explore how to use ET in team sessions to complement other testing activities. The goal was to define a team exploratory testing (TET) session approach and to provide evidence that the approach is worth using. A TET session approach is defined by means of parameters, roles, and process. Also, instructions for using the approach are given. The team is the...

  8. The Constitutional Law Sessions

    Science.gov (United States)

    White, Daniel O.

    1972-01-01

    Teachers, attorneys, and law educators met to evaluate 1971 workshops in law education and to plan improved learning experiences at future workshops. Coordination between substantive law sessions and teaching methodology sessions was cited as a major necessity. Teachers were encouraged to develop their own material. (JB)

  9. Summary of Technical Sessions - Summary and Recommendations

    International Nuclear Information System (INIS)

    Technical Session 1 - Development achievements of BEPU methods and State of the Art: The objective of this session was to present the different approaches dealing with Best Estimate codes and uncertainties evaluations. Existing methods were summarized and different papers were focused on specific methods stressing their bases, peculiarities, advantages and limitations. As a result of the session a picture of the current State of the Art was obtained. The session comprised six papers. Technical Session 2 - International comparative activities: This session had as a main objective to review the activities launched in the past and present from the NEA in connection with BEPU methods, with focus on the applicability of conclusions derived from former benchmarks like UMS, the main outcomes of the recently finished BEMUSE project, and the objectives and relevance of UAM and PREMIUM projects. The session comprised four papers. Technical Session 3 - Applications: Licensing, safety analysis support, regulatory body views and industry activities: This session focused on the application of current methods in safety analyses. Contributions from industry, technical safety organizations and regulatory bodies were provided. As a result, a view of the penetration of BEPU methods in current safety analyses was obtained, as well as an indication of the evolution in the near future. Elements such as licensing practices, assessment process, etc. were considered. The session comprised nine papers. Technical Session 4. BEPU methods extension to new fields The session addressed the extension of BEPU methods beyond their current use. By now such methods are mainly applied to classic deterministic environment but it is believed that their benefits could be extended to other fields. Seven papers were presented in the session dealing with subjects that fit in the objectives established in the workshop programme. The papers cover areas like: extension to CFD, quantification of global safety

  10. Summary of workshop session F on electron-cloud instabilities

    OpenAIRE

    Zimmermann, Frank; Wolski, Andrzej

    2004-01-01

    We summarize Session F of the ECLOUD 04 workshop. This session was dedicated to beam instabilities driven by electron cloud. Specifically, we discuss the principal observations of electron-cloud instabilities, analytical models, simulation codes and the next steps that need to be taken to arrive at a predictive theory.

  11. HETEROGENEOUS MULTIMEDIA SESSIONS

    OpenAIRE

    MANJUR S. KOLHAR; Anas F. Bayan; TAT-CHEE WAN; O. ABOUBDALLA; R. SURESWARAN

    2009-01-01

    This paper discusses technical issues related to delivery and control of IP multimedia services, such as multimedia conferencing, involving heterogeneous end terminals. In particular, it proposes the design of an experimental system for interworking between InterAsterisk exchange Protocol and RSW session and call control signaling protocols. This IP videoconferencing interworking system is composed of two core units for supporting delivery of sessions and streams. These units perform various ...

  12. Linearly Refined Session Types

    Directory of Open Access Journals (Sweden)

    Pedro Baltazar

    2012-11-01

    Full Text Available Session types capture precise protocol structure in concurrent programming, but do not specify properties of the exchanged values beyond their basic type. Refinement types are a form of dependent types that can address this limitation, combining types with logical formulae that may refer to program values and can constrain types using arbitrary predicates. We present a pi calculus with assume and assert operations, typed using a session discipline that incorporates refinement formulae written in a fragment of Multiplicative Linear Logic. Our original combination of session and refinement types, together with the well established benefits of linearity, allows very fine-grained specifications of communication protocols in which refinement formulae are treated as logical resources rather than persistent truths.

  13. Session 2: Machine studies

    International Nuclear Information System (INIS)

    This document summarizes the talks and discussion that took place in the second session of the Chamonix 2012 workshop concerning results from machine studies performed in 2011. The session consisted of the following presentations: -) LHC experience with different bunch spacings by G. Rumolo; -) Observations of beam-beam effects in MDs in 2011 by W. Herr; -) Beam-induced heating/ bunch length/RF and lessons for 2012 by E. Metral; -) Lessons in beam diagnostics by R. Jones; -) Quench margins by M. Sapinski; and -) First demonstration with beam of the Achromatic Telescopic Squeeze (ATS) by S. Fartoukh. (authors)

  14. Summary of Session III

    OpenAIRE

    Furman, M.A.

    2002-01-01

    This is a summary of the talks presented in Session III "Simulations of Electron-Cloud Build Up" of the Mini-Workshop on Electron-Cloud Simulations for Proton and Positron Beams ECLOUD-02, held at CERN, 15-18 April 2002.

  15. The outreach sessions

    Energy Technology Data Exchange (ETDEWEB)

    Trache, Livius [Horia Hulubei National Institute for Physics and Nuclear Engineering, P.O. Box MG-6, 077125 Bucharest-Magurele (Romania)

    2015-02-24

    These are moderator’s remarks about the outreach day in the middle of the CSSP14, and in particular about the afternoon outreach session in round table format with the announced theme: “CERN at 60 and the internationalization of science”.

  16. Abstracts of SIG Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1995

    1995-01-01

    Presents abstracts of 15 special interest group (SIG) sessions. Topics include navigation and information utilization in the Internet, natural language processing, automatic indexing, image indexing, classification, users' models of database searching, online public access catalogs, education for information professions, information services,…

  17. Secure shell session resumption

    OpenAIRE

    Kuryla, S. V.

    2009-01-01

    The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. However, using modern cryptography techniques might be computationally expensive, especially for low-end devices such as wireless access points and DSL routers. Here I present an implementation of a session resumption mechanism that has been proposed earlier to improve the performance of SSI I.

  18. Modular Session Types for Objects

    CERN Document Server

    Gay, Simon J; Ravara, António; Vasconcelos, Vasco Thudichum

    2012-01-01

    Session types allow communication protocols to be specified type-theoretically so that protocol implementations can be verified by static type checking. We extend previous work on session types for distributed object-oriented languages in three ways. (1) We attach a session type to a class definition, to specify the possible sequences of method calls. (2) We allow a session type implementation to be modularized, i.e. partitioned into separately-callable methods. (3) We treat session-typed communication channels as objects, integrating their session types with the session types of classes. The result is an elegant unification of communication channels and their session types, distributed OO programming, and a form of typestate supporting non-uniform objects, i.e. objects that dynamically change the set of available methods. We define syntax, operational semantics, a sound type system, and a sound and complete type checking algorithm for a small distributed OO language with structural subtyping. Static typing g...

  19. Performance Evaluation of Coded Meshed Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Pedersen, Morten Videbæk;

    2013-01-01

    We characterize the performance of intra- and inter-session network coding (NC) in wireless networks using real-life implementations. We compare this performance to a recently developed hybrid approach, called CORE, which combines intra- and inter-session NC exploiting the code structure...

  20. Adding Sessions to BPEL

    Directory of Open Access Journals (Sweden)

    Alessandro Fantechi

    2012-10-01

    Full Text Available By considering an essential subset of the BPEL orchestration language, we define SeB, a session based style of this subset. We discuss the formal semantics of SeB and we present its main properties. We use a new approach to address the formal semantics, based on a translation into so-called control graphs. Our semantics handles control links and addresses the static semantics that prescribes the valid usage of variables. We also provide the semantics of collections of networked services. Relying on these semantics, we define precisely what is meant by interaction safety, paving the way to the formal analysis of safe interactions between BPEL services.

  1. Session: Hard Rock Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Dunn, James C.; Drumheller, Douglas S.; Glowka, David A.; Lysne, Peter

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five presentations: ''Hard Rock Penetration - Summary'' by George P. Tennyson, Jr.; ''Overview - Hard Rock Penetration'' by James C. Dunn; ''An Overview of Acoustic Telemetry'' by Douglas S. Drumheller; ''Lost Circulation Technology Development Status'' by David A. Glowka; ''Downhole Memory-Logging Tools'' by Peter Lysne.

  2. ICALEPS 2005 : opening session

    CERN Multimedia

    Maximilien Brice

    2005-01-01

    ICALEPCS 2005, the tenth International Conference on Accelerator and Large Experimental Physics Control Systems, will be held in Geneva, Switzerland, 10-14 Oct. 2005 at the International Conference Center Geneva (CICG). ICALEPCS 2005 thus falls in the year that UNESCO has declared the "World Year of Physics". ICALEPCS covers all aspects of control and operation of Experimental Physics facilities such as particle accelerators, particle detectors, optical telescopes, radio telescopes, nuclear fusion facilities like Tokamaks, nuclear reactors, lasers, etc .... Opening session by . A. Daneels (CERN): Introducting ICALEPCS 2005 . C.Lamprecht (Republic & State of Geneva): Welcome speech . J. Lister (EPFL): Welcome speech . J. Engelen (CERN): The machine and experiment challenges of LHC

  3. Amendment works of the Korean civil code (Property Law)

    OpenAIRE

    Kim, Sang Yong

    2001-01-01

    "The Korean Civil Code is currently in the process of amendment. The government expects to submit a proposal for amending the Civil Code to this year's regular session of the National Assembly. However, considering the extent to which the works for amending the Civil Code being in process by the Civil Code amendment committee have thus far advanced, submission of the proposal for Civil Code amendment within this year’s regular session of the National Assembly can be considered ...

  4. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant;

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity....... Coding density tuning can be performed by designing time-dependent coding matrices. In multicast networks, this tuning can be performed within the network by designing time-dependent pre- coding and network coding matrices with mild conditions on the network structure for specific densities. We present a...

  5. From In-Session Behaviors to Drinking Outcomes: A Causal Chain for Motivational Interviewing

    Science.gov (United States)

    Moyers, Theresa B.; Martin, Tim; Houck, Jon M.; Christopher, Paulette J.; Tonigan, J. Scott

    2009-01-01

    Client speech in favor of change within motivational interviewing sessions has been linked to treatment outcomes, but a causal chain has not yet been demonstrated. Using a sequential behavioral coding system for client speech, the authors found that, at both the session and utterance levels, specific therapist behaviors predict client change talk.…

  6. Twin Sessions Through African Eyes

    Institute of Scientific and Technical Information of China (English)

    Ni Yanshuo

    2012-01-01

    Every year journalists from around China and the world flock to Beijing in March to cover the sessions of the National People's Congress (NPC) and the Chinese People's Political Consultative Conference (CPPCC), known as the lianghui, or twin sessions. With the deepening of Sino-African relations in the past decades, an increasing number of African journalists are involved in reporting China's lianghui to their audiences in Africa.

  7. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  8. Scientific conference proceedings. Session 4

    International Nuclear Information System (INIS)

    Session 4 of the conference was held on 7 June 1985 at Rez near Prague. 17 papers were submitted dealing with radiation chemistry and radiation technologies, dosimetry, technology of producing labelled compounds and their uses in medicine, determination of elements by neutron activation analysis and infrared, mass and atomic absorption spectroscopy. All contributions were inputted to INIS. (M.D.)

  9. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2004-01-01

    WS-Security provides basic means to secure SOAP traffic, one envelope at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; besides, it is often important to secure the integrity of a whole session, as well as each message. To this end,

  10. Session summaries - Session 1: operator aids for control rooms; Session 2: operator aids for technical support centres; session 3: simulation tools for operator training

    International Nuclear Information System (INIS)

    (Kurchatov Institute - Russia) described the main features of a full-scope simulator devoted to operator training on RBMK type reactors. After outlining the most significant characteristics of this type of reactors, it is stressed that operator error was a non-negligible factor of risk and that the full-scope simulator had been designed to address this kind of problem. The third paper (University of Cantabria in Santander - Spain) described an Integrated Simulator and Real Time Information System. Based on the MAAP3 computer code, the simulator allows several operators to interact simultaneously on the process. It includes an anomaly-generating capability both before and during the accident, and operators can interact with the model at any time into the accident. The fourth paper (GRS - Germany) complemented the demonstration performed in session 1. GRS had developed a special training course on the Phenomenology and Progression of Severe Accidents in PWRs. The last paper (CSN - Spain) dealt with the Integration of Operator Actions in Accident Sequence Simulation Tools for a BWR Plant

  11. Scientific conference proceedings. Session 3

    International Nuclear Information System (INIS)

    The Radiochemical Technology session met at UJV Rez on June 7, 1985 to hear 13 papers of which 11 were incorporated in INIS. The papers inform of results attained in the field of processing liquid radioactive wastes from nuclear power plants, processing spent nuclear fuel using the fluoride process, of the separation of fission products by dicarbolide extraction, the chemistry of complex uranium compounds, etc. The cooperation of UJV with VUJE and VUCHZ is also dealt with. (E.S.)

  12. Semantic Session Analysis for Web Usage Mining

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hui; SONG Hantao; XU Xiaomei

    2007-01-01

    A semantic session analysis method partitioning Web usage logs is presented. Semantic Web usage log preparation model enhances usage logs with semantic. The Markov chain model based on ontology semantic measurement is used to identifying which active session a request should belong to. The competitive method is applied to determine the end of the sessions.Compared with other algorithms, more successful sessions are additionally detected by semantic outlier analysis.

  13. A Video Recall Study of In-session Changes in Sentiment Override.

    Science.gov (United States)

    Johnson, Lee N; Tambling, Rachel B; Anderson, Shayne R

    2015-09-01

    This study examines in-session changes in sentiment override over the first three sessions of couple therapy. Couples viewed a video recording of therapy sessions immediately after each of the first three sessions and continuously rated their level of sentiment override. Ninety-eight changes were randomly chosen for analysis. Three talk turns prior to each change was coded using the Family Relational Communication Control Coding System. Results show that changes in sentiment override occur frequently. Repeated incidents of communication control were related to negative change in sentiment override for females. Repeated incidents of being left out of the conversation were related to negative changes in sentiment override for females and positive changes for males.

  14. Institutional computing (IC) information session

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Kenneth R [Los Alamos National Laboratory; Lally, Bryan R [Los Alamos National Laboratory

    2011-01-19

    The LANL Institutional Computing Program (IC) will host an information session about the current state of unclassified Institutional Computing at Los Alamos, exciting plans for the future, and the current call for proposals for science and engineering projects requiring computing. Program representatives will give short presentations and field questions about the call for proposals and future planned machines, and discuss technical support available to existing and future projects. Los Alamos has started making a serious institutional investment in open computing available to our science projects, and that investment is expected to increase even more.

  15. Working session 3: Tubing integrity

    Energy Technology Data Exchange (ETDEWEB)

    Cueto-Felgueroso, C. [Tecnatom, S.A., San Sebastian de los Reyes, Madrid (Spain); Strosnider, J. [NRC, Washington, DC (United States)

    1997-02-01

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group`s discussions on these subjects, including conclusions and recommendations, are summarized in this article.

  16. Scientific conference proceedings. Session 1

    International Nuclear Information System (INIS)

    The scientific conference was held in Rez near Prague on June 6 - 7, 1985 on the occasion of the 30th anniversary of the establishment of the UJV. In session 1 - Nuclear Power Engineering - the participants heard 12 papers all of which were incorporated in INIS. They dealt with the thermohydraulic analysis of the PWR core, the reliability analysis of safety systems of WWER nuclear power plants, with in-core measurements, optimization calculations of fast reactors, thermohydraulic calculations of fast reactor fuel assemblies, emergency core cooling of fast reactors, etc. (E.S.)

  17. Working session 3: Tubing integrity

    International Nuclear Information System (INIS)

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group's discussions on these subjects, including conclusions and recommendations, are summarized in this article

  18. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  19. Session Two Outcome of the Formula First Session Task in Problem- and Solution-Focused Approaches.

    Science.gov (United States)

    Jordan, Karin; Quinn, William H.

    1994-01-01

    Evaluated treatment effects in single session process using problem-focused approach and solution-focused approach. Findings indicated significant difference between two approaches when dealing with client's perceived problem improvement, outcome expectancy, session depth, session smoothness, and session positivity. Found no significant…

  20. Secure Execution of Distributed Session Programs

    CERN Document Server

    Alves, Nuno; Yoshida, Nobuko; Deniélou, Pierre-Malo; 10.4204/EPTCS.69.1

    2011-01-01

    The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols) are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP) protocol. The key technical point is the delicate treatment of secure session de...

  1. Working session 1: Tubing degradation

    Energy Technology Data Exchange (ETDEWEB)

    Kharshafdjian, G. [Atomic Energy of Canada, Mississauga, Ontario (Canada); Turluer, G. [IPSN, Fontenay-aux-Roses (France)

    1997-02-01

    A general introductory overview of the purpose of the group and the general subject area of SG tubing degradation was given by the facilitator. The purpose of the session was described as to {open_quotes}develop conclusions and proposals on regulatory and technical needs required to deal with the issues of SG tubing degradation.{close_quotes} Types, locations and characteristics of tubing degradation in steam generators were briefly reviewed. The well-known synergistic effects of materials, environment, and stress and strain/strain rate, subsequently referred to by the acronym {open_quotes}MESS{close_quotes} by some of the group members, were noted. The element of time (i.e., evolution of these variables with time) was emphasized. It was also suggested that the group might want to consider the related topics of inspection capabilities, operational variables, degradation remedies, and validity of test data, and some background information in these areas was provided. The presentation given by Peter Millet during the Plenary Session was reviewed; Specifically, the chemical aspects and the degradation from the secondary side of the steam generator were noted. The main issues discussed during the October 1995 EPRI meeting on secondary side corrosion were reported, and a listing of the potential SG tube degradations was provided and discussed.

  2. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  3. Working session 2: Tubing inspection

    Energy Technology Data Exchange (ETDEWEB)

    Guerra, J. [Tecnatom, S.A. San Sebastian de los Reyes, Madrid (Spain); Tapping, R.L. [AECL, Chalk River, Ontario (Canada)

    1997-02-01

    This session was attended by delegates from 10 countries, and four papers were presented. A wide range of issues was tabled for discussion. Realizing that there was limited time available for more detailed discussion, three topics were chosen for the more detailed discussion: circumferential cracking, performance demonstration (to focus on POD and sizing), and limits of methods. Two other subsessions were organized: one dealt with some challenges related to the robustness of current inspection methods, especially with respect to leaving cracked tubes in service, and the other with developing a chart of current NDE technology with recommendations for future development. These three areas are summarized in turn, along with conclusions and/or recommendations. During the discussions there were four presentations. There were two (Canada, Japan) on eddy current probe developments, both of which addressed multiarray probes that would detect a range of flaws, one (Spain) on circumferential crack detection, and one (JRC, Petten) on the recent PISC III results.

  4. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  5. Control DHT maintenance costs with session heterogeneity

    Institute of Scientific and Technical Information of China (English)

    ZOU Fu-tai; WU Zeng-de; ZHANG Liang; MA Fan-yuan

    2005-01-01

    The maintaining overheads of Distributed Hash Table (DHT) topology have recently received considerable attention.This paper presents a novel SHT (Session Heterogeneity Topology) model, in which DHT is reconstructed with session heterogeneity. SHT clusters nodes by means of session heterogeneity among nodes and selects the stable nodes as the participants of DHT. With an evolving process, this model gradually makes DHT stable and reliable. Therefore the high maintaining overheads for DHT are effectively controlled. Simulation with real traces of session distribution showed that the maintaining overheads are reduced dramatically and that the data availability is greatly improved.

  6. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  7. Two Sessions: Hopes Fill into Trades

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    @@ March in Beijing doesn't only embrace the warm spring's coming, also the two parliamentary sessions of China, the national conference in the highest level of China's parliament and top political advisory body. This year's two sessions, namely, the 2nd Session of the 11th Na-tional People's Congress (NPC) and the 2nd Session of the 11th National Committee of the Chinese People's Political Consultative Conference (CPPCC) lasted from March 5 to 18, and March 3 to 14, respectively. It was the first NPC & CPPCC held since international financial crisis China strongly felt last September.

  8. Session Report - S. Voinis (Andra)

    International Nuclear Information System (INIS)

    The session addressed key issues related to the industrial feasibility of construction. It covered the implementer and regulator points of view. The conclusions derive from three presentations completed by the outcomes of six WG. At the Morsleben Repository, Germany, the licensing of the closure of the repository has been initiated by BfS. The closure concept is based on extensive backfilling with salt concrete complemented by seals. In order to demonstrate the feasibility of constructing such a seal structure an in-situ experiment is performed in a drift of the repository. In the UK, the framework for implementing geological disposal of the higher activity radioactive waste is described in the White Paper published by the UK Government in June 2008. The process to site a facility will be staged and based on voluntarism and partnership with local communities. This process is in its early stage. The paper outlines the work being undertaken by the NDA. In canada, Ontario Power Generation (OPG) has submitted information required for a CNSC licence to prepare the site and construct a DGR for the disposal of low and intermediate level waste from the operation of their nuclear power reactors. That submission includes an Environmental Impact Statement (EIS), as required for a Panel Review under the Canadian Environmental Assessment Act (CEAA), and the information required for a licence application under the NSCA Regulations. Discussions between the proponent and the regulator in the pre-licensing phase, clarified CNSC expectations for the characterization of the site and for the development of the EIS and application. They also helped to ensure that OPG understood these expectations. Outcomes WG session-1: - Start with construction but during operational phase: Simultaneous construction and operation activities. - Need for technical requirements/criteria: So that it can be judged whether 'products' meet the requirements; LT safety issues to be considered during

  9. The International Mathematical Olympiad Training Session.

    Science.gov (United States)

    Rousseau, Cecil; Patruno, Gregg

    1985-01-01

    The Mathematical Olympiad Training Session is designed to give United States students a problem-oriented exposure to subject areas (algebra, geometry, number theory, combinatorics, and inequalities) through an intensive three-week course. Techniques used during the session, with three sample problems and their solutions, are presented. (JN)

  10. Declarative interpretations of session-based concurrency

    DEFF Research Database (Denmark)

    Cano, Mauricio; Rueda, Camilo; López-Acosta, Hugo-Andrés;

    2015-01-01

    paper, we investigate the relationship between operational and declarative models of session-based concurrency. We propose two interpretations of session π-calculus processes as declarative processes in linear concurrent constraint programming (lcc). They offer a basis on which both operational and...

  11. Theory Sessions Documents - 31710 General Linguistics I

    OpenAIRE

    Muñoz Baell, Irma María

    2012-01-01

    Please follow the link below to download all the course materials required for the theory sessions. You will find 1 Student Introductory Assignment, 1 Introductory Activity, 9 Reading Assignments, 11 Team Based Learning Activities, 1Student Peer Review Activity, and 1 Final Week Activity - Academic year 2011-2012 (ECTS credits: 6 (150 hours)). See the Planned Weekly Schedule (Theory sessions).

  12. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten;

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...

  13. Flexible session management in a distributed environment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Zach; /Wisconsin U., Madison; Bradley, Dan; /Wisconsin U., Madison; Tannenbaum, Todd; /Wisconsin U., Madison; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  14. VSS BASED SESSION SETUP MECHANISM IN IMS

    Institute of Scientific and Technical Information of China (English)

    Cao Yufei; Liao Jianxin; Qi Qi; Zhu Xiaomin

    2009-01-01

    This paper proposes a novel session setup mechanism in IMS (IP Multimedia Subsystem) by introducing the functional entity termed VSS (Visitor Subscriber Server) which is used to provide registration and location management.The new mechanism aims at improving session setup procedure by a betterment of location management in IMS.Through the use of two-tier subscriber information database constituted by the HSS (Home Subscriber Server) and the VSS,the new mechanism seperates the registration procedure and location management from the S-CSCF (Serving-Call'Session Control Function),and makes them be handled by the VSS.At the same time,the new mechanism updates the signaling procedure of registration and session setup.With VSS based location management.the cost of registeration and session setup procedure as well as the delay of session setup procedure become lower.he cost and delay functious of the new session setup mechanism as well aus the cost function of new registeration are deduced.Then,simulations and analysis verify that the performance of this new mechanism gets the benefit in cost and time.

  15. Session Types = Intersection Types + Union Types

    CERN Document Server

    Padovani, Luca

    2011-01-01

    We propose a semantically grounded theory of session types which relies on intersection and union types. We argue that intersection and union types are natural candidates for modeling branching points in session types and we show that the resulting theory overcomes some important defects of related behavioral theories. In particular, intersections and unions provide a native solution to the problem of computing joins and meets of session types. Also, the subtyping relation turns out to be a pre-congruence, while this is not always the case in related behavioral theories.

  16. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  17. 不用Cookies实现的session

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    第一.不能有多个sessionID.那样URL会变得很长。关掉浏览器,或丢了sessionID参数session也就没用了.除非每次都在URL后面冒着sessionID参数。暂时不考虑这个问题.把存活期屏蔽。

  18. Session Initiation Protocol Security: A Brief Review

    OpenAIRE

    Selvakumar Manickam; Chen-Wei Tan; Aws N. Jaber; Ali A. Khudher

    2012-01-01

    Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analysed. Some of the identified issues are: Social threats, eavesdropping, delaying, modification of media session, service abuse threats, physical access threats and denied services threats. Results...

  19. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  20. Summary session of the Gas Sampling Calorimetry Workshop

    International Nuclear Information System (INIS)

    The summary session of the Gas Sampling Calorimetry Workshop was a review and discussion session. A number of questions were raised and briefly discussed. More extensive discussions of energy resolution formed the heart of the final session

  1. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  2. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  3. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  4. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  5. Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history

    OpenAIRE

    Gresty, David; Gan, Diane; Loukas, George; Ierotheou, Constantinos

    2016-01-01

    This paper proposes a new approach to the forensic investigation of Internet history artefacts by aggregating the history from a recovered device into sessions and comparing those sessions to other sessions to determine whether they are one-time events or form a repetitive or habitual pattern. We describe two approaches for performing the session aggregation: fixed-length sessions and variable-length sessions. We also describe an approach for identifying repetitive pattern of life behaviour a...

  6. Instruments for documentation of music therapy sessions

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner

    . Danish and Norwegian music therapist have collaborated on developing a one page sheet with a structured form where they after each music therapy session document their use of methods and techniques in individual music therapy with persons with dementia. With this instrument therapists have easy access......It is an important part of the clinical music therapy work to document the daily sessions. For the clinician it is necessary to have a brief overview of each session in order to assess the methods and the process, and not least to be able to give clear reports of these issues to other health care...... professionals at staff meetings, conferences, etc. For music therapists with many clients there is not time enough during a working day to provide comprehensive process descriptions in the music therapy log. Therefore instruments that help the clinician in reducing and structuring this information are needed...

  7. Efficient Session Type Guided Distributed Interaction

    Science.gov (United States)

    Sivaramakrishnan, K. C.; Nagaraj, Karthik; Ziarek, Lukasz; Eugster, Patrick

    Recently, there has been much interest in multi-party session types (MPSTs) as a means of rigorously specifying protocols for interaction among multiple distributed participants. By capturing distributed interaction as series of typed interactions, MPSTs allow for the static verification of compliance of corresponding distributed object programs. We observe that explicit control flow information manifested by MPST opens intriguing avenues also for performance enhancements. In this paper, we present a session type assisted performance enhancement framework for distributed object interaction in Java. Experimental evaluation within our distributed runtime infrastructure illustrates the costs and benefits of our composable enhancement strategies.

  8. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  9. Session Initiation Protocol Security: A Brief Review

    Directory of Open Access Journals (Sweden)

    Selvakumar Manickam

    2012-01-01

    Full Text Available Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analysed. Some of the identified issues are: Social threats, eavesdropping, delaying, modification of media session, service abuse threats, physical access threats and denied services threats. Results and Conclusion: A useful categorization of SIP security issues has been done. The vulnerabilities of existing SIP infrastructure and possible remedies are discussed. It is confirmed that, message attacks are the most dominant category of SIP attacks.

  10. Assessing Client Progress Session by Session in the Treatment of Social Anxiety Disorder: The Social Anxiety Session Change Index

    Science.gov (United States)

    Hayes, Sarah A.; Miller, Nathan A.; Hope, Debra A.; Heimberg, Richard G.; Juster, Harlan R.

    2008-01-01

    Frequent assessment during therapy can improve treatments and provide accountability. However, clinicians often do not monitor progress because of the time it takes to administer and score assessments. In response, the Social Anxiety Session Change Index (SASCI) was developed. The SASCI is a short, easily administered rating of subjective…

  11. Poster Sessions in Marketing Education: An Empirical Examination

    Science.gov (United States)

    Stegemann, Nicole; Sutton-Brady, Catherine

    2009-01-01

    Poster sessions provide a creative and stimulating alternative to traditional assessment methods in marketing. Poster sessions, as a means of assessment, have long been used in science fields. This article presents the successful implementation of poster sessions as a means of assessment in a postgraduate unit of study. Poster sessions in…

  12. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  13. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...... in trees....

  14. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  15. 9. Biennial session of nuclear physics

    International Nuclear Information System (INIS)

    As every two years the 9th biennial session of nuclear physics shall try to make a survey of the recent experimental developments as well as the evolution of the theoretical ideas in Nuclear Physics. Communications are indexed and analysed separately

  16. Posters. [Poster Session at AHRD Conference, 2001].

    Science.gov (United States)

    2001

    The first of the papers in this poster session, "Developing the Employment Brand: Targeting MBA Campus Hires" (Diane M. Bergeron), posits that employment branding benefits both individuals and organizations. It functions as a campus recruiting tool in a competitive labor market and communicates the organization's values and work environment to…

  17. Working session 4: Preventative and corrective measures

    Energy Technology Data Exchange (ETDEWEB)

    Clark, R. [Golder Federal Services Inc., Redmond, WA (United States); Slama, G. [Framatome, Paris (France)

    1997-02-01

    The Preventive and Corrective Measures working session included 13 members from France, Germany, Japan, Spain, Slovenia, and the United States. Attendee experience included regulators, utilities, three steam generator vendors, consultants and researchers. Discussions centered on four principal topics: (1) alternate materials, (2) mechanical mitigation, (3) maintenance, and (4) water chemistry. New or replacement steam generators and original equipment steam generators were separately addressed. Four papers were presented to the session, to provide information and stimulate various discussion topics. Topics discussed and issues raised during the several meeting sessions are provided below, followed by summary conclusions and recommendations on which the group was able to reach a majority consensus. The working session was composed of individuals with diverse experience and varied areas of specialized expertise. The somewhat broad range of topics addressed by the group at times saw discussion participation by only a few individuals. As in any technical meeting where all are allowed the opportunity to speak their mind, straying from an Individual topic was not unusual. Where useful, these stray topics are also presented below within the context In which they occurred. The main categories of discussion were: minimize sludge; new steam generators; maintenance; mechanical mitigation; water chemistry.

  18. My Session With André.

    Science.gov (United States)

    Eigen, Michael

    2015-10-01

    The author shares personal reminiscences of a therapy session with André Green, as well as impressions of professional meetings, readings, and clinical work. He describes personal help he received and aspects of Green's writings on dynamics of madness, as well as the latter's end-of-life discussion of therapeutic limits.

  19. IAEA General Conference begins annual session

    International Nuclear Information System (INIS)

    The document gives general information about the programme of the 43rd regular session of the IAEA General Conference (27 September - 1 october 1999, Austria Center Vienna), attended by ministers and high-level governmental representatives from 111 Member States of the IAEA

  20. Splinter Session "Solar and Stellar Flares"

    OpenAIRE

    Fletcher, L; Hudson, H. S.; Cauzzi, G.; Getman, K. V.; Giampapa, M.; Hawley, S.L; Heinzel, P.; Johnstone, C.; Kowalski, A. F.; Osten, R. A.; Pye, J.

    2012-01-01

    This summary reports on papers presented at the Cool Stars-16 meeting in the splinter session "Solar and Stellar flares." Although many topics were discussed, the main themes were the commonality of interests, and of physics, between the solar and stellar flare communities, and the opportunities for important new observations in the near future.

  1. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  2. ASCO Plenary Sessions: impact, legacy, future.

    Science.gov (United States)

    Vandross, Andrae; Prasad, Vinay; Mailankody, Sham

    2016-06-01

    The ASCO annual meeting draws a large crowd of physicians, cancer researchers, policy makers, and industry representatives. The crown jewel of the annual events is the Plenary session where impactful, influential and visible abstracts are selected for the largest audience. Plenary topics are frequently paired with concurrent New England Journal or Lancet publications.  Here, we review 9 years of ASCO plenary sessions.  Several themes emerge.  First, many of the topics selected have indeed been practice changing, such as the use of ALK inhibitors for ALK rearranged NSCLC, or checkpoint inhibitors in metastatic melanoma.  Second, although some plenary topics seemed destined to change practice, they ultimately falter, such as the use of Cetuximab in NSCLC, vaccine therapy for follicular lymphoma, and even Bevacizumab in metastatic renal cell cancer. Who could have forseen bevacizumab displaced by several VEGF TKIs?  Third, negative trials are rare among Plenary sessions, but when they are presented they are immensely important.  Examples include a seminal study using CA-125 levels to guide treatment of relapsed ovarian cancer, the use of lapatinib combined with traztuzumab in the adjuvant treatment of HER2 + disease, and studies showing no survival benefit to upfront bevacizumab in glioblastoma multiforme.   Fourth, we note a large industry presence among Plenary sessions, as the Industry in part sponsored 62% of Plenary abstracts.  Ultimately a review of 9 years of ASCO plenary reveals the plenary for what it is: a conservative selection of abstracts that, at the time, are thought to change the face of oncology.  Time, however, is the true arbiter, and some succeed in this quest, while others falter.  ASCO plenary sessions reveal the influence, legacy and future of cancer care.

  3. Advancing methods for reliably assessing motivational interviewing fidelity using the motivational interviewing skills code.

    Science.gov (United States)

    Lord, Sarah Peregrine; Can, Doğan; Yi, Michael; Marin, Rebeca; Dunn, Christopher W; Imel, Zac E; Georgiou, Panayiotis; Narayanan, Shrikanth; Steyvers, Mark; Atkins, David C

    2015-02-01

    The current paper presents novel methods for collecting MISC data and accurately assessing reliability of behavior codes at the level of the utterance. The MISC 2.1 was used to rate MI interviews from five randomized trials targeting alcohol and drug use. Sessions were coded at the utterance-level. Utterance-based coding reliability was estimated using three methods and compared to traditional reliability estimates of session tallies. Session-level reliability was generally higher compared to reliability using utterance-based codes, suggesting that typical methods for MISC reliability may be biased. These novel methods in MI fidelity data collection and reliability assessment provided rich data for therapist feedback and further analyses. Beyond implications for fidelity coding, utterance-level coding schemes may elucidate important elements in the counselor-client interaction that could inform theories of change and the practice of MI.

  4. Advancing methods for reliably assessing motivational interviewing fidelity using the motivational interviewing skills code.

    Science.gov (United States)

    Lord, Sarah Peregrine; Can, Doğan; Yi, Michael; Marin, Rebeca; Dunn, Christopher W; Imel, Zac E; Georgiou, Panayiotis; Narayanan, Shrikanth; Steyvers, Mark; Atkins, David C

    2015-02-01

    The current paper presents novel methods for collecting MISC data and accurately assessing reliability of behavior codes at the level of the utterance. The MISC 2.1 was used to rate MI interviews from five randomized trials targeting alcohol and drug use. Sessions were coded at the utterance-level. Utterance-based coding reliability was estimated using three methods and compared to traditional reliability estimates of session tallies. Session-level reliability was generally higher compared to reliability using utterance-based codes, suggesting that typical methods for MISC reliability may be biased. These novel methods in MI fidelity data collection and reliability assessment provided rich data for therapist feedback and further analyses. Beyond implications for fidelity coding, utterance-level coding schemes may elucidate important elements in the counselor-client interaction that could inform theories of change and the practice of MI. PMID:25242192

  5. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately.

  6. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    International Nuclear Information System (INIS)

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately

  7. Session summaries presented by session chairpersons. Panel discussion: conclusions and recommendations

    International Nuclear Information System (INIS)

    The points suggested for the discussion were: a) the sources of uncertainties in Level 2 PSA; b) the methods to quantify uncertainties; c) the international guidance on uncertainty treatment; d) the current practice in Level 2 PSA: qualitative vs. quantitative, how to present results; e) the practical issues confronting PSA analysts; f) the future development and challenges, e.g. SAM, new plant licensing, risk-informed applications etc. Some remarks have been put forward with respect to the role of uncertainty analysis, the severe accident code analysis, the expert judgement/opinion, and the Future development. The recommendations stress on: the updating of the OECD Report on 'Level 2 PSA Methodology and Severe Accident Management' [NEA/CSNI/R(97)11], the development of a guidance document or handbook to reflect good practices on treatment of Level 2 PSA uncertainties; the need for a guidance on expert judgment process - from expert consultation to formal elicitation, with emphasis on rationale documentation; and the need for conducting an international benchmarking exercise, for comparing outcome from different teams on Level 2 PSA for similar (existing) NPPs, with emphasis on uncertainty treatment From the discussion, there is good agreement that Level 2 PSA is now a commonly used key tool for many NPP applications and the uncertainty analysis forms an integral part of it. Uncertainty analysis is used to confirm robustness of results with respect to any acceptance criteria and therefore serves to underpin the quality of a Level 2 PSA. Increasing demand for in-depth treatment in current and future applications include for example: - SAM (e.g. IVR strategy for high power reactors); - Risk-informed decision making; - New reactor licensing. It is also clear that there are different views, emphasis and priorities on a number of issues reflected by the key points raised during the discussion. From the discussion, a number of recommendations were made, including the

  8. Buffered Communication Analysis in Distributed Multiparty Sessions

    Science.gov (United States)

    Deniélou, Pierre-Malo; Yoshida, Nobuko

    Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchrony, the communication buffers can happen to grow inconsiderately over time. This paper proposes a static verification methodology based on multiparty session types which can efficiently compute the upper bounds on buffer sizes. Our analysis relies on a uniform causality audit of the entire collaboration pattern - an examination that is not always possible from each end-point type. We extend this method to design algorithms that allocate communication channels in order to optimise the memory requirements of session executions. From these analyses, we propose two refinements methods which respect buffer bounds: a global protocol refinement that automatically inserts confirmation messages to guarantee stipulated buffer sizes and a local protocol refinement to optimise asynchronous messaging without buffer overflow. Finally our work is applied to overcome a buffer overflow problem of the multi-buffering algorithm.

  9. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    CERN Document Server

    Allen, Alice; Brunner, Robert; Burger, Dan; DuPrie, Kimberly; Hanisch, Robert J; Mann, Robert; Mink, Jessica; Sandin, Christer; Shortridge, Keith; Teuben, Peter

    2012-01-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published ...

  10. Opening of the 123rd Council session

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The CERN Council held its 123rd session on 13 December 2002 under the chairmanship of Professor Maurice Bourquin. The election of the next Director General, the Baseline Plan for 2003-2010 and a new status for non-European states were among the items agreed. Photo 01: (left to right) Director-General Prof. Luciano Maiani, President of Council Prof. Maurice Bourquin, and Director of administration Jan van der Boon.

  11. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  12. Safety Training: scheduled sessions in April

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in April. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 26-APR-11 (08.30 – 10.00) in French 26-APR-11 (10.30 – 12.00) in French Conduite de plates-formes élévatrices mobiles de personnel (PEMP) 28-APR-11 to 29-APR-11 (08.00 – 17.30) in French* Sécurité chimique – Introduction 29-APR-11 (09.00 – 11.30) in French (*) session in French with the possibility of receiving the documentation in English   By Isabelle Cusato (H...

  13. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  14. Codes and standards for quality engineering. PVP-Volume 285

    International Nuclear Information System (INIS)

    Codes and Standards address the requirements for safety and reliability of pressure vessels and piping--materials, design, analysis, construction, fabrication, welding, nondestructive examination, acceptance testing, inservice inspection and testing, repair, replacement and modification. The role of Quality Engineering in all of these aspects of Codes and Standards is immense. In light of the experiences and lessons learned, the Codes and Standards Technical Committee of the ASME Pressure Vessels and Piping Division organized several technical and panel sessions. Papers presented at these sessions are contained in this volume. The following topics are discussed: flow-accelerated corrosion; corrosion in piping and vessels; changing priorities in codes and standards; piping system operability; and operating plant criteria. In addition to the above topics, brief summaries of the presentations at the panel sessions sponsored by the Codes and Standards Technical Committee are included in this volume. These pertain to the changing priorities in Codes and Standards and a discussion on the status of ASME Nuclear Codes and Standards. Thirty-eight papers have been processed separately for inclusion on the data base

  15. Ideas for Advancing Code Sharing (A Different Kind of Hack Day)

    CERN Document Server

    Teuben, Peter; Berriman, Bruce; DuPrie, Kimberly; Hanisch, Robert J; Mink, Jessica; Nemiroff, Robert; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Wallin, John

    2013-01-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and calibration? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  16. Ideas for Advancing Code Sharing: A Different Kind of Hack Day

    Science.gov (United States)

    Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.

    2014-05-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  17. Music Education and Music Therapy. Introduction to Plenary Session 3

    DEFF Research Database (Denmark)

    Bonde, Lars Ole

    2002-01-01

    Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics......Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics...

  18. 78 FR 46312 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-07-31

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, August 6, 2013 8:30 a.m. to 1:00...

  19. 78 FR 61321 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-10-03

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, October 22, 2013 9:00 a.m. to 1:00...

  20. 77 FR 60373 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2012-10-03

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting. Time: Thursday, October 11, 2012, 5 p.m. to 6:30...

  1. 77 FR 62211 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2012-10-12

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting. Time: Tuesday, October 23, 2012, 8:30 a.m. to...

  2. 78 FR 5164 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-01-24

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, February 5, 2013, 9:00 a.m. to 1:00...

  3. 78 FR 53497 - Commercial Space Transportation Advisory Committee; Closed Session

    Science.gov (United States)

    2013-08-29

    ... Federal Aviation Administration Commercial Space Transportation Advisory Committee; Closed Session AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Commercial Space Transportation Advisory... closed session of the Commercial Space Transportation Advisory Committee (COMSTAC). The special...

  4. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  5. On Identifying which Intermediate Nodes Should Code in Multicast Networks

    DEFF Research Database (Denmark)

    Pinto, Tiago; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2013-01-01

    intermediate nodes that do require coding is instrumental for the efficient operation of coded networks and can have a significant impact in overall energy consumption. We present a distributed, low complexity algorithm that allows every node to identify if it should code and, if so, through what output link...... should the coded packets be sent. Our algorithm uses as input the optimal subgraph determined by Lun et al's optimization formulation [13]. Numerical results are provided using common Internet Service Provider (ISP) network topologies and also random network deployments. Our results show that the number......Network coding has the potential to enhance energy efficiency of multicast sessions by providing optimal communication subgraphs for the transmission of the data. However, the coding requirement at intermediate nodes may introduce additional complexity and energy consumption in order to code...

  6. Graph Transformation for Consolidation of Creativity Sessions Results

    DEFF Research Database (Denmark)

    Dolog, Peter

    2010-01-01

    Graph transformation approach for consolidation of creativity sessions results is part of the FP7 EU/IST project idSpace: Tooling of and training for collaborative, distributed product innovation. The goal of graph transformation approach is to provide a tool for merging results of various sessio...... (such as brainstorming sessions), which are represented as graphs, when the session participants- are physically distributed....

  7. 78 FR 45494 - Plant Breeding Listening Session meeting

    Science.gov (United States)

    2013-07-29

    ...; ] DEPARTMENT OF AGRICULTURE Plant Breeding Listening Session meeting ACTION: Notice of a Plant Breeding... Agriculture (USDA) announces a Plant Breeding Listening Session stakeholder meeting for all interested plant breeding and cultivar development stakeholders. DATES: The Plant Breeding Listening Session will be...

  8. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  9. Significant Others in Substance Abusers' Change Talk During Motivational Interviewing Sessions in the Finnish Probation Service

    Directory of Open Access Journals (Sweden)

    Sarpavaara Harri

    2015-03-01

    Full Text Available AIMS - This article explores the meanings substance-abusing clients attach to family and friendships during motivational interviewing (MI sessions in Probation Service. DATA - The analyses are based on videotaped and transcribed data consisting of 82 MI sessions. This database involves the first two counseling sessions of 41 client-counselor pairs. Sessions were videotaped in 12 Probation Service offices in Finland between 2007 and 2009. METHODS - The analysis relies on coding of client's change talk utterances and qualitative semiotic framework. RESULTS - The meanings of the significant others were diverse from the point of view of the client's motivation: family appeared as a support for change, an aspiration, a sufferer, or an obstacle to change; and friendship appeared as an obstacle to change, a surmounted obstacle, a cause to change, or a support to change. CONCLUSIONS - Significant others and their quality are important and diverse factors that promote or hinder change in substance abuser' change talk. Thus, it is suggested that the meaning of significant others should not be overlooked in MI and other substance abuse treatment.

  10. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  11. Summary of panel discussion: New generation of codes

    NARCIS (Netherlands)

    Ellingwood, B.; Nowak, A.; Melchers, R.E.; Thoft-Christensen, P.; Furuta, H.; Vrouwenvelder, A.C.W.M.

    1998-01-01

    In the past decade, there have been numerous advances in probability-based structural codes and codified design in countries in Europe, North America, and the Pacific Rim. The professional engineering community is gradually accepting these concepts. This Panel Session provides a forum to present and

  12. Aspen Global Change Institute Summer Science Sessions

    Energy Technology Data Exchange (ETDEWEB)

    Katzenberger, John; Kaye, Jack A

    2006-10-01

    The Aspen Global Change Institute (AGCI) successfully organized and convened six interdisciplinary meetings over the course of award NNG04GA21G. The topics of the meetings were consistent with a range of issues, goals and objectives as described within the NASA Earth Science Enterprise Strategic Plan and more broadly by the US Global Change Research Program/Our Changing Planet, the more recent Climate Change Program Strategic Plan and the NSF Pathways report. The meetings were chaired by two or more leaders from within the disciplinary focus of each session. 222 scholars for a total of 1097 participants-days were convened under the auspices of this award. The overall goal of each AGCI session is to further the understanding of Earth system science and global environmental change through interdisciplinary dialog. The format and structure of the meetings allows for presentation by each participant, in-depth discussion by the whole group, and smaller working group and synthesis activities. The size of the group is important in terms of the group dynamics and interaction, and the ability for each participant's work to be adequately presented and discussed within the duration of the meeting, while still allowing time for synthesis

  13. SESSAMO: Session Mobility for Video Streaming Applications

    Directory of Open Access Journals (Sweden)

    Mohammed BOUTABIA

    2011-04-01

    Full Text Available Nowadays, telecom operators are making a remarkable progress in providing a wide offer of broadbandaccess to answer the high demand for high bit rate applications. Nevertheless, user requirements do notstop at providing high rate connection, but exceeds it to ensuring transparent service portability among hisequipments. The user would like to choose among his devices those which respond at best his needs andconstraints. From small smart phones to large screen devices, the customer enjoys its entertainments orbusiness meetings according to its current situation. Service continuity over different terminals known assession mobility is a challenging operation in terms of handover latency, context transfer and mediaadaptation. Moreover, this transfer requires synchronization between the involved terminals.In this paper we present “SESSAMO”, a new lightweight session mobility protocol for streamingapplications using RTSP. This solution is transparent to the network and does not require any changes inthe client or server streaming application. The solution is detailed and a set of measurement results arepresented. In addition, we present a new method to renegotiate session parameters following terminalcapacities in order to adapt the flow accordingly. Renegotiation proposal is based on the use of SDPng andMPEG-21.

  14. Safety Training: scheduled sessions in March

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 08-MAR-11 (08.30 – 10.00) in English 08-MAR-11 (10.30 – 12.00) in French 15-MAR-11 (08.30 – 10.00) in French 15-MAR-11 (10.30 – 12.00) in French 17-MAR-11 (08.30 – 10.00) in English 17-MAR-11 (10.30 – 12.00) in English 22-MAR-11 (08.30 – 10.00) in French 22-MAR-11 (10.30 – 12.00) in French 24-MAR-11 (08.30 – 10.00) in French 24-MAR-11 (10.30 – 12.00) in French 29-MAR...

  15. Safety Training: scheduled sessions in May

    CERN Multimedia

    Isabelle Cusato (HSE Unit)

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year.   Biocell Training 10-MAY-11 (08.30 – 10.00) in French 10-MAY-11 (10.30 – 12.00) in French 12-MAY-11 (08.30 – 10.00) in English 12-MAY-11 (10.30 – 12.00) in English 19-MAY-11 (08.30 – 10.00) in French 19-MAY-11 (10.30 – 12.00) in French 24-MAY-11 (08.30 – 10.00) in English 24-MAY-11 (10.30 – 12.00) in English   Champs Magnétiques 13-MAY-11 (09.30 – 11.30) in French...

  16. Within-session and between-session variability of haemodialysis shunt flow measurements

    NARCIS (Netherlands)

    Huisman, RM; van Dijk, M; de Bruin, C; Loonstra, J; Sluiter, WJ; Zeebregts, CJ; van den Dungen, JJAM

    2005-01-01

    Background. Knowledge of the variabilty of a measurement method is essential for its clinical application. We investigated the variability of shunt flow measurements, since this is a relatively neglected area in the literature. In particular, no direct comparison of between-session and within-sessio

  17. Working through: In-Session Processes that Promote Between-Session Thoughts and Activities

    Science.gov (United States)

    Owen, Jesse; Quirk, Kelley; Hilsenroth, Mark J.; Rodolfa, Emil

    2012-01-01

    This study examined whether clients' ratings of the working alliance as well as their perception of cognitive-behavioral (CB) and psychodynamic-interpersonal (PI) techniques (delivered by therapists who used both) were associated with clients' intersession processes (i.e., their thoughts about therapy and therapeutic activity between sessions).…

  18. Nonbinary quantum codes

    OpenAIRE

    Eric M. Rains

    1997-01-01

    We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than 2 states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogues of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields...

  19. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  20. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  1. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  2. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  3. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  4. 2004 scientific forum - Session 2 summary

    International Nuclear Information System (INIS)

    The growth of nuclear power, while providing many benefits, has also contributed to an increasing global challenge over safe and secure waste and spent fuel management. Over the past fifty years, the world has come to better understand the strong interplay between all elements of the nuclear fuel cycle, global economics, and global security. The nuclear fuel cycle can no longer be managed as a simple sequence of technological, economic and political challenges. Rather it must be managed as a system of strongly related issues - waste and spent fuel management cannot be relegated to the back-end of the fuel cycle as only a disposal or storage issue. There exists a wealth of success and experience with waste and spent fuel management that can be forged together with a global systems perspective to lay the framework for the future. The three keynote speakers and four panellists for session 2 (waste and spent fuel management issues) of the 2004 Scientific Forum reviewed related experience to date, including approaches from direct disposal to the closed cycle. Regarding the latter, reprocessing of irradiated power reactor fuel was noted to be a mature, commercially available technology. Experience to date has demonstrated that commercial reprocessing can be compatible with security and non-proliferation requirements. There has also been a continuing reduction in the volume of waste arising from reprocessing. This trend will continue with the implementation of improved technology and operating practices. R and D programmes to study the partitioning and transmutation of environmentally significant radionuclides are being pursued to further enhance the effectiveness of waste minimization programmes. Regarding direct disposal, session 2 participants described significant progress to date. As described in the Director General's statement to the 48th session of the General Conference, Finland, the USA, and Sweden have all moved forward with their geologic disposal programmes

  5. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    Science.gov (United States)

    Allen, A.; Berriman, B.; Brunner, R.; Burger, D.; DuPrie, K.; Hanisch, R. J.; Mann, R.; Mink, J.; Sandin, C.; Shortridge, K.; Teuben, P.

    2013-10-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published scientific results should be made available, and there should be discovery mechanisms to allow these to be found easily. With increased use of resources such as GitHub (for code availability), ASCL (for code discovery), and a stated strong preference from the new journal Astronomy & Computing for code release, we expect to see additional progress over the next few years.

  6. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  7. Report on session 1984-1985

    International Nuclear Information System (INIS)

    During this session the centre changed ownership, so that as from 1st October 1985 it will be operated by Edinburgh, Glasgow and Strathclyde Universities. Aberdeen and St. Andrews are associate members for access to the isotope geology facilities. Other Universities will use the centre on a commercial basis. The research activities are summarized; these are divided into reactor related activities with brief outlines of the projects undertaken in radiochemistry and physics, health physics and nuclear medicine and engineering. The number of analyses undertaken in isotope Geology increased to over 4,000. Sulphur isotope techniques were introduced during the year. The work at the NERC radiocarbon laboratory is also described. The teaching aspects of the reactor and its operation during the year are recorded. There were no problems with the reactor operation and it achieved its highest energy output of 232.5MWH. (U.K.)

  8. Meeting report VLPNPV: Session 3: Immune responses.

    Science.gov (United States)

    Morrison, Trudy G

    2014-01-01

    Virus-like particles (VLPs) and nano-particles (NP) are increasingly considered for both prophylactic and therapeutic vaccines for a wide variety of human and animal diseases. Indeed, 2 VLPs have already been licensed for use in humans, the human papilloma virus vaccine and the hepatitis B virus vaccine. (1) Reflecting this increased interest, a second international conference with a specific focus on VLPs and NP was held at the Salk Institute for Biological Studies in La Jolla, California, in June 2014. Approximately 100 attendees, hailing from many nations, came from academic institutions, research institutes, and biotech companies. A wide variety of topics were discussed, ranging from development and characterization of specific VLP and NP vaccine candidates to methods of production of these particles. Session three was focused on the general question of immune responses to VLPs. PMID:25529229

  9. Ecole de Physique des Houches: session 96

    CERN Document Server

    Huard, Benjamin; Schoelkopf, Robert; Cugliandolo, Leticia F; Quantum Machines : Measurement and Control of Engineered Quantum Systems

    2014-01-01

    This book gathers the lecture notes of courses given at the 2011 summer school in theoretical physics in Les Houches, France, Session XCVI. What is a quantum machine? Can we say that lasers and transistors are quantum machines? After all, physicists advertise these devices as the two main spin-offs of the understanding of quantum mechanical phenomena. However, while quantum mechanics must be used to predict the wavelength of a laser and the operation voltage of a transistor, it does not intervene at the level of the signals processed by these systems. Signals involve macroscopic collective variables like voltages and currents in a circuit or the amplitude of the oscillating electric field in an electromagnetic cavity resonator. In a true quantum machine, the signal collective variables, which both inform the outside on the state of the machine and receive controlling instructions, must themselves be treated as quantum operators, just as the position of the electron in a hydrogen atom. Quantum superconducting...

  10. Seamless Video Session Handoff between WLANs

    Directory of Open Access Journals (Sweden)

    Claudio de Castro Monteiro

    2010-01-01

    Full Text Available Handoff in a distributed IEEE 802.11 Wireless LAN network is a source of significant amount of problems on the video transmission environment. The visual quality of video streaming applications is lowered when stations are in handoff status. In this paper, we introduce an architecture of a session proxy (SP, which tries to preserve the quality of the streaming video upon each handoff between access points. We have evaluated thresholds of RSSI and Loss Frame Rate (LFR for deciding the moment when the handoff process shall begin. Our solution performance was evaluated in a testbed implementation for MPEG-4 video on demand with one video server (VLS and two FreeBSD-based access points supporting Mobile IP, DHCP Server and IAPP approach.

  11. Session: Pre-development project risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Curry, Richard; Linehan, Andy

    2004-09-01

    This second session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question and answer period. The focus of the presentations was on the practices and methodologies used in the wind energy industry for assessing risk to birds and bats at candidate project sites. Presenters offered examples of pre-development siting evaluation requirements set by certain states. Presentation one was titled ''Practices and Methodologies and Initial Screening Tools'' by Richard Curry of Curry and Kerlinger, LLC. Presentation two was titled ''State of the Industry in the Pacific Northwest'' by Andy Linehan, CH2MHILL.

  12. AAS Special Session: Policy Making in Astronomy

    Science.gov (United States)

    Cardelli, J. A.; Massa, D.

    1995-12-01

    The professional astronomical community today is more diverse than at any time in its history. Individuals participating in creative research programs can be found in a wide range of positions. This type of diversity, which mixes research, education, and service (e.g. contract) work, represents the strength of contemporary astronomy. While recognizing the unavoidable reductions in funding and restructuring of organizations like NASA, it is imperative that the significance of the current diversity be considered during these processes. Creative ideas are one of the cornerstones of quality research, and they can originate anywhere. Consequently, it is essential that adequate research resources remain available for free and open competition by all astronomers. Our goal in this session is to bring together officials from the AAS, NASA, and the NSF to discuss how the policy and decision making process operates and whether it should be changed to better serve the general needs of the professional astronomical community. Examples of the issues we believe are important include: In establishing new policy, how can the needs of the average research astronomer be better addressed? How could input from such astronomers be provided to those who craft NASA/NSF policy? How can/should the AAS serve as an interface between policy/decision making bodies and its membership? Should the AAS membership become more actively/effectively involved in the decision making process and, if so, how? More information on this session and related issues can be found at the Association of Research Astronomers Home Page: http://www.phy.vill.edu/astro/faculty/ara/ara_home.htm

  13. Responding changes systematically within sessions during conditioning procedures.

    Science.gov (United States)

    McSweeney, F K; Roll, J M

    1993-11-01

    When the procedure is held constant within an experimental session, responding often changes systematically within that session. Many of these within-session changes in responding cannot be dismissed as learning curves or by-products of satiation. They have been observed in studies of positive reinforcement, avoidance, punishment, extinction, discrimination, delayed matching to sample, concept formation, maze and alley running, and laboratory analogues of foraging, as well as in the unconditioned substrates of conditioned behavior. When aversive stimuli are used, responding usually increases early in the session. When positive reinforcers are used, responding changes in a variety of ways, including increasing, decreasing, and bitonic functions. Both strong and minimal reinforcement procedures produce within-session decreases in positively reinforced behavior. Within-session changes in responding have substantial theoretical and methodological implications for research in conditioning. PMID:8283153

  14. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  15. Summary Of Session 5: How Should We Handle Safety?

    International Nuclear Information System (INIS)

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  16. Examining Web Application by Clumping and Orienting User Session Data

    OpenAIRE

    Deenadayalan, T.; Kavitha, V.; S.Rajarajeswari

    2010-01-01

    The increasing demand for reliable Web applications gives a central role to Web testing. Most of the existing works are focused on the definition of novel testing techniques, specifically tailored to the Web. However, no attempt was carried out so far to understand the specific nature of Web faults. This paper presents a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster and tailored...

  17. Summary Of Session 5: How Should We Handle Safety?

    Energy Technology Data Exchange (ETDEWEB)

    Albert, M.; Roy, G

    2001-07-01

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  18. Responding changes systematically within sessions during conditioning procedures.

    OpenAIRE

    McSweeney, F K; Roll, J M

    1993-01-01

    When the procedure is held constant within an experimental session, responding often changes systematically within that session. Many of these within-session changes in responding cannot be dismissed as learning curves or by-products of satiation. They have been observed in studies of positive reinforcement, avoidance, punishment, extinction, discrimination, delayed matching to sample, concept formation, maze and alley running, and laboratory analogues of foraging, as well as in the unconditi...

  19. Effect of a yoga practice session and a yoga theory session on state anxiety.

    Science.gov (United States)

    Telles, Shirley; Gaur, Vaishali; Balkrishna, Acharya

    2009-12-01

    Yoga techniques practiced for varying durations have been shown to reduce state anxiety. In this study, there were 300 naive-to-yoga persons of both sexes who were attending a yoga therapy center in north India for stress relief as day visitors and were not residing at the center. They were assigned to two groups, yoga practice and yoga theory, and their state anxiety was assessed before and after a 2-hr. yoga session. A significant reduction in scores on state anxiety was found in the yoga practice group (14.7% decrease), as well as in the yoga theory group (3.4% decrease). The difference in scores following the sessions was statistically significant. Hence, yoga practice as well as learning about theoretical aspects of yoga appear to reduce state anxiety, with a greater reduction following yoga practice.

  20. Linking Competency with Training Needs: Session Summary on Disaster Studies and Evaluation, Session BO-17.

    Science.gov (United States)

    Ling, Kelvin W K; Daily, Elaine K

    2016-02-01

    This section of Prehospital and Disaster Medicine (PDM) presents reports and summaries of the 19th World Congress on Disaster and Emergency Medicine (WCDEM) held in Cape Town, South Africa in April of 2015. Abstracts of Congress oral and poster presentations were published in April 2015 as a supplement to PDM (Volume 30, Supplement 1). Reports and session summaries of the 19th World Congress on Disaster and Emergency Medicine. PMID:26842014

  1. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  2. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  3. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  4. A Comparison of Natural Language Processing Methods for Automated Coding of Motivational Interviewing.

    Science.gov (United States)

    Tanana, Michael; Hallgren, Kevin A; Imel, Zac E; Atkins, David C; Srikumar, Vivek

    2016-06-01

    Motivational interviewing (MI) is an efficacious treatment for substance use disorders and other problem behaviors. Studies on MI fidelity and mechanisms of change typically use human raters to code therapy sessions, which requires considerable time, training, and financial costs. Natural language processing techniques have recently been utilized for coding MI sessions using machine learning techniques, rather than human coders, and preliminary results have suggested these methods hold promise. The current study extends this previous work by introducing two natural language processing models for automatically coding MI sessions via computer. The two models differ in the way they semantically represent session content, utilizing either 1) simple discrete sentence features (DSF model) and 2) more complex recursive neural networks (RNN model). Utterance- and session-level predictions from these models were compared to ratings provided by human coders using a large sample of MI sessions (N=341 sessions; 78,977 clinician and client talk turns) from 6 MI studies. Results show that the DSF model generally had slightly better performance compared to the RNN model. The DSF model had "good" or higher utterance-level agreement with human coders (Cohen's kappa>0.60) for open and closed questions, affirm, giving information, and follow/neutral (all therapist codes); considerably higher agreement was obtained for session-level indices, and many estimates were competitive with human-to-human agreement. However, there was poor agreement for client change talk, client sustain talk, and therapist MI-inconsistent behaviors. Natural language processing methods provide accurate representations of human derived behavioral codes and could offer substantial improvements to the efficiency and scale in which MI mechanisms of change research and fidelity monitoring are conducted.

  5. Increasing session-to-session transfer in a brain-computer interface with on-site background noise acquisition

    Science.gov (United States)

    Cho, Hohyun; Ahn, Minkyu; Kim, Kiwoong; Jun, Sung Chan

    2015-12-01

    Objective. A brain-computer interface (BCI) usually requires a time-consuming training phase during which data are collected and used to generate a classifier. Because brain signals vary dynamically over time (and even over sessions), this training phase may be necessary each time the BCI system is used, which is impractical. However, the variability in background noise, which is less dependent on a control signal, may dominate the dynamics of brain signals. Therefore, we hypothesized that an understanding of variations in background noise may allow existing data to be reused by incorporating the noise characteristics into the feature extraction framework; in this way, new session data are not required each time and this increases the feasibility of the BCI systems. Approach. In this work, we collected background noise during a single, brief on-site acquisition session (approximately 3 min) immediately before a new session, and we found that variations in background noise were predictable to some extent. Then we implemented this simple session-to-session transfer strategy with a regularized spatiotemporal filter (RSTF), and we tested it with a total of 20 cross-session datasets collected over multiple days from 12 subjects. We also proposed and tested a bias correction (BC) in the RSTF. Main results. We found that our proposed session-to-session strategies yielded a slightly less or comparable performance to the conventional paradigm (each session training phase is needed with an on-site training dataset). Furthermore, using an RSTF only and an RSTF with a BC outperformed existing approaches in session-to-session transfers. Significance. We inferred from our results that, with an on-site background noise suppression feature extractor and pre-existing training data, further training time may be unnecessary.

  6. SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways

    Directory of Open Access Journals (Sweden)

    Akbar AliHammad

    2010-01-01

    Full Text Available 6LoWPAN (IPv6 based Low-Power Personal Area Network is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inter-connected. This interconnection is especially required in commercial and enterprise applications of sensor networks where reliable and timely data transfers such as multiple code updates are needed from Internet nodes to sensor nodes. For this type of inbound traffic which is mostly bulk, TCP as transport layer protocol is essential, resulting in end-to-end TCP session through a default gateway. In this scenario, a single gateway tends to become the bottleneck because of non-uniform connectivity to all the sensor nodes besides being vulnerable to buffer overflow. We propose SET; a management architecture for multiple split-TCP sessions across a number of serving gateways. SET implements striping and multiple TCP session management through a shim at session layer. Through analytical modeling and ns2 simulations, we show that our proposed architecture optimizes communication for ingress bulk data transfer while providing associated load balancing services. We conclude that multiple split-TCP sessions managed in parallel across a number of gateways result in reduced latency for bulk data transfer and provide robustness against gateway failures.

  7. A session-to-session examination of homework engagement in cognitive therapy for depression: Do patients experience immediate benefits?

    Science.gov (United States)

    Conklin, Laren R; Strunk, Daniel R

    2015-09-01

    Homework is a key component of Cognitive Therapy (CT) for depression. Although previous research has found evidence for a positive relationship between homework compliance and treatment outcome, the methods used in previous studies have often not been optimal. In this study, we examine the relation of specific aspects of homework engagement and symptom change over successive session-to-session intervals. In a sample of 53 depressed adults participating in CT, we examined the relation of observer-rated homework engagement and session-to-session symptom change across the first five sessions. Within patient (and not between patient) variability in homework engagement was significantly related to greater session-to-session symptom improvements. These findings were similar when homework engagement was assessed through a measure of general engagement with homework assignments and a measure assessing engagement in specific assignments often used in CT. Secondary analyses suggested that observer ratings of the effort patients made on homework and the completion of cognitive homework were the numerically strongest predictors of depressive symptom improvements. Patient engagement with homework assignments appears to be an important predictor of early session-to-session symptom improvements. Future research is needed to identify what therapist behaviors promote homework engagement. PMID:26183022

  8. Teaching statistics to medical undergraduates using interactive and participatory sessions

    Directory of Open Access Journals (Sweden)

    THULASINGAM MAHALAKSHMY

    2013-10-01

    Full Text Available Introduction: In India, medical undergraduates think that statistics is difficult to understand. Often, it is taught just before final assessment examination using didactic lectures, with little use of medical examples and less focus on application. Hence, we prepared interactive, participatory sessions for teaching biostatistics to medical undergraduate. Methods: The sessions were delivered by a facilitator. It had clearly specified objectives and teaching learning strategies. A needs assessment was done by interviewing the students who had undergone traditional biostatistics teaching methodology. Specific learning objectives for the sessions were finalized using the Delphi technique and review of University syllabus. Two trained Community Medicine faculties designed the lesson plans ‘backwards’ from desired outcome to content, teaching/learning strategies, assessment and evaluation process (Outcomes-based lesson planning. Forty, third-semester (Para-clinical phase of the second year medical undergraduates undertook these seven teaching sessions. The session followed adult learning principles and included group discussions, games and reflections. We evaluated the impact of the sessions using in-depth interviews, retrospective post-then-preself- assessment and a pre-announced written test. Results: With traditional statistics teaching methodology, students perceived it as a standalone subject and were not interested in statistics. Students who underwent the sessions commented that the sessions were enjoyable, interesting, and participatory and more than %90 of them felt they were engaged throughout the session. They also narrated various instances where they could apply the biostatistics learning. In the post-then-pre-assessment median post-session scores for all the objectives were significantly higher (p <0.050. Conclusion: Use of interactive, participatory sessions for teaching biostatistics to medical undergraduates resulted in a

  9. Proceedings of the 21st DOE/NRC nuclear air cleaning conference; Volume 2, Sessions 9--16

    Energy Technology Data Exchange (ETDEWEB)

    First, M.W. [ed.] [Harvard Univ., Boston, MA (United States). Harvard Air Cleaning Lab.

    1991-02-01

    The 21st meeting of the Department of Energy/Nuclear Regulatory Commission (DOE/NRC) Nuclear Air Cleaning Conference was held in San Diego, CA on August 13--16, 1990. The proceedings have been published as a two volume set. Volume 2 contains sessions covering adsorbents, nuclear codes and standards, modelling, filters, safety, containment venting and a review of nuclear air cleaning programs around the world. Also included is the list of attendees and an index of authors and speakers. (MHB)

  10. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  11. APPLYING COLLABORATION SCRIPT IN KNOWLEDGE BASED SESSIONS

    Directory of Open Access Journals (Sweden)

    AIMAN TURANI

    2016-01-01

    Full Text Available Knowledge Based Processes, KBP, have been introduced to facilitate knowledge transfer among organizational and corporate employees. They stress on the key role of socialization and group meetings in promoting effective knowledge transfer. Meetings within virtual environment are becoming more and more used in today’s organizational settings. There are many conferencing tools that are used to facilitate such meetings. However, providing participants with a co nferencing or chatting tool and expecting them to transfer their knowledge to each other in a convenient way, could lead to many disappointments. CSCL, Computer Support for Collaborative Learning, is relatively a new discipline within teaching and learning field. Applying CSCL techniques and technologies in Knowledge Base Systems, KBS, would be a reasonable option since teaching and learning is essentially a process of knowledge transfer between instructors and students or collaboratively between students themselves. In this research we are focusing on the usage of Collaboration Script, CS, as a way to support knowledge transfer sessions in a structured and formal way. It facilitates sharing tacit knowledge via guided interpersonal interactions and turning them to explicit knowledge by capturing and retrieving these interactions. In this paper we are presenting the scripting structure of three common collaboration techniques used in Knowledge Base processes. As a proof of concept, two of these techniques are described using the collaboration scripting language, ColScript, that was introduced by us in an earlier research.

  12. Nonbinary quantum codes

    CERN Document Server

    Rains, E M

    1997-01-01

    We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than 2 states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogues of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields; in particular, we get analogues of quadratic residue codes, including a single-error correcting code encoding one letter in five, for any alphabet size. We also consider the problem of fault-tolerant computation through such codes, generalizing ideas of Gottesman.

  13. Anaphora in question-answer sessions in university ELF contexts.

    Directory of Open Access Journals (Sweden)

    Thomas Wulstan Christiansen

    2015-07-01

    Full Text Available Abstract - Identity chains (Hasan 1984 ˗ strings of co-referential noun phrases ˗ constitute a lesser researched area in the field of ELF, as has the more general area of cohesion (but see Hüttner 2009, Christiansen 2011. Following on the work on anaphora of such scholars as Reinhart (1983 and Cornish (1999, and on cohesion (e.g. Halliday and Hasan 1976, Halliday 2004, Christiansen (2009a/b, 2011 focuses on the link between text cohesion and discourse coherence. The interactive perspective of discourse (seen as the process of which text is the product: see Widdowson 1984: 100 is especially relevant to an ELF context of spontaneous spoken interaction. As Guido (2008 evidences, different inter-cultural concerns constitute a crucial dimension to the complex multi-code interaction. Consequently, the diverse ways in which speakers from different L1 backgrounds employ anaphors and construct identity chains are key elements in the co-construction of a dialogic text. In this case study, six extracts of transcripts taken from the VOICE corpus (2011 of conference question and answer sessions set in multicultural contexts are analysed qualitatively. The different ways that participants construct identity chains (e.g. whether they use full forms of various kinds or anaphoric pro-forms are classified. The analysis focuses on both how individual anaphors are resolved and how relations between anaphors and antecedent triggers are encoded, and how identity chains are constructed and organized individually. The objective is to identify which kinds of noun phrase (various subtypes of full and pro-forms are used by diverse groups of EFL speakers both in relation to their own contributions and to those of other speakers (with a threefold distinction made between the same turn of the same speaker, a different turn of the same speaker, and a different turn by a different speaker.

  14. Session-based Choreography with Exceptions

    DEFF Research Database (Denmark)

    Carbone, Marco

    2009-01-01

    Choreography has recently emerged as a pragmatic and concise way of describing communication-based systems such as web services and financial protocols. Recent studies have investigated the transition from the design stage of a system to its implementation providing an automatic way of mapping...... a choreograhy into executable code. In this work, we focus on an extension of choreography with a communication-based (interactional) exception mechanism by giving its formal semantics. In particular, we discuss through some examples how interactional exceptions at choreography level can be implemented into end...

  15. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-01-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  16. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-05-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  17. Type Inference for Session Types in the Pi-Calculus

    DEFF Research Database (Denmark)

    Huttel, Hans; Graversen, Eva Fajstrup; Wahl, Sebastian;

    2014-01-01

    In this paper we present a direct algorithm for session type inference for the π-calculus. Type inference for session types has previously been achieved by either imposing limitations and restriction on the π-calculus, or by reducing the type inference problem to that for linear types. Our approach...

  18. Professional development session for early career scientists at SITC 2012

    OpenAIRE

    Capitini, Christian M.; Redmond, William L.; Shafer-Weaver, Kimberly A

    2013-01-01

    The Society for Immunotherapy of Cancer (SITC) 2012 Professional Development Session was held as part of the SITC 27th Annual Meeting, Washington, DC, on October 24, 2012. The session was designed as a new opportunity for early career investigators to learn about relevant career development topics in a didactic setting.

  19. Quality Assurance of Assessment and Moderation Discourses Involving Sessional Staff

    Science.gov (United States)

    Grainger, Peter; Adie, Lenore; Weir, Katie

    2016-01-01

    Quality assurance is a major agenda in tertiary education. The casualisation of academic work, especially in teaching, is also a quality assurance issue. Casual or sessional staff members teach and assess more than 50% of all university courses in Australia, and yet the research in relation to the role sessional staff play in quality assurance of…

  20. Energy and the public: public awareness workshop and plenary session

    Energy Technology Data Exchange (ETDEWEB)

    1979-07-01

    This publication of these two sessions of the conference on February 22 and 23, 1979 was prepared from a verbatim record made by a reporting firm. A separate abstract was prepared for each of the seventeen papers of the public awareness workshops and of the six papers of the plenary session.

  1. First-Session Competency: The Brief Strategic Therapy Scale-1

    Science.gov (United States)

    Amini, Rachelle L.; Woolley, Scott R.

    2011-01-01

    The first session in brief strategic therapy is the most critical phase of treatment. More than a mere "assessment phase," the first session in a true intervention sets the stage for all subsequent therapeutic maneuvers. This article presents a supervisory observation tool, the Brief Strategic Therapy Scale-1 (BSTS-1), a fidelity measure proposed…

  2. Applying Metaphor in HRD Research and Practice: Innovative Session.

    Science.gov (United States)

    Short, Darren C.; Ardichvili, Alexander; Daley, Barbara J.; Kalata, Erica; Kraemer, Theresa J.; Kuchinke, K. Peter; Willis, Verna J.

    A group of human resource development (HRD) practitioners participated in an innovative session on applying metaphor in HRD research and practice. The session objectives were as follows: (1) facilitate a dialogue between those who wrote for and those who read the Advances in Developing Human Resources (ADHR)issue on metaphor in HRD; (2) extend the…

  3. Within-Session Delay-of-Reinforcement Gradients

    Science.gov (United States)

    Reilly, Mark P.; Lattal, Kennon A.

    2004-01-01

    Within-session delay-of-reinforcement gradients were generated with pigeons by progressively increasing delays to reinforcement within each session. In Experiment 1, the effects of imposing progressive delays on variable-interval and fixed-interval schedules were investigated while controlling for simultaneous decreases in reinforcer rate across…

  4. Quality of Group Member Agendas and Group Session Climate.

    Science.gov (United States)

    Kivlighan, Dennis M., Jr.; Jauquet, Carol A.

    1990-01-01

    Examined relationship between group members' (N=36) approach to group sessions and group session climate and relationship between length of time in group and agenda quality. Found average ratings of interpersonal and here-and-now dimensions of agendas were significantly related to average perception of group climate as more engaged and less…

  5. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  6. Reactivity to nicotine cues over repeated cue reactivity sessions.

    Science.gov (United States)

    LaRowe, Steven D; Saladin, Michael E; Carpenter, Matthew J; Upadhyaya, Himanshu P

    2007-12-01

    The present study investigated whether reactivity to nicotine-related cues would attenuate across four experimental sessions held 1 week apart. Participants were nineteen non-treatment seeking, nicotine-dependent males. Cue reactivity sessions were performed in an outpatient research center using in vivo cues consisting of standardized smoking-related paraphernalia (e.g., cigarettes) and neutral comparison paraphernalia (e.g., pencils). Craving ratings were collected before and after both cue presentations while physiological measures (heart rate, skin conductance) were collected before and during the cue presentations. Although craving levels decreased across sessions, smoking-related cues consistently evoked significantly greater increases in craving relative to neutral cues over all four experimental sessions. Skin conductance was higher in response to smoking cues, though this effect was not as robust as that observed for craving. Results suggest that, under the described experimental parameters, craving can be reliably elicited over repeated cue reactivity sessions.

  7. Similarity Measurement of Web Sessions Based on Sequence Alignment

    Institute of Scientific and Technical Information of China (English)

    LI Chaofeng; LU Yansheng

    2007-01-01

    The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra-group similarity while minimizing the inter-group similarity.The first and foremost question needed to be considered in clustering Web sessions is how to measure the similarity between Web sessions. However, there are many shortcomings in traditional measurements. This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited Web page. Then we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of Web page access in detail.Experiments have proved that our method is valid and efficient.

  8. Examining Web Application by Clumping and Orienting User Session Data

    CERN Document Server

    Deenadayalan, T; Rajarajeswari, S

    2010-01-01

    The increasing demand for reliable Web applications gives a central role to Web testing. Most of the existing works are focused on the definition of novel testing techniques, specifically tailored to the Web. However, no attempt was carried out so far to understand the specific nature of Web faults. This paper presents a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster and tailored by augmentation with additional requests to cover the dependence relationships between web pages. The created suite not only can significantly reduce the size of the collected user sessions, also viable to exercise fault sensitive paths. The results demonstrate that our approach consistently detected the majority of known faults using a relatively small number of test cases and will be a powerful system when more and more user sessions are being clustered.

  9. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  10. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  11. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  12. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  13. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  14. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  15. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  16. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  17. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  18. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  19. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  20. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  1. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  2. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  3. Semi-Automated Discovery of Application Session Structure

    Energy Technology Data Exchange (ETDEWEB)

    Kannan, J.; Jung, J.; Paxson, V.; Koksal, C.

    2006-09-07

    While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a higher level---the structure of user-initiated sessions comprised of groups of related connections---remains much less explored. Some types of session structure, such as the coupling between an FTP control connection and the data connections it spawns, have prespecified forms, though the specifications do not guarantee how the forms appear in practice. Other types of sessions, such as a user reading email with a browser, only manifest empirically. Still other sessions might exist without us even knowing of their presence, such as a botnet zombie receiving instructions from its master and proceeding in turn to carry them out. We present algorithms rooted in the statistics of Poisson processes that can mine a large corpus of network connection logs to extract the apparent structure of application sessions embedded in the connections. Our methods are semi-automated in that we aim to present an analyst with high-quality information (expressed as regular expressions) reflecting different possible abstractions of an application's session structure. We develop and test our methods using traces from a large Internet site, finding diversity in the number of applications that manifest, their different session structures, and the presence of abnormal behavior. Our work has applications to traffic characterization and monitoring, source models for synthesizing network traffic, and anomaly detection.

  4. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  5. Predicting E-commerce Consumer Behaviour Using Sparse Session Data

    OpenAIRE

    Thorrud, Thorstein Kaldahl; Myklatun, Øyvind

    2015-01-01

    This thesis research consumer behavior in an e-commerce domain by using a data set of sparse session data collected from an anonymous European e-commerce site. The goal is to predict whether a consumer session results in a purchase, and if so, which items are purchased. The data is supplied by the ACM Recommender System Challenge, which is a yearly challenge held by the ACM Recommender System Conference. Classification is used for predicting whether or not a session made a purchase, as w...

  6. Authentication Schemes for Session Passwords Using Color and Images

    Directory of Open Access Journals (Sweden)

    M Sreelatha

    2011-05-01

    Full Text Available Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.

  7. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  8. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  9. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  10. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  11. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  12. Session Report - S. Smith (US NRC)

    International Nuclear Information System (INIS)

    - environment needed for safety functions; some degree of flexibility in regulatory review and assessment; education of workers: identify differences as compared to conventional rock engineering; applicability of mining regulations. In Sweden the site selection process for the final repository for spent nuclear fuel was initiated in 1992 and resulted, in June 2009, in the selection of Forsmark as the selected site for the final repository. Nuclear facilities require permits in accordance with the Swedish Environmental Code and the Nuclear Activities Act. SKB has submitted two applications to SSM (the Swedish Radiation Safety Authority) according to the Nuclear Activities Act and one to the Environmental Court according to the Environmental Code. The application according the Environmental Code includes the whole KBS-3-system - the final repository in Forsmark, the existing interim storage facility and the encapsulation plant in Oskarshamn. The challenges for the implementer and the regulator are the following: number of documents to elaborate and structure of these documents; right of veto of municipalities; management of a complex licensing process; change from R and D to industrial operations implying the creation of a sizeable construction department in SKB; strengthening of technical bases; application of regulatory framework in a different situation compared to conventional process type nuclear facilities; understanding and addressing constraints from post-closure safety related to the construction and operation of the repository; management of the time frames of repository operation requiring flexibility and continued development of disposal concept; flexible regulations: first use as basis for licensing a new nuclear facility; making adjustments for structural changes during construction and operation; ensuring excavation/construction/backfill activities do not jeopardize conditions for passive post-closure; application of general regulations for a KBS-3 type repository

  13. The evaluation process of short training sessions in organizations

    NARCIS (Netherlands)

    Overschie, M.G.F.; Lukosch, H.K.; De Vries, P.

    This paper presents a critical reflection of the evaluation of learning processes in organizations. Based on learning and evaluation theories and concepts we discuss qualitative and quantitative evaluation processes, and its relationship to short training sessions to foster sustainable development.

  14. Summary of the parallel session on hadron dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Corcoran, M.D. [Rice Univ., Houston, TX (United States); Carroll, A.S. [Brookhaven National Lab., Upton, NY (United States)

    1994-12-31

    The hadron dynamics sessions focussed on A-dependent effects in hard interactions and heavy quark production, as well as color transparency effects. Other topics covered included exclusive processes and spin effects.

  15. Session-Based Programming for Parallel Algorithms: Expressiveness and Performance

    CERN Document Server

    Bejleri, Andi; Yoshida, Nobuko; 10.4204/EPTCS.17.2

    2010-01-01

    This paper investigates session programming and typing of benchmark examples to compare productivity, safety and performance with other communications programming languages. Parallel algorithms are used to examine the above aspects due to their extensive use of message passing for interaction, and their increasing prominence in algorithmic research with the rising availability of hardware resources such as multicore machines and clusters. We contribute new benchmark results for SJ, an extension of Java for type-safe, binary session programming, against MPJ Express, a Java messaging system based on the MPI standard. In conclusion, we observe that (1) despite rich libraries and functionality, MPI remains a low-level API, and can suffer from commonly perceived disadvantages of explicit message passing such as deadlocks and unexpected message types, and (2) the benefits of high-level session abstraction, which has significant impact on program structure to improve readability and reliability, and session type-saf...

  16. Spring Meeting Preview: Joint Assembly Sessions Focus on Urbanization

    Science.gov (United States)

    Zielinski, Sarah

    2006-04-01

    The urban environment has grown to encompass not just the downtown area of a city but also the suburbs and rapidly growing exurban areas. This growth can affect a wide range of geological, physical, and biological processes. Several sessions at the 23-26 May 2006 Joint Assembly in Baltimore, Md., will explore this topic. Two union sessions on the ``Impact of Urbanization on Environmental Systems'' (U31A and U32A) will take place on Wednesday morning, 24 May, at 8:30 A.M. and 10:45 A.M. The sessions are designed to be a wide-ranging exploration of the different, multiple roles that urbanization, and the changes in the environment that accompany urbanization, have on biological and geophysical processes, said session co-convener Larry Band. Brand is Voit Gilmore distinguished professor and chair of the department of geography at the University of North Carolina, Chapel Hill.

  17. An improved anti-leech mechanism based on session identifier

    Science.gov (United States)

    Zhang, Jianbiao; Zhu, Tong; Zhang, Han; Lin, Li

    2012-01-01

    With the rapid development of information technology and extensive requirement of network resource sharing, plenty of resource hotlinking phenomenons appear on the internet. The hotlinking problem not only harms the interests of legal websites but also leads to a great affection to fair internet environment. The anti-leech technique based on session identifier is highly secure, but the transmission of session identifier in plaintext form causes some security flaws. In this paper, a proxy hotlinking technique based on session identifier is introduced firstly to illustrate these security flaws; next, this paper proposes an improved anti-leech mechanism based on session identifier, the mechanism takes the random factor as the core and detects hotlinking request using a map table that contains random factor, user's information and time stamp; at last the paper analyzes the security of mechanism in theory. The result reveals that the improved mechanism has the merits of simple realization, high security and great flexibility.

  18. Diversity and End User Context in Smartphone Usage Sessions

    OpenAIRE

    Soikkeli, Tapio; Karikoski, Juuso; Hämmäinen, Heikki

    2011-01-01

    Julkaisun kokoteksti on luettavissa vain Aalto-tunnuksilla. Please note that access to the fulltext is limited to Aalto staff and students. Mobile end user context has gained increasingattention in the mobile services industry. Context information isseen as an important component in developing new, morepersonalized, mobile services and applications. This paper studiesthe effect of end user context on smartphone usage sessions.Smartphone usage sessions are used to depict user behavior an...

  19. Panel Session on the Future of Few-Body Physics

    International Nuclear Information System (INIS)

    During the 22nd European Few-Body Conference, a session was devoted to a panel discussion on the future of few-body physics. The panel members were Charlotte Elster, Jaume Carbonell, Evgeny Epelbaum, Nasser Kalantar-Nayestanaki, and Jean-Marc Richard. The session was chaired by Ben Bakker. After presentations by the panel members, several topics were discussed with the audience. The conclusions of this discussion are presented in this paper. (author)

  20. Summary of The 3 South China Cardiovascular Scientific Sessions

    Institute of Scientific and Technical Information of China (English)

    刘伊丽; 曾冲

    2001-01-01

    @@The 3rd South China Cardiovascular Scientific Sessions was held on August 4th ~ 6th, 2001 in Guangzhou.There were a total of 119 papers published, 13 lectures given by well- known cardiologists from inland and other parts of the world and 13 satellite conferences.These sessions were characterized by abundant updated information and advance in research on cardiovascular diseases in basic and clinical sciences. They are summarized as follows:

  1. Assessing play-based activities, child talk, and single session outcome in family therapy with young children.

    Science.gov (United States)

    Willis, Amber B; Walters, Lynda H; Crane, D Russell

    2014-07-01

    This exploratory, observational study was designed to reveal descriptive information regarding therapists' actual practices with preschool- and school-aged children in a single session of family therapy and to investigate change mechanisms in family play therapy that have been proposed to make this approach effective. A purposive sample of 30 families receiving family therapy was recruited and video-taped during a family session where at least one child between the ages of 4 and 12 was present. Following the session, the therapist and parent(s) completed questionnaires while one of the children (aged 4-12) was interviewed. Session recordings were coded, minute-by-minute, for participant talk time, visual aids or props used, and therapy technique type (e.g., play-based/activity vs. talk-only techniques). Hierarchical regression and canonical correlational analyses revealed evidence supporting the theory that play-based techniques promote young children's participation, enhance the quality of the child-therapist relationship, and build positive emotional experiences in family therapy.

  2. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions.......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when...

  3. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  4. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...

  5. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  6. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  7. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  8. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  9. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  10. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  11. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  12. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  13. Session 70 - Panel: Consequence Management of a Radiological Dispersion Device

    International Nuclear Information System (INIS)

    This was an unusual panel session in that the panelists did not give presentations but responded to a tabletop exercise where they postulated decisions necessary after radiological dispersal device detonation event (dirty bomb). Articles in the daily WM'06 newsletter sought to prepare the participants for a simulated exercise involving the sighting of a known terrorist and the theft of radiological materials. During the slide presentation (in the form of a developing television news broadcast) the audience played decision makers and their 'votes' were tallied for multiple choice decisions and questions. After that was completed, the expert panel was asked to give their best responses for those decisions. The audience was allowed to ask questions and to give opinions as the panel responded. During the exercise the session co-chairs alternated announcing the events as they unfolded in the exercise and polled the audience using multiple-choice options for decisions to be made during the event. The answers to those questions were recorded and compared to the panelists' answers. The event chronology and decisions (audience questions) are shown in this report. - An explosion was reported at the Tucson International Airport (9:35 am). 1. Who is in charge? - Witnesses report 10-20 fatalities, 50 injured and massive damage to the airport, no cause determined yet (9:55 am). 2. IC's Next Action Should Be? - KRAD (local television station) Investigative News Reporters interviewed witnesses that observed a 25 foot U-Haul truck pull up onto the departure ramp just moments before the explosion (10:02 am). Terrorism has not been ruled out. 3. When is the incident declared a potential crime scene? - City of Tucson IC has ordered an evacuation of the airport to a holding area at a nearby long term parking area (10:10 am). No information has been given as to why the evacuation took place. The explosion is suspected to contain chemical, biological or radiological agents. County and

  14. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  15. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, A.; Katoen, J.P.; Westra, Y.; Alblas, H.; Gyimóthy, T.

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived fro

  16. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  17. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  18. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  19. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  20. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  1. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  2. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  3. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  4. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  5. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  6. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  7. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  8. What's in a Session: Tracking Individual Behavior on the Web

    CERN Document Server

    Meiss, Mark; Gonçalves, Bruno; Ramasco, José J; Menczer, Filippo; 10.1145/1557914.1557946

    2010-01-01

    We examine the properties of all HTTP requests generated by a thousand undergraduates over a span of two months. Preserving user identity in the data set allows us to discover novel properties of Web traffic that directly affect models of hypertext navigation. We find that the popularity of Web sites -- the number of users who contribute to their traffic -- lacks any intrinsic mean and may be unbounded. Further, many aspects of the browsing behavior of individual users can be approximated by log-normal distributions even though their aggregate behavior is scale-free. Finally, we show that users' click streams cannot be cleanly segmented into sessions using timeouts, affecting any attempt to model hypertext navigation using statistics of individual sessions. We propose a strictly logical definition of sessions based on browsing activity as revealed by referrer URLs; a user may have several active sessions in their click stream at any one time. We demonstrate that applying a timeout to these logical sessions af...

  9. Introduction and Overview of the Industrial Interactive Panel Session

    Science.gov (United States)

    Seiler, David

    2014-03-01

    A unique industrial panel covering the challenges and needs of various industries and how being innovative is important. The session involves two invited industry speakers (24 minutes each) who will set the stage for the interactive round table panel session. The Panel, led by moderator Mark Bernius (Morgan Advanced Materials), consists of the two invited speakers plus an additional five industry panelists. The first thirty minutes of the panel session has the five additional panelists introducing themselves and their work/company. These introductions could include what they or their company does, sharing one or two technical highlights, listing some challenges or needs for physicists, and what innovation breakthroughs are needed in their industries. The final hour of the session will be highly interactive with questions to the panel coming from the moderator, the audience, and the panelists themselves. Questions that might be addressed include: how physicists are or could be critical in advancing innovation; how can AIP/APS/FIAP help industry get the physics help they need to be innovative (knowledge, the right staff, etc.); what role can students and post docs play in advancing industry's mission; etc. We invite you to participate in this interactive session and ask our industry experts your own interesting and challenging questions. The invited speakers are George Thompson, Intel, and Rick Watkins, Nike. The panel members also include Jason Cleveland, Asylum Research; Robert Doering, Texas Instruments; William Gallagher, IBM T.J. Watson Research Center; James Hollenhorst, Agilent Technologies; and Martin Poitzsch, Schlumberger-Doll Research.

  10. Communicating Earth Science Applications through Virtual Poster Sessions

    Science.gov (United States)

    Favors, J. E.; Childs-Gleason, L. M.; Ross, K. W.; Ruiz, M. L.; Rogers, L.

    2013-12-01

    The DEVELOP National Program addresses environmental and public policy issues through interdisciplinary research projects that apply the lens of NASA Earth observations to community concerns around the globe. Part of NASA's Applied Sciences' Capacity Building Program, DEVELOP bridges the gap between NASA Earth Science and society, building capacity in both participants and partner organizations to better prepare them to handle the challenges that face our society and future generations. Teams of DEVELOP participants partner with decision makers to conduct rapid feasibility projects that highlight fresh applications of NASA's suite of Earth observing sensors, cultivate advanced skills, and increase understanding of NASA Earth Science data and technology. Part of this process involves the creation of short introductory videos that demonstrate the environmental concerns, project methodologies and results, and an overview of how this work will impact decision makers. These videos are presented to the public three times a year in 'virtual poster sessions' (VPS) that provide an interactive way for individuals from around the globe to access the research, understand the capabilities and applications of NASA's Earth science datasets, and interact with the participants through blogging and dialogue sessions. Virtual poster sessions have allowed DEVELOP to introduce NASA's Earth science assets to thousands of viewers around the world. For instance, one fall VPS had over 5,000 visitors from 89 different countries during the two week session. This presentation will discuss lessons learned and statistics related to the series of nine virtual poster sessions that DEVELOP has conducted 2011-2013.

  11. Theory, practice, and history in critical GIS: Reports on an AAG panel session

    Science.gov (United States)

    Wilson, M.W.; Poore, B.S.

    2009-01-01

    Extending a special session held at the 2008 annual meeting of the Association of American Geographers in Boston, this commentary collection highlights elements of the critical GIS research agenda that are particularly pressing. Responding to a Progress report on critical GIS written by David O'Sullivan in 2006, these six commentaries discuss how different interpretations of 'critical' are traced through critical GIS research. Participants in the panel session discussed the need for a continued discussion of a code of ethics in GIS use in the context of ongoing efforts to alter or remake the software and its associated practices, of neo-geographies and volunteered geographies. There were continued calls for hope and practical ways to actualize this hope, and a recognition that critical GIS needs to remain relevant to the technology. This 'relevance' can be variously defined, and in doing so, researchers should consider their positioning vis-??-vis the technology. Throughout the commentaries collected here, a question remains as to what kind of work disciplinary sub-fields such as critical GIS and GIScience perform. This is a question about language, specifically the distance that language can create among practitioners and theoreticians, both in the case of critical GIS and more broadly throughout GIScience.

  12. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  13. CACTI: Free, Open-Source Software for the Sequential Coding of Behavioral Interactions

    OpenAIRE

    Lisa H Glynn; Hallgren, Kevin A.; Houck, Jon M.; Moyers, Theresa B.

    2012-01-01

    The sequential analysis of client and clinician speech in psychotherapy sessions can help to identify and characterize potential mechanisms of treatment and behavior change. Previous studies required coding systems that were time-consuming, expensive, and error-prone. Existing software can be expensive and inflexible, and furthermore, no single package allows for pre-parsing, sequential coding, and assignment of global ratings. We developed a free, open-source, and adaptable program to meet t...

  14. Look at the Gato! Code-Switching in Speech to Toddlers

    Science.gov (United States)

    Bail, Amelie; Morini, Giovanna; Newman, Rochelle S.

    2015-01-01

    We examined code-switching (CS) in the speech of twenty-four bilingual caregivers when speaking with their 18- to 24-month-old children. All parents CS at least once in a short play session, and some code-switched quite often (over 1/3 of utterances). This CS included both inter-sentential and intra-sentential switches, suggesting that at least…

  15. Radiation transport phenomena and modeling. Part A: Codes; Part B: Applications with examples

    International Nuclear Information System (INIS)

    This report contains the notes from the second session of the 1997 IEEE Nuclear and Space Radiation Effects Conference Short Course on Applying Computer Simulation Tools to Radiation Effects Problems. Part A discusses the physical phenomena modeled in radiation transport codes and various types of algorithmic implementations. Part B gives examples of how these codes can be used to design experiments whose results can be easily analyzed and describes how to calculate quantities of interest for electronic devices

  16. On the definition of Transnational Corporations in a UN Code of Conduct

    OpenAIRE

    Schetting, Gerd

    1980-01-01

    The UN Commission on Transnational Corporations which was appointed by ECOSOC will have its next meeting in May. An Intergovernmental Working Group will have held ten sessions by then and present a draft Code of Conduct dealing with transnational corporations. (For a review of the state of preparations for this Code see the article by Hartmut Scheele in INTERECONOMICS No. 6/1979). The Commission itself and the Working Group have dealt more than once with the question to which enterprises the ...

  17. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  18. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  19. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  20. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  1. Vienna SAC-SOS: Analysis of the European VLBI Sessions

    Science.gov (United States)

    Ros, C. T.; Pavetich, P.; Nilsson, T.; Böhm, J.; Schuh, H.

    2012-12-01

    The Institute of Geodesy and Geophysics (IGG) of the Vienna University of Technology as an IVS Special Analysis Center for Specific Observing Sessions (SAC-SOS) has analyzed the European VLBI sessions using the software VieVS. Between 1990 and 2011, 115 sessions have been carried out. The analyzed baselines have lengths ranging from approximately 445 to 4580 km, and they show good repeatabilities, apart from the ones containing station Simeiz. The station velocities have also been investigated. The stations situated in the stable part of Europe have not shown significant relative movements w.r.t. Wettzell, whereas the stations located in the northern areas have the largest vertical motions as a result of the post glacial isostatic rebound of the zone. The stations placed in Italy, around the Black Sea, in Siberia, and near the Arctic Circle show the largest relative horizontal motions because they belong to different geodynamical units.

  2. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist. Leadership Training           Training Course Title Next Session Language Duration Available places Needed to maintain the session Driving for Impact and Influence 13-Sep-2016 to 14-Sep-2016 French 2 days 4 0 Essentials of People Management for CERN Supervisors (Adapted from CDP for CERN Supervisors) 22-Sep-2016 to 23-Sep-2016, 18-Nov-2016, 17-Jan-2017 to 18-Jan-2017 English 5 days 5 0 Eléments essentiels de la gestion du personnel pour les superviseurs (adapt&a...

  3. Summary of papers presented in the Theory and Modelling session

    Directory of Open Access Journals (Sweden)

    Lin-Liu Y.R.

    2012-09-01

    Full Text Available A total of 14 contributions were presented in the Theory and Modelling sessions at EC-17. One Theory and Modelling paper was included in the ITER ECRH and ECE sessions each. Three papers were in the area of nonlinear physics discussing parametric processes accompanying ECRH. Eight papers were based on the quasi-linear theory of wave heating and current drive. Three of these addressed the application of ECCD for NTM stabilization. Two papers considered scattering of EC waves by edge density fluctuations and related phenomena. In this summary, we briefly describe the highlights of these contributions. Finally, the three papers concerning modelling of various aspects of ECE are reported in the ECE session.

  4. Topical Session on the Decommissioning and Dismantling Safety Case

    International Nuclear Information System (INIS)

    Set up by the Radioactive Waste Management Committee (RWMC), the WPDD brings together senior representatives of national organisations who have a broad overview of Decommissioning and Dismantling (D and D) issues through their work as regulators, implementers, R and D experts or policy makers. These include representatives from regulatory authorities, industrial decommissioners from the NEA Cooperative Programme on Exchange of Scientific and Technical Information on Nuclear Installation Decommissioning Projects (CPD), and cross-representation from the NEA Committee on Nuclear Regulatory Activities, the Committee on Radiation Protection and Public Health, and the RWMC. The EC is a member of the WPDD and the IAEA also participates. This ensures co-ordination amongst activities in these international programmes. Participation from civil society organisations is considered on a case by case basis, and has already taken place through the active involvement of the Group of Municipalities with Nuclear Installations at the first meeting of the WPDD At its second meeting, in Paris, 5-7 December 2001, the WPDD held two topical sessions on the D and D Safety Case and on the Management of Materials from D and D, respectively. This report documents the topical session on the safety case. The topical session was meant to provide an exchange of information and experience on the following issues: What topics should be included in a safety case? Of what should it consist? Is there sufficient and complete guidance nationally and internationally? How do practices differ internationally? Main boundary condition to this session was that it would deal with plants where spent fuel has been removed. Also the topical sessions was kept at a level that makes the most of the varied constituency of the WPDD. Namely, interface issues are important, and issue-identification and discussion was the immediate goal. There was less interest in examining areas where variability amongst national

  5. ENABLING NETWORK CONVERGENCE THROUGH CONTEXTUAL SESSION MOBILITY WITH IMS

    Directory of Open Access Journals (Sweden)

    A. Dragoi

    2011-05-01

    Full Text Available To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This article investigates the problem space of supporting Session Mobility (SM with IMS and the associated issues such as when and how to support dynamic changes in the set of devices through which the user accesses a session. It also investigates how the SM arrival calls should be handled at the network level where they are not considered as ongoing sessions. Hence, we discuss the design options and identify functional blocks needed to support SM. We propose applying priority-based resource allocation approach to guarantee lower blocking probability for ongoing SM arrival calls compared to new arrival calls. Numerical results show that this approach allows achieving such performance for different call arrival rates.

  6. Enabling Network Convergence Through Contextual Session Mobility With IMS

    Directory of Open Access Journals (Sweden)

    A.Dragoi

    2011-05-01

    Full Text Available To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This article investigates the problem space of supporting Session Mobility (SM with IMS and the associated issues such as when and how to support dynamic changes in the set of devices through which the user accesses a session. It also investigates how the SM arrival calls should be handled at the network level where they are not considered as ongoing sessions. Hence, we discuss the design options and identify functional blocks needed to support SM. We propose applying priority-basedresource allocation approach to guarantee lower blocking probability for ongoing SM arrival calls compared to new arrival calls. Numerical results show that this approach allows achieving such performance for different call arrival rates.

  7. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  8. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  9. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  10. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  11. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  12. An Interactive Session on Nutritional Pathologies for Health Professional Students

    Directory of Open Access Journals (Sweden)

    Joshua DeSipio

    2015-07-01

    Full Text Available Various studies have emphasized the need to improve the nutrition training of health professionals, which will help them to provide optimal patient care. Nutrition-based interactive sessions may serve as an efficient approach to instigate an interest in nutrition among the students. Here we report the reception and effectiveness of a nutrition-pathology based interactive activity that we designed and implemented in the gastroenterology course given to the second year students at our medical school. The activity involved team work, individual accountability and peer-teaching. Nutrition pathology case stems (Kwashiorkor, vitamin B-12 deficiency, zinc deficiency and zinc-induced copper deficiency were posted on the course website for the students to read before the session. At the start of the session, all the groups (each made up of four members took a pre-quiz. Each student was then given an information sheet describing one case. Each group discussed the four cases with students acting as the “teacher” for the case assigned to them. A post-quiz was administered to the groups to assess acquisition of knowledge as well as in-depth thinking about the nutrition aspects discussed. The efficacy of the session measured by pre (39% questions correctly answered in total and post-quizzes (96% questions correctly answered in total and the overwhelmingly positive student feedback indicated that the session was highly effective. Ninety-five percent of students thought that the session demonstrated the clinical relevance of nutrition, while 98% students found the peer teaching to be engaging.

  13. Multipath Routing of Multiple Description Coded Images in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    徐缓缓; 朱策; 虞露

    2014-01-01

    Multiple description coding (MDC) generates multiple decodable bitstreams for a source to combat informa-tion loss. In this paper, multipath routing problem for two-description coded images is investigated for traditional and coded wireless networks without and with coding capability at intermediate nodes, respectively. Firstly, we formulate an interference-aware MDC multipath routing for traditional networks by employing a time-division link scheduling method to eliminate wireless interference, and ultimately obtain an optimal path selection corresponding to the minimum achievable distortion. Secondly, for coded networks, we evaluate practical wireless network coding (NC) in delivering descriptions of multiple unicast sessions. While NC increases maximum supporting flow rate of MDC descriptions in wireless networks, possible undecodability of NC mixed information is alleviated by MDC. To minimize achievable distortion, a proposed interference-and-coding-aware MDC multipath routing strikes a good balance between minimizing side effect of wireless interference avoidance and maximizing NC opportunity. Simulation results validate the effectiveness of the two proposed schemes.

  14. Mini-conference and Related Sessions on Laboratory Plasma Astrophysics

    Energy Technology Data Exchange (ETDEWEB)

    Hantao Ji

    2004-02-27

    This paper provides a summary of some major physics issues and future perspectives discussed in the Mini-Conference on Laboratory Plasma Astrophysics. This Mini-conference, sponsored by the Topical Group on Plasma Astrophysics, was held as part of the American Physical Society's Division of Plasma Physics 2003 Annual Meeting (October 27-31, 2003). Also included are brief summaries of selected talks on the same topic presented at two invited paper sessions (including a tutorial) and two contributed focus oral sessions, which were organized in coordination with the Mini-Conference by the same organizers.

  15. Highlights of session presentations. TSS / CST population IEC meeting.

    Science.gov (United States)

    1995-01-01

    The great deal of documentation which was prepared for the recent TSS/CST Population IEC (information, education, and communication) meeting from research, field experiments, and action projects will be useful to TSS/CST advisors and individual countries undertaking IEC and population education work. This article summarizes the 12 sessions held during the open forum. To illustrate some of the latest trends in population and health communication, the "enter-educate" approach and use of the interactive computer software called SCOPE (Strategic Communication Planning and Evaluation) were discussed. Next, ways in which to apply research effectively in IEC and population education were considered. Examples were provided of 1) a workshop methodology used to help a multidisciplinary group design a problem-solving communication strategy in Malaysia and Dominica; 2) the counseling training evaluation technique based on the GATHER (greet, ask, tell, help, explain, and return for follow-up) model; and 3) four types of evaluation of population education in schools. The third session was concerned with the program approach used in IEC and population education. Session 4 dealt with the implication of UNFPA support to family planning (FP) IEC. Counseling skills training and interpersonal communication were next on the agenda, followed by a consideration of how knowledge and policies are applied in the area of youth. The seventh session concentrated on ways to involve men in FP and reproductive health and included a discussion of a case study on the attitude and behavior of men with regard to FP which had IEC implications. The next session described the need to reconceptualize population education and what such a reconceptualization would entail. Session 9 was devoted to a consideration of gender issues and the education of girls. The tenth session covered the use of participatory approaches and community involvement in population communication programs. Innovative methodologies

  16. ASIS '99 Knowledge: Creation, Organization and Use, Part III: Plenary Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1999

    1999-01-01

    Describes the following sessions: "Knowledge Management: A Celebration of Humans Connected with Quality Information Objects (Plenary Session 1); "Intellectual Property Rights and the Emerging Information Infrastructure (Plenary Session 2); and "Knowledge: Creation, Organization and Use (Conference Wrap-up Session). (AEF)

  17. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  18. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  19. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  20. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  1. Functions of Arabic-English Code-Switching: Sociolinguistic Insights from a Study Abroad Program

    Science.gov (United States)

    Al Masaeed, Khaled

    2013-01-01

    This sociolinguistic study examines the functions and motivations of code-switching, which is used here to mean the use of more than one language in the same conversation. The conversations studied here take place in a very particular context: one-on-one speaking sessions in a study abroad program in Morocco where English is the L1 and Arabic the…

  2. Energy and Power Measurements for Network Coding in the Context of Green Mobile Clouds

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper presents an in-depth power and energy measurement campaign for inter- and intra-session network coding enabled communication in mobile clouds. The measurements are carried out on different commercial platforms with focus on routers and mobile phones with different CPU capabilities. Our...

  3. Determination of a behavioral transfer function: White-noise analysis of session-to-session response-ratio dynamics on concurrent VI VI schedules

    OpenAIRE

    Hunter, Ian; Davison, Michael

    1985-01-01

    Six pigeons were exposed to concurrent variable-interval schedules in which the programmed reinforcer ratios changed from session to session according to a pseudorandom binary sequence. This procedure corresponded to the stochastic identification paradigm (“white-noise experiment”) of systems theory and enabled the relation between log response ratios in the current session and log reinforcer ratios in all previous sessions to be determined. Such dynamic relations are called linear transfer f...

  4. Differences between a single session and repeated sessions of 1 Hz TMS by double-cone coil prefrontal stimulation for the improvement of tinnitus.

    Science.gov (United States)

    Vanneste, Sven; De Ridder, Dirk

    2013-03-01

    Tinnitus related distress is associated with increased activity in the anterior cingulate cortex (ACC). In a recent study, it was demonstrated that a single session of low frequency prefrontal TMS using a double-cone coil (DCC) modulating the ACC (AC/DC TMS, anterior cingulate cortex targeted modulation by Double-Cone coil) yields a transient improvement in subjects with chronic tinnitus. An increasing number of studies demonstrated that repeated sessions of low frequency TMS to the temporoparietal area can significantly improve tinnitus complaints. Our aim is to determine the extent to which repeated sessions of AC/DC TMS can modulate tinnitus in comparison to a single session. Seventy-three tinnitus patients received a single (N = 46) or repetitive (N = 27) session(s) of TMS using a DCC placed over the prefrontal cortex. Our results indicate that both single sessions as well as multiple sessions (i.e. 8 sessions) of AC/DC TMS suppress both tinnitus distress (respectively 7.60% vs. 26.19%) and tinnitus intensity (respectively 7.12% vs. 19.60%) transiently. It was further shown that multiple sessions of AC/DC TMS generate a higher suppression effect in comparison to a single session of AC/DC TMS and that more patients responded to repeated sessions of 1 Hz stimulation in comparison to a single session. Our findings give further support to the fact that non-auditory areas are involved in tinnitus intensity and tinnitus distress and that more patients respond to repeated sessions with a higher suppression effect in comparison to patients who received a single session, suggesting that the approach of daily TMS sessions is relevant.

  5. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  6. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  7. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  8. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  9. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  10. Adaptations to short, frequent sessions of endurance and strength training are similar to longer, less frequent exercise sessions when the total volume is the same

    DEFF Research Database (Denmark)

    Kilen, Anders; Hjelvang, Line B; Dall, Niels;

    2015-01-01

    ]: n = 21) performed nine 15-minute training sessions weekly, whereas a second group ("classical training" [CL]: n = 8) completed exactly the same training on a weekly basis but as three 45-minute sessions. For each group, each session comprised exclusively strength, high-intensity cardiovascular...

  11. Organizing conceptual knowledge in humans with a gridlike code.

    Science.gov (United States)

    Constantinescu, Alexandra O; O'Reilly, Jill X; Behrens, Timothy E J

    2016-06-17

    It has been hypothesized that the brain organizes concepts into a mental map, allowing conceptual relationships to be navigated in a manner similar to that of space. Grid cells use a hexagonally symmetric code to organize spatial representations and are the likely source of a precise hexagonal symmetry in the functional magnetic resonance imaging signal. Humans navigating conceptual two-dimensional knowledge showed the same hexagonal signal in a set of brain regions markedly similar to those activated during spatial navigation. This gridlike signal is consistent across sessions acquired within an hour and more than a week apart. Our findings suggest that global relational codes may be used to organize nonspatial conceptual representations and that these codes may have a hexagonal gridlike pattern when conceptual knowledge is laid out in two continuous dimensions. PMID:27313047

  12. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  13. INC93: international nuclear congress. Technical sessions summaries

    International Nuclear Information System (INIS)

    The conference dealt mainly with safety, environmental and human aspects of nuclear energy, including waste management. This volume consists of summaries of the technical sessions contained in Volumes 2 and 3. The individual papers have also been abstracted separately for INIS, with the summaries abridged

  14. Y-Notes; Introductory Sessions on Nuclear Technology

    International Nuclear Information System (INIS)

    This chapter is divided into next parts: What is 'Y-Notes; Young generation opening session; Nuclear education and transfer of know-how; Nuclear technology; Other applications of nuclear technology; Nuclear programs and technical cooperation; Political aspects; Environment and safety; Communication and public perception; Economics; Fuel cycle challenges; Video

  15. Definitional Ceremonies: Integrating Community into Multicultural Counseling Sessions

    Science.gov (United States)

    Bitter, James Robert; Robertson, Patricia E.; Roig, Grace; Disqueact, J. Graham

    2004-01-01

    Definitional Ceremonies are used as a forum for integrating members of diverse cultures into multicultural counseling sessions. The authors provide a philosophical foundation, implementation process, and excerpts from a typescript of a recent definitional ceremony involving a women and her mother, both recently in the United States from Panama.

  16. Commentary on session II: The politics of migration and trade

    OpenAIRE

    Freeman, Gary P.

    2006-01-01

    Summary and discussion of the two papers in this session: "U.S.-Mexican migration cooperation: obstacles and opportunities" by Marc R. Rosenblum; "Political implications of U.S. public attitudes toward immigration on the immigration policymaking process" by Valerie F. Hunt

  17. Aggregated Search Interface Preferences in Multi-Session Search Tasks

    NARCIS (Netherlands)

    M. Bron; J. van Gorp; F. Nack; L.B. Baltussen; M. de Rijke

    2013-01-01

    Aggregated search interfaces provide users with an overview of results from various sources. Two general types of display exist: tabbed, with access to each source in a separate tab, and blended, which combines multiple sources into a single result page. Multi-session search tasks, e.g., a research

  18. Secure bindings of SAML assertions to TLS sessions

    DEFF Research Database (Denmark)

    Kohlar, Florian; Schwenk, Jörg; Jensen, Meiko;

    2010-01-01

    is to strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. In this paper, we present a third approach which is of further interest beyond IDM protocols: we bind the SAML assertion to the TLS session that has been agreed upon between client and the service...

  19. Setting the Standards for Sessional Staff: Quality Learning and Teaching

    Science.gov (United States)

    Harvey, Marina

    2013-01-01

    Across the Australian Higher Education sector a focus on quality is driving a new paradigm for learning and teaching: quality standards. One challenge is to engage all academics with this progress towards systematic quality enhancement and assurance. Sessional staff, who provide most of the face-to-face teaching in Australian universities, remain…

  20. Hypnosis and Smoking: A Five-Session Approach.

    Science.gov (United States)

    Watkins, Helen H.

    An active five-session, individualized treatment approach to the stopping of smoking is described. This approach emphasized the following: (a) the feedback, in and out of hypnosis, of the client's own reasons for quitting, (b) the visualization of both positive and negative smoking experiences meaningful to the client, (c) maintaining contact with…

  1. Summary of the Open Session at the IMC 2016

    Science.gov (United States)

    Verbeeck, C.; Argo, M.; Brown, P.; Molau, S.; Rendtel, J.; Martínez Picar, A.

    2016-01-01

    The Open Session at the IMC 2016 took place on Friday, June 3rd 2016 evening (21:30-22:30) and was intended to accommodate beginners' questions about meteor astronomy. Megan Argo moderated a panel of experts, consisting of Peter Brown, Sirko Molau, Jürgen Rendtel, and Antonio Martínez Picar.

  2. Anger and Violence Prevention: Enhancing Treatment Effects through Booster Sessions

    Science.gov (United States)

    Bundy, Alysha; McWhirter, Paula T.; McWhirter, J. Jeffries

    2011-01-01

    This study was designed to evaluate the effectiveness of booster sessions on the maintenance of intervention gains following an anger management prevention program: "Student Created Aggression Replacement Education Program" ("SCARE"). Participants who had completed the "SCARE" program a year earlier were randomly assigned into either a booster…

  3. Session-Based Programming for Parallel Algorithms: Expressiveness and Performance

    Directory of Open Access Journals (Sweden)

    Andi Bejleri

    2010-02-01

    Full Text Available This paper investigates session programming and typing of benchmark examples to compare productivity, safety and performance with other communications programming languages. Parallel algorithms are used to examine the above aspects due to their extensive use of message passing for interaction, and their increasing prominence in algorithmic research with the rising availability of hardware resources such as multicore machines and clusters. We contribute new benchmark results for SJ, an extension of Java for type-safe, binary session programming, against MPJ Express, a Java messaging system based on the MPI standard. In conclusion, we observe that (1 despite rich libraries and functionality, MPI remains a low-level API, and can suffer from commonly perceived disadvantages of explicit message passing such as deadlocks and unexpected message types, and (2 the benefits of high-level session abstraction, which has significant impact on program structure to improve readability and reliability, and session type-safety can greatly facilitate the task of communications programming whilst retaining competitive performance.

  4. Video Traffic Flow Analysis in Distributed System during Interactive Session

    Directory of Open Access Journals (Sweden)

    Soumen Kanrar

    2016-01-01

    Full Text Available Cost effective, smooth multimedia streaming to the remote customer through the distributed “video on demand” architecture is the most challenging research issue over the decade. The hierarchical system design is used for distributed network to satisfy more requesting users. The distributed hierarchical network system contains all the local and remote storage multimedia servers. The hierarchical network system is used to provide continuous availability of the data stream to the requesting customer. In this work, we propose a novel data stream that handles the methodology for reducing the connection failure and smooth multimedia stream delivery to the remote customer. The proposed session based single-user bandwidth requirement model presents the bandwidth requirement for any interactive session like pause, move slowly, rewind, skip some of the frame, and move fast with some constant number of frames. The proposed session based optimum storage finding algorithm reduces the search hop count towards the remote storage-data server. The modeling and simulation result shows the better impact over the distributed system architecture. This work presents the novel bandwidth requirement model at the interactive session and gives the trade-off in communication and storage costs for different system resource configurations.

  5. Using Simulated Sessions to Enhance Clinical Social Work Education

    Science.gov (United States)

    Mooradian, John K.

    2008-01-01

    This article evaluates a learning method that used theatre students as family clients in an advanced social work practice course. Data from 47 advanced graduate students showed that observing peers conduct simulated sessions can be an effective and valued learning experience. Quantitative findings indicated that simulations are perceived to be…

  6. Clinical Teaching by Video-Enhanced Study Club Discussion Sessions.

    Science.gov (United States)

    Roberts, Douglass B.; And Others

    1988-01-01

    The Loma Linda University School of Dentistry's "study club" method of teaching operative dentistry involves a four-hour clinical operating session and an hour-long discussion immediately following. Videotape recordings of the operative procedures are used successfully in the discussion period to enhance observation and recall. (MSE)

  7. Kinematics of ankle taping after a training session.

    Science.gov (United States)

    Meana, M; Alegre, L M; Elvira, J L L; Aguado, X

    2008-01-01

    This study aimed to test the effectiveness of ankle taping on the limitation of forced supination during a change of direction, as well as the losses of effectiveness after a 30-minute training session. Fifteen young men with no ankle injury volunteered for the study. The static and dynamic ranges of movement (ROM) were measured before and after a training session. The dynamic measurements were recorded using high-speed 3D photogrammetry. The differences between static and dynamic measures of ankle supination and plantar flexion were significant. The losses of effectiveness during supination and ankle plantar flexion restriction were 42.3 % and 47.6 %, respectively. Ankle taping was effective in restricting the maximal static ROMs before a training session, but the effectiveness decreased after 30 min of training. The present study shows the necessity of performing dynamic ROM analysis of sports techniques involved in the ankle sprain mechanism in order to determine the degree of tape restriction after a training session, because there were differences between static and dynamic ankle ROMs. The lack of effects on the restriction of the dynamic plantar flexion would bring into question the necessity of ankle taping in subjects without previous injuries. PMID:17614032

  8. Discussion summary of session 4: strategy for 2012 (part II)

    International Nuclear Information System (INIS)

    The fourth session of the 2012 LHC Performance Workshop included the following topics: -) beam Energy (it was decided to step back in energy from 4 TeV to 3.5 TeV in case of excessive number of quenches), -) optics options, -) collimation settings and performance, -) performance reach in the LHC for 2012, -) MD plans in 2012, and -) Ions in 2012

  9. 3rd Session of the Sant Cugat Forum on Astrophysics

    CERN Document Server

    Gravitational wave astrophysics

    2015-01-01

    This book offers review chapters written by invited speakers of the 3rd Session of the Sant Cugat Forum on Astrophysics — Gravitational Waves Astrophysics. All chapters have been peer reviewed. The book goes beyond normal conference proceedings in that it provides a wide panorama of the astrophysics of gravitational waves and serves as a reference work for researchers in the field.

  10. CWI at TREC 2012, KBA track and Session Track

    NARCIS (Netherlands)

    Araújo, S.; Boscarino, C.; Gebremeskel, G.G.; He, J.; Vries, A.P. de; Voorhees, E.M.; Buckland, L. P.

    2013-01-01

    We participated in two tracks: Knowledge Base Acceleration (KBA) Track and Session Track. In the KBA track, we focused on experi- menting with different approaches as it is the first time the track is launched. We experimented with supervised and unsupervised re- trieval models. Our supervised appro

  11. Our Place in the Universe. Session 1; History of Astronomy

    Science.gov (United States)

    Adams, Mitzi

    2016-01-01

    This session includes a very broad overview of a couple of the major ideas of astronomy, along with demonstrations of Earth's motions that, give rise to the seasons, show us the "faces" of Venus (and the Moon), and result in retrograde motion of the outer planets.

  12. IOC session report, July 2001, Moscow: Salt Lake 2002

    OpenAIRE

    2014-01-01

    The Salt Lake Organizing Committee (SLOC) is pleased to present the July 2001 progress report of the XIX Olympic Winter Games. This report, presented to the 112th International O lympic Committee (IOC) Session meeting in Moscow, details the progress of SLOC since September 2000.

  13. Effects of Psychotherapy Training and Intervention Use on Session Outcome

    Science.gov (United States)

    Boswell, James F.; Castonguay, Louis G.; Wasserman, Rachel H.

    2010-01-01

    Objective: This study was an investigation of the relationships among therapist training variables, psychotherapy process, and session outcome in a psychotherapy training clinic. The aims were to assess the relationship between "training as usual" and intervention use in individual psychotherapy, to investigate the relationship between therapist…

  14. Measuring TPACK... Yes! But how? A working session

    NARCIS (Netherlands)

    P. Fisser; L. Ervin; J. Voogt; M. Koehler

    2014-01-01

    Many instruments are being developed within the international TPACK community. This roundtable session would serve as an opportunity to begin the dialogue necessary to the creation of an instrument that pulls together lessons learned from previous research and assessment design principles. We will f

  15. Implementing Problem-Based Learning in the Counseling Session.

    Science.gov (United States)

    Hall, Kimberly R.

    This study examined the use of problem-based learning (PBL) in an actual counseling session and the effects on student assertiveness skills. A group of seventh-grade students, who were all victims of bullies, participated in the study. The students, two boys and one girls, were 13 and 14 years old. Teachers rated the level of assertiveness skills…

  16. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  17. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  18. Practical session assessments in human anatomy: Weightings and performance.

    Science.gov (United States)

    McDonald, Aaron C; Chan, Siew-Pang; Schuijers, Johannes A

    2016-07-01

    Assessment weighting within a given module can be a motivating factor for students when deciding on their commitment level and time given to study a specific topic. In this study, an analysis of assessment performances of second year anatomy students was performed over four years to determine if (1) students performed better when a higher weighting was given to a set of practical session assessments and (2) whether an improved performance in the practical session assessments had a carry-over effect on other assessment tasks within that anatomy module and/or other anatomy modules that follow. Results showed that increasing the weighting of practical session assessments improved the average mark in that assessment and also improved the percentage of students passing that assessment. Further, it significantly improved performance in the written end-semester examination within the same module and had a carry-over effect on the anatomy module taught in the next teaching period, as students performed better in subsequent practical session assessments as well as subsequent end-semester examinations. It was concluded that the weighting of assessments had significant influences on a student's performance in that, and subsequent, assessments. It is postulated that practical session assessments, designed to develop deep learning skills in anatomy, improved efficacy in student performance in assessments undertaken in that and subsequent anatomy modules when the weighting of these assessments was greater. These deep learning skills were also transferable to other methods of assessing anatomy. Anat Sci Educ 9: 330-336. © 2015 American Association of Anatomists. PMID:26580309

  19. Single-Session Radiofrequency Ablation of Bilateral Lung Metastases

    Energy Technology Data Exchange (ETDEWEB)

    Palussiere, Jean, E-mail: palussiere@bergonie.org; Gomez, Fernando; Cannella, Matthieu; Ferron, Stephane; Descat, Edouard [Institut Bergonie, Department of Radiology, Regional Cancer Centre (France); Fonck, Marianne [Institut Bergonie, Department of Digestive Oncology (France); Brouste, Veronique [Institut Bergonie, Clinical and Epidemiological Research Unit (France); Avril, Antoine [Institut Bergonie, Department of Surgery (France)

    2012-08-15

    Purpose: This retrospective study examined the feasibility and efficacy of bilateral lung radiofrequency ablation (RFA) performed in a single session. Methods: From 2002-2009, patients with bilateral lung metastases were treated by RFA, where possible in a single session under general anesthesia with CT guidance. The second lung was punctured only if no complications occurred after treatment of the first lung. Five lung metastases maximum per patient were treated by RFA and prospectively followed. The primary endpoint was the evaluation of acute and delayed complications. Secondary endpoints were calculation of hospitalization duration, local efficacy, median survival, and median time to tumor progression. Local efficacy was evaluated on CT or positron emission tomography (PET) CT. Results: Sixty-seven patients were treated for bilateral lung metastases with RFA (mean age, 62 years). Single-session treatment was not possible in 40 due to severe pneumothoraces (n = 24), bilateral pleural contact (n = 14), and operational exclusions (n = 2). Twenty-seven (41%) received single-session RFA of lesions in both lungs for 66 metastases overall. Fourteen unilateral and four bilateral pneumothoraces occurred (18 overall, 66.7%). Unilateral (n = 13) and bilateral (n = 2) chest tube drainage was required. Median hospitalization was 3 (range, 2-8) days. Median survival was 26 months (95% confidence interval (CI), 19-33). Four recurrences on RFA sites were observed (4 patients). Median time to tumor progression was 9.5 months (95% CI, 4.2-23.5). Conclusions: Although performing single-session bilateral lung RFA is not always possible due to pneumothoraces after RFA of first lung, when it is performed, this technique is safe and effective.

  20. Managing Widely Disparate Code Bases Through Automation of Continuous Integration and Deployment

    Science.gov (United States)

    McLaughlin, B. D.; Joshi, T.

    2013-12-01

    NASA EOSDIS tools, services, and service endpoints are widely dispersed across different sub-agencies and sub-organizations. Each of these entities has a different set of skills and widely varying codebases. Some produce sophisticated, well-tested, stable and deployable code, while others are struggling to meet stringent requirements with limited resources. This disparity makes the process of partnering with and deploying code onto the Earthdata platform (https://earthdata.nasa.gov) difficult, even at times impossible. The Earthdata Code Collaborative (ECC) is a project repository and code hosting facility that addresses this problem directly through a three-tiered approach: 1. Provide a standardized set of testing and automation tools for all hosted projects. 2. Regularly report on bugs and features as well as testing coverage and success through Web-based tools. 3. Directly pipeline projects from the ECC into the Earthdata production environment. This session will explain the architecture behind the ECC, including the custom software and 3rd party tools used. It will also detail the process by which decisions were and are being made to arrive at a fully-automated suite of tools and tests that allow any code base to quickly improve its quality and become a candidate for Earthdata inclusion. The session is oriented towards developers, managers, and team members involved in the process of developing, testing, deploying, and ensuring the quality of a code base, whether that code base be tens of millions of lines of code or simply hundreds.

  1. Cue-responding behaviors during pharmacy counseling sessions with patients with asthma about inhaled corticosteroids: Potential relations with medication beliefs and self-reported adherence.

    OpenAIRE

    Driesenaar, J.A.; de Smet, P A G M; Van Hulten, R; Noordman, J.; van Dulmen, A M

    2016-01-01

    The aim of this study was to examine cue-responding behavior at the pharmacy while counseling about inhaled corticosteroids (ICS) in relation to medication adherence and medication beliefs. Patients with asthma aged ≥18 years using ICS were recruited from 12 pharmacies. Counseling sessions were video-recorded. Patients' emotional and informational cues and pharmacists' and pharmacy technicians' cue-responding behaviors were coded using an expanded version of the Medical Interview Aural Rating...

  2. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  3. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  4. New residential construction compliance: Evaluation of the Washington State Energy Code program

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, W.M.; Lee, A.D.; Sandahl, L.J.; Durfee, D.L.; Richman, E.E.

    1993-07-01

    This report describes the Pacific Northwest Laboratory`s (PNL`s) evaluation of the Washington State Energy Code Program (WSECP). In 1990, the Washington State Legislature passed a residential energy efficiency code to be effective July 1, 1992. Bonneville supported passage and implementation of the code to ensure that new residences in the State of Washington were as energy efficient as economically feasible. The Washington State Energy Office (WSEO) is conducting the WSECP for Bonneville to support code implementation. This support takes several forms, including providing training to code enforcement officials, technical support both in the field and through telephone ``hot lines,`` and computerized tools to review house plans for code compliance. WSEO began implementing the WSECP in 1992, prior to the effective date of the new code. This first phase of the WSECP was the subject of an earlier process evaluation conducted by PNL. From that evaluation PNL found that most new homes being built immediately after the code went into effect were ``grand-fathered`` under the old code. The training program for the new code was in place and sessions were being attended by the jurisdictions but it was too early to determine if the training was effective in improving code compliance and easing the transition to the new energy code. That is the subject of this evaluation.

  5. SUMMARY OF GENERAL WORKING GROUP A+B+D: CODES BENCHMARKING.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.; SHAPOSHNIKOVA, E.; ZIMMERMANN, F.; HOFMANN, I.

    2006-05-29

    Computer simulation is an indispensable tool in assisting the design, construction, and operation of accelerators. In particular, computer simulation complements analytical theories and experimental observations in understanding beam dynamics in accelerators. The ultimate function of computer simulation is to study mechanisms that limit the performance of frontier accelerators. There are four goals for the benchmarking of computer simulation codes, namely debugging, validation, comparison and verification: (1) Debugging--codes should calculate what they are supposed to calculate; (2) Validation--results generated by the codes should agree with established analytical results for specific cases; (3) Comparison--results from two sets of codes should agree with each other if the models used are the same; and (4) Verification--results from the codes should agree with experimental measurements. This is the summary of the joint session among working groups A, B, and D of the HI32006 Workshop on computer codes benchmarking.

  6. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  7. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  8. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  9. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  10. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  11. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  12. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  13. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  14. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  15. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  16. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  17. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  18. Verbal expressions used by anaclitic and introjective patients with depressive symptomatology: Analysis of change and stuck episodes within therapeutic sessions

    Directory of Open Access Journals (Sweden)

    Nelson Valdés

    2015-01-01

    Full Text Available A person’s speech makes it possible to identify significant indicators which reflect certain characteristics of his/her personality organization, but also can vary depending on the relevance of specific moments of the session and the symptoms type. The present study analyzed 10 completed and successful therapeutic processes using a mixed methodology. The therapies were video–and audio-taped, as well as observed through a one-way mirror by trained observers. All the sessions of each therapy were considered (N = 230 in order to identify, delimit, transcribe, and analyze Change Episodes (CEs = 24 and Stuck Episodes (SEs = 26. Each episode was made up by patients’ speech segments (N = 1,282, which were considered as the sampling unit. The Therapeutic Activity Coding System (TACS-1.0 was used to manually code each patient’s verbalizations, nested within episodes and individuals, in order to analyze them using Hierarchical Linear Modelling (HLM. The findings suggest that anaclitic patients tend to use more verbalizations in order to ask for feedback or to be understood by their therapists (attune, whereas introjective patients tend to use more verbalizations in order to construct new meanings (resignify during therapeutic conversation, but especially during SEs. Clinical implications to enrich the therapeutic practice are discussed.

  19. 1979 New Mexico legislative session: energy issues and legislation

    International Nuclear Information System (INIS)

    This report is an account of the energy legislation and associated issues considered during the 1979 session of the 34th New Mexico Legislature. The session's major issue was the federal study of a proposed nuclear Waste Isolation Pilot Plant (WIPP) in New Mexico. A large proportion of time and effort was spent on resolving the state's formal position toward the federal project. However, other energy concerns were also significant even though they were neither as controversial nor as visible as the primary issue. The two most important laws enacted were the Radioactive Waste Consultation Act and the Radioactive Waste Transportation Act. The Legislature considered 47 other energy-related bills, of which 17 were enacted

  20. Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation

    CERN Document Server

    Shen, Charles; Nahum, Erich

    2008-01-01

    A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload problem calls for a pushback control solution in which the potentially overloaded receiving server may notify its upstream sending servers to have them send only the amount of load within the receiving server's processing capacity. The pushback framework can be achieved by either a rate-based feedback or a window-based feedback. The centerpiece of the feedback mechanism is the algorithm used to generate load regulation information. We propose three new window-based feedback algorithms and evaluate them together with two exis...

  1. Type systems for distributed programs components and sessions

    CERN Document Server

    Dardha, Ornela

    2016-01-01

    In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. In particular, static analysis techniques based on types and type systems are an adequate methodology considering their success in guaranteeing not only basic safety properties, but also more sophisticated ones like deadlock or lock freedom in concurrent settings. The main contributions of this book are twofold. i) We design a type system for a concurrent object-oriented calculus to statically ensure consistency of dynamic reconfigurations. ii) We define an encoding of the session pi-calculus, which models communication in distributed systems, into the standard typed pi-calculus. We use this encoding to derive properties like type safety and progress in the session pi-calculus by exploiting the corresponding properties in the standard typed pi-calculus.

  2. Session: Avoiding, minimizing, and mitigating avian and bat impacts

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Kerlinger, Paul

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question answer period. The session addressed a variety of questions related to avoiding, minimizing, and mitigating the avian and bat impacts of wind power development including: what has been learned from operating turbines and mitigating impacts where they are unavoidable, such as at Altamont Pass WRA, and should there be mitigation measures such as habitat creation or land conservation where impacts occur. Other impact minimization and mitigation approaches discussed included: location and siting evaluations; options for construction and operation of wind facilities; turbine lighting; and the physical alignment/orientation. Titles and authors of the presentations were: 'Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part II' by Carl Thelander and 'Prevention and Mitigation of Avian Impacts at Wind Power Facilities' by Paul Kerlinger.

  3. 1979 New Mexico legislative session: energy issues and legislation. [WIPP

    Energy Technology Data Exchange (ETDEWEB)

    Barsumian, L.; Vandevender, S.G.

    1979-10-01

    This report is an account of the energy legislation and associated issues considered during the 1979 session of the 34th New Mexico Legislature. The session's major issue was the federal study of a proposed nuclear Waste Isolation Pilot Plant (WIPP) in New Mexico. A large proportion of time and effort was spent on resolving the state's formal position toward the federal project. However, other energy concerns were also significant even though they were neither as controversial nor as visible as the primary issue. The two most important laws enacted were the Radioactive Waste Consultation Act and the Radioactive Waste Transportation Act. The Legislature considered 47 other energy-related bills, of which 17 were enacted.

  4. Hilbert Matrix Based Cryptosystem using a Session Key

    CERN Document Server

    Raja, Penmetsa V Krishna; Avadhani, P S

    2011-01-01

    Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. The objectives of the proposed work are to propose a new cryptographic method based on the special matrix called the Hilbert matrix for authentication and confidentiality and to propose a model for confidentiality and authentication using shared key cryptosystems with the concept of digital enveloping using a session key. In the present work various algorithms are presented for encryption and authentication based on Hilbert matrix using a session key.

  5. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  6. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  7. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  8. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  9. An Interactive Session on Nutritional Pathologies for Health Professional Students

    OpenAIRE

    Joshua DeSipio; Sangita Phadtare

    2015-01-01

    Various studies have emphasized the need to improve the nutrition training of health professionals, which will help them to provide optimal patient care. Nutrition-based interactive sessions may serve as an efficient approach to instigate an interest in nutrition among the students. Here we report the reception and effectiveness of a nutrition-pathology based interactive activity that we designed and implemented in the gastroenterology course given to the second year students at our medical s...

  10. Upcoming training sessions (up to end October) - Places available

    CERN Document Server

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist.  

  11. Effects of an Intensive Resistant Training Sessions and Green Tea

    OpenAIRE

    Mohammad Esmaeil Afzalpour; Elham Ghasemi; Asghar ZarbanP

    2014-01-01

    Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity) women were randomly divided into 4 equal (n=10) groups including green tea supplementation, green tea supp...

  12. Resources for Education and Outreach Activities discussion session

    CERN Document Server

    Barney, David; The ATLAS collaboration; Bourdarios, Claire; Kobel, Michael; Kourkoumelis, Christine; Melo, Ivan; Rangel-Smith, Camila; Alexopoulos, Angelos

    2015-01-01

    Over the past few years a variety of resources have been developed, by individuals and groups, to support Education & Outreach activities in particle physics. Following short (five-minute) presentations by six speakers, a discussion session allowed the audience to go further in depth in activities they found particularly interesting. This paper presents brief overviews from each of the six speakers, followed by a summary of the ensuing discussion

  13. Address at the opening session of the Niels Bohr Symposium

    International Nuclear Information System (INIS)

    In his address at the opening session of the Niels Bohr Symposium organized jointly by UNESCO and the Niels Bohr Institute in Copenhagen in May 1998 in order to examine the latest developments in key fields of physics, the Director General of UNESCO presented the scientific work and the spirit of Niels Bohr, emphasizing the impact of his discoveries for new openings in science and in society in general

  14. Astronomy and Space Technologies, WILGA 2012; EuCARD Sessions

    OpenAIRE

    Romaniuk, R S

    2012-01-01

    Wilga Sessions on HEP experiments, astroparticle physics and accelerator technology were organized under the umbrella of the EU FP7 Project EuCARD – European Coordination for Accelerator Research and Development. This paper is the first part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with photonics and electronics applications in astronomy and space technologies. It presents a digest of chosen technical work results shown by young researchers fro...

  15. Session-Based Programming for Parallel Algorithms: Expressiveness and Performance

    OpenAIRE

    Andi Bejleri; Raymond Hu; Nobuko Yoshida

    2010-01-01

    This paper investigates session programming and typing of benchmark examples to compare productivity, safety and performance with other communications programming languages. Parallel algorithms are used to examine the above aspects due to their extensive use of message passing for interaction, and their increasing prominence in algorithmic research with the rising availability of hardware resources such as multicore machines and clusters. We contribute new benchmark results for SJ, an extensi...

  16. An investigation of the differential-outcomes effect within sessions

    OpenAIRE

    Jones, B. Maxwell; White, K. Geoffrey

    1994-01-01

    The differential-outcomes effect is manifest as more accurate performance of a delayed conditional discrimination when alternative choice responses are followed by different reinforcers than when they are followed by the same reinforcer. In Experiment 1, a differential-outcomes effect was demonstrated within sessions by signaling the duration of food access for correct responses with stimuli appearing in conjunction with the sample stimuli. The delayed matching-to-sample performance of 5 pige...

  17. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  18. Effects of an Intensive Resistant Training Sessions and Green Tea

    Directory of Open Access Journals (Sweden)

    Mohammad Esmaeil Afzalpour

    2014-03-01

    Full Text Available Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity women were randomly divided into 4 equal (n=10 groups including green tea supplementation, green tea supplementation plus resistance training, resistance training, and control groups. After supplementation period (600 mg/day, 14 days, resistance training and green tea supplementation plus resistance training groups performed an intensive resistance training session at 75-85 % of one repetition maximum. The malondialdehyde and total thiol were measured as oxidative stress indices. Data were analyzed by using of repeated measure ANOVA and LSD tests at p<0.056T. Results: Results showed that after 14 days of green tea consumption, malondialdehyde significantly decreased in green tea supplementation (p=0.03 and green tea supplementation plus resistance training (p=0.01 groups, while total thiol increased significantly (p=0.01 in two green tea supplementation groups. However, an intensive resistance training session increased malondialdehyde (p=0.01 without any significantly changes in total thiol (p=0.426T. Conclusion: It seems that green tea supplementation can inhibit exercise-induced protein and lipid oxidation in non-athletes women via enhancement of antioxidant defense system of the body6T.6T

  19. Analysis and comparison of intensity in specific soccer training sessions

    Directory of Open Access Journals (Sweden)

    Luciano Antonacci Condessa

    2015-03-01

    Full Text Available This study compared the exercise intensity of four specific soccer training sessions (friendly and training match, tactical and technical workouts. Ten professional soccer players (24.2 ± 3.7 years, 177.9 ± 7.3 cm, 63.2 ± 4.6 mLO2•kg-1•min-l were recruited. A treadmill progressive interval test was performed to determine the players' VO2max, maximal heart rate (HRmax, HR-VO2 curve, and the heart rate corresponding to blood lactate concentrations of 2 and 4 mmol/L. The heart rate during the training sessions was used to estimate the exercise intensity and to classify them into intensity zones (low-intensity: 4 mmol/L. Exercise intensities were different among training sessions (friendly match: 86.0 ± 5.1% HRmax; training match: 81.2 ± 4.1% HRmax; tactical workout: 70.4 ± 5.3% HRmax; technical workout: 62.1 ± 3.6% HRmax. The friendly match presented the highest percentage of time performed in the high-intensity zone.

  20. New Session of introductory “E-Groups Training”

    CERN Multimedia

    2013-01-01

    The session provides a short introduction of E-Groups and how to use it to efficiently manage mailing lists at CERN. Alongside a general overview of the E-Groups application, E-Groups specific terminology, the management of dynamic and static groups and the specific settings for mails and archives are discussed in detail.   The course is intended to give newcomers a clear idea of what E-Groups are and how they can be used at CERN. It should enable users to be more efficient when being confronted in particular with: the creation of dynamic and static E-groups and the decision whether the one or the other type is more appropriate, the management of E-group memberships, and the setting of mailing/archiving related properties. The session will also focus on some best practices and give general advice on how to use E-Groups. This introductory training session is given jointly by members of the IT-OIS and GS-AIS groups and is intended for any member at CERN potentially being confronted with the ...

  1. The Physics session at the ATLAS overview week

    CERN Multimedia

    Takai, H.

    The Physics session at the ATLAS overview week at Clermont-Ferrand will be certainly remembered by the presentation of Blaise Pascal's historical experiment repeat. And why not? He is the local hero and by the looks of his primitive measurements it does take a lot of guts to explain his results on the basis of air columns. He was also lucky that he did not have to simulate his results on modern day computers but used the Pascaline. Certainly a man ahead of his time. Of course that wasn't all. Surrounded by a chain of (luckily) extinct volcanoes, rolling hills, and superb views, Clermont-Ferrand provided the perfect backdrop for the physics discussions. It was once more seen that the physics of ATLAS is diverse and that it is healthy and doing well. Many people contributed to the success of the session. Fabiola started the session precisely at 14:00 with a summary of the most recent activities from the physics coordination. Somehow what got stuck in my mind was the very positive statistics on how many prese...

  2. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study inclu...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound...... for C(I,L)? . . . . . . . . . . . . . . . . . . . . . . . . 160 4.6 Using weighted degree orderings . . . . . . . . . . . . . . . . . . . . . . . . . 163 4.7 The order domain conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4.8 Weight functions and order domains...

  3. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  4. Something for Everyone? A Content Analysis of Provincial Library Association Conference Sessions

    Directory of Open Access Journals (Sweden)

    Virginia Wilson

    2010-06-01

    Full Text Available Objective – To determine the breakdown of provincial library association conference sessions by the following categories: library sector, library group, and topic. Methods – A content analysis of five years worth of conference sessions from British Columbia, Alberta, and Saskatchewan, using an evidence based library and information practice framework. Results – 287 out of the 551 total sessions over the five years analyzed targeted all library sectors. 194 sessions targeted public libraries, 66 were for academic libraries, 70 focused on school libraries, and only 7 specifically targeted special libraries. 201 out of the 551 total sessions could be of interest to all groups; 334 were of particular interest to librarians; 122 were targeted towards library technicians, 54 sessions targeted library workers; and 89 sessions were specifically for trustees. Management was the most popular session topic, followed by Culture, Information Access and Retrieval, Collections, Professional Issues, Programming, Reference, and Education Conclusions - While public library sessions did indeed dominate all of the conference sessions when individual sectors were examined, sessions appropriate for every library sector outnumbered everything else. The majority of sessions were of particular interest to librarians, and Management was the most popular session topic.

  5. 78 FR 22225 - Meeting: African Development Foundation, Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-04-15

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, April 23, 2013 11:15 a.m. to 2:15...

  6. FISHERIES IN MOUNT HOPE BAY: NOTES ON A SPECIAL SYMPOSIUM FROM A SESSION MODERATOR

    Science.gov (United States)

    This contribution represents a summary of talks presented during the afternoon session the Mount Hope Bay Syposium, focused directly on the issues surrounding observed winter flounder populations, as prepared by the session moderator.

  7. CERN Technical Training 2006: Office Software Curriculum Scheduled Course Sessions (October-December 2006)

    CERN Multimedia

    2006-01-01

    The Office Software Curriculum of the CERN Technical Training Programme currently offers comprehensive training in Microsoft Office (Word, Excel, Powerpoint, Access, Outlook), MS Project, Frontpage, Dreamweaver, Indesign, LaTeX, and CERN EDMS. There are some places available on the following Microsoft Office 2003 course sessions, currently scheduled until December 2007: EXCEL 2003 - niveau 2 : ECDL - 16-17 October (2 days, session in French) WORD 2003 (Short Course II) - HowTo... Mail merge - 2 November (morning, bilingual session) WORD 2003 (Short Course IV) - HowTo... Work with master document - 2 November (afternoon, bilingual session) OUTLOOK 2003 (Short Course III) - Meetings and Delegation - 3 November (morning, bilingual session) EXCEL 2003 (Short Course IV) - HowTo... Link cells, worksheets and workbooks - 3 November (afternoon, bilingual session) EXCEL 2003 - Level 1: ECDL - 13-14 November (2 days, session in English) ACCESS 2003 - Level 2: ECDL - 5-6 December (2 days, session in English) The abo...

  8. 78 FR 70093 - Commercial Space Transportation Advisory Committee-Closed Session

    Science.gov (United States)

    2013-11-22

    ... Federal Aviation Administration Commercial Space Transportation Advisory Committee--Closed Session AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Commercial Space Transportation Advisory... closed session of the Commercial Space Transportation Advisory Committee (COMSTAC). The special...

  9. 76 FR 55732 - Public Listening Sessions Regarding the Maritime Administration's Panama Canal Expansion Study...

    Science.gov (United States)

    2011-09-08

    ... Maritime Administration Public Listening Sessions Regarding the Maritime Administration's Panama Canal Expansion Study and the America's Marine Highway Program AGENCY: Maritime Administration, DOT. ACTION: Notice. SUMMARY: The purpose of this notice is to announce a series of public listening sessions...

  10. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  11. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  12. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  13. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  14. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  15. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  16. Computer codes in nuclear safety, radiation transport and dosimetry; Les codes de calcul en radioprotection, radiophysique et dosimetrie

    Energy Technology Data Exchange (ETDEWEB)

    Bordy, J.M.; Kodeli, I.; Menard, St.; Bouchet, J.L.; Renard, F.; Martin, E.; Blazy, L.; Voros, S.; Bochud, F.; Laedermann, J.P.; Beaugelin, K.; Makovicka, L.; Quiot, A.; Vermeersch, F.; Roche, H.; Perrin, M.C.; Laye, F.; Bardies, M.; Struelens, L.; Vanhavere, F.; Gschwind, R.; Fernandez, F.; Quesne, B.; Fritsch, P.; Lamart, St.; Crovisier, Ph.; Leservot, A.; Antoni, R.; Huet, Ch.; Thiam, Ch.; Donadille, L.; Monfort, M.; Diop, Ch.; Ricard, M

    2006-07-01

    The purpose of this conference was to describe the present state of computer codes dedicated to radiation transport or radiation source assessment or dosimetry. The presentations have been parted into 2 sessions: 1) methodology and 2) uses in industrial or medical or research domains. It appears that 2 different calculation strategies are prevailing, both are based on preliminary Monte-Carlo calculations with data storage. First, quick simulations made from a database of particle histories built though a previous Monte-Carlo simulation and secondly, a neuronal approach involving a learning platform generated through a previous Monte-Carlo simulation. This document gathers the slides of the presentations.

  17. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  18. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  19. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  20. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  1. Proceedings of the conference on computer codes and the linear accelerator community

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R.K. (comp.)

    1990-07-01

    The conference whose proceedings you are reading was envisioned as the second in a series, the first having been held in San Diego in January 1988. The intended participants were those people who are actively involved in writing and applying computer codes for the solution of problems related to the design and construction of linear accelerators. The first conference reviewed many of the codes both extant and under development. This second conference provided an opportunity to update the status of those codes, and to provide a forum in which emerging new 3D codes could be described and discussed. The afternoon poster session on the second day of the conference provided an opportunity for extended discussion. All in all, this conference was felt to be quite a useful interchange of ideas and developments in the field of 3D calculations, parallel computation, higher-order optics calculations, and code documentation and maintenance for the linear accelerator community. A third conference is planned.

  2. Proceedings of the conference on computer codes and the linear accelerator community

    International Nuclear Information System (INIS)

    The conference whose proceedings you are reading was envisioned as the second in a series, the first having been held in San Diego in January 1988. The intended participants were those people who are actively involved in writing and applying computer codes for the solution of problems related to the design and construction of linear accelerators. The first conference reviewed many of the codes both extant and under development. This second conference provided an opportunity to update the status of those codes, and to provide a forum in which emerging new 3D codes could be described and discussed. The afternoon poster session on the second day of the conference provided an opportunity for extended discussion. All in all, this conference was felt to be quite a useful interchange of ideas and developments in the field of 3D calculations, parallel computation, higher-order optics calculations, and code documentation and maintenance for the linear accelerator community. A third conference is planned

  3. Do User (Browse and Click) Sessions Relate to Their Questions in a Domain-specific Collection?

    DEFF Research Database (Denmark)

    Steinhauer, Jeremy; Delcambre, Lois M.L.; Lykke, Marianne;

    2013-01-01

    We seek to improve information retrieval in a domain-specific col-lection by clustering user sessions as recorded in a click log and then classifying later user sessions in real-time. As a preliminary step, we explore, the main as-sumption of this approach: whether user sessions in such a site...

  4. A Comparison of Therapist-Facilitated and Self-Guided Dream Interpretation Sessions.

    Science.gov (United States)

    Heaton, Kristin J.; Hill, Clara E.; Petersen, David A.; Rochlen, Aaron B.; Zack, Jason S.

    1998-01-01

    Volunteer clients (N=25 undergraduate students) reported achieving greater depth, mastery, insight, and other results from therapist-facilitated sessions compared to self-guided sessions. Observer and therapist ratings indicated that therapists adhered to the Hill model of dream interpretation during therapist-facilitated sessions. Implications…

  5. Comparison of Dream Interpretation, Event Interpretation, and Unstructured Sessions in Brief Therapy.

    Science.gov (United States)

    Diemer, Roberta A.; And Others

    1996-01-01

    Twenty-five distressed adult clients received 2 sessions each of dream and event interpretation using the Hill model during 12 sessions of successful therapy. No differences were found in depth, insight, and working alliance among dream interpretation, event interpretation, and unstructured sessions, suggesting that dream interpretation is as…

  6. 77 FR 19666 - Stakeholder Listening Session in Preparation for the 65th World Health Assembly

    Science.gov (United States)

    2012-04-02

    ... HUMAN SERVICES Stakeholder Listening Session in Preparation for the 65th World Health Assembly Time and... the 65th World Health Assembly-- will hold an informal Stakeholder Listening Session on Monday April...., Washington, DC, 20201. The Stakeholder Listening Session will help the HHS's Office of Global Affairs...

  7. 75 FR 27536 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-05-17

    ... Office of the Secretary Notice of the Specialty Crop Committee's Stakeholder Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: In... Agriculture announces a stakeholder listening session of the Specialty Crop Committee, under the auspices...

  8. 77 FR 43106 - Tribal Consultation Sessions-Department of the Interior Information Technology Infrastructure...

    Science.gov (United States)

    2012-07-23

    ... Office of the Secretary Tribal Consultation Sessions--Department of the Interior Information Technology... sessions. The purpose of the sessions is to obtain tribal input on the 2012 Information Technology transformation realignment proposal as well as on how Information Technology transformation should be...

  9. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  10. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  11. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  12. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  13. Assessing the Key to Effective Coaching in Parent-Child Interaction Therapy: The Therapist-Parent Interaction Coding System

    OpenAIRE

    Barnett, Miya L.; Niec, Larissa N.; Acevedo-Polakovich, I. David

    2013-01-01

    This paper describes the initial evaluation of the Therapist-Parent Interaction Coding System (TPICS), a measure of in vivo therapist coaching for the evidence-based behavioral parent training intervention, parent-child interaction therapy (PCIT). Sixty-one video-recorded treatment sessions were coded with the TPICS to investigate (1) the variety of coaching techniques PCIT therapists use in the early stage of treatment, (2) whether parent skill-level guides a therapist’s coaching style and f...

  14. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  15. Comment on bilateral same-session intravitreal injections

    Institute of Scientific and Technical Information of China (English)

    Levent; Karabas; Fehim; Esen; Ozlem; Sahin

    2015-01-01

    <正>Dear Editor,We have read the article by Abu-Yahgi et al[1]with great interest.The authors share their experience with bilateral same-session intravitreal injection of anti-vascular endothelial growth factors(anti-VEGF).They report a single case of endophthalmitis in a series of 342 injections of 74patients and compare their results with their 3634 cases of unilateral injections with 2 cases of endophthalmitis[1].There are some issues related with the article that may benefit from

  16. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  17. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  18. Cue-Responding Behaviors During Pharmacy Counseling Sessions With Patients With Asthma About Inhaled Corticosteroids: Potential Relations With Medication Beliefs and Self-Reported Adherence.

    Science.gov (United States)

    Driesenaar, Jeanine A; De Smet, Peter A G M; van Hulten, Rolf; Noordman, Janneke; van Dulmen, Sandra

    2016-10-01

    The aim of this study was to examine cue-responding behavior at the pharmacy while counseling about inhaled corticosteroids (ICS) in relation to medication adherence and medication beliefs. Patients with asthma aged ≥18 years using ICS were recruited from 12 pharmacies. Counseling sessions were video-recorded. Patients' emotional and informational cues and pharmacists' and pharmacy technicians' cue-responding behaviors were coded using an expanded version of the Medical Interview Aural Rating Scale. The Beliefs about Medicines Questionnaire assessed patients' ICS concern and necessity beliefs. Self-reported ICS adherence was measured by four questions. During the 86 sessions, patients expressed on average 2.3, mostly informational, cues (70.8%). In 26.7% of the sessions, no cues were expressed. Pharmacists' and technicians' responses to emotional cues (59.3%) were mostly inadequate, and to informational cues mostly appropriate (63.6%). Providing inappropriate information (20.3%) was related to higher concerns post session (p < .05), and cue exploration to higher self-reported adherence at 3 months (p < .05). Apparently, providers' responses to patients' cues might have therapeutic value. In addition, patients might need to be encouraged to ask questions and express their concerns. PMID:26940701

  19. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  20. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  1. The experiences of ICU patients during follow-up sessions : A qualitative study

    OpenAIRE

    Haraldsson, Lena; Christensson, Lennart; Conlon, Lisa; Henricson, Maria

    2015-01-01

    Objective Evidence supports the recommendation for follow-up session(s) for patients after discharge from an intensive care unit (ICU). The aim of these follow-up sessions is to allow patients to express and discuss their experiences and problems following their time in an ICU. To optimise the knowledge gained from the follow-up session experience, it is necessary to describe how patients experience these sessions. The aim of this study was to describe how ICU-patients, experience a follow-up...

  2. 7 years of MacGyver sessions at EGU and AGU: what happened?

    Science.gov (United States)

    Hut, Rolf; Selker, John; Weijs, Steven; Luxemburg, Wim; Wickert, Andy; Blume, Theresa; Bamburger, Jan; Stoof, Cathelijne; Tauro, Flavia

    2016-04-01

    The session that this poster is in, the: "Self-made sensors and unintended use of measurement equipment", also known as the "MacGyver-session" has had 7 years of scientists contributing their self made devices, hacks and solutions with the hydrological community. In 2009, the first session was held at the AGU fall meeting and since 2011 a session is also organised at the EGU General Assembly. On this poster, and in the accompanying review paper, we will present an overview of the work presented in the last 7 years, cataloging the work of the inventive scientists who have contributed to these successful, and above all: fun, sessions.

  3. Ethical Codes in the Professions.

    Science.gov (United States)

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  4. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy mac...

  5. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  6. Direct construction of code loops

    OpenAIRE

    Nagy, Gabor P.

    2004-01-01

    Code loops were introduced by R. L. Griess. R.L. Griess and T. Hsu gave methods to construct the corresponding code loop from any given doubly even binary code; both these methods used some kind of induction. In this paper, we present a global construction of the loop, where we apply the correspondance between the concepts of Moufang loops and groups with triality.

  7. From Skew-Cyclic Codes to Asymmetric Quantum Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick; Yemen, Olfa

    2010-01-01

    We introduce an additive but not $\\F_{4}$-linear map $S$ from $\\F_{4}^{n}$ to $\\F_{4}^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $\\theta$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.

  8. TWEED Code Book

    OpenAIRE

    Engene, Jan Oskar

    2006-01-01

    The TWEED data set contains information on more than 11.000 events related to internal (or domestic) terrorism in 18 West European countries for the 1950 through 2004 period. The code book describes the structure of the data set, the countries covered, and the variables included and functions as a user’s guide to the data set. The data set is available at: http://www.uib.no/people/sspje/tweed.htm The data set Terrorism in Western Europe: Events Data, TWEED, contains information on events r...

  9. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  10. Correct Code Containing Containers

    OpenAIRE

    Dross, Claire; Filliâtre, Jean-Christophe; Moy, Yannick

    2011-01-01

    For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers. In this paper, we present a definition of containers whose aim is to facilitate their use in certified software, using modern proof technology and novel s...

  11. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...... the impact of interference from other transmissions. Unlike these conventional studies, in this paper, we apply PLNC to a large-scale cellular network in the presence of intercell interference (ICI). In cellular networks, a terminal and a Base Station (BS) have different transmission power, which causes...

  12. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  13. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  14. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  15. On SIP Session setup delay for VoIP services over correlated fading channels

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam S.; Prasad, Ramjee

    2006-01-01

    In this paper, the session setup delay of the session initiation protocol (SIP) is studied. The transmissions on both the forward and reverse channel are assumed to experience Markovian errors. The session setup delay is evaluated for different transport protocols, and with the use of the radio...... link protocol (RLP). An adaptive retransmission timer is used to optimize SIP performances. Using numerical results, we find that SIP over user datagram protocol (UDP) instead of transport control protocol (TCP) can make the session setup up to 30% shorter. Also, RLP drastically reduces the session...... setup delay down to 4 to 5 s, even in environments with high frame error rates (10%) and significant correlation in the fading process (fDT=0.02). SIP is compared with its competitor H.323. SIP session setup delay with compressed messages outperforms H.323 session setup delay....

  16. Report of the American Heart Association (AHA) Scientific Sessions 2013, Dallas.

    Science.gov (United States)

    Ishimori, Naoki; Kinugawa, Shintaro; Yamada, Satoshi; Yokoshiki, Hisashi; Mitsuyama, Hirofumi; Tsutsui, Hiroyuki

    2014-01-01

    The American Heart Association (AHA) Scientific Sessions were held in Dallas on November 16-20, 2013. The meeting is one of the most leading conferences of cardiology in the world, with over 18,000 professional attendees from more than 105 countries. There were 315 invited sessions and 443 abstract sessions, comprising more than 5,000 presentations. The sessions were expanded to 26 program tracks, which included and integrated basic, translational, clinical, and population science. In the series of late-breaking sessions, updates of results from 20 clinical trials were disclosed. Japanese scientists submitted the second most abstracts to the Scientific Sessions in 2013. We appreciate the significant contribution to the sessions by Japanese cardiologists as well as the Japanese Circulation Society.

  17. Session: What can we learn from developed wind resource areas

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Erickson, Wally

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop was composed of two parts intended to examine what existing science tells us about wind turbine impacts at existing wind project sites. Part one dealt with the Altamont Wind Resource area, one of the older wind projects in the US, with a paper presented by Carl Thelander titled ''Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part 1''. Questions addressed by the presenter included: how is avian habitat affected at Altamont and do birds avoid turbine sites; are birds being attracted to turbine strings; what factors contribute to direct impacts on birds by wind turbines at Altamont; how do use, behavior, avoidance and other factors affect risk to avian species, and particularly impacts those species listed as threatened, endangered, or of conservation concern, and other state listed species. The second part dealt with direct impacts to birds at new generation wind plants outside of California, examining such is sues as mortality, avoidance, direct habitat impacts from terrestrial wind projects, species and numbers killed per turbine rates/MW generated, impacts to listed threatened and endangered species, to USFWS Birds of Conservation Concern, and to state listed species. This session focused on newer wind project sites with a paper titled ''Bird Fatality and Risk at New Generation Wind Projects'' by Wally Erickson. Each paper was followed by a discussion/question and answer period.

  18. Indoor air contamination during a waterpipe (narghile) smoking session.

    Science.gov (United States)

    Fromme, Hermann; Dietrich, Silvio; Heitmann, Dieter; Dressel, Holger; Diemer, Jürgen; Schulz, Thomas; Jörres, Rudolf A; Berlin, Knut; Völkel, Wolfgang

    2009-07-01

    The smoke of waterpipe contains numerous substances of health concern, but people mistakenly believe that this smoking method is less harmful and addictive than cigarettes. An experiment was performed in a 57 m3 room on two dates with no smoking on the first date and waterpipe smoking for 4h on the second date. We measured volatile organic compounds (VOC), polycyclic aromatic hydrocarbons (PAH), metals, carbon monoxide (CO), nitrogen oxides (e.g. NO), as well as particle mass (PM), particle number concentration (PNC) and particle surface area in indoor air. High concentrations were observed for the target analytes during the 4-h smoking event. The median (90th percentile) values of PM(2.5), PNC, CO and NO were 393 (737 microg/m(3)), 289,000 (550,000 particles/cm(3)), 51 (65 ppm) and 0.11 (0.13 ppm), respectively. The particle size distribution has a maximum of particles relating to a diameter of 17 nm. The seven carcinogenic PAH were found to be a factor 2.6 higher during the smoking session compared to the control day. In conclusion, the observed indoor air contamination of different harmful substances during a WP session is high, and exposure may pose a health risk for smokers but in particular for non-smokers who are exposed to ETS.

  19. Effectiveness of an Electronic Booster Session Delivered to Mandated Students.

    Science.gov (United States)

    Linowski, Sally A; DiFulvio, Gloria T; Fedorchak, Diane; Puleo, Elaine

    2016-01-01

    College student drinking continues to be a problem in the United States. Students who have violated campus alcohol policy are at particularly high risk for dangerous drinking. While Brief Alcohol Screening and Intervention for College Students (BASICS) has been found to be an effective strategy in reducing high-risk drinking and associated consequences, questions remain about ways to further reduce risk or sustain changes associated with a face-to face intervention. The purpose of this study was to assess the effectiveness of a computer-delivered personalized feedback (electronic booster) delivered to policy violators who completed a mandated BASICS program. At 3-month post-intervention, 346 participants (60.4% male and 39.6% female) were randomized to one of two conditions: assessment only (n = 171) or electronic booster feedback (n = 175). Follow-up assessments were given to all participants at 3, 6, and 12-month post-initial intervention. Both groups showed reductions in drinking after the in-person BASICS intervention, but no additional reductions were seen with the addition of an electronic booster session. Findings suggest that although brief motivational interventions delivered in person to mandated students have been shown to be effective with mandated students, there is no additional benefit from an electronic booster session delivered 3-month post-intervention for this population.

  20. Materials & Engineering: Propelling Innovation MRS Bulletin Special Issue Session

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Gopal [Materials Research Society, Warrendale, PA (United States)

    2016-05-06

    Materials enable engineering; and, engineering in turn depends on materials to transform design concepts and equations into physical entities. This relationship continues to grow with expanding societal demand for new products and processes. MRS Bulletin, a publication of the Materials Research Society (MRS) and Cambridge University Press, planned a special issue for December 2015 on Materials and Engineering: Propelling Innovation. This special issue of MRS Bulletin captured the unique relationship between materials and engineering, which are closely intertwined. A special half day session at the 2015 MRS Fall Meeting in Boston captured this discussion through presentations by high level experts followed by a panel discussion on what it takes to translate materials discoveries into products to benefit society. The Special Session included presentations by experts who are practitioners in materials as well as engineering applications, followed by a panel discussion. Participants discussed state-of-the-art in materials applications in engineering, as well as how engineering needs have pushed materials developments, as also reflected in the 20 or so articles published in the special issue of MRS Bulletin. As expected, the discussions spanned the broad spectrum of materials and provided very strong interdisciplinary interactions and discussions by participants and presenters.

  1. Safety Training: scheduled sessions in September and October 2011

    CERN Document Server

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personnel électricien effectuant des opérations du domaine de tension BTA...

  2. Safety Training: scheduled sessions in September and October 2011

    CERN Document Server

    DGS Unit

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Chemical Safety – Introduction 11-OCT-11, 9.00 – 11.30, in English Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personne...

  3. Takotsubo cardiomyopathy after a dancing session: a case report

    Directory of Open Access Journals (Sweden)

    Ibrahim Ammar A

    2011-10-01

    Full Text Available Abstract Introduction Stress-induced (Takotsubo cardiomyopathy is a rare form of cardiomyopathy which presents in a manner similar to that of acute coronary syndrome. This sometimes leads to unnecessary thrombolysis therapy. The pathogenesis of this disease is still poorly understood. We believe that reporting all cases of Takotsubo cardiomyopathy will contribute to a better understanding of this disease. Here, we report a patient who, in the absence of any recent stressful events in her life, developed the disease after a session of dancing. Case presentation A 69-year-old Caucasian woman presented with features suggestive of acute coronary syndrome shortly after a session of dancing. Echocardiography and a coronary angiogram showed typical features of Takotsubo cardiomyopathy and our patient was treated accordingly. Eight weeks later, her condition resolved completely and the results of echocardiography were totally normal. Conclusions Takotsubo cardiomyopathy, though transient, is a rare and serious condition. Although it is commonly precipitated by stressful life events, these are not necessarily present. Our patient was enjoying one of her hobbies (that is, dancing when she developed the disease. This case has particular interest in medicine, especially for the specialties of cardiology and emergency medicine. We hope that it will add more information to the literature about this rare condition.

  4. Working session 5: Operational aspects and risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cizelj, L. [Jozef Stefan Institute, Ljubljana (Slovenia); Donoghue, J. [Nuclear Regulatory Commission, Washington, DC (United States)

    1997-02-01

    A general observation is that both operational aspects and risk analysis cannot be adequately discussed without information presented in other sessions. Some overlap of conclusions and recommendations is therefore to be expected. Further, it was assumed that recommendations concerning improvements in some related topics were generated by other sessions and are not repeated here. These include: (1) Knowledge on degradation mechanisms (initiation, progression, and failure). (2) Modeling of degradation (initiation, progression, and failure). (3) Capabilities of NDE methods. (4) Preventive maintenance and repair. One should note here, however, that all of these directly affect both operational and risk aspects of affected plants. A list of conclusions and recommendations is based on available presentations and discussions addressing risk and operational experience. The authors aimed at reaching as broad a consensus as possible. It should be noted here that there is no strict delineation between operational and safety aspects of degradation of steam generator tubes. This is caused by different risk perceptions in different countries/societies. The conclusions and recommendations were divided into four broad groups: human reliability; leakage monitoring; risk impact; and consequence assessment.

  5. Prospects for UT1 Measurements from VLBI Intensive Sessions

    Science.gov (United States)

    Boehm, Johannes; Nilsson, Tobias; Schuh, Harald

    2010-01-01

    Very Long Baseline Interferometry (VLBI) Intensives are one-hour single baseline sessions to provide Universal Time (UT1) in near real-time up to a delay of three days if a site is not e-transferring the observational data. Due to the importance of UT1 estimates for the prediction of Earth orientation parameters, as well as any kind of navigation on Earth or in space, there is not only the need to improve the timeliness of the results but also their accuracy. We identify the asymmetry of the tropospheric delays as the major error source, and we provide two strategies to improve the results, in particular of those Intensives which include the station Tsukuba in Japan with its large tropospheric variation. We find an improvement when (1) using ray-traced delays from a numerical weather model, and (2) when estimating tropospheric gradients within the analysis of Intensive sessions. The improvement is shown in terms of reduction of rms of length-of-day estimates w.r.t. those derived from Global Positioning System observations

  6. Effectiveness of an Electronic Booster Session Delivered to Mandated Students.

    Science.gov (United States)

    Linowski, Sally A; DiFulvio, Gloria T; Fedorchak, Diane; Puleo, Elaine

    2016-01-01

    College student drinking continues to be a problem in the United States. Students who have violated campus alcohol policy are at particularly high risk for dangerous drinking. While Brief Alcohol Screening and Intervention for College Students (BASICS) has been found to be an effective strategy in reducing high-risk drinking and associated consequences, questions remain about ways to further reduce risk or sustain changes associated with a face-to face intervention. The purpose of this study was to assess the effectiveness of a computer-delivered personalized feedback (electronic booster) delivered to policy violators who completed a mandated BASICS program. At 3-month post-intervention, 346 participants (60.4% male and 39.6% female) were randomized to one of two conditions: assessment only (n = 171) or electronic booster feedback (n = 175). Follow-up assessments were given to all participants at 3, 6, and 12-month post-initial intervention. Both groups showed reductions in drinking after the in-person BASICS intervention, but no additional reductions were seen with the addition of an electronic booster session. Findings suggest that although brief motivational interventions delivered in person to mandated students have been shown to be effective with mandated students, there is no additional benefit from an electronic booster session delivered 3-month post-intervention for this population. PMID:26857563

  7. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  8. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  9. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani;

    2014-01-01

    oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains......Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...

  10. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  11. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  12. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  13. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  14. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being the best. \\paragraph*{Conclusions:} Different allele coding methods lead to the same inference in the marker-based and equivalent models when a fixed...... effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous...... genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call...

  15. Practices in Code Discoverability: Astrophysics Source Code Library

    Science.gov (United States)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  16. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  17. Finite-Length Analysis of BATS Codes

    OpenAIRE

    Yang, Shenghao; Ng, Tsz-Ching; Yeung, Raymond W.

    2013-01-01

    BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propagation (BP) decoding and inactivation decoding. Our results enable us to evaluate efficiently the...

  18. Network Coding Designs Suited for the Real World

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

    2013-01-01

    Network coding (NC) has attracted tremendous attention from the research community due to its potential to significantly improve networks' throughput, delay, and energy performance as well as a means to simplify protocol design and naturally providing security support. The possibilities in code d...... practical pitfalls, this paper seeks to identify key ingredients to a successful design, critical and common limitations to most intra-session NC systems as well as promising techniques and ideas to guide future models and research problems grounded on practical concerns.......Network coding (NC) has attracted tremendous attention from the research community due to its potential to significantly improve networks' throughput, delay, and energy performance as well as a means to simplify protocol design and naturally providing security support. The possibilities in code...... design have produced a large influx of new ideas and approaches to harness the power of NC. But, which of these designs are truly successful in practice? and which designs will not live up to their promised theoretical gains due to real-world constraints? Without attempting a comprehensive view of all...

  19. Summary of Session 2.B. Planning and implementation

    International Nuclear Information System (INIS)

    Session 2.B. can be summarized by a statement in one of the papers given in the session: 'Dismantling of nuclear facilities is basically not a technical problem but a challenge to project management and logistics once the legal and economical boundary conditions have been clarified'. The session balanced generic principles and concerns raised by decommissioning projects with practical examples of lessons learned from some specific projects and raised some key issues for all involved in decommissioning - whether regulator, operator or other stakeholder. Ideally, planning for decommissioning should start as early as possible, preferably when the facility is being designed. When a facility or activity is shut down it is very important that a formal decision to decommission is made so that the situation is clear to all stakeholders. The impact on the work force and the local community due to the cessation of operation of a facility must be recognized and addressed early in the transition from operation to decommissioning. Factors such as uncertainty, potential job losses and diminution of career paths as research careers are replaced by construction/deconstruction jobs all lead to poor morale and an exodus of qualified staff. Attention to safety culture during all phases of decommissioning will assist in ensuring that safety and environmental protection objectives are met, as well as promoting desired worker retention. Some issues for future consideration include the following: Consider the role of the State in the clearance process, should the State take responsibility for decommissioned sites that cannot be 'green fielded'?; Consider establishing expert missions focused on decommissioning similar to those of the IAEA's Operational Safety Assessment Review Team and WATRAP. Actions that could be taken include: Clarifying the status of all shutdown facilities that have not declared decommissioning; Ensuring that the focus of the decommissioning programme includes all

  20. Rotational Seismology: AGU Session, Working Group, and Website

    Science.gov (United States)

    Lee, William H.K.; Igel, Heiner; Todorovska, Maria I.; Evans, John R.

    2007-01-01

    Introduction Although effects of rotational motions due to earthquakes have long been observed (e. g., Mallet, 1862), nevertheless Richter (1958, p. 213) stated that: 'Perfectly general motion would also involve rotations about three perpendicular axes, and three more instruments for these. Theory indicates, and observation confirms, that such rotations are negligible.' However, Richter provided no references for this claim. Seismology is based primarily on the observation and modeling of three-component translational ground motions. Nevertheless, theoretical seismologists (e.g., Aki and Richards, 1980, 2002) have argued for decades that the rotational part of ground motions should also be recorded. It is well known that standard seismometers are quite sensitive to rotations and therefore subject to rotation-induced errors. The paucity of observations of rotational motions is mainly the result of a lack, until recently, of affordable rotational sensors of sufficient resolution. Nevertheless, in the past decade, a number of authors have reported direct observations of rotational motions and rotations inferred from rigid-body rotations in short baseline accelerometer arrays, creating a burgeoning library of rotational data. For example, ring laser gyros in Germany and New Zealand have led to the first significant and consistent observations of rotational motions from distant earthquakes (Igel et al., 2005, 2007). A monograph on Earthquake Source Asymmetry, Structural Media and Rotation Effects was published recently as well by Teisseyre et al. (2006). Measurement of rotational motions has implications for: (1) recovering the complete ground-displacement history from seismometer recordings; (2) further constraining earthquake rupture properties; (3) extracting information about subsurface properties; and (4) providing additional ground motion information to earthquake engineers for seismic design. A special session on Rotational Motions in Seismology was convened by H

  1. Les codes correcteurs

    OpenAIRE

    Rigo, Michel

    2009-01-01

    Qu'on le veuille ou non, nous vivons dans un monde où les informations et les moyens de communication sont omniprésents. Les exemples où se mêlent informatique et télécommunications sont nombreux. Que ce soit l'Internet, la musique achetée en ligne ou gravée sur CD, les baladeurs de type iPod et autres appareils portables, les supports mémoire de tout type, la photographie numérique, la présence d'ordinateurs de bord sophistiqués dans nos voitures, etc. Sans code correcteur, le CD (implémenta...

  2. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  3. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  4. Crystalizing the genetic code

    CERN Document Server

    Frappat, L; Sorba, Paul

    2000-01-01

    New developments are presented in the framework of the model introduced by the authors in refs. [1,2] and in which nucleotides as well as codons are classified in crystal bases of the quantum group U_q(sl(2)+sl(2)) in the limit q -> 0. An operator which gives the correspondence between the amino-acids and the codons is now obtained for any known genetic code. The free energy released by base pairing of dinucleotides as well as the relative hydrophilicity and hydrophobicity of the dinucleosides are also computed. For the vertebrate series, a universal behaviour in the ratios of codon usage frequencies is put in evidence and is shown to fit nicely in our model. Then a first attempt to represent the mutations relative to the deletion of a pyrimidine by action of a suitable crystal spinor operator is proposed. Finally recent theoretical descriptions are reviewed and compared with our model.

  5. HIGH-VOLUME RESISTANCE TRAINING SESSION ACUTELY DIMINISHES RESPIRATORY MUSCLE STRENGTH

    Directory of Open Access Journals (Sweden)

    Daniel A. Hackett

    2012-03-01

    Full Text Available This study investigated the effect of a high-volume compared to a low-volume resistance training session on maximal inspiratory pressure (MIP and maximal expiratory pressure (MEP. Twenty male subjects with resistance training experience (6.2 ± 3.2 y, in a crossover trial, completed two resistance training protocols (high-volume: 5 sets per exercise; low-volume: 2 sets per exercise and a control session (no exercise on 3 separate occasions. MIP and MEP decreased by 13.6% (p < 0.01 and 14.7% (p < 0.01 respectively from pre-session MIP and MEP, following the high-volume session. MIP and MEP were unaffected following the low-volume or the control sessions. MIP returned to pre-session values after 40 minutes, whereas MEP remained significantly reduced after 60 minutes post-session by 9.2% compared to pre-session (p < 0.01. The findings suggest that the high-volume session significantly decreased MIP and MEP post-session, implicating a substantially increased demand on the respiratory muscles and that adequate recovery is mandatory following this mode of training.

  6. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  7. What's on the therapist's mind? A grounded theory analysis of family therapist reflections during individual therapy sessions.

    Science.gov (United States)

    Rober, Peter; Elliott, Robert; Buysse, Ann; Loots, Gerrit; De Corte, Kim

    2008-01-01

    The authors used a videotape-assisted recall procedure to study the content of family therapists' inner conversations during individual sessions with a standardized client. Grounded theory was used to analyze therapists' reflections, resulting in a taxonomy of 282 different codes in a hierarchical tree structure of six levels, organized into four general domains: attending to client process; processing the client's story; focusing on therapists' own experience; and managing the therapeutic process. In addition to providing a descriptive model of therapists' inner conversation, this research led to an appreciation of the wealth of therapists' inner conversation. In particular, the authors found that therapists work hard to create an intersubjective space within which to talk by trying to be in tune with their clients and by using clients as a guide.

  8. CROR: Coding-Aware Opportunistic Routing in Multi-Channel Cognitive Radio Networks

    OpenAIRE

    Zhong, Xiaoxiong; Qin, Yang; Yang, Yuanyuan; Li, Li

    2015-01-01

    Cognitive radio (CR) is a promising technology to improve spectrum utilization. However, spectrum availability is uncertain which mainly depends on primary user's (PU's) behaviors. This makes it more difficult for most existing CR routing protocols to achieve high throughput in multi-channel cognitive radio networks (CRNs). Inter-session network coding and opportunistic routing can leverage the broadcast nature of the wireless channel to improve the performance for CRNs. In this paper we pres...

  9. The Schrödinger Sessions: Science for Science Fiction

    Science.gov (United States)

    Orzel, Chad; Edwards, Emily; Rolston, Steven

    In July 2015, we held a workshop for 17 science fiction writers working in a variety of media at the Joint Quantum Institute at the University of Maryland, College Park. ''The Schrödinger Sessions,'' funded by an outreach grant from APS, provided a three-day ''crash course'' on quantum physics and technology, including lectures from JQI scientists and tours of JQI labs. The goal was to better inform and inspire stories making use of quantum physics, as a means of outreach to inspire a broad audience of future scientists. We will report on the contents of the workshop, reactions from the attendees and presenters, and future plans. Funded by an Outreach Mini-Grant from the APS.

  10. Proceedings of the Areva Technical Days. Session 5

    International Nuclear Information System (INIS)

    This document presents the proceedings of the Areva technical days, presented during the session 5 the 9 and 10 december 2004, at Istanbul. It deals with the operations of the transmission and distribution division. With manufacturing facilities in over 40 countries and a sales network in over 100, Areva offers customers technological solutions for nuclear power generation and electricity transmission and distribution (the Group also provides interconnect systems to the telecommunications, computer and automotive markets). It provides five topics: a general presentation of Areva, the strategic stakes for transmission and distribution by world-zone, economic and strategic stakes of business unit products, business unit systems and business unit automation. (A.L.B.)

  11. Session 5: the different aspects of gas sales

    International Nuclear Information System (INIS)

    Here are given the summaries of the speeches of Mr Regis Halgand (Gaz de France): the different gas markets; of Mr Joel Pedessac (Comite Francais du Butane et du Propane (CFBP): the uses of LPG; of Mr Yves Tournie (Total): DME, market and demonstration pilot of the JFE process; of Mr Pierre Yves Burban (Doris Engineering): the export of gas under the form of CNG (compressed natural gas); and of Mr Eric Caprani (Axens): first balance of the ENI/IFP/AXENS GTL plan. All these speeches have been presented at the AFTP petroleum yearly days (12-13 October 2005) during the session 5 concerning the different aspects of gas sales. (O.M.)

  12. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    CERN Document Server

    Hasib, Abdullah Al; Morshed, Md Sarwar

    2010-01-01

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.

  13. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Md. Sarwar Morshed

    2010-01-01

    Full Text Available The Session Initiation Protocol (SIP has become the most predominant protocol for Voice over Internet Protocol (VoIP signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF. Finally we analyze the security aspects of these approaches.

  14. Astronomy and Space Technologies, WILGA 2012; EuCARD Sessions

    CERN Document Server

    Romaniuk, R S

    2012-01-01

    Wilga Sessions on HEP experiments, astroparticle physics and accelerator technology were organized under the umbrella of the EU FP7 Project EuCARD – European Coordination for Accelerator Research and Development. This paper is the first part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with photonics and electronics applications in astronomy and space technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JE...

  15. Proceedings of the Areva Technical Days. Session 5

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document presents the proceedings of the Areva technical days, presented during the session 5 the 9 and 10 december 2004, at Istanbul. It deals with the operations of the transmission and distribution division. With manufacturing facilities in over 40 countries and a sales network in over 100, Areva offers customers technological solutions for nuclear power generation and electricity transmission and distribution (the Group also provides interconnect systems to the telecommunications, computer and automotive markets). It provides five topics: a general presentation of Areva, the strategic stakes for transmission and distribution by world-zone, economic and strategic stakes of business unit products, business unit systems and business unit automation. (A.L.B.)

  16. Mathematics Intensive Summer Session (MISS). Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    This final technical report appears in two parts: the report for the 1995 summer MISS program and the report for the 1996 summer MISS program. Copies of the US Department of Energy Pre-Freshman Enrichment Program 1995 Entry Form and 1996 Entry Form completed by all participants were sent to the Oak Ridge Institute for Science and Education in the fall of 1995 and 1996 respectively. Those forms are on file should they be needed. Attached also is a copy of the Summary of ideas for panel discussions, problem-solving sessions, or small group discussions presented at the Department of Energy Oak Ridge Institute for Science and Education Pre-Freshman Enrichment Program Project Directors Meeting held in San Antonio, TX, November 12--14, 1995.

  17. First Doctoral student assembly and poster session at CERN

    CERN Multimedia

    2010-01-01

    Presently, 130 doctoral students at CERN do their research on “technical” subjects such as magnets and cryogenics, beam and detector physics, computing and vacuum, among others.   Student present  their scientific achievements at the first doctoral student assembly. To present their scientific achievements and to bring together the students with CERN supervisors and CERN’s management was the main objective of the first doctoral student assembly and poster session, held June 30. The photograph shows about half of those who presented posters, all in their second year of assignment, and ready to attach their work to the panels. Another aim of the assembly was to discuss the outcome of the anonymous questionnaire and to gain feedback for the improvement of the doctoral student program. While there is vast overall satisfaction, improvements should aim at strengthening the links between students, CERN supervisors, and university professors. With 24 posters prese...

  18. Achieving intersubjective understanding: examples from an occupational therapy treatment session.

    Science.gov (United States)

    Crepeau, E B

    1991-11-01

    Occupational therapists, like other health care professionals, must balance their application of treatment techniques with an understanding of their patients' life experiences. This paper reviews the literature from interpretive and medical sociology regarding the interplay between professional power and the achievement of an understanding of another person. It analyzes how an occupational therapist, during a single treatment session, enters into her patient's life-world and simultaneously controls and manages the treatment process. The concepts of knowledge schemata (the expectations and beliefs people bring to a situation) and footings (the shifts in alignment, or focus, that occur during interaction) are central to this analysis. The process of achieving a balance between professional power and an understanding of the patient's experience may be fostered in education and in clinical supervision through increased emphasis on the importance of understanding the values and beliefs of patients and on the development and refinement of interactive skills.

  19. Summary Of Session 3: How Should Accelerator Operations Be Organized?

    Energy Technology Data Exchange (ETDEWEB)

    Bloemhard, R.; Stanek, M

    2001-07-01

    The underlying structure and organization of a group strongly influences its effectiveness and efficiency. An operations group may develop a 'persistence of form' that prevents it from responding to changes in responsibilities and technology. Even if a group has been in existence for a long time, it is a good idea to re-evaluate its structure periodically. An organization can possess an aesthetic quality related to how simple and transparent its functions appear to users and other outsiders. Information and tasks should flow freely without undue impedance. In this session we examined the issue of group design from a variety of perspectives including both large and small labs, commercial operations and that of an 'expert' consultant. (author)

  20. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  1. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  2. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  3. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-01-01

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine. PMID:18998785

  4. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  5. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  6. Numerical Coding of Nominal Data

    OpenAIRE

    Gniazdowski, Zenon; GRABOWSKI Michal

    2016-01-01

    In this paper, a novel approach for coding nominal data is proposed. For the given nominal data, a rank in a form of complex number is assigned. The proposed method does not lose any information about the attribute and brings other properties previously unknown. The approach based on these knew properties can been used for classification. The analyzed example shows that classification with the use of coded nominal data or both numerical as well as coded nominal data is more effective than the...

  7. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  8. Prefix Code Translation by Mapping

    Institute of Scientific and Technical Information of China (English)

    蒋贤春

    1994-01-01

    This paper introduces a new way of prefix code translation.It helps to finish the whole translation by mapping once (only one comparison instruction is needed for getting the length of prefix code),and returns the original data and the length of prefix code element.The decoding time is only about four times as many as the time accessing original data directly.

  9. Generalized PCM coding of Images

    OpenAIRE

    Prades Nebot, José; MORBEE, MARLEEN; DELP, EDWARD

    2012-01-01

    Pulse-code modulation (PCM) with embedded quantization allows the rate of the PCM bitstream to be reduced by simply removing a fixed number of least significant bits from each codeword. Although this source coding technique is extremely simple, it has poor coding efficiency. In this paper, we present a generalized PCM (GPCM) algorithm for images that simply removes bits from each codeword. In contrast to PCM, however, the number and the specific bits that a GPCM encoder removes in each cod...

  10. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  11. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  12. Explosive Formulation Code Naming SOP

    Energy Technology Data Exchange (ETDEWEB)

    Martz, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  13. Combinatorial aspects of code loops

    OpenAIRE

    Vojtěchovský, Petr

    2007-01-01

    The existence and uniqueness (up to equivalence) of code loops was first established by R. Griess. Nevertheless, the explicit construction of code loops remained open until T. Hsu introduced the notion of symplectic cubic spaces and their Frattini extensions, and pointed out how the construction of code loops followed from the (purely combinatorial) result of O. Chein and E. Goodaire. Within this paper, we focus on their combinatorial construction and prove a more general result using the lan...

  14. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  15. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  16. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  17. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  18. Implementation of Motor Imagery during Specific Aerobic Training Session in Young Tennis Players

    OpenAIRE

    Aymeric Guillot; Franck Di Rienzo; Vincent Pialoux; Germain Simon; Sarah Skinner; Isabelle Rogowski

    2015-01-01

    The aim of this study was to investigate the effects of implementing motor imagery (MI) during specific tennis high intensity intermittent training (HIIT) sessions on groundstroke performance in young elite tennis players. Stroke accuracy and ball velocity of forehand and backhand drives were evaluated in ten young tennis players, immediately before and after having randomly performed two HIIT sessions. One session included MI exercises during the recovery phases, while the other included ver...

  19. Exploration of session perceptions in the words of clients and therapists

    OpenAIRE

    Batzel, Donna

    1997-01-01

    This qualitative, baseline study collected information from clients and therapists about their perceptions of their first three sessions together. Four pairs of clients and therapists, matched on gender, participated in the study. Clients were adults seeking individual therapy for problems related to relationship issues and/or depression. Each participant provided a written document of their sessions, answered questionnaires about the helpfulness of their sessions together, and participated i...

  20. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  1. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  2. Patched Conic Trajectory Code

    Science.gov (United States)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  3. Proceedings of the topical meeting on reactor physics and safety: Sessions 1-10. Volume 1

    International Nuclear Information System (INIS)

    Technical papers and invited lectures presented at the International Topical Meeting on Reactor Physics and Safety are presented. The sessions include a general session on Challenges in Reactor Physics and Safety. Together with sessions on conventional reactor physics topics, there are sessions on safety in nuclear design, dynamic behavior of reactors, degraded cores, research reactors and pressure vessel embrittlement. This conference is broad in scope and brings together experts from all over the fee world to present papers and exchange ideas on the reactor physics and safety aspects of nuclear reactors

  4. Fast reactor cycle technology development 'mid-term technical session of the FaCT project'. Session report and presentation materials

    International Nuclear Information System (INIS)

    The Fast Reactor Cycle Technology Development (FaCT) project was launched in 2006 and has since been vigorously promoted. The first milestone of this project aims to decide whether to adopt the innovative technologies in 2010. As part of the mid-term review for this milestone, a technical session was held at Shinsei-Bank Hall in Tokyo on August 7, 2009, and more than 200 people attended the session, including delegates from governments, universities, research organizations, electric utilities and atomic industries. In this session, JAEA (Japan Atomic Energy Agency) and MFBR (Mitsubishi FBR systems, Inc.) reported 2006-2008 R and D results of the FaCT project and obtained quite a lot of comments and opinions from the participants. These have now been successfully reflected in the R and D activities. This report hereinafter provides a summary of the session and the presentation materials. (author)

  5. Upgrade of FUMACS code package

    International Nuclear Information System (INIS)

    The FUMACS code package (an acronym of FUel MAnagement Code System) was developed at Rudjer Boskovic Institute in year 1991 with the aim to enable in-core fuel management analysis of the NPP Krsko core for nominal (full power) conditions. The modernization and uprating of the NPP Krsko core from 1876 to 1994 MW (th) performed in year 2000 resulted in the change of operating conditions. The old version of the FUMACS code package would not model properly the NPP Krsko core for the new operating conditions. The upgrade of the FUMACS code package to enable the modeling of the NPP Krsko core for uprated conditions and longer cycles required modifications of master files, libraries and codes. In order to make the code package more user friendly, Windows (95/98/NT) compatible version of the code package, with incorporated graphical user interface has been developed. The new version of the code package has been verified and validated for new operating conditions through modeling and comparison of results with referent design of a number of 12-month and 18-month operating cycles.(author)

  6. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  7. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence tha

  8. Using NAEYC's Code of Ethics.

    Science.gov (United States)

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  9. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  10. Revised Safety Code A2

    CERN Document Server

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  11. Quantum Convolutional Error Correction Codes

    OpenAIRE

    Chau, H. F.

    1998-01-01

    I report two general methods to construct quantum convolutional codes for quantum registers with internal $N$ states. Using one of these methods, I construct a quantum convolutional code of rate 1/4 which is able to correct one general quantum error for every eight consecutive quantum registers.

  12. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...

  13. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a...

  14. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  15. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  16. Mobile Konami Code Source Files

    OpenAIRE

    Boomgaarden, Jacob; Corney, Joshua

    2015-01-01

    An archive file of Android source code projects available for import into Android Studio. These projects were utilized in the research for the following thesis: MOBILE KONAMI CODES: ANALYSIS OF ANDROID MALWARE SERVICES UTILIZING SENSOR AND RESOURCE-BASED STATE CHANGES. This thesis may be found here: http://calhoun.nps.edu/handle/10945/45163

  17. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  18. Best practices for code release

    Science.gov (United States)

    Berriman, G. Bruce

    2016-01-01

    In this talk, I want to describe what I think are the best practices for releasing code and having it adopted by end users. Make sure your code is licensed, so users will know how the software can be used and modified, and place your code in a public repository that (and make sure that you follow institutional policies in doing this). Yet licensing and releasing code are not enough: the code must be organized and documented so users can understand what it does, what its limitations are, and how to build and use it. I will describe what I think are best practices in developing the content to support release, including tutorials, design documents, specifications of interfaces and so on. Much of what I have learned on based on ten years of experience in supporting releases of the Montage Image Mosaic Engine.

  19. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  20. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus;

    2014-01-01

    -malleable codes where the adversary only is allowed to tamper a single time with an encoding. We show how to construct continuous non-malleable codes in the common split-state model where an encoding consist of two parts and the tampering can be arbitrary but has to be independent with both parts. Our main......Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged...... or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...

  1. Portable code development in C

    Energy Technology Data Exchange (ETDEWEB)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  2. Super Special Codes using Super Matrices

    CERN Document Server

    Kandasamy, W B Vasantha; Ilanthenral, K

    2010-01-01

    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

  3. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  4. Percutaneous radiofrequency ablation of hepatocellular carcinoma: analysis of 80 patients treated with two consecutive sessions

    Energy Technology Data Exchange (ETDEWEB)

    Rhim, Hyunchul; Kim, Young-sun; Choi, Dongil; Lim, Hyo K.; Park, KoWoon [Samsung Medical Center, Sungkyunkwan University School of Medicine, Department of Radiology and Center for Imaging Science, Seoul (Korea)

    2008-07-15

    This study investigated the reasons for some patients requiring two consecutive sessions of percutaneous radiofrequency (RF) ablation of hepatocellular carcinoma (HCC). We reviewed our database of 1,179 patients (1,624 treatments) with HCCs treated by percutaneous ultrasound (US)-guided RF ablation over 6 years. We retrospectively evaluated 80 patients who required a second session after the first session. The medical records and follow-up CTs were studied. We assessed the reasons for the second session and the patient outcomes. A second session was required in 80 (4.8%) out of 1,642 treatments of percutaneous RF ablation for HCC. The reason for the second session included technical failure related to the patient or the procedure (n=26), technical failure due to residual (n=40), newly detected (n=11) or missed (n=3) tumors found at the immediate follow-up CT. All patients were retreated with a second RFA session the next day. Seventy-five (93%) of 80 patients achieved complete ablation after the second session. The remaining five patients were treated by TACE (n=1), additional RFA (as second treatment at next admission) (n=3), or were lost to follow-up (n=1). After 1 month follow-up, 72 patients (96%) showed complete ablation after the second session. The interventional oncologist should understand the technical reasons for a patient requiring a second session of RF ablation when providing treatment for HCCs and perform careful pre-procedural planning to minimize the need for multi-session procedures. (orig.)

  5. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  6. ICE-DIP closing workshop - Public session | 14 September

    CERN Multimedia

    2016-01-01

    ICE-DIP, the Intel-CERN European Doctorate Industrial Program (see here), is a European Industrial Doctorate scheme (see here) led by CERN. The focus of the project, which launched in 2013, has been the development of techniques for acquiring and processing data that are relevant for the trigger and data-acquisition systems of the LHC experiments.   The results will be publicly presented in an open session on the afternoon of 14th September. Building on CERN’s long-standing relationship with Intel through CERN openlab, ICE-DIP brings together CERN, Intel and research universities to offer training to five PhD students in advanced information and communication technologies (ICT). These young researchers have been funded by the European Commission as fellows at CERN and enrolled in doctoral programmes at the National University of Ireland Maynooth and Dublin City University. They have each completed 18 month secondments at Intel locations around the world gaining in-depth experience of the v...

  7. Meeting report VLPNPV: Sessions 1 and 2: Plenary.

    Science.gov (United States)

    Sainsbury, Frank

    2014-01-01

    Following the highly successful inaugural meeting in 2012, the second installment of Virus-Like Particles and Nano-Particle Vaccines (VLPNPV), proved to be a worthy follow-up in an outstanding conference series. VLPNPV is a forum for academics and industry to address one of the major areas of need in biomedical sciences, the development of novel prophylactic and therapeutic vaccines. The conference was opened by Professor Marianne Manchester of the University of California, San Diego who pointed to the significance of the site chosen for the conference, the Salk Institute. Founded by Jonas Salk, the Salk Institute for Biological Studies is a non-profit, independent research institute with focuses in molecular biology and genetics, neurosciences, and plant biology. This diversity in research themes reflects the wishes of the institute's founder who saw value in using interdisciplinary approaches to understanding the basic principles in life, aimed at generating new therapies and treatments for human disease. Likewise, interdisciplinarity was reflected in the main themes of the meeting, which also highlight some of the potential advantages of virus-like particle (VLP) and nanoparticle vaccines, including novel formulations/adjuvanting effects, structurally accurate/designed antigens, production systems and capacity, and tailoring the immune response. These themes were covered by the 2 plenary sessions that opened the conference and are described in this report. PMID:25485812

  8. CYCLIC CODES OVER FORMAL POWER SERIES RINGS

    Institute of Scientific and Technical Information of China (English)

    Dougherty Steven T.; Liu Hongwei

    2011-01-01

    In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.

  9. Advanced thermal-hydraulic and neutronic codes: current and future applications. Summary and conclusions

    International Nuclear Information System (INIS)

    An OECD Workshop on Advanced Thermal-Hydraulic and Neutronic Codes Applications was held from 10 to 13 April 2000, in Barcelona, Spain, sponsored by the Committee on the Safety of Nuclear Installations (CSNI) of the OECD Nuclear Energy Agency (NEA). It was organised in collaboration with the Spanish Nuclear Safety Council (CSN) and hosted by CSN and the Polytechnic University of Catalonia (UPC) in collaboration with the Spanish Electricity Association (UNESA). The objectives of the Workshop were to review the developments since the previous CSNI Workshop held in Annapolis [NEA/CSNI/ R(97)4; NUREG/CP-0159], to analyse the present status of maturity and remnant needs of thermal-hydraulic (TH) and neutronic system codes and methods, and finally to evaluate the role of these tools in the evolving regulatory environment. The Technical Sessions and Discussion Sessions covered the following topics: - Regulatory requirements for Best-Estimate (BE) code assessment; - Application of TH and neutronic codes for current safety issues; - Uncertainty analysis; - Needs for integral plant transient and accident analysis; - Simulators and fast running codes; - Advances in next generation TH and neutronic codes; - Future trends in physical modeling; - Long term plans for development of advanced codes. The focus of the Workshop was on system codes. An incursion was made, however, in the new field of applying Computational Fluid Dynamic (CFD) codes to nuclear safety analysis. As a general conclusion, the Barcelona Workshop can be considered representative of the progress towards the targets marked at Annapolis almost four years ago. The Annapolis Workshop had identified areas where further development and specific improvements were needed, among them: multi-field models, transport of interfacial area, 2D and 3D thermal-hydraulics, 3-D neutronics consistent with level of details of thermal-hydraulics. Recommendations issued at Annapolis included: developing small pilot/test codes for

  10. Proceedings of the workshop on advanced thermal-hydraulic and neutronic codes: current and future applications

    International Nuclear Information System (INIS)

    An OECD Workshop on Advanced Thermal-Hydraulic and Neutronic Codes Applications was held from 10 to 13 April 2000, in Barcelona, Spain, sponsored by the Committee on the Safety of Nuclear Installations (CSNI) of the OECD Nuclear Energy Agency (NEA). It was organised in collaboration with the Spanish Nuclear Safety Council (CSN) and hosted by CSN and the Polytechnic University of Catalonia (UPC) in collaboration with the Spanish Electricity Association (UNESA). The objectives of the Workshop were to review the developments since the previous CSNI Workshop held in Annapolis [NEA/CSNI/ R(97)4; NUREG/CP-0159], to analyse the present status of maturity and remnant needs of thermal-hydraulic (TH) and neutronic system codes and methods, and finally to evaluate the role of these tools in the evolving regulatory environment. The Technical Sessions and Discussion Sessions covered the following topics: - Regulatory requirements for Best-Estimate (BE) code assessment; - Application of TH and neutronic codes for current safety issues; - Uncertainty analysis; - Needs for integral plant transient and accident analysis; - Simulators and fast running codes; - Advances in next generation TH and neutronic codes; - Future trends in physical modeling; - Long term plans for development of advanced codes. The focus of the Workshop was on system codes. An incursion was made, however, in the new field of applying Computational Fluid Dynamic (CFD) codes to nuclear safety analysis. As a general conclusion, the Barcelona Workshop can be considered representative of the progress towards the targets marked at Annapolis almost four years ago. The Annapolis Workshop had identified areas where further development and specific improvements were needed, among them: multi-field models, transport of interfacial area, 2D and 3D thermal-hydraulics, 3-D neutronics consistent with level of details of thermal-hydraulics. Recommendations issued at Annapolis included: developing small pilot/test codes for

  11. 78 FR 37553 - Maternal Health Town Hall Listening Session; Notice of Meeting

    Science.gov (United States)

    2013-06-21

    ... national strategy to reduce maternal morbidity and mortality, and improve the quality and safety of... HUMAN SERVICES Health Resources and Services Administration Maternal Health Town Hall Listening Session; Notice of Meeting Name: Maternal Health Town Hall Listening Session. Date and Time: August 27, 2013,...

  12. Within-Session Transitions in Choice: A Structural and Quantitative Analysis

    Science.gov (United States)

    Banna, Kelly M.; Newland, M. Christopher

    2009-01-01

    The present study used within-session transitions between two concurrent schedules to evaluate choice in transition. Eight female Long-Evans rats were trained to respond under concurrent schedules of reinforcement during experimental sessions that lasted 22 hr. The generalized matching equation was used to model steady-state behavior at the end of…

  13. Illinois Board of Education Closed Sessions: Does the Superintendent Make a Difference?

    Science.gov (United States)

    Banicki, Guy; Pacha, Joseph

    2011-01-01

    Holding closed sessions in school board meetings to reach major policy decisions is generally discouraged; but, school boards occasionally use this tactic if conflict and tension arise. Therefore, the questions of "how often does a Board of Education encounter conflict and tension" and "how is the decision made to schedule a closed session to…

  14. Views of STS-5 crew during a training session in the SMS

    Science.gov (United States)

    1982-01-01

    Views of STS-5 crew during a training session in the Shuttle Mission Simulator (SMS). Astronaut Robert F. Overmyer, STS-5 pilot, participates in training session wearing a communications kit assembly (ASSY). He is dressed in regular flight suit and is studying flight documentation.

  15. Synthesis of chemicals and polymers: towards cleaner processes and atom economy, session 5

    Energy Technology Data Exchange (ETDEWEB)

    Razavi, A.; Thivolle-Cazat, J.; Hutchings, G.; Murata, K.; Leininger, S.; Sorokin, A.; Angelis, A. de; Apesteguia, C.I.; Mayoral, J.A.; Hardacre, C.; Jeon, J.; Tominaga, K.; Plasseraud, L.; Kervennal, J.; Souza, R.F. de; Ciardelli, F.; Dominguez, J.M.

    2004-07-01

    The abstracts of all the presentations (1 plenary session, 2 keynotes, 16 oral communications, 151 posters) of the thematic session 5 'synthesis of chemicals and polymers: towards cleaner processes and atom economy' are gathered in the CD-Rom of the conference. (O.M.)

  16. Correspondence of Motivational Interviewing Adherence and Competence Ratings in Real and Role-Played Client Sessions

    Science.gov (United States)

    Decker, Suzanne E.; Carroll, Kathleen M.; Nich, Charla; Canning-Ball, Monica; Martino, Steve

    2013-01-01

    Treatment integrity ratings (adherence and competence) are frequently used as outcome measures in clinician training studies, drawn from recorded real client or role-played client sessions. However, it is unknown whether clinician adherence and competence are similar in real client and role-played sessions or whether real and role-play clients…

  17. Individual neuropsychological support and group sessions for relatives to TBI patients

    DEFF Research Database (Denmark)

    Siert, Lars

    TITLE: Individual neuropsychological support and group sessions for relatives to TBI patients. OBJECTIVE: To describe how the neuropsychologist work with early and ongoing individual support and group sessions for relatives to adult TBI patients in the acute and sub acute phase and after discharge...

  18. An Evaluation of Consultation Sessions for Foster Carers and Adoptive Parents

    Science.gov (United States)

    Osborne, Cara; Alfano, Julia

    2011-01-01

    The aim of the study was to examine whether consultation sessions provided by educational psychologists (EPs) offer a useful way of supporting foster and adoptive parents. Feedback was collected from 101 EPs and 78 foster and adoptive parents through the use of a short questionnaire at the end of each session. As might be expected, educational…

  19. 78 FR 14840 - U.S.-EU High Level Regulatory Cooperation Forum-Stakeholder Session

    Science.gov (United States)

    2013-03-07

    ... BUDGET U.S.-EU High Level Regulatory Cooperation Forum--Stakeholder Session AGENCY: Office of Management... some stakeholders from making presentations on April 10th or 11th, 2013. However, there will be future opportunities to submit suggestions and ideas, and the stakeholder session agenda will in no way prejudge...

  20. 78 FR 21607 - Stakeholder Listening Session in Preparation for the 66th World Health Assembly

    Science.gov (United States)

    2013-04-11

    ... HUMAN SERVICES Stakeholder Listening Session in Preparation for the 66th World Health Assembly Time and... leading the U.S. delegation to the 66th World Health Assembly-- will hold an informal Stakeholder..., 200 Independence Avenue SW., Washington, DC 20201. The Stakeholder Listening Session will help the...