WorldWideScience

Sample records for asms2004 session code

  1. Code-switching across brainstorming sessions: implications for the revised hierarchical model of bilingual language processing.

    Science.gov (United States)

    Blot, Kevin J; Zárate, Michael A; Paulus, Paul B

    2003-01-01

    The revised hierarchical model (RHM) of bilingual language processing posits independent word form representations for the dominant language (L1) and the nondominant language (L2), facilitated translation from L2 words to L1 words, access to common concepts for L1 and L2, and stronger activation of concepts for L1 than for L2. Spanish-English and English-Spanish bilinguals brainstormed for two sessions; half switched languages (L1-L2 or L2-L1) and half stayed in the same language (L1-L1 or L2-L2) across sessions. In both sessions, L1 brainstorming resulted in more efficient idea productivity than L2 brainstorming, supporting stronger concept activation for L1, consistent with the RHM. Switching languages from L2 to L1 resulted in the most efficient idea productivity in Session 2, suggesting that switching to L1 not only permits strong concept activation, but also the activation of concepts that are relatively different than those activated by L2, inconsistent with the RHM. Switching languages increased the proportion of Session 1 ideas repeated during Session 2, despite instructions not to repeat. This finding suggests that there is activation of concepts as well as word forms in same language brainstorming and that this dual activation aids in following instructions not to repeat, consistent with the RHM. It is suggested that the RHM be re-specified to accommodate the notion that L1 and L2 access relatively different concepts.

  2. Breakout Sessions

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Participants are split into small groups for detailed discussion on their chosen topic. To register please click on 'See details' link from the agenda and then on the link to send an email to the session for which you would like to book. Please don't change the subject line of the email.

  3. Sessions and Session Types: An Overview

    Science.gov (United States)

    Dezani-Ciancaglini, Mariangiola; de'Liguoro, Ugo

    We illustrate the concepts of sessions and session types as they have been developed in the setting of the π-calculus. Motivated by the goal of obtaining a formalisation closer to existing standards and aiming at their enhancement and strengthening, several extensions of the original core system have been proposed, which we survey together with the embodying of sessions into functional and object-oriented languages, as well as some implementations.

  4. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    . In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post...

  5. The Public Poster Session

    Science.gov (United States)

    Levine-Rasky, Cynthia

    2009-01-01

    This note describes the use of a student poster session as an innovative approach to student learning. The local context for the assignment is provided, followed by a description of the course for which the poster was prepared, details about the assignment including its evaluation, and practical considerations for planning a poster session. The…

  6. Multiparty Asynchronous Session Types

    DEFF Research Database (Denmark)

    Honda, Kohei; Yoshida, Nobuko; Carbone, Marco

    2016-01-01

    . This work extends the foregoing theories of binary session types to multiparty, asynchronous sessions, which often arise in practical communication-centered applications. Presented as a typed calculus for mobile processes, the theory introduces a new notion of types in which interactions involving multiple......Communication is a central elements in software development. As a potential typed foundation for structured communication-centered programming, session types have been studied over the past decade for a wide range of process calculi and programming languages, focusing on binary (two-party) sessions...... peers are directly abstracted as a global scenario. Global types retain the friendly type syntax of binary session types while specifying dependencies and capturing complex causal chains of multiparty asynchronous interactions. A global type plays the role of a shared agreement among communication peers...

  7. Session 7: Reserve

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, R.; Crockford, G

    2001-07-01

    The reserve session was devoted to some issues that came up through the workshop, which were grouped into three main areas: The Global Accelerator Network, Problems of stress and how to get organized to minimize them, What should an operations group be responsible for? This paper summarizes the discussions that took place. (author)

  8. Poster Session- Extended Abstracts

    Science.gov (United States)

    Jack D. Alexander III; Jean Findley; Brenda K. Kury; Jan L. Beyers; Douglas S. Cram; Terrell T. Baker; Jon C. Boren; Carl Edminster; Sue A. Ferguson; Steven McKay; David Nagel; Trent Piepho; Miriam Rorig; Casey Anderson; Jeanne Hoadley; Paulette L. Ford; Mark C. Andersen; Ed L. Fredrickson; Joe Truett; Gary W. Roemer; Brenda K. Kury; Jennifer Vollmer; Christine L. May; Danny C. Lee; James P. Menakis; Robert E. Keane; Zhi-Liang Zhu; Carol Miller; Brett Davis; Katharine Gray; Ken Mix; William P. Kuvlesky Jr.; D. Lynn Drawe; Marcia G. Narog; Roger D. Ottmar; Robert E. Vihnanek; Clinton S. Wright; Timothy E. Paysen; Burton K. Pendleton; Rosemary L. Pendleton; Carleton S. White; John Rogan; Doug Stow; Janet Franklin; Jennifer Miller; Lisa Levien; Chris Fischer; Emma Underwood; Robert Klinger; Peggy Moore; Clinton S. Wright

    2008-01-01

    Titles found within Poster Session-Extended Abstracts include:Assessment of emergency fire rehabilitation of four fires from the 2000 fire season on the Vale, Oregon, BLM district: review of the density sampling materials and methods: p. 329 Growth of regreen, seeded for erosion control, in the...

  9. Summary of Session 3

    Energy Technology Data Exchange (ETDEWEB)

    Fleischer, J. [Universitaet Bielefeld, Fakultaet fuer Physik, Bielefeld (Germany)]. E-mail: fl@physik.uni-bielefeld.de

    2004-11-21

    In Session 3, the speakers were dealing with the following topics: Automatization of Feynman Diagram Calculations (FDC), Event generators, Analytical approaches to FDC and various Mathematical innovations related to different physical problems. A more general, 'brainstorming', talk was given by J. Vermaseren as first talk.

  10. The outreach sessions

    Energy Technology Data Exchange (ETDEWEB)

    Trache, Livius [Horia Hulubei National Institute for Physics and Nuclear Engineering, P.O. Box MG-6, 077125 Bucharest-Magurele (Romania)

    2015-02-24

    These are moderator’s remarks about the outreach day in the middle of the CSSP14, and in particular about the afternoon outreach session in round table format with the announced theme: “CERN at 60 and the internationalization of science”.

  11. Session: Offshore wind

    Energy Technology Data Exchange (ETDEWEB)

    Gaarde, Jette; Ram, Bonnie

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations. Due to time constraints, a discussion period was not possible. The session addressed the current state of offshore wind energy development. The first presentation ''Monitoring Program and Results: Horns Rev and Nysted'' by Jette Gaarde summarized selected environmental studies conducted to date at operating offshore wind turbine projects in Denmark and lessons from other offshore wind developments in Europe. Wildlife impacts studies from the Danish sites focused on birds, fish, and mammals. The second presentation ''What has the U.S. Wind Industry Learned from the European Example'' by Bonnie Ram provided an update on current permit applications for offshore wind developments in the U.S. as well as lessons that may be drawn from the European experience.

  12. Sessions as Propositions

    Directory of Open Access Journals (Sweden)

    Sam Lindley

    2014-06-01

    Full Text Available Recently, Wadler presented a continuation-passing translation from a session-typed functional language, GV, to a process calculus based on classical linear logic, CP. However, this translation is one-way: CP is more expressive than GV. We propose an extension of GV, called HGV, and give translations showing that it is as expressive as CP. The new translations shed light both on the original translation from GV to CP, and on the limitations in expressiveness of GV.

  13. Session: Hard Rock Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Dunn, James C.; Drumheller, Douglas S.; Glowka, David A.; Lysne, Peter

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five presentations: ''Hard Rock Penetration - Summary'' by George P. Tennyson, Jr.; ''Overview - Hard Rock Penetration'' by James C. Dunn; ''An Overview of Acoustic Telemetry'' by Douglas S. Drumheller; ''Lost Circulation Technology Development Status'' by David A. Glowka; ''Downhole Memory-Logging Tools'' by Peter Lysne.

  14. Session: Geopressured-Geothermal

    Energy Technology Data Exchange (ETDEWEB)

    Jelacic, Allan J.; Eaton, Ben A.; Shook, G. Michael; Birkinshaw, Kelly; Negus-de Wys, Jane

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five presentations: ''Overview of Geopressured-Geothermal'' by Allan J. Jelacic; ''Geothermal Well Operations and Automation in a Competitive Market'' by Ben A. Eaton; ''Reservoir Modeling and Prediction at Pleasant Bayou Geopressured-Geothermal Reservoir'' by G. Michael Shook; ''Survey of California Geopressured-Geothermal'' by Kelly Birkinshaw; and ''Technology Transfer, Reaching the Market for Geopressured-Geothermal Resources'' by Jane Negus-de Wys.

  15. ICALEPS 2005 : opening session

    CERN Multimedia

    Maximilien Brice

    2005-01-01

    ICALEPCS 2005, the tenth International Conference on Accelerator and Large Experimental Physics Control Systems, will be held in Geneva, Switzerland, 10-14 Oct. 2005 at the International Conference Center Geneva (CICG). ICALEPCS 2005 thus falls in the year that UNESCO has declared the "World Year of Physics". ICALEPCS covers all aspects of control and operation of Experimental Physics facilities such as particle accelerators, particle detectors, optical telescopes, radio telescopes, nuclear fusion facilities like Tokamaks, nuclear reactors, lasers, etc .... Opening session by . A. Daneels (CERN): Introducting ICALEPCS 2005 . C.Lamprecht (Republic & State of Geneva): Welcome speech . J. Lister (EPFL): Welcome speech . J. Engelen (CERN): The machine and experiment challenges of LHC

  16. Session: Reservoir Technology

    Energy Technology Data Exchange (ETDEWEB)

    Renner, Joel L.; Bodvarsson, Gudmundur S.; Wannamaker, Philip E.; Horne, Roland N.; Shook, G. Michael

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five papers: ''Reservoir Technology'' by Joel L. Renner; ''LBL Research on the Geysers: Conceptual Models, Simulation and Monitoring Studies'' by Gudmundur S. Bodvarsson; ''Geothermal Geophysical Research in Electrical Methods at UURI'' by Philip E. Wannamaker; ''Optimizing Reinjection Strategy at Palinpinon, Philippines Based on Chloride Data'' by Roland N. Horne; ''TETRAD Reservoir Simulation'' by G. Michael Shook

  17. Performance Evaluation of Coded Meshed Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Pedersen, Morten Videbæk

    2013-01-01

    We characterize the performance of intra- and inter-session network coding (NC) in wireless networks using real-life implementations. We compare this performance to a recently developed hybrid approach, called CORE, which combines intra- and inter-session NC exploiting the code structure...

  18. Session Types at the Mirror

    Directory of Open Access Journals (Sweden)

    Luca Padovani

    2009-12-01

    Full Text Available We (redefine session types as projections of process behaviors with respect to the communication channels they use. In this setting, we give session types a semantics based on fair testing. The outcome is a unified theory of behavioral types that shares common aspects with conversation types and that encompass features of both dyadic and multi-party session types. The point of view we provide sheds light on the nature of session types and gives us a chance to reason about them in a framework where every notion, from well-typedness to the subtyping relation between session types, is semantically -rather than syntactically- grounded.

  19. Wyoming: "A Net Positive Session"

    OpenAIRE

    Schuhmann, Robert A.

    2016-01-01

    Wyoming’s general legislative session concluded March 6, 2015 with the passage of 185 bills and nearly $285 million in new spending.[1] Because this was a general session rather than a budget session, very few budget issues were addressed. However, key budgetary matters this year included: (1) addressing a $222 million shortfall brought about by falling oil prices and (2) several new capital construction projects spread across the state and at the University of Wyoming. Wyoming democrats in t...

  20. Session Types at the Mirror

    OpenAIRE

    Luca Padovani

    2009-01-01

    We (re)define session types as projections of process behaviors with respect to the communication channels they use. In this setting, we give session types a semantics based on fair testing. The outcome is a unified theory of behavioral types that shares common aspects with conversation types and that encompass features of both dyadic and multi-party session types. The point of view we provide sheds light on the nature of session types and gives us a chance to reason about them in a framework...

  1. Reversible Multiparty Sessions with Checkpoints

    Directory of Open Access Journals (Sweden)

    Mariangiola Dezani-Ciancaglini

    2016-08-01

    Full Text Available Reversible interactions model different scenarios, like biochemical systems and human as well as automatic negotiations. We abstract interactions via multiparty sessions enriched with named checkpoints. Computations can either go forward or roll back to some checkpoints, where possibly different choices may be taken. In this way communications can be undone and different conversations may be tried. Interactions are typed with global types, which control also rollbacks. Typeability of session participants in agreement with global types ensures session fidelity and progress of reversible communications.

  2. Poster Session A

    Science.gov (United States)

    2009-01-01

    A.1 Labeling of Peptide Fragmented Mass Spectra in Proteomic Studies B. Gerrits1, C. Panse1, B. Bodenmiller2, and R. Schlapbach1 1UZH/ETH Functional Genomics Center, Zurich, Switzerland; 2IMSB/ETH, Zurich, Switzerland Due to the advent of accurate and fast sampling mass spectrometers, proteomic experiments often contain thousands of peptide fragmentation spectra. Although it is commonly accepted that no manual validation of individual spectra in such experiments is feasible, annotated spectra of the peptides assignments with their modifications are required for publication and reviewing purposes. Here we present an algorithm that greatly facilitates the visualisation of peptide fragmentation spectra and aides with the quality assessment of modification sites such as phosphorylation. The application has two inputs: 1) the Mascot dat-file including the Mascot modifications and 2) the assignment list containing the query number and peptide rank. In the first step using Perl, the application retrieves the peptide assignments and computes the theoretical fragments. These are then mapped to the peak list with the error margin specified during the initial search. During the second stage using R, two different heuristics can be chosen to calculate the appropriate text-labels and print the labelled spectra. To demonstrate the usefulness of the peakplot application we built a CGI based world wide web accessible userinterface. Also via this interface several data sets are available for testing. As datfile content based filtering aion score cut-off, peptide query hit selection, and a selection by peptide modification based on the mascot servermodification file are provided. As output on default four different colour schemes areprovided, as well as one multi panel plot, which provides additional graphics and statistics about the assigned peaklist. A.2 Exact Quantification of Complex Protein Mixtures Using MeCAT—Metal Coded Tagging R. Ahrends1, U. Bergmann1, S. Pieper1, B

  3. Cyclone Codes

    OpenAIRE

    Schindelhauer, Christian; Jakoby, Andreas; Köhler, Sven

    2016-01-01

    We introduce Cyclone codes which are rateless erasure resilient codes. They combine Pair codes with Luby Transform (LT) codes by computing a code symbol from a random set of data symbols using bitwise XOR and cyclic shift operations. The number of data symbols is chosen according to the Robust Soliton distribution. XOR and cyclic shift operations establish a unitary commutative ring if data symbols have a length of $p-1$ bits, for some prime number $p$. We consider the graph given by code sym...

  4. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  5. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class......Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class...

  6. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  7. Code Team Training: Demonstrating Adherence to AHA Guidelines During Pediatric Code Blue Activations.

    Science.gov (United States)

    Stewart, Claire; Shoemaker, Jamie; Keller-Smith, Rachel; Edmunds, Katherine; Davis, Andrew; Tegtmeyer, Ken

    2017-10-16

    Pediatric code blue activations are infrequent events with a high mortality rate despite the best effort of code teams. The best method for training these code teams is debatable; however, it is clear that training is needed to assure adherence to American Heart Association (AHA) Resuscitation Guidelines and to prevent the decay that invariably occurs after Pediatric Advanced Life Support training. The objectives of this project were to train a multidisciplinary, multidepartmental code team and to measure this team's adherence to AHA guidelines during code simulation. Multidisciplinary code team training sessions were held using high-fidelity, in situ simulation. Sessions were held several times per month. Each session was filmed and reviewed for adherence to 5 AHA guidelines: chest compression rate, ventilation rate, chest compression fraction, use of a backboard, and use of a team leader. After the first study period, modifications were made to the code team including implementation of just-in-time training and alteration of the compression team. Thirty-eight sessions were completed, with 31 eligible for video analysis. During the first study period, 1 session adhered to all AHA guidelines. During the second study period, after alteration of the code team and implementation of just-in-time training, no sessions adhered to all AHA guidelines; however, there was an improvement in percentage of sessions adhering to ventilation rate and chest compression rate and an improvement in median ventilation rate. We present a method for training a large code team drawn from multiple hospital departments and a method of assessing code team performance. Despite subjective improvement in code team positioning, communication, and role completion and some improvement in ventilation rate and chest compression rate, we failed to consistently demonstrate improvement in adherence to all guidelines.

  8. IMC9 Edinburgh Nomenclature Sessions.

    Science.gov (United States)

    Norvell, Lorelei L; Hawksworth, David L; Petersen, Ronald H; Redhead, Scott A

    2010-12-01

    The proceedings of the 3-5 August 2010, IMC9 Edinburgh Nomenclature Sessions are briefly summarized. The final resolution approved by the General Assembly endorses the recommendations by the Nomenclature Sessions regarding transfer of the governance of fungal nomenclature from botanical to mycological congresses, mandatory pre-publication deposit of nomenclatural information for valid publication of new fungal names, and the acceptability of English as an alternative to Latin in the valid publication of fungal names. Complete results from the IMC9 nomenclature questionnaire are also provided.

  9. Family therapy retention: an observation of first-session communication.

    Science.gov (United States)

    Marchionda, Daria M; Slesnick, Natasha

    2013-01-01

    This study examined the relationship between communication patterns and retention among families (n=18) receiving family therapy. Those that attended 12 sessions were labeled completers (n=6), 4-8 sessions were middle dropouts (n=6), and 1-3 sessions were early dropouts (n=6). Audiotape recordings of the first therapy session were transcribed. The content (positive or negative) and total percentage of communications by the parent, adolescent, and therapist were coded. Completer and middle dropout parents (but not adolescents) showed higher talk time proportions than parents in the early dropout group. Completer families had higher percentages of therapist-to-parent communications, while early dropout families had higher percentages of therapist-to-adolescent communications. There were no significant differences between middle dropouts and completers in either content or total communications. These findings demonstrate the potential utility of examining within-session communication patterns and suggest that within-session processes may determine therapy retention. © 2012 American Association for Marriage and Family Therapy.

  10. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2004-01-01

    WS-Security provides basic means to secure SOAP traffic, one envelope at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; besides, it is often important to secure the integrity of a whole session, as well as each message. To this end,

  11. Sharing code.

    Science.gov (United States)

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  12. Analog Coding.

    Science.gov (United States)

    CODING, ANALOG SYSTEMS), INFORMATION THEORY, DATA TRANSMISSION SYSTEMS , TRANSMITTER RECEIVERS, WHITE NOISE, PROBABILITY, ERRORS, PROBABILITY DENSITY FUNCTIONS, DIFFERENTIAL EQUATIONS, SET THEORY, COMPUTER PROGRAMS

  13. Beam instability Workshop - plenary sessions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The purpose of this workshop was to provide a review of the mechanisms of limiting beam instabilities, their cures, including feedback, and beam measurement for synchrotron radiation light sources. 12 plenary sessions took place whose titles are: 1) challenging brilliance and lifetime issues with increasing currents; 2) limiting instabilities in multibunch; 3) experience from high currents in B factories; 4) longitudinal dynamics in high intensity/bunch; 5) Transverse instabilities for high intensity/bunch; 6) working group introduction from ESRF experience; 7) impedance modelling: simulations, minimization; 8) report on the broadband impedance measurements and modelling workshop; 9) feedback systems for synchrotron light sources; 10) beam instabilities diagnostics; 11) harmonic cavities: the pros and cons; and 12) experimental study of fast beam-ion instabilities at PLS. This document gathers the 12 articles that were presented during these sessions.

  14. Divergence coding for convolutional codes

    Directory of Open Access Journals (Sweden)

    Valery Zolotarev

    2017-01-01

    Full Text Available In the paper we propose a new coding/decoding on the divergence principle. A new divergent multithreshold decoder (MTD for convolutional self-orthogonal codes contains two threshold elements. The second threshold element decodes the code with the code distance one greater than for the first threshold element. Errorcorrecting possibility of the new MTD modification have been higher than traditional MTD. Simulation results show that the performance of the divergent schemes allow to approach area of its effective work to channel capacity approximately on 0,5 dB. Note that we include the enough effective Viterbi decoder instead of the first threshold element, the divergence principle can reach more. Index Terms — error-correcting coding, convolutional code, decoder, multithreshold decoder, Viterbi algorithm.

  15. Aeropropulsion 1987. Session 3: Internal Fluid Mechanics Research

    Science.gov (United States)

    1987-01-01

    Internal fluid mechanics research at Lewis is directed toward an improved understanding of the important flow physics affecting aerospace propulsion systems, and applying this improved understanding to formulate accurate predictive codes. To this end, research is conducted involving detailed experimentation and analysis. The presentations in this session summarize ongoing work and indicated future emphasis in three major research thrusts: namely, inlets, ducts, and nozzles; turbomachinery; and chemical reacting flows.

  16. A comparative analysis of the therapeutic focus in cognitive-behavioral and psychodynamic-interpersonal sessions.

    Science.gov (United States)

    Goldfried, M R; Castonguay, L G; Hayes, A M; Drozd, J F; Shapiro, D A

    1997-10-01

    This study compared therapeutic foci in a sampling of 30 cognitive-behavioral and 27 psychodynamic-interpersonal manual-driven treatments for depression. High- and low-impact sessions were coded for each client, with the Coding System of Therapeutic Focus. Results indicated that psychodynamic-interpersonal sessions focused more on such variables as emotion, patterns, incongruities, the impact that others made on clients, clients' expected reaction of others, the tendency to avoid therapeutic progress, therapists themselves, clients' parents, and links between people and time periods in clients' lives. Cognitive-behavioral sessions placed greater emphasis on external circumstances and clients' ability to make decisions, gave more support and information and encouraged between-session experiences, and focused more on the future. Relatively few differences emerged as a function of session impact. Results are discussed in terms of the different and similar theoretical conceptions of the change process.

  17. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...

  18. Energy and Power Measurements for Network Coding in the Context of Green Mobile Clouds

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani

    2013-01-01

    results for inter-session network coding in Open-Mesh routers underline that the energy invested in performing network coding pays off by dramatically reducing the total energy for the transmission of data over wireless links. We also show measurements for intra-session network coding in three different...

  19. Institutional computing (IC) information session

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Kenneth R [Los Alamos National Laboratory; Lally, Bryan R [Los Alamos National Laboratory

    2011-01-19

    The LANL Institutional Computing Program (IC) will host an information session about the current state of unclassified Institutional Computing at Los Alamos, exciting plans for the future, and the current call for proposals for science and engineering projects requiring computing. Program representatives will give short presentations and field questions about the call for proposals and future planned machines, and discuss technical support available to existing and future projects. Los Alamos has started making a serious institutional investment in open computing available to our science projects, and that investment is expected to increase even more.

  20. Practical Session: Simple Linear Regression

    Science.gov (United States)

    Clausel, M.; Grégoire, G.

    2014-12-01

    Two exercises are proposed to illustrate the simple linear regression. The first one is based on the famous Galton's data set on heredity. We use the lm R command and get coefficients estimates, standard error of the error, R2, residuals …In the second example, devoted to data related to the vapor tension of mercury, we fit a simple linear regression, predict values, and anticipate on multiple linear regression. This pratical session is an excerpt from practical exercises proposed by A. Dalalyan at EPNC (see Exercises 1 and 2 of http://certis.enpc.fr/~dalalyan/Download/TP_ENPC_4.pdf).

  1. Working session 3: Tubing integrity

    Energy Technology Data Exchange (ETDEWEB)

    Cueto-Felgueroso, C. [Tecnatom, S.A., San Sebastian de los Reyes, Madrid (Spain); Strosnider, J. [NRC, Washington, DC (United States)

    1997-02-01

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group`s discussions on these subjects, including conclusions and recommendations, are summarized in this article.

  2. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  3. Coding labour

    National Research Council Canada - National Science Library

    McCosker, Anthony; Milne, Esther

    2014-01-01

    ... software. Code encompasses the laws that regulate human affairs and the operation of capital, behavioural mores and accepted ways of acting, but it also defines the building blocks of life as DNA...

  4. Working session 1: Tubing degradation

    Energy Technology Data Exchange (ETDEWEB)

    Kharshafdjian, G. [Atomic Energy of Canada, Mississauga, Ontario (Canada); Turluer, G. [IPSN, Fontenay-aux-Roses (France)

    1997-02-01

    A general introductory overview of the purpose of the group and the general subject area of SG tubing degradation was given by the facilitator. The purpose of the session was described as to {open_quotes}develop conclusions and proposals on regulatory and technical needs required to deal with the issues of SG tubing degradation.{close_quotes} Types, locations and characteristics of tubing degradation in steam generators were briefly reviewed. The well-known synergistic effects of materials, environment, and stress and strain/strain rate, subsequently referred to by the acronym {open_quotes}MESS{close_quotes} by some of the group members, were noted. The element of time (i.e., evolution of these variables with time) was emphasized. It was also suggested that the group might want to consider the related topics of inspection capabilities, operational variables, degradation remedies, and validity of test data, and some background information in these areas was provided. The presentation given by Peter Millet during the Plenary Session was reviewed; Specifically, the chemical aspects and the degradation from the secondary side of the steam generator were noted. The main issues discussed during the October 1995 EPRI meeting on secondary side corrosion were reported, and a listing of the potential SG tube degradations was provided and discussed.

  5. Emotion episodes during psychotherapy sessions among women newly diagnosed with gynecological cancers.

    Science.gov (United States)

    Myers Virtue, Shannon; Manne, Sharon L; Darabos, Kathleen; Heckman, Carolyn J; Ozga, Melissa; Kissane, David; Rubin, Stephen; Rosenblum, Norman

    2015-09-01

    The aim of this study was to describe emotion episodes during early and late psychotherapy sessions among women newly diagnosed with gynecological cancer and to examine whether the total number of emotion episodes during early and later sessions was associated with baseline psychological distress, dispositional emotion expressivity, and patient-rated therapeutic progress. The study utilized data from an ongoing study examining the efficacy of two psychotherapy interventions, a coping and communication intervention and a supportive counseling intervention, for women diagnosed with gynecological cancer. Emotion episode coding was completed for the first and sixth psychotherapy sessions for each patient randomized to receive psychotherapy (N = 173). Patients completed baseline survey measures of psychological distress and dispositional emotional expressivity and post-session ratings of therapeutic progress. The average number of emotion episodes was 7.4 in the first session and 5.2 episodes in the sixth session. In both sessions, the majority of emotion episodes contained only negative emotions and focused on a cancer-related topic. A higher number of emotion episodes in the first session was associated with higher psychological distress reported in the baseline survey (p = 0.02). A higher number of emotion episodes in the sixth session was associated with a higher number of emotion episodes in the first session (p psychotherapy among women diagnosed with gynecological cancer. Copyright © 2014 John Wiley & Sons, Ltd.

  6. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  7. Session: Discussion of Research Needs

    Energy Technology Data Exchange (ETDEWEB)

    anon.

    2004-09-01

    This final session at the Wind Energy and Birds/Bats workshop was lead by a facilitator who asked participants for their overall reaction to the research that had been presented during the workshop. Questions addressed by workshop participants included: how do you develop trust and confidence in the research, what are some of the specific gaps in our understanding of wind energy's impact on birds and bats; how do we prioritize and proceed with closing the data/research gaps; how do we connect the dots and bring various research and mapping efforts together; given gaps in the data, what are the critical questions we need to answer to make project decisions now; and, how do we track/influence the policies that will shape wind energy development. Conclusions reached regarding these questions are included in summary form.

  8. Working session 2: Tubing inspection

    Energy Technology Data Exchange (ETDEWEB)

    Guerra, J. [Tecnatom, S.A. San Sebastian de los Reyes, Madrid (Spain); Tapping, R.L. [AECL, Chalk River, Ontario (Canada)

    1997-02-01

    This session was attended by delegates from 10 countries, and four papers were presented. A wide range of issues was tabled for discussion. Realizing that there was limited time available for more detailed discussion, three topics were chosen for the more detailed discussion: circumferential cracking, performance demonstration (to focus on POD and sizing), and limits of methods. Two other subsessions were organized: one dealt with some challenges related to the robustness of current inspection methods, especially with respect to leaving cracked tubes in service, and the other with developing a chart of current NDE technology with recommendations for future development. These three areas are summarized in turn, along with conclusions and/or recommendations. During the discussions there were four presentations. There were two (Canada, Japan) on eddy current probe developments, both of which addressed multiarray probes that would detect a range of flaws, one (Spain) on circumferential crack detection, and one (JRC, Petten) on the recent PISC III results.

  9. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  10. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  11. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  12. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621. Keywords.

  13. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  14. A Video Recall Study of In-session Changes in Sentiment Override.

    Science.gov (United States)

    Johnson, Lee N; Tambling, Rachel B; Anderson, Shayne R

    2015-09-01

    This study examines in-session changes in sentiment override over the first three sessions of couple therapy. Couples viewed a video recording of therapy sessions immediately after each of the first three sessions and continuously rated their level of sentiment override. Ninety-eight changes were randomly chosen for analysis. Three talk turns prior to each change was coded using the Family Relational Communication Control Coding System. Results show that changes in sentiment override occur frequently. Repeated incidents of communication control were related to negative change in sentiment override for females. Repeated incidents of being left out of the conversation were related to negative changes in sentiment override for females and positive changes for males. © 2014 Family Process Institute.

  15. Synchrony in Dyadic Psychotherapy Sessions

    Science.gov (United States)

    Ramseyer, Fabian; Tschacher, Wolfgang

    Synchrony is a multi-faceted concept used in diverse domains such as physics, biology, and the social sciences. This chapter reviews some of the evidence of nonverbal synchrony in human communication, with a main focus on the role of synchrony in the psychotherapeutic setting. Nonverbal synchrony describes coordinated behavior of patient and therapist. Its association with empathy, rapport and the therapeutic relationship has been pointed out repeatedly, yet close evaluation of empirical studies suggests that the evidence remains inconclusive. Particularly in naturalistic studies, research with quantitative measures of synchrony is still lacking. We introduce a new empirical approach for the study of synchrony in psychotherapies under field conditions: Motion Energy Analysis (MEA). This is a video-based algorithm that quantifies the amount of movement in freely definable regions of interest. Our statistical analysis detects synchrony on a global level, irrespective of the specific body parts moving. Synchrony thus defined can be considered as a general measure of movement coordination between interacting individuals. Data from a sequence of N = 21 therapy sessions taken from one psychotherapy dyad shows a high positive relationship between synchrony and the therapeutic bond. Nonverbal synchrony can thus be considered a promising concept for research on the therapeutic alliance. Further areas of application are discussed.

  16. Polar Codes

    Science.gov (United States)

    2014-12-01

    added by the decoder is K/ρ+Td. By the last assumption, Td and Te are both ≤ K/ρ, so the total latency added is between 2K/ρ and 4K /ρ. For example...better resolution near the decision point. Reference [12] showed that in decoding a (1024, 512) polar code, using 6-bit LLRs resulted in per- formance

  17. Content Coding of Psychotherapy Transcripts Using Labeled Topic Models.

    Science.gov (United States)

    Gaut, Garren; Steyvers, Mark; Imel, Zac E; Atkins, David C; Smyth, Padhraic

    2017-03-01

    Psychotherapy represents a broad class of medical interventions received by millions of patients each year. Unlike most medical treatments, its primary mechanisms are linguistic; i.e., the treatment relies directly on a conversation between a patient and provider. However, the evaluation of patient-provider conversation suffers from critical shortcomings, including intensive labor requirements, coder error, nonstandardized coding systems, and inability to scale up to larger data sets. To overcome these shortcomings, psychotherapy analysis needs a reliable and scalable method for summarizing the content of treatment encounters. We used a publicly available psychotherapy corpus from Alexander Street press comprising a large collection of transcripts of patient-provider conversations to compare coding performance for two machine learning methods. We used the labeled latent Dirichlet allocation (L-LDA) model to learn associations between text and codes, to predict codes in psychotherapy sessions, and to localize specific passages of within-session text representative of a session code. We compared the L-LDA model to a baseline lasso regression model using predictive accuracy and model generalizability (measured by calculating the area under the curve (AUC) from the receiver operating characteristic curve). The L-LDA model outperforms the lasso logistic regression model at predicting session-level codes with average AUC scores of 0.79, and 0.70, respectively. For fine-grained level coding, L-LDA and logistic regression are able to identify specific talk-turns representative of symptom codes. However, model performance for talk-turn identification is not yet as reliable as human coders. We conclude that the L-LDA model has the potential to be an objective, scalable method for accurate automated coding of psychotherapy sessions that perform better than comparable discriminative methods at session-level coding and can also predict fine-grained codes.

  18. Convolutional-Code-Specific CRC Code Design

    OpenAIRE

    Lou, Chung-Yu; Daneshrad, Babak; Wesel, Richard D.

    2015-01-01

    Cyclic redundancy check (CRC) codes check if a codeword is correctly received. This paper presents an algorithm to design CRC codes that are optimized for the code-specific error behavior of a specified feedforward convolutional code. The algorithm utilizes two distinct approaches to computing undetected error probability of a CRC code used with a specific convolutional code. The first approach enumerates the error patterns of the convolutional code and tests if each of them is detectable. Th...

  19. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  20. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble...... of concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  1. bilateral single session ureteroscopy for ureteral calculi

    African Journals Online (AJOL)

    Objectives: To determine the feasibility, safety and success rate of bilateral single session rigid retrograde ureteroscopy (URS) for bilateral ureteral calculi. Patients and Methods: Thirty-five patients underwent bilateral single session ureteroscopic calculus removal. Results: Out of 70 renal units in 35 patients treated, ...

  2. Multiparty session types as coherence proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Montesi, Fabrizio

    2017-01-01

    We propose a Curry–Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof nor...

  3. Client Introversion and Counseling Session Impact.

    Science.gov (United States)

    Nocita, Andrew; Stiles, William B.

    1986-01-01

    Examined impact of counseling sessions as a function of clients' personality characteristics. Results indicated introverted clients rated their sessions as uncomfortable, unpleasant, tense, rough, and difficult and rated their postsession mood as relatively unfriendly, uncertain, sad, angry, and afraid. Conversely, extroverted clients rated their…

  4. Therapeutic Alliances Predict Session by Session Drinking Behavior in the Treatment of Alcohol Use Disorders

    Science.gov (United States)

    Connors, Gerard J.; Maisto, Stephen A.; Schlauch, Robert C.; Dearing, Ronda L.; Prince, Mark A.; Duerr, Mark R.

    2016-01-01

    Objective The therapeutic alliance is recognized as an important contributor to treatment outcomes. In this study, the session-to-session interplay of the alliance (as perceived by the patient) and alcohol involvement (drinking days and heavy drinking days between successive treatment sessions) was examined. The analyses also tested the extent to which pretreatment changes in drinking altered these interrelationships. Method Participants (N = 63) seeking treatment for an alcohol use disorder received 12-weeks of CBT for alcohol dependence and completed weekly assessments of the alliance. Results Higher session alliance scores at a given session significantly predicted lower alcohol involvement (both drinking days and heavy drinking days) in the period until the next treatment session, controlling for previous alcohol involvement. This relationship was further moderated by pretreatment change (changes in drinking prior to the first treatment session). Among those who demonstrated low pretreatment change, alliances continued to predict alcohol involvement. In contrast, alliances were not associated with alcohol involvement among those who significantly reduced their drinking prior to the first treatment session (high pretreatment changers). Finally, alcohol involvement during the period preceding a treatment session did not significantly predict alliance ratings. Conclusions These data demonstrate that more positive patient ratings of the alliance at any given treatment session are associated with less alcohol involvement during the period until the next treatment session, most particularly among patients who have not initiated reductions in their drinking prior to the first treatment session. For such patients, efforts to maximize therapeutic alliances may be warranted and productive. PMID:27548032

  5. Session-RPE for quantifying the load of different youth basketball training sessions

    Directory of Open Access Journals (Sweden)

    C Lupo

    2016-12-01

    Full Text Available The aim of the study was to evaluate youth basketball training, verifying the reliability of the session-RPE method in relation to session duration (< and ≥ 80 minutes and workout typology (reduced and high warm-up, conditioning, technical, tactical, game portions within a single session categories. Six male youth basketball players (age, 16.5±0.5 years; height, 195.5±6.75 cm; body mass, 93.9±10.9 kg; and body mass index, 23.6±2.8 kg.m-2 were monitored (HR, type and duration of workouts during 15 (66 individual training sessions (80±26 minutes. Edwards’ HR method was used as a reference measure of internal training load (ITL; the CR-10 RPE scale was administered 30 minutes after the end of each session. The results obtained showed that all comparisons between different session durations and workout portions revealed effects in term of Edwards’ ITLs except for warm-up portions. Moderate to strong relationships between Edwards’ and session- RPE methods emerged for all sessions (r = .85, P < .001, player’s sessions (r range = .79 - .95, P < .001, session durations (< 80 minutes: r = .67, P < .001; ≥ 80 minutes: r = .75, P < .001, and workout portions (r range = .78 - .89, P range = .002 - < .001. The findings indicated that coaches of youth basketball players can successfully use session-RPE to monitor the ITL, regardless of session durations and workout portions.

  6. Session-RPE for quantifying the load of different youth basketball training sessions

    Science.gov (United States)

    Tessitore, A; Gasperi, L; Gomez, MAR

    2016-01-01

    The aim of the study was to evaluate youth basketball training, verifying the reliability of the session-RPE method in relation to session duration (< and ≥ 80 minutes) and workout typology (reduced and high warm-up, conditioning, technical, tactical, game portions within a single session) categories. Six male youth basketball players (age, 16.5±0.5 years; height, 195.5±6.75 cm; body mass, 93.9±10.9 kg; and body mass index, 23.6±2.8 kg.m-2) were monitored (HR, type and duration of workouts) during 15 (66 individual) training sessions (80±26 minutes). Edwards’ HR method was used as a reference measure of internal training load (ITL); the CR-10 RPE scale was administered 30 minutes after the end of each session. The results obtained showed that all comparisons between different session durations and workout portions revealed effects in term of Edwards’ ITLs except for warm-up portions. Moderate to strong relationships between Edwards’ and session- RPE methods emerged for all sessions (r = .85, P < .001), player’s sessions (r range = .79 - .95, P < .001), session durations (< 80 minutes: r = .67, P < .001; ≥ 80 minutes: r = .75, P < .001), and workout portions (r range = .78 - .89, P range = .002 - < .001). The findings indicated that coaches of youth basketball players can successfully use session-RPE to monitor the ITL, regardless of session durations and workout portions. PMID:28416891

  7. Flexible session management in a distributed environment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Zach; /Wisconsin U., Madison; Bradley, Dan; /Wisconsin U., Madison; Tannenbaum, Todd; /Wisconsin U., Madison; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  8. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    uncompromised subset of the participants are still guar- anteed that their interaction will respect sessions. A protocol transfor- mation turns any protocol into a session-respecting protocol. We do this via a general theory of separability. Our main theorem ap- plies to different separability requirements......, and characterizes when we can separate protocol executions sufficiently to meet a particular require- ment. This theorem also gives direct proofs of some old and new protocol composition results. Thus, our theory of separability appears to cover protocol composition and session-like behavior within a uniform frame...

  9. Session-RPE for quantifying the load of different youth basketball training sessions.

    Science.gov (United States)

    Lupo, C; Tessitore, A; Gasperi, L; Gomez, Mar

    2017-03-01

    The aim of the study was to evaluate youth basketball training, verifying the reliability of the session-RPE method in relation to session duration (training sessions (80±26 minutes). Edwards' HR method was used as a reference measure of internal training load (ITL); the CR-10 RPE scale was administered 30 minutes after the end of each session. The results obtained showed that all comparisons between different session durations and workout portions revealed effects in term of Edwards' ITLs except for warm-up portions. Moderate to strong relationships between Edwards' and session- RPE methods emerged for all sessions (r = .85, P < .001), player's sessions (r range = .79 - .95, P < .001), session durations (< 80 minutes: r = .67, P < .001; ≥ 80 minutes: r = .75, P < .001), and workout portions (r range = .78 - .89, P range = .002 - < .001). The findings indicated that coaches of youth basketball players can successfully use session-RPE to monitor the ITL, regardless of session durations and workout portions.

  10. Session 1: strategies to engage pharma

    National Research Council Canada - National Science Library

    Frank, Richard

    2008-01-01

    Presentations Participants in this panel and in the discussion sessions that followed outlined key challenges in satisfying the needs of pharmaceutical companies in molecular imaging, addressing, among other topics...

  11. The anatomy of free paper sessions.

    OpenAIRE

    Tsakraklides, V G; Tsakraklides, E K; Kotsis, L K; Sotiropoulos, S S; Patedakis, G; Grivas, T; Pektasides, E; Lykoudis, S.

    1980-01-01

    The interaction between speakers, audience, and chairmen was studied by 13 investigators during a medical meeting at which 356 free papers were given before a total audience of 2483 in 48 sessions. A protocol was used to score 21 questions relating to the presentation, 15 to the chairman of the session, and nine to the audience. Many speakers made technical faults in presentation and their use of slides. Most chairmen failed to comply with simple rules of procedure and with the expectations o...

  12. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  13. Code Pulse: Software Assurance (SWA) Visual Analytics for Dynamic Analysis of Code

    Science.gov (United States)

    2014-09-01

    mark different execution sessions with recordings. For example, a “ startup ” recording could be created to mark the startup se- quence of the traced...testing processes. It is an OWASP project and has an active network of security professionals to lean on as it slowly cracks out of its R&D cocoon. Code

  14. Affective Processes in Therapy Sessions in relation to adaptive Affect Expression Between Sessions

    OpenAIRE

    Holmboe, Alexander Christian

    2011-01-01

    Preliminary data from the Intensive Mapping of Psychotherapy Process project (PROCMAP) at Modum Bad were used in this study. The aim was to investigate the relationship between affective processes inside therapy and affect expression between sessions. Affect expression outside therapy, also called new learning, is a relatively unexplored concept. Method: Activating affect, inhibitory affect (in session) and new learning (between sessions) were rated using Achievement of Therapeutic Objecti...

  15. Intersections and Unions of Session Types

    Directory of Open Access Journals (Sweden)

    Coşku Acay

    2017-02-01

    Full Text Available Prior work has extended the deep, logical connection between the linear sequent calculus and session-typed message-passing concurrent computation with equi-recursive types and a natural notion of subtyping. In this paper, we extend this further by intersection and union types in order to express multiple behavioral properties of processes in a single type. We prove session fidelity and absence of deadlock and illustrate the expressive power of our system with some simple examples. We observe that we can represent internal and external choice by intersection and union, respectively, which was previously suggested by Padovani for a different language of session types motivated by operational rather than logical concerns.

  16. Instruments for documentation of music therapy sessions

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner

    It is an important part of the clinical music therapy work to document the daily sessions. For the clinician it is necessary to have a brief overview of each session in order to assess the methods and the process, and not least to be able to give clear reports of these issues to other health care...... professionals at staff meetings, conferences, etc. For music therapists with many clients there is not time enough during a working day to provide comprehensive process descriptions in the music therapy log. Therefore instruments that help the clinician in reducing and structuring this information are needed....... Danish and Norwegian music therapist have collaborated on developing a one page sheet with a structured form where they after each music therapy session document their use of methods and techniques in individual music therapy with persons with dementia. With this instrument therapists have easy access...

  17. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show...

  18. Assessing Client Progress Session by Session in the Treatment of Social Anxiety Disorder: The Social Anxiety Session Change Index

    Science.gov (United States)

    Hayes, Sarah A.; Miller, Nathan A.; Hope, Debra A.; Heimberg, Richard G.; Juster, Harlan R.

    2008-01-01

    Frequent assessment during therapy can improve treatments and provide accountability. However, clinicians often do not monitor progress because of the time it takes to administer and score assessments. In response, the Social Anxiety Session Change Index (SASCI) was developed. The SASCI is a short, easily administered rating of subjective…

  19. Summary of Session 2 "Machine Studies"

    CERN Document Server

    Assmann, R W

    2012-01-01

    This document summarizes the talks and discussion that took place in the second session of the Chamonix 2012 workshop concerning results from machine studies performed in 2011. The session consisted of the following presentations: “LHC experience with different bunch spacings” by G. Rumolo; “Observations of beam-beam effects in MDs in 2011” by W. Herr; “Beam-induced heating/ bunch length/RF and lessons for 2012” by E. Metral; “Lessons in beam diagnostics” by R. Jones; “Quench margins” by M. Sapinski; “First demonstration with beam of the Achromatic Telescopic Squeeze (ATS)” by S. Fartoukh.

  20. Efficient Session Type Guided Distributed Interaction

    Science.gov (United States)

    Sivaramakrishnan, K. C.; Nagaraj, Karthik; Ziarek, Lukasz; Eugster, Patrick

    Recently, there has been much interest in multi-party session types (MPSTs) as a means of rigorously specifying protocols for interaction among multiple distributed participants. By capturing distributed interaction as series of typed interactions, MPSTs allow for the static verification of compliance of corresponding distributed object programs. We observe that explicit control flow information manifested by MPST opens intriguing avenues also for performance enhancements. In this paper, we present a session type assisted performance enhancement framework for distributed object interaction in Java. Experimental evaluation within our distributed runtime infrastructure illustrates the costs and benefits of our composable enhancement strategies.

  1. Poster session in instructional technology course

    Science.gov (United States)

    Diniaty, Artina; Fauzi'ah, Lina; Wulan Febriana, Beta; Arlianty, Widinda Normalia

    2017-12-01

    Instructional technology course must be studied by students in order to 1) understand the role of technology in learning, 2) capable of analyzing advantages and disadvantages of using technology in teaching, 3) capable of performing technology in teaching. A poster session in instructional technology course was performed to 1) enhance students' interest in this course and develop students' creativity. The step of this research includes: planning, implementation, and evaluation. The result showed that students' responses towards poster session in instructional technology course were good.

  2. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...... normalisation to executing communications. Our key contribution is generalising duality, from CLL, to a new notion of n-ary compatibility, called coherence. Building on coherence as a principle of compositionality, we generalise the cut rule of CLL to a new rule for composing many processes communicating...

  3. Session-RPE for quantifying load of different youth taekwondo training sessions.

    Science.gov (United States)

    Lupo, Corrado; Capranica, Laura; Cortis, Cristina; Guidotti, Flavia; Bianco, Antonino; Tessitore, Antonio

    2017-03-01

    The session rating of perceived exertion (session-RPE) proved to be a valuable method to quantify the internal training load (ITL) in taekwondo. However, no study validated this method in youth taekwondo athletes performing different training sessions. Thus this study aimed at evaluating the reliability of the session-RPE to monitor the ITL of prepubescent taekwondo athletes during pre-competitive (PC) and competitive (C) training sessions. Five female (age: 12.0±0.7 y; height: 1.54±0.08 m; body mass: 48.8±7.3 kg) and four male (age: 12.0±0.8 yrs; height: 1.55±0.07 m; body mass: 47.3±5.3 kg) taekwondo athletes were monitored during 100 individual sessions (PC: N.=33; C: N.=67). The Edwards' HR method was used as reference measure of ITL; the CR-10 RPE scale was administered at 1- and 30-minutes from the end of each session. No difference for gender emerged. The ITLs of C (Edwards: 228±40 arbitrary units, AU) resulted higher than that of PC (192±26 AU; P=0.04). Although all training typologies and data collections achieved significant correlations between Edwards' and session-RPE methods, a large relationship (r =0.71, Ptraining typologies. However, PC training evaluated at 30 minutes of the recovery phase represents the best condition for a highly reliable ITL perception.

  4. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is propose...... including an outer BCH code correcting a few bit errors.......The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  5. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  6. Generalized concatenated quantum codes

    Science.gov (United States)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng, Bei

    2009-05-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  7. On Duplicate Results in a Search Session

    Science.gov (United States)

    2012-11-01

    Kendall’s tau). Table 9. Shuffling of results in session #47 after applying browsing novelty model. q1 = “ pseudocyesis ” q2 = “ pseudocyesis ...epidemiology” q = “ pseudocyesis history” PITTSHQM.RL1 PITTSHQMnov.RL1 rank docno rank docno rank docno rank change docno 1 enwp01-63-10556 1 enwp01-23-15772

  8. Working session 4: Preventative and corrective measures

    Energy Technology Data Exchange (ETDEWEB)

    Clark, R. [Golder Federal Services Inc., Redmond, WA (United States); Slama, G. [Framatome, Paris (France)

    1997-02-01

    The Preventive and Corrective Measures working session included 13 members from France, Germany, Japan, Spain, Slovenia, and the United States. Attendee experience included regulators, utilities, three steam generator vendors, consultants and researchers. Discussions centered on four principal topics: (1) alternate materials, (2) mechanical mitigation, (3) maintenance, and (4) water chemistry. New or replacement steam generators and original equipment steam generators were separately addressed. Four papers were presented to the session, to provide information and stimulate various discussion topics. Topics discussed and issues raised during the several meeting sessions are provided below, followed by summary conclusions and recommendations on which the group was able to reach a majority consensus. The working session was composed of individuals with diverse experience and varied areas of specialized expertise. The somewhat broad range of topics addressed by the group at times saw discussion participation by only a few individuals. As in any technical meeting where all are allowed the opportunity to speak their mind, straying from an Individual topic was not unusual. Where useful, these stray topics are also presented below within the context In which they occurred. The main categories of discussion were: minimize sludge; new steam generators; maintenance; mechanical mitigation; water chemistry.

  9. Factors Influencing Number of Physiotherapy Treatment Sessions ...

    African Journals Online (AJOL)

    Older male respondents, with higher educational attainment, especially those who are specialized in orthopaedics had fewer treatment sessions with their patients. However, working experience, acquisition of additional training (through continuous professional education) and types of treatment modalities did not have any ...

  10. An Erlang Implementation of Multiparty Session Actors

    Directory of Open Access Journals (Sweden)

    Simon Fowler

    2016-08-01

    Full Text Available By requiring co-ordination to take place using explicit message passing instead of relying on shared memory, actor-based programming languages have been shown to be effective tools for building reliable and fault-tolerant distributed systems. Although naturally communication-centric, communication patterns in actor-based applications remain informally specified, meaning that errors in communication are detected late, if at all. Multiparty session types are a formalism to describe, at a global level, the interactions between multiple communicating entities. This article describes the implementation of a prototype framework for monitoring Erlang/OTP gen_server applications against multiparty session types, showing how previous work on multiparty session actors can be adapted to a purely actor-based language, and how monitor violations and termination of session participants can be reported in line with the Erlang mantra of "let it fail". Finally, the framework is used to implement two case studies: an adaptation of a freely-available DNS server, and a chat server.

  11. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  12. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  13. Coding system of therapeutic focus on action and insight.

    Science.gov (United States)

    Samoilov, A; Goldfried, M R; Shapiro, D A

    2000-06-01

    This study (a) used an established comprehensive process measure to uncover a latent pattern of therapeutic focus in cognitive-behavioral and psychodynamic-interpersonal sessions; (b) used these results to develop the coding system of Therapeutic Focus on Action and Insight, which makes it possible to evaluate therapists' relative emphasis on the Constructing Meaning and Facilitating Action domains of in-session focus; and (c) evaluated its reliability and validity.

  14. Poster Sessions in Marketing Education: An Empirical Examination

    Science.gov (United States)

    Stegemann, Nicole; Sutton-Brady, Catherine

    2009-01-01

    Poster sessions provide a creative and stimulating alternative to traditional assessment methods in marketing. Poster sessions, as a means of assessment, have long been used in science fields. This article presents the successful implementation of poster sessions as a means of assessment in a postgraduate unit of study. Poster sessions in…

  15. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  16. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  17. Algebraic geometric codes

    Science.gov (United States)

    Shahshahani, M.

    1991-01-01

    The performance characteristics are discussed of certain algebraic geometric codes. Algebraic geometric codes have good minimum distance properties. On many channels they outperform other comparable block codes; therefore, one would expect them eventually to replace some of the block codes used in communications systems. It is suggested that it is unlikely that they will become useful substitutes for the Reed-Solomon codes used by the Deep Space Network in the near future. However, they may be applicable to systems where the signal to noise ratio is sufficiently high so that block codes would be more suitable than convolutional or concatenated codes.

  18. Monomial-like codes

    CERN Document Server

    Martinez-Moro, Edgar; Ozbudak, Ferruh; Szabo, Steve

    2010-01-01

    As a generalization of cyclic codes of length p^s over F_{p^a}, we study n-dimensional cyclic codes of length p^{s_1} X ... X p^{s_n} over F_{p^a} generated by a single "monomial". Namely, we study multi-variable cyclic codes of the form in F_{p^a}[x_1...x_n] / . We call such codes monomial-like codes. We show that these codes arise from the product of certain single variable codes and we determine their minimum Hamming distance. We determine the dual of monomial-like codes yielding a parity check matrix. We also present an alternative way of constructing a parity check matrix using the Hasse derivative. We study the weight hierarchy of certain monomial like codes. We simplify an expression that gives us the weight hierarchy of these codes.

  19. Parameterized Concurrent Multi-Party Session Types

    Directory of Open Access Journals (Sweden)

    Minas Charalambides

    2012-08-01

    Full Text Available Session types have been proposed as a means of statically verifying implementations of communication protocols. Although prior work has been successful in verifying some classes of protocols, it does not cope well with parameterized, multi-actor scenarios with inherent asynchrony. For example, the sliding window protocol is inexpressible in previously proposed session type systems. This paper describes System-A, a new typing language which overcomes many of the expressiveness limitations of prior work. System-A explicitly supports asynchrony and parallelism, as well as multiple forms of parameterization. We define System-A and show how it can be used for the static verification of a large class of asynchronous communication protocols.

  20. The anatomy of free paper sessions.

    Science.gov (United States)

    Tsakraklides, V G; Tsakraklides, E K; Kotsis, L K; Sotiropoulos, S S; Patedakis, G; Grivas, T; Pektasides, E; Lykoudis, S

    1980-11-01

    The interaction between speakers, audience, and chairmen was studied by 13 investigators during a medical meeting at which 356 free papers were given before a total audience of 2483 in 48 sessions. A protocol was used to score 21 questions relating to the presentation, 15 to the chairman of the session, and nine to the audience. Many speakers made technical faults in presentation and their use of slides. Most chairmen failed to comply with simple rules of procedure and with the expectations of speakers and audience. The interest of the audience was affected by the performance of speakers and chairman. Speakers should pay more attention to the technique of presentation, and organising committees of medical meetings should provide instructions to both speakers and chairmen.

  1. One-session treatment for specific phobias.

    Science.gov (United States)

    Ost, L G

    1989-01-01

    A rapid and effective treatment for specific phobias, in which the treatment is done in one single session, is described in detail. The treatment method consists of a combination of exposure in vivo and modeling. The short- and long-term outcome for a consecutive series of 20 patients are reported. Mean treatment time was 2.1 h and at follow-up after an average of 4 yr 90% were much improved or completely recovered.

  2. Robust and Scalable DTLS Session Establishment

    OpenAIRE

    Tiloca, Marco; Gehrmann, Christian; Seitz, Ludwig

    2016-01-01

    The Datagram Transport Layer Security (DTLS) protocol is highly vulnerable to a form of denial-of-service attack (DoS), aimed at establishing a high number of invalid, half-open, secure sessions. Moreover, even when the efficient pre-shared key provisioning mode is considered, the key storage on the server side scales poorly with the number of clients. SICS Swedish ICT has designed a security architecture that efficiently addresses both issues without breaking the current standard.

  3. Foundations of Session Types and Behavioural Contracts

    DEFF Research Database (Denmark)

    Huttel, Hans; Lanese, Ivan; Vasconcelos, Vasco

    2016-01-01

    Behavioural type systems, usually associated to concurrent or distributed computations, encompass concepts such as interfaces, communication protocols, and contracts, in addition to the traditional input/output operations. The behavioural type of a software component specifies its expected patterns...... of interaction using expressive type languages, so types can be used to determine automatically whether the component interacts correctly with other components. Two related important notions of behavioural types are those of session types and behavioural contracts. This article surveys the main accomplishments...

  4. Summary of the Hadronic Weak Interaction session

    Science.gov (United States)

    Bock, G.; Bryman, D. A.; Numao, T.

    1993-07-01

    We summarize and discuss present and future experiments on decays of light mesons and muons that were presented in the Hadronic Weak Interaction working group session of the Workshop on Future Directions in Particle and Nuclear Physics at Multi-GeV Hadron Facilities. Precise measurements and rare-decay searches, which sense mass scales in the 1-1000 TeV region, are discussed in the context of the standard model and beyond.

  5. Summary of the Hadronic Weak Interaction session

    Energy Technology Data Exchange (ETDEWEB)

    Bock, G. [Fermi National Accelerator Lab., Batavia, IL (United States); Bryman, D.A.; Numao, T. [British Columbia Univ., Vancouver, BC (Canada). TRIUMF Facility

    1993-07-01

    We summarize and discuss present and future experiments on decays of light mesons and muons that were presented in the Hadronic Weak Interaction working group session of the ``Workshop on Future Directions in Particle and Nuclear Physics at Multi-GeV Hadron Facilities.`` Precise measurements and rare-decay searches, which sense mass scales in the 1--1000 TeV region, are discussed in the context of the standard model and beyond.

  6. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  7. Using facilitators in mock codes: recasting the parts for success.

    Science.gov (United States)

    Cuda, S; Doerr, D; Gonzalez, M

    1999-01-01

    Members of the CHRISTUS Santa Rosa Children's Hospital staff development committee identified a need for a mock code program which would address a range of learning needs for nurses and other caregivers with varying levels of knowledge, skills, and experience. We implemented a mock code program using experienced caregivers, usually emergency room and pediatric intensive care RNs and respiratory therapists to serve as facilitators to code participants during the mock code drills. Facilitators have dual roles of teaching and guiding the code participant as well as evaluating performance. Code participants and facilitators benefit from the design of this program. Debriefing session input and written program evaluations show that code participants value the opportunity to practice their skills in a nonthreatening situation in which they receive immediate feedback as needed. Facilitators learn to teach and coach and strengthen their own code knowledge and skills at the same time. This mock code program serves as a unique way to include novice and experienced nurses in mock codes together. The knowledge, skills, and confidence of the code participants and the facilitators have matured. The design of the program allows for immediate teaching/learning where needed, as well as appropriate evaluation. This program develops stronger, calmer, more efficient, and more confident nurses during codes. Practice and equipment changes can be based on findings from the mock codes. The program is invaluable to patients, staff, and hospital.

  8. Comparing Deadlock-Free Session Typed Processes

    Directory of Open Access Journals (Sweden)

    Ornela Dardha

    2015-08-01

    Full Text Available Besides respecting prescribed protocols, communication-centric systems should never "get stuck". This requirement has been expressed by liveness properties such as progress or (deadlock freedom. Several typing disciplines that ensure these properties for mobile processes have been proposed. Unfortunately, very little is known about the precise relationship between these disciplines—and the classes of typed processes they induce. In this paper, we compare L and K, two classes of deadlock-free, session typed concurrent processes. The class L stands out for its canonicity: it results naturally from interpretations of linear logic propositions as session types. The class K, obtained by encoding session types into Kobayashi's usage types, includes processes not typable in other type systems. We show that L is strictly included in K. We also identify the precise condition under which L and K coincide. One key observation is that the degree of sharing between parallel processes determines a new expressiveness hierarchy for typed processes. We also provide a type-preserving rewriting procedure of processes in K into processes in L. This procedure suggests that, while effective, the degree of sharing is a rather subtle criteria for distinguishing typed processes.

  9. Safety Training: scheduled sessions in April

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in April. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 26-APR-11 (08.30 – 10.00) in French 26-APR-11 (10.30 – 12.00) in French Conduite de plates-formes élévatrices mobiles de personnel (PEMP) 28-APR-11 to 29-APR-11 (08.00 – 17.30) in French* Sécurité chimique – Introduction 29-APR-11 (09.00 – 11.30) in French (*) session in French with the possibility of receiving the documentation in English   By Isabelle Cusato (H...

  10. Ideas for Advancing Code Sharing: A Different Kind of Hack Day

    Science.gov (United States)

    Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.

    2014-05-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  11. Ideas for Advancing Code Sharing (A Different Kind of Hack Day)

    OpenAIRE

    Teuben, Peter; Allen, Alice; Berriman, Bruce; DuPrie, Kimberly; Hanisch, Robert J.; Mink, Jessica; Nemiroff, Robert; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Wallin, John

    2013-01-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and calibration? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainsto...

  12. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately.

  13. Coding gaze tracking data with chromatic gradients for VR Exposure Therapy

    DEFF Research Database (Denmark)

    Herbelin, Bruno; Grillon, Helena; De Heras Ciechomski, Pablo

    2007-01-01

    This article presents a simple and intuitive way to represent the eye-tracking data gathered during immersive virtual reality exposure therapy sessions. Eye-tracking technology is used to observe gaze movements during vir- tual reality sessions and the gaze-map chromatic gradient coding allows...

  14. How Do Therapists Ally with Adolescents in Family Therapy? An Examination of Relational Control Communication in Early Sessions

    Science.gov (United States)

    de la Pena, Cristina Muniz; Friedlander, Myrna L.; Escudero, Valentin; Heatherington, Laurie

    2012-01-01

    Sequential analyses examined associations between the working alliance and therapist-adolescent communication patterns in 10 Spanish cases of brief conjoint family therapy. Early sessions with strong versus problematic alliances, rated by observers, were selected for coding of relational control communication patterns. No differences were found in…

  15. Summary of Session 4 "Beam Energy"

    CERN Document Server

    Siemko, A

    2011-01-01

    In this session, the possible scenarios for the beam energy in the LHC 2011 run were discussed. The benefits for the physics reach for physics operations at s larger than 7 TeV were reviewed. The main goal was, however, to establish the necessary information for a sound risk analysis by assessing the probability of thermal runaway and evaluating the consequences of a hypothetical incident. A new technique to improve the knowledge of joint resistances of the cooper busbars and therefore the reliability of the risk analysis has also been discussed.

  16. Parallel Monitors for Self-adaptive Sessions

    Directory of Open Access Journals (Sweden)

    Mario Coppo

    2016-06-01

    Full Text Available The paper presents a data-driven model of self-adaptivity for multiparty sessions. System choreography is prescribed by a global type. Participants are incarnated by processes associated with monitors, which control their behaviour. Each participant can access and modify a set of global data, which are able to trigger adaptations in the presence of critical changes of values. The use of the parallel composition for building global types, monitors and processes enables a significant degree of flexibility: an adaptation step can dynamically reconfigure a set of participants only, without altering the remaining participants, even if the two groups communicate.

  17. Department of Energy PEIS scoping session

    Energy Technology Data Exchange (ETDEWEB)

    Badar, L

    1992-12-10

    This is the second programmatic environmental impact statement scoping session held in Durango, Colorado. The purpose was: to present the ground water program so as to build some familiarity and understanding about the issue involved; and to get Durango community's input. Scoping is the collection of information and getting everyone involved and really making a team out of coming up with a proposed action. This report contains the presentations made by the project manager for the Uranium Mill Tailings (UMTRA) program, site manager for the Durango UMTRA site, manager of ground water hydrology, and include comments made by local residents.

  18. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  19. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  20. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  1. Session 3: PICs and upgrade scenario 1

    CERN Document Server

    Meddahi, M

    2014-01-01

    This document summarizes the talks and discussion which took place in the third session of the RLIUP Review. The session was devoted to Performance Improving Consolidation (thereafter PICs) and Upgrade scenario 1. The PICs were defined as the “Replacement or upgrade of a system justified by consolidation but with the goal of improving performance”. The PICs scenario goals were further defined as accumulating 70 fb-1 integrated luminosity per year over a period a 10 years of operation, reaching 1000 fb-1 (starting with an initial integrated luminosity of 300 fb-1). An ‘Upgrade’ was defined as the ‘Replacement or addition of a system to improve the performance, which would otherwise not be necessary’. The Upgrade scenario 1 goals were defined as accumulating 170 fb-1 integrated luminosity per year over a period a 10 years of operation, reaching 2000 fb-1 (starting with an initial integrated luminosity of 300 fb-1). This scenario assumed no crab cavity, no levelling, and a crossing angle adjusted for...

  2. Developing assessment: involving the sessional clinical teacher.

    Science.gov (United States)

    Bateman, H; Thomason, J M; McCracken, G; Ellis, J

    2016-02-12

    Assessment development is a fundamental element of curriculum management and a requirement for providers of education to consistently demonstrate attainment of educational standards. Development of authentic, valid and reliable assessment is, however, both challenging and resource intensive. In the UK, dental education standards are regulated by the General Dental Council (GDC). The 'safe beginner' is the threshold determined by the GDC for the passing student - but how do we apply this? This article describes an approach the School of Dental Sciences at Newcastle University has adopted to address the challenges associated with developing assessments. Sessional clinical teachers contribute a significant proportion of the clinical supervision within the BDS programme and also have a good appreciation of both the standard and concept of the 'safe beginner'. By implementing a process of active timetable management, we have identified time where this group could contribute to assessment development. We believe that aspects, which could be enhanced by their involvement, include writing, validation, standard-setting and utilisation of assessment. To achieve this, we recognise a requirement for investment in careful manpower planning and training, but consider that it is realistic and beneficial to include sessional clinical teachers in this essential part of learning and teaching.

  3. Safety Training: scheduled sessions in March

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 08-MAR-11 (08.30 – 10.00) in English 08-MAR-11 (10.30 – 12.00) in French 15-MAR-11 (08.30 – 10.00) in French 15-MAR-11 (10.30 – 12.00) in French 17-MAR-11 (08.30 – 10.00) in English 17-MAR-11 (10.30 – 12.00) in English 22-MAR-11 (08.30 – 10.00) in French 22-MAR-11 (10.30 – 12.00) in French 24-MAR-11 (08.30 – 10.00) in French 24-MAR-11 (10.30 – 12.00) in French 29-MAR...

  4. Safety Training: scheduled sessions in May

    CERN Multimedia

    Isabelle Cusato (HSE Unit)

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year.   Biocell Training 10-MAY-11 (08.30 – 10.00) in French 10-MAY-11 (10.30 – 12.00) in French 12-MAY-11 (08.30 – 10.00) in English 12-MAY-11 (10.30 – 12.00) in English 19-MAY-11 (08.30 – 10.00) in French 19-MAY-11 (10.30 – 12.00) in French 24-MAY-11 (08.30 – 10.00) in English 24-MAY-11 (10.30 – 12.00) in English   Champs Magnétiques 13-MAY-11 (09.30 – 11.30) in French...

  5. Aspen Global Change Institute Summer Science Sessions

    Energy Technology Data Exchange (ETDEWEB)

    Katzenberger, John; Kaye, Jack A

    2006-10-01

    The Aspen Global Change Institute (AGCI) successfully organized and convened six interdisciplinary meetings over the course of award NNG04GA21G. The topics of the meetings were consistent with a range of issues, goals and objectives as described within the NASA Earth Science Enterprise Strategic Plan and more broadly by the US Global Change Research Program/Our Changing Planet, the more recent Climate Change Program Strategic Plan and the NSF Pathways report. The meetings were chaired by two or more leaders from within the disciplinary focus of each session. 222 scholars for a total of 1097 participants-days were convened under the auspices of this award. The overall goal of each AGCI session is to further the understanding of Earth system science and global environmental change through interdisciplinary dialog. The format and structure of the meetings allows for presentation by each participant, in-depth discussion by the whole group, and smaller working group and synthesis activities. The size of the group is important in terms of the group dynamics and interaction, and the ability for each participant's work to be adequately presented and discussed within the duration of the meeting, while still allowing time for synthesis

  6. Implementing and evaluating reflective practice group sessions.

    Science.gov (United States)

    McGrath, Deidre; Higgins, Agnes

    2006-05-01

    The rapidly changing and developing arenas of biological and medical technology, coupled with a myriad of social concerns and issues affecting individual, family and societal health, necessitates that nursing practitioners engage themselves fully with patients in the pursuit of health and healing. The above factors have not only served as catalysts in the development of educational curricula in general but also nursing curricula. Reflection in these curricula is often considered an appropriate vehicle for the analysis of nursing practice, fostering not only an understanding of nurse's work but also the development of critically thoughtful approaches essential for providing nursing care in complex environments [Duke, S., Appleton, J., 2000. The use of reflection in a palliative care programme: a qualitative study of the development of reflective skills over an academic year. J. Adv. Nurs. 32 (6), 1557-1568]. Consequently, nurse educators are being called upon to develop nurses who are reflective practitioners. The focus of this paper is on an exploration of issues that arose from the implementation of reflective sessions with a group of qualified nurses undertaking a diploma in nursing. This paper addresses the challenges experienced in the introduction of reflection as a teaching method. Recommendations for other lecturers when using this approach are also provided. It is anticipated this paper will provide practical advice and guidance for educators who wish to use reflective sessions to enhance the educational experience of their nursing students.

  7. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  8. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  9. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  10. Music Education and Music Therapy. Introduction to Plenary Session 3

    DEFF Research Database (Denmark)

    Bonde, Lars Ole

    2002-01-01

    Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics......Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics...

  11. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  12. 78 FR 45494 - Plant Breeding Listening Session meeting

    Science.gov (United States)

    2013-07-29

    ...; ] DEPARTMENT OF AGRICULTURE Plant Breeding Listening Session meeting ACTION: Notice of a Plant Breeding Listening Session Meeting. SUMMARY: The Office of the Chief Scientist of the United States Department of Agriculture (USDA) announces a Plant Breeding Listening Session stakeholder meeting for all interested plant...

  13. 78 FR 44922 - Notice of an Education Listening Session Meeting

    Science.gov (United States)

    2013-07-25

    ...; ] DEPARTMENT OF AGRICULTURE Notice of an Education Listening Session Meeting SUMMARY: The Education... an Education Listening Session stakeholder meeting for all interested agricultural education stakeholders. DATES: The Education Listening Session will be held August 1, 2013. The public may file written...

  14. Bringing golf into sport psychology sessions through technology ...

    African Journals Online (AJOL)

    Bringing golf into sport psychology sessions through technology (video footage) ... sessions through technology (video footage). L Human, D Kriek, T Bezuidenhout ... psychology sessions informed by narrative practice with the six golfers respectively, during which the identified material from Stage 2 was discussed. During ...

  15. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  16. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  17. 76 FR 33305 - Medicare Program; Accelerated Development Sessions for Accountable Care Organizations-June 20, 21...

    Science.gov (United States)

    2011-06-08

    ... following: Incorrectly referenced the learning sessions as accelerated development sessions (ADSs) instead of accelerated development learning sessions (ADLSs). Made inadvertent errors in our description of... ``Accelerated Development Sessions'' is corrected to read ``Accelerated Development Learning Sessions''. (2) In...

  18. Session: Pre-development project risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Curry, Richard; Linehan, Andy

    2004-09-01

    This second session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question and answer period. The focus of the presentations was on the practices and methodologies used in the wind energy industry for assessing risk to birds and bats at candidate project sites. Presenters offered examples of pre-development siting evaluation requirements set by certain states. Presentation one was titled ''Practices and Methodologies and Initial Screening Tools'' by Richard Curry of Curry and Kerlinger, LLC. Presentation two was titled ''State of the Industry in the Pacific Northwest'' by Andy Linehan, CH2MHILL.

  19. Precise subtyping for synchronous multiparty sessions

    Directory of Open Access Journals (Sweden)

    Mariangiola Dezani-Ciancaglini

    2016-02-01

    Full Text Available The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with respect to type safety, i.e. the safe replacement of a term of a smaller type when a term of a bigger type is expected. The latter preciseness is based on the denotation of a type which is a mathematical object that describes the meaning of the type in accordance with the denotations of other expressions from the language. The result of this paper is the operational and denotational preciseness of the subtyping for a synchronous multiparty session calculus. The novelty of this paper is the introduction of characteristic global types to prove the operational completeness.

  20. Meeting report VLPNPV: Session 3: Immune responses.

    Science.gov (United States)

    Morrison, Trudy G

    2014-01-01

    Virus-like particles (VLPs) and nano-particles (NP) are increasingly considered for both prophylactic and therapeutic vaccines for a wide variety of human and animal diseases. Indeed, 2 VLPs have already been licensed for use in humans, the human papilloma virus vaccine and the hepatitis B virus vaccine. (1) Reflecting this increased interest, a second international conference with a specific focus on VLPs and NP was held at the Salk Institute for Biological Studies in La Jolla, California, in June 2014. Approximately 100 attendees, hailing from many nations, came from academic institutions, research institutes, and biotech companies. A wide variety of topics were discussed, ranging from development and characterization of specific VLP and NP vaccine candidates to methods of production of these particles. Session three was focused on the general question of immune responses to VLPs.

  1. Ecole de Physique des Houches: session 96

    CERN Document Server

    Huard, Benjamin; Schoelkopf, Robert; Cugliandolo, Leticia F; Quantum Machines : Measurement and Control of Engineered Quantum Systems

    2014-01-01

    This book gathers the lecture notes of courses given at the 2011 summer school in theoretical physics in Les Houches, France, Session XCVI. What is a quantum machine? Can we say that lasers and transistors are quantum machines? After all, physicists advertise these devices as the two main spin-offs of the understanding of quantum mechanical phenomena. However, while quantum mechanics must be used to predict the wavelength of a laser and the operation voltage of a transistor, it does not intervene at the level of the signals processed by these systems. Signals involve macroscopic collective variables like voltages and currents in a circuit or the amplitude of the oscillating electric field in an electromagnetic cavity resonator. In a true quantum machine, the signal collective variables, which both inform the outside on the state of the machine and receive controlling instructions, must themselves be treated as quantum operators, just as the position of the electron in a hydrogen atom. Quantum superconducting...

  2. Session: Program Review X Wrap-Up

    Energy Technology Data Exchange (ETDEWEB)

    None

    1992-01-01

    This wrap-up session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of Closing Remarks by Roland R. Kessler and six NGA Industry Critique Panel presentations: ''Summary of Comments on DOE-Industry Cooperation by Geothermal Industry Panel'' by James B. Koenig, GeothermEx, Inc.; ''NGA Industry Critique of the Exploration Component'' by Joe L. Iovenitti, Weiss Associates; ''Critique of Drilling Research'' by Jerry Hamblin, UNOCAL Geothermal; ''Critique Panel Comments on Reservoir Engineering, DOE Geothermal Technology Development'' by Dennis Kaspereit, California Energy Company, Inc.; ''DOE Geothermal Program Review - Critique on Production'' by Douglas B. Jung, Two-Phase Engineering and Research; ''Comments on the DOE Hydrothermal Energy Conversion R&D Program'' by David L. Mendive, Geothermal Development Associates.

  3. AAS Special Session: Policy Making in Astronomy

    Science.gov (United States)

    Cardelli, J. A.; Massa, D.

    1995-12-01

    The professional astronomical community today is more diverse than at any time in its history. Individuals participating in creative research programs can be found in a wide range of positions. This type of diversity, which mixes research, education, and service (e.g. contract) work, represents the strength of contemporary astronomy. While recognizing the unavoidable reductions in funding and restructuring of organizations like NASA, it is imperative that the significance of the current diversity be considered during these processes. Creative ideas are one of the cornerstones of quality research, and they can originate anywhere. Consequently, it is essential that adequate research resources remain available for free and open competition by all astronomers. Our goal in this session is to bring together officials from the AAS, NASA, and the NSF to discuss how the policy and decision making process operates and whether it should be changed to better serve the general needs of the professional astronomical community. Examples of the issues we believe are important include: In establishing new policy, how can the needs of the average research astronomer be better addressed? How could input from such astronomers be provided to those who craft NASA/NSF policy? How can/should the AAS serve as an interface between policy/decision making bodies and its membership? Should the AAS membership become more actively/effectively involved in the decision making process and, if so, how? More information on this session and related issues can be found at the Association of Research Astronomers Home Page: http://www.phy.vill.edu/astro/faculty/ara/ara_home.htm

  4. Significant Others in Substance Abusers' Change Talk During Motivational Interviewing Sessions in the Finnish Probation Service

    Directory of Open Access Journals (Sweden)

    Sarpavaara Harri

    2015-03-01

    Full Text Available AIMS - This article explores the meanings substance-abusing clients attach to family and friendships during motivational interviewing (MI sessions in Probation Service. DATA - The analyses are based on videotaped and transcribed data consisting of 82 MI sessions. This database involves the first two counseling sessions of 41 client-counselor pairs. Sessions were videotaped in 12 Probation Service offices in Finland between 2007 and 2009. METHODS - The analysis relies on coding of client's change talk utterances and qualitative semiotic framework. RESULTS - The meanings of the significant others were diverse from the point of view of the client's motivation: family appeared as a support for change, an aspiration, a sufferer, or an obstacle to change; and friendship appeared as an obstacle to change, a surmounted obstacle, a cause to change, or a support to change. CONCLUSIONS - Significant others and their quality are important and diverse factors that promote or hinder change in substance abuser' change talk. Thus, it is suggested that the meaning of significant others should not be overlooked in MI and other substance abuse treatment.

  5. Flipped versus Traditional Classroom Information Literacy Sessions: Student Perceptions and Cognitions

    Directory of Open Access Journals (Sweden)

    Torstein Låg

    2016-12-01

    Full Text Available Teaching effectively with limited classroom time is a challenge for information literacy teachers. In the flipped classroom (FC teaching model, information transmission teaching is delivered outside of class, freeing up class time for learning activities. I adopted the FC model in sessions that were previously taught using a traditional classroom (TC model. The aim of this paper is to evaluate the FC model's relative impact on (1 student perceptions of usefulness and quality, and (2 student cognitions about the IL sessions. Responses to evaluation forms from the TC model (N = 65, were compared to those from FC model (N = 78. Students judged usefulness and quality on two 4-point rating scales. Student cognitions were elicited with an open-ended question asking for suggestions for improvement and other comments. Responses to the latter were coded by an assistant blind to the conditions. Ratings were near ceiling and similar for both conditions. Responses to the open-ended question revealed interesting trends. Students in the FC condition provided wordier comments, were more concerned with what they themselves did and could do, and with the subject matter of the session. Students in the TC condition were more concerned with how information was presented to them. Results indicate that the FC teaching model is a viable alternative for IL sessions, and that it may encourage students to engage more with IL and their own learning process.

  6. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  7. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  8. Overview of Code Verification

    Science.gov (United States)

    1983-01-01

    The verified code for the SIFT Executive is not the code that executes on the SIFT system as delivered. The running versions of the SIFT Executive contain optimizations and special code relating to the messy interface to the hardware broadcast interface and to packing of data to conserve space in the store of the BDX930 processors. The running code was in fact developed prior to and without consideration of any mechanical verification. This was regarded as necessary experimentation with the SIFT hardware and special purpose Pascal compiler. The Pascal code sections cover: the selection of a schedule from the global executive broadcast, scheduling, dispatching, three way voting, and error reporting actions of the SIFT Executive. Not included in these sections of Pascal code are: the global executive, five way voting, clock synchronization, interactive consistency, low level broadcasting, and program loading, initialization, and schedule construction.

  9. Session-based Choreography with Exceptions

    DEFF Research Database (Denmark)

    Carbone, Marco

    2009-01-01

    Choreography has recently emerged as a pragmatic and concise way of describing communication-based systems such as web services and financial protocols. Recent studies have investigated the transition from the design stage of a system to its implementation providing an automatic way of mapping...... a choreograhy into executable code. In this work, we focus on an extension of choreography with a communication-based (interactional) exception mechanism by giving its formal semantics. In particular, we discuss through some examples how interactional exceptions at choreography level can be implemented into end...

  10. Phonological coding during reading

    Science.gov (United States)

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  11. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  12. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-05-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  13. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  14. Decoding of Cyclic Codes,

    Science.gov (United States)

    INFORMATION THEORY, *DECODING), (* DATA TRANSMISSION SYSTEMS , DECODING), STATISTICAL ANALYSIS, STOCHASTIC PROCESSES, CODING, WHITE NOISE, NUMBER THEORY, CORRECTIONS, BINARY ARITHMETIC, SHIFT REGISTERS, CONTROL SYSTEMS, USSR

  15. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  16. Diameter Perfect Lee Codes

    CERN Document Server

    Horak, Peter

    2011-01-01

    Lee codes have been intensively studied for more than 40 years. Interest in these codes has been triggered by the Golomb-Welch conjecture on the existence of perfect error-correcting Lee codes. In this paper we deal with the existence and enumeration of diameter perfect Lee codes. As main results we determine all q for which there exists a linear diameter-4 perfect Lee code of word length n over Z_{q}, and prove that for each n\\geq3 there are unaccountably many diameter-4 perfect Lee codes of word length n over Z. This is in a strict contrast with perfect error-correcting Lee codes of word length n over Z as there is a unique such code for n=3, and its is conjectured that this is always the case when 2n+1 is a prime. Diameter perfect Lee codes will be constructed by an algebraic construction that is based on a group homomorphism. This will allow us to design an efficient algorithm for their decoding.

  17. Expander chunked codes

    Science.gov (United States)

    Tang, Bin; Yang, Shenghao; Ye, Baoliu; Yin, Yitong; Lu, Sanglu

    2015-12-01

    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance, where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 % of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.

  18. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  19. On {\\sigma}-LCD codes

    OpenAIRE

    Carlet, Claude; Mesnager, Sihem; Tang, Chunming; Qi, Yanfeng

    2017-01-01

    Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with $\\sigma$ complementary dual ($\\sigma$-LCD), which includes known Euclidean LCD codes, Hermitian LCD codes, and Galois LCD codes. As Euclidean LCD codes, $\\sigma$-LCD ...

  20. The Shock and Vibration Bulletin. Part 2. Opening Session, Panel Sessions, Seismic, Special Problems

    Science.gov (United States)

    1975-06-01

    MULTIDIRECTIONAL MOBILITY DATA FOR BEAMS D. J. Ewins, Imperial College of Science and Technology. London. England and P. T. Gleeson , Moddlesex Polytechnic...iaaMMIiiBiMMiti iiirn’iirMiiiiiiiiiii’iiiiiiir ManriHMMiüaHiiMdttiiMHIi r ■■ ■ IM ADDRESS OF WELCOME George Peterson Director Air Force Material...8217- ■——^ TEST OR ANALYZE A Fanel Session Moderator: George Amir Puielists: Harold If. Forkois. Naval Research Laboratory LB. Irving, Johns Hopkins

  1. Bone Therapeutics: Safety Considerations, Session Summary.

    Science.gov (United States)

    Jerome, Christopher P; Boyce, Rogely

    2017-10-01

    This session was a series of presentations focused on safety considerations for late stage or currently marketed bone therapeutic agents. The first presentation was an overview of a major regulatory requirement in the nonclinical filing package for bone therapeutics, studies designed to assess the impact of an agent on bone quality. Two presentations focused on safety issues associated with drugs whose primary mechanism of action is inhibition of bone resorption. Typical findings associated with this class of agents in general and reproductive toxicology studies were reviewed, highlighting INHAND (International Harmonization of Nomenclature and Diagnostic Criteria) nomenclature. This was followed by an overview of safety issues that have been identified largely through clinical experience. Similar presentations followed emphasizing safety and regulatory issues associated with classes of drugs whose primary mechanism of action is stimulation of bone formation known broadly as bone anabolic agents. The major focus of these discussions was carcinogenicity risk assessment. The final presentation was an introduction to a rapidly evolving area in bone therapeutics, treatment of rare genetic bone diseases, and the developmental challenges associated with these indications and novel therapeutic modalities.

  2. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  3. Error Correcting Codes

    Indian Academy of Sciences (India)

    be fixed to define codes over such domains). New decoding schemes that take advantage of such connections can be devised. These may soon show up in a technique called code division multiple access (CDMA) which is proposed as a basis for digital cellular communication. CDMA provides a facility for many users to ...

  4. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  5. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March 1997 pp 33-47. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/002/03/0033-0047 ...

  6. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, Albert; Katoen, Joost P.; Westra, Ymte; Alblas, H.; Gyimóthy, Tibor

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived

  7. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  8. Informal control code logic

    NARCIS (Netherlands)

    Bergstra, J.A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical

  9. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  10. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alexandre

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  11. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 1. Error Correcting Codes The Hamming Codes. Priti Shankar. Series Article Volume 2 Issue 1 January ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  12. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  13. Quantum Synchronizable Codes From Quadratic Residue Codes and Their Supercodes

    OpenAIRE

    Xie, Yixuan; Yuan, Jinhong; Fujiwara, Yuichiro

    2014-01-01

    Quantum synchronizable codes are quantum error-correcting codes designed to correct the effects of both quantum noise and block synchronization errors. While it is known that quantum synchronizable codes can be constructed from cyclic codes that satisfy special properties, only a few classes of cyclic codes have been proved to give promising quantum synchronizable codes. In this paper, using quadratic residue codes and their supercodes, we give a simple construction for quantum synchronizable...

  14. CBiOS Science Sessions - 2013

    Directory of Open Access Journals (Sweden)

    Nelson Alexandre Rodrigues Tavares

    2013-06-01

    Full Text Available CBiOS Science Sessions - 2013 - Nutrition: pregnancy counselling website (http://nutricao.ulusofona.pt Nutrição: website de aconselhamento durante a gravidez, Nelson Alexandre Rodrigues Tavares; Relationship between daily water intake and skin physiology, Impacto Cutâneo do consumo dietário de água, Maria Lídia Laginha Mestre Guerreiro da Palma; Development of different types of nanosystems: polymeric, lipid-based and metallic nanoparticles. Desenvolvimento de diferentes tipos de nanosistemas: poliméricos, lipid-based e de nanoparticulas metálicas, Catarina Silva, Patrícia Rijo, Catarina Reis; Interaction between propofol and HES 130/0.4: Chemical, physiological and toxicological. Interação entre Propofol e HES 130/0.4: Química, Fisiológica e Toxicológica, Aura Silva, Ana Ortiz, Carlos Venâncio, Rui Silva, Joaquim Mendes, Paula Guedes, Helena Vala, David Ferreira; Study the potential applicability of the by-products of the Prunus cerasus in promoting health and skin care. Estudo da aplicabilidade dos sub-produtos de Prunus cerasus na promoção de saúde cutânea, Elisabete Maurício, Catarina Rosado, Diaz Diaz Lanza; Cell migration and adhesion - impact of ROS in tumour metastasis Migração celular e adesão - impacto de ROS na metástase tumural, Nuno Saraiva; Bioactive and Non-Conventional Photoprotection Fotoproteção Bioactiva e Não-Convencional, André Rolim Baby.

  15. Summary Of Session 5: How Should We Handle Safety?

    Energy Technology Data Exchange (ETDEWEB)

    Albert, M.; Roy, G

    2001-07-01

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  16. Application Layer Multipoint Extension for the Session Initiation Protocol

    OpenAIRE

    Thorp, Brian J

    2005-01-01

    The Session Initiation Protocol (SIP) was first published in 1999, by the Internet Engineering Task Force (IETF), to be the standard for multimedia transfers. SIP is a peer-to-peer signaling protocol that is capable of initiating, modifying, and terminating media sessions. SIP utilizes existing Internet Protocols (IP) such as Domain Name Service (DNS) and the Session Description Protocol (SDP), allowing it to seamlessly integrate into existing IP networks. As SIP has matured and gaine...

  17. Session management for web-based healthcare applications.

    Science.gov (United States)

    Wei, L; Sengupta, S

    1999-01-01

    In health care systems, users may access multiple applications during one session of interaction with the system. However, users must sign on to each application individually, and it is difficult to maintain a common context among these applications. We are developing a session management system for web-based applications using LDAP directory service, which will allow single sign-on to multiple web-based applications, and maintain a common context among those applications for the user. This paper discusses the motivations for building this system, the system architecture, and the challenges of our approach, such as the session objects management for the user, and session security.

  18. Secret Sessions of Congress: A Brief Historical Overview

    National Research Council Canada - National Science Library

    Amer, Mildred

    2004-01-01

    Secret or closed door sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...

  19. Secret Sessions of Congress: A Brief Historical Overview

    National Research Council Canada - National Science Library

    Amer, Mildred

    2005-01-01

    "Secret" or "closed door" sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...

  20. A multidisciplinary approach to vascular surgery procedure coding improves coding accuracy, work relative value unit assignment, and reimbursement.

    Science.gov (United States)

    Aiello, Francesco A; Judelson, Dejah R; Messina, Louis M; Indes, Jeffrey; FitzGerald, Gordon; Doucet, Danielle R; Simons, Jessica P; Schanzer, Andres

    2016-08-01

    Vascular surgery procedural reimbursement depends on accurate procedural coding and documentation. Despite the critical importance of correct coding, there has been a paucity of research focused on the effect of direct physician involvement. We hypothesize that direct physician involvement in procedural coding will lead to improved coding accuracy, increased work relative value unit (wRVU) assignment, and increased physician reimbursement. This prospective observational cohort study evaluated procedural coding accuracy of fistulograms at an academic medical institution (January-June 2014). All fistulograms were coded by institutional coders (traditional coding) and by a single vascular surgeon whose codes were verified by two institution coders (multidisciplinary coding). The coding methods were compared, and differences were translated into revenue and wRVUs using the Medicare Physician Fee Schedule. Comparison between traditional and multidisciplinary coding was performed for three discrete study periods: baseline (period 1), after a coding education session for physicians and coders (period 2), and after a coding education session with implementation of an operative dictation template (period 3). The accuracy of surgeon operative dictations during each study period was also assessed. An external validation at a second academic institution was performed during period 1 to assess and compare coding accuracy. During period 1, traditional coding resulted in a 4.4% (P = .004) loss in reimbursement and a 5.4% (P = .01) loss in wRVUs compared with multidisciplinary coding. During period 2, no significant difference was found between traditional and multidisciplinary coding in reimbursement (1.3% loss; P = .24) or wRVUs (1.8% loss; P = .20). During period 3, traditional coding yielded a higher overall reimbursement (1.3% gain; P = .26) than multidisciplinary coding. This increase, however, was due to errors by institution coders, with six inappropriately used codes

  1. Pyramid image codes

    Science.gov (United States)

    Watson, Andrew B.

    1990-01-01

    All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

  2. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  3. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  4. Quantum coding theorems

    Science.gov (United States)

    Holevo, A. S.

    1998-12-01

    ContentsI. IntroductionII. General considerations § 1. Quantum communication channel § 2. Entropy bound and channel capacity § 3. Formulation of the quantum coding theorem. Weak conversionIII. Proof of the direct statement of the coding theorem § 1. Channels with pure signal states § 2. Reliability function § 3. Quantum binary channel § 4. Case of arbitrary states with bounded entropyIV. c-q channels with input constraints § 1. Coding theorem § 2. Gauss channel with one degree of freedom § 3. Classical signal on quantum background noise Bibliography

  5. Increasing session-to-session transfer in a brain-computer interface with on-site background noise acquisition.

    Science.gov (United States)

    Cho, Hohyun; Ahn, Minkyu; Kim, Kiwoong; Jun, Sung Chan

    2015-12-01

    A brain-computer interface (BCI) usually requires a time-consuming training phase during which data are collected and used to generate a classifier. Because brain signals vary dynamically over time (and even over sessions), this training phase may be necessary each time the BCI system is used, which is impractical. However, the variability in background noise, which is less dependent on a control signal, may dominate the dynamics of brain signals. Therefore, we hypothesized that an understanding of variations in background noise may allow existing data to be reused by incorporating the noise characteristics into the feature extraction framework; in this way, new session data are not required each time and this increases the feasibility of the BCI systems. In this work, we collected background noise during a single, brief on-site acquisition session (approximately 3 min) immediately before a new session, and we found that variations in background noise were predictable to some extent. Then we implemented this simple session-to-session transfer strategy with a regularized spatiotemporal filter (RSTF), and we tested it with a total of 20 cross-session datasets collected over multiple days from 12 subjects. We also proposed and tested a bias correction (BC) in the RSTF. We found that our proposed session-to-session strategies yielded a slightly less or comparable performance to the conventional paradigm (each session training phase is needed with an on-site training dataset). Furthermore, using an RSTF only and an RSTF with a BC outperformed existing approaches in session-to-session transfers. We inferred from our results that, with an on-site background noise suppression feature extractor and pre-existing training data, further training time may be unnecessary.

  6. Napping promotes inter-session habituation to emotional stimuli.

    Science.gov (United States)

    Pace-Schott, Edward F; Shepherd, Elizabeth; Spencer, Rebecca M C; Marcello, Matthew; Tucker, Matthew; Propper, Ruth E; Stickgold, Robert

    2011-01-01

    The effects of a daytime nap on inter-session habituation to aversive visual stimuli were investigated. Healthy young adult volunteers viewed repeated presentations of highly negative and emotionally neutral (but equally arousing) International Affective Picture System (IAPS) photographs during two afternoon sessions separated by 2.5h. Half of the photographs were shown at both sessions (Repeated Sets) and half differed between sessions (Novel Sets). For each stimulus presentation, evoked skin conductance response (SCR), heart-rate deceleration (HRD) and corrugator supercilii EMG response (EMG), were computed and range corrected using respective maximum session-1 responses. Following each presentation, subjects rated each photograph on dimensions of pleasantness and arousability. During the inter-session interval, Nap subjects had a 120-min polysomnographically monitored sleep opportunity, whereas Wake subjects watched a non-stimulating video. Nap and Wake subjects did not differ in their subjective ratings of photographs. However, for Repeated-Set photographs, Nap subjects demonstrated greater inter-session habituation in SCR and EMG but a trend toward lesser inter-session habituation in HRD. These group differences were absent for Novel-Set photographs. Group differences across all measures were greater for negative stimuli. Occurrence of SWS during the nap was associated with greater inter-session habituation of EMG whereas occurrence of REM was associated with lesser inter-session habituation of SCR to negative stimuli. Sleep may therefore promote emotional adjustment at the level of somatic responses. Physiological but not subjective inter-session habituation to aversive images was enhanced by a daytime nap. Copyright © 2010 Elsevier Inc. All rights reserved.

  7. A session-to-session examination of homework engagement in cognitive therapy for depression: Do patients experience immediate benefits?

    Science.gov (United States)

    Conklin, Laren R; Strunk, Daniel R

    2015-09-01

    Homework is a key component of Cognitive Therapy (CT) for depression. Although previous research has found evidence for a positive relationship between homework compliance and treatment outcome, the methods used in previous studies have often not been optimal. In this study, we examine the relation of specific aspects of homework engagement and symptom change over successive session-to-session intervals. In a sample of 53 depressed adults participating in CT, we examined the relation of observer-rated homework engagement and session-to-session symptom change across the first five sessions. Within patient (and not between patient) variability in homework engagement was significantly related to greater session-to-session symptom improvements. These findings were similar when homework engagement was assessed through a measure of general engagement with homework assignments and a measure assessing engagement in specific assignments often used in CT. Secondary analyses suggested that observer ratings of the effort patients made on homework and the completion of cognitive homework were the numerically strongest predictors of depressive symptom improvements. Patient engagement with homework assignments appears to be an important predictor of early session-to-session symptom improvements. Future research is needed to identify what therapist behaviors promote homework engagement. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  9. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  10. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  11. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  12. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  13. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  14. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  15. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  16. Code de conduite

    International Development Research Centre (IDRC) Digital Library (Canada)

    irocca

    son point de vue, dans un esprit d'accueil et de respect. NOTRE CODE DE CONDUITE. Le CRDI s'engage à adopter un comportement conforme aux normes d'éthique les plus strictes dans toutes ses activités. Le Code de conduite reflète notre mission, notre philosophie en matière d'emploi et les résultats des discussions ...

  17. Proceedings of the 21st DOE/NRC nuclear air cleaning conference; Volume 2, Sessions 9--16

    Energy Technology Data Exchange (ETDEWEB)

    First, M.W. [ed.] [Harvard Univ., Boston, MA (United States). Harvard Air Cleaning Lab.

    1991-02-01

    The 21st meeting of the Department of Energy/Nuclear Regulatory Commission (DOE/NRC) Nuclear Air Cleaning Conference was held in San Diego, CA on August 13--16, 1990. The proceedings have been published as a two volume set. Volume 2 contains sessions covering adsorbents, nuclear codes and standards, modelling, filters, safety, containment venting and a review of nuclear air cleaning programs around the world. Also included is the list of attendees and an index of authors and speakers. (MHB)

  18. Energy and the public: public awareness workshop and plenary session

    Energy Technology Data Exchange (ETDEWEB)

    1979-07-01

    This publication of these two sessions of the conference on February 22 and 23, 1979 was prepared from a verbatim record made by a reporting firm. A separate abstract was prepared for each of the seventeen papers of the public awareness workshops and of the six papers of the plenary session.

  19. Acute and session RPE responses during resistance training: Bouts ...

    African Journals Online (AJOL)

    low (60% 1RM) and high (90% 1RM) workloads for acute rate of perceived exertion (RPE) (per exercise), session RPE (S-RPE) (30 min post), HR (per exercise) and total work (per session, and per exercise). Background. RPE is a convenient method for quantifying intensity in aerobic exercise. However, RPE has recently ...

  20. First-Session Competency: The Brief Strategic Therapy Scale-1

    Science.gov (United States)

    Amini, Rachelle L.; Woolley, Scott R.

    2011-01-01

    The first session in brief strategic therapy is the most critical phase of treatment. More than a mere "assessment phase," the first session in a true intervention sets the stage for all subsequent therapeutic maneuvers. This article presents a supervisory observation tool, the Brief Strategic Therapy Scale-1 (BSTS-1), a fidelity measure proposed…

  1. 76 FR 42112 - Specialty Crop Committee Stakeholder Listening Sessions

    Science.gov (United States)

    2011-07-18

    ... crops'' as fruits, vegetables, tree nuts, dried fruits and nursery crops (including floriculture). In...; ] DEPARTMENT OF AGRICULTURE Office of the Secretary Specialty Crop Committee Stakeholder Listening Sessions... Department of Agriculture announces two stakeholder listening sessions of the Specialty Crop Committee, under...

  2. Session A4 Rangelands as dynamic systems Desertification ...

    African Journals Online (AJOL)

    Session A4 Rangelands as dynamic systems Desertification: patterns and processes in Africa. M Timm Hoffman, Michael Darkoh. Abstract. The United Nations Convention to Combat Desertification (UNCCD) makes special mention of the desertification problem in Africa. This session will provide an up to date overview of ...

  3. Type Inference for Session Types in the Pi-Calculus

    DEFF Research Database (Denmark)

    Graversen, Eva Fajstrup; Harbo, Jacob Buchreitz; Huttel, Hans

    2014-01-01

    In this paper we present a direct algorithm for session type inference for the π-calculus. Type inference for session types has previously been achieved by either imposing limitations and restriction on the π-calculus, or by reducing the type inference problem to that for linear types. Our approach...

  4. Quality Assurance of Assessment and Moderation Discourses Involving Sessional Staff

    Science.gov (United States)

    Grainger, Peter; Adie, Lenore; Weir, Katie

    2016-01-01

    Quality assurance is a major agenda in tertiary education. The casualisation of academic work, especially in teaching, is also a quality assurance issue. Casual or sessional staff members teach and assess more than 50% of all university courses in Australia, and yet the research in relation to the role sessional staff play in quality assurance of…

  5. Speed Posters: An Alternative to Traditional Poster and Podium Sessions.

    Science.gov (United States)

    Wagnes, Lisa D

    2016-08-01

    Speed posters were used as an alternative concurrent session option during a national nursing education conference. The session format was received positively by both participants and presenters, and, as a result, recommendations for use were developed by the conference planners. J Contin Educ Nurs. 2016;47(8):344-346. Copyright 2016, SLACK Incorporated.

  6. Graph Transformation for Consolidation of Creativity Sessions Results

    DEFF Research Database (Denmark)

    Dolog, Peter

    2010-01-01

    Graph transformation approach for consolidation of creativity sessions results is part of the FP7 EU/IST project idSpace: Tooling of and training for collaborative, distributed product innovation. The goal of graph transformation approach is to provide a tool for merging results of various sessions...

  7. Validity and reliability of the session RPE method for monitoring ...

    African Journals Online (AJOL)

    The results support the validity and reliability of the Session RPE method of monitoring exercise intensity, although as might be predicted for a subjective method the Session RPE was less precise than the objective measures of exercise training intensity. South African Journal of Sports Medicine Vol. 18 (1) 2006: pp. 14-17 ...

  8. Open Coding Descriptions

    Directory of Open Access Journals (Sweden)

    Barney G. Glaser, PhD, Hon PhD

    2016-12-01

    Full Text Available Open coding is a big source of descriptions that must be managed and controlled when doing GT research. The goal of generating a GT is to generate an emergent set of concepts and their properties that fit and work with relevancy to be integrated into a theory. To achieve this goal, the researcher begins his research with open coding, that is coding all his data in every possible way. The consequence of this open coding is a multitude of descriptions for possible concepts that often do not fit in the emerging theory. Thus in this case the researcher ends up with many irrelevant descriptions for concepts that do not apply. To dwell on descriptions for inapplicable concepts ruins the GT theory as it starts. It is hard to stop. Confusion easily sets in. Switching the study to a QDA is a simple rescue. Rigorous focusing on emerging concepts is vital before being lost in open coding descriptions. It is important, no matter how interesting the description may become. Once a core is possible, selective coding can start which will help control against being lost in multiple descriptions.

  9. Reactivity to nicotine cues over repeated cue reactivity sessions

    Science.gov (United States)

    LaRowe, Steven D.; Saladin, Michael E.; Carpenter, Matthew J.; Upadhyaya, Himanshu P.

    2009-01-01

    The present study investigated whether reactivity to nicotine-related cues would attenuate across four experimental sessions held one week apart. Participants were nineteen non-treatment seeking, nicotine-dependent males. Cue reactivity sessions were performed in an outpatient research center using in vivo cues consisting of standardized smoking-related paraphernalia (e.g., cigarettes) and neutral comparison paraphernalia (e.g., pencils). Craving ratings were collected before and after both cue presentations while physiological measures (heart rate, skin conductance) were collected before and during the cue presentations. Although craving levels decreased across sessions, smoking-related cues consistently evoked significantly greater increases in craving relative to neutral cues over all four experimental sessions. Skin conductance was higher in response to smoking cues, though this effect was not as robust as that observed for craving. Results suggest that, under the described experimental parameters, craving can be reliably elicited over repeated cue reactivity sessions. PMID:17537583

  10. Reflective sessions: a tool for teacher empowerment

    Directory of Open Access Journals (Sweden)

    Maria Cecília Camargo Magalhães

    2005-01-01

    Full Text Available The aim of this paper is to discuss to what extent reflective sessions can become a tool for teacher empowerment when included as a component of a reflective teacher education in-service course, and understood as a classroom activity which provides the possibility for a new type of discursive organisation to emerge. The discussion will be of a twofold nature: on the one hand it will focus on the need to provide Brazilian state school teachers of English involved in a continuing education programme with a context conducive to reflective practice and, on the other hand, it will focus on the effectiveness of organizing that context as discussion dyads, so as to create a collaborative set up for participants to examine their classes critically. The aim set for the participants is learning how to evaluate each other's classroom practice by looking at it as a locus of investigation and of theory (deconstruction. The paper discusses the educational process evolving from the discussions by analysing the dyads' discourses (Bronckart, 1999, i.e., the linguistic discursive choices that reveal their motives when acting with a pair in order to evaluate their classroom practices critically. This will also shed some light on the level of effectiveness of the tool itselfO objetivo deste artigo é discutir até que ponto sessões reflexivas podem tornar-se uma ferramenta para o empoderamento do professor quando incluída em um curso de formação contínua reflexiva, e entendida como uma atividade de sala de aula que oferece a possibilidade de construção de um novo tipo de organização discursiva. A discussão será feita, por um lado, focalizando a necessidade de se oferecer às professoras de inglês da escola pública brasileira engajadas em um programa de educação contínua um contexto que leve à prática reflexiva, e, por outro lado, focalizando a efetividade de se organizar esse contexto na forma de discussão em duplas, a fim de se criar um espa

  11. Network Coding Designs Suited for the Real World

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2013-01-01

    Network coding (NC) has attracted tremendous attention from the research community due to its potential to significantly improve networks' throughput, delay, and energy performance as well as a means to simplify protocol design and naturally providing security support. The possibilities in code d...... practical pitfalls, this paper seeks to identify key ingredients to a successful design, critical and common limitations to most intra-session NC systems as well as promising techniques and ideas to guide future models and research problems grounded on practical concerns....

  12. Mind the gap: In-session silences are associated with client attachment insecurity, therapeutic alliance, and treatment outcome.

    Science.gov (United States)

    Daniel, Sarah I F; Folke, Sofie; Lunn, Susanne; Gondan, Matthias; Poulsen, Stig

    2018-03-01

    The association between in-session silences and client attachment, therapeutic alliance, and treatment outcome was investigated in two treatments for bulimia nervosa. 69 women and one man were randomized to two years of psychoanalytic psychotherapy (PPT) or 20 sessions of cognitive behavioral therapy (CBT). Client attachment was assessed using the Adult Attachment Interview. Early, middle and late sessions (N = 175) were evaluated with the Vanderbilt Therapeutic Alliance Scales, and quality of in-session silences was coded with the Pausing Inventory Categorization System (PICS). Multilevel Poisson and linear regression analyses were performed. Coders identified 6236 pauses, which were more frequent in PPT than in CBT. Higher pausing frequency and higher relative frequency of obstructive pauses were associated with client insecure attachment as well as with poorer treatment alliance, and accounted for part of the relation between client attachment and therapeutic alliance. Good outcome clients had higher relative frequency of productive pauses, especially in mid-treatment, and lower relative frequency of obstructive pauses, especially in late treatment. The study further validates the PICS. Findings indicate that therapists may be able to use in-session silences as an indicator of client attachment insecurity and as a prognostic sign of eventual treatment outcome.

  13. SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways

    Directory of Open Access Journals (Sweden)

    Akbar AliHammad

    2010-01-01

    Full Text Available 6LoWPAN (IPv6 based Low-Power Personal Area Network is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inter-connected. This interconnection is especially required in commercial and enterprise applications of sensor networks where reliable and timely data transfers such as multiple code updates are needed from Internet nodes to sensor nodes. For this type of inbound traffic which is mostly bulk, TCP as transport layer protocol is essential, resulting in end-to-end TCP session through a default gateway. In this scenario, a single gateway tends to become the bottleneck because of non-uniform connectivity to all the sensor nodes besides being vulnerable to buffer overflow. We propose SET; a management architecture for multiple split-TCP sessions across a number of serving gateways. SET implements striping and multiple TCP session management through a shim at session layer. Through analytical modeling and ns2 simulations, we show that our proposed architecture optimizes communication for ingress bulk data transfer while providing associated load balancing services. We conclude that multiple split-TCP sessions managed in parallel across a number of gateways result in reduced latency for bulk data transfer and provide robustness against gateway failures.

  14. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  15. Working alliance for clients with social anxiety disorder: relationship with session helpfulness and within-session habituation.

    Science.gov (United States)

    Hayes, Sarah A; Hope, Debra A; VanDyke, Melanie M; Heimberg, Richard G

    2007-01-01

    It has been suggested that a strong working alliance encourages clients to take risks during therapy (Raue, Castonguay, & Goldfried, 1993). This encouragement may be important for clients who fear negative evaluations as they engage in risk-taking elements of therapy. This study examined the relationship between working alliance, session helpfulness and measures of emotional processing in 18 clients undergoing cognitive behavior therapy (CBT) for social anxiety disorder. Results indicate a positive correlation between client-rated, but not observer-rated, working alliance and session helpfulness. Moderate levels of working alliance were associated with higher initial anxiety and deeper within-session habituation. Overall, a strong alliance was associated with clients engaging with the session and finding the session helpful. Implications for the use of CBT for social anxiety are discussed.

  16. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. Copyright © 2011. Published by Elsevier Inc.

  17. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-11-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  18. Twisted Reed-Solomon Codes

    DEFF Research Database (Denmark)

    Beelen, Peter; Puchinger, Sven; Rosenkilde ne Nielsen, Johan

    2017-01-01

    We present a new general construction of MDS codes over a finite field Fq. We describe two explicit subclasses which contain new MDS codes of length at least q/2 for all values of q ≥ 11. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code.......We present a new general construction of MDS codes over a finite field Fq. We describe two explicit subclasses which contain new MDS codes of length at least q/2 for all values of q ≥ 11. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code....

  19. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  20. Manufacturer Identification Code (MID) - ACE

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  1. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  2. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  3. Semi-Automated Discovery of Application Session Structure

    Energy Technology Data Exchange (ETDEWEB)

    Kannan, J.; Jung, J.; Paxson, V.; Koksal, C.

    2006-09-07

    While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a higher level---the structure of user-initiated sessions comprised of groups of related connections---remains much less explored. Some types of session structure, such as the coupling between an FTP control connection and the data connections it spawns, have prespecified forms, though the specifications do not guarantee how the forms appear in practice. Other types of sessions, such as a user reading email with a browser, only manifest empirically. Still other sessions might exist without us even knowing of their presence, such as a botnet zombie receiving instructions from its master and proceeding in turn to carry them out. We present algorithms rooted in the statistics of Poisson processes that can mine a large corpus of network connection logs to extract the apparent structure of application sessions embedded in the connections. Our methods are semi-automated in that we aim to present an analyst with high-quality information (expressed as regular expressions) reflecting different possible abstractions of an application's session structure. We develop and test our methods using traces from a large Internet site, finding diversity in the number of applications that manifest, their different session structures, and the presence of abnormal behavior. Our work has applications to traffic characterization and monitoring, source models for synthesizing network traffic, and anomaly detection.

  4. Current and Future Applications of Mechanical Fasteners for Light-Frame Wood Structures: Proceedings of Mechanical Fasteners Plenary Session at the Forest Products Research Society Annual Meeting

    Science.gov (United States)

    Leslie H. Groom; [Compiler

    1993-01-01

    The title of this publication-"Current and Future Applications of Mechanical Fasteners for Light-Frame Wood Structures" is the theme of this plenary session from the 1991 annual meeting of the Forest Products Research Society (FPRS). This theme was chosen to address current issues in the forest products industry: changing design codes, fastener performance,...

  5. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  6. Physiological and psychological responses to a university fitness session.

    OpenAIRE

    S. Grant; Armstrong, G; Sutherland, R.; Wilson, J.; Aitchison, T.; Paul, E.; S. Henderson

    1993-01-01

    The purpose of this study was to examine the physiological and psychological responses to a university fitness session entitled 'popmobility'. A popmobility session consists of 20 min of aerobic activities, 5 min of local muscular endurance exercises and 5 min of flexibility exercises. Ten regular participants of these sessions, women of mean(s.d.) age 21.2(1.5) years, took part in the study. A maximal oxygen uptake (VO2max) treadmill test was performed by each subject to obtain VO2max and ma...

  7. [The paradoxical effect of persuasive communication in health education sessions].

    Science.gov (United States)

    Piperini, Marie-Christine

    2012-01-01

    The purpose of this study was to examine the communication dynamics leading to the adoption of new attitudes and cognitions in health education sessions. We examined the verbal interactions at work in persuasive communication in 16 health education sessions. The study found that the medical expertise of the educator and the initial level of commitment of the participants had a positive effect on adherence to recommendations. However, persuasive communication in health education sessions appears to involve a paradoxical process in which criticism of the message can go hand in hand with the expression of an intention to implement new risk-reducing behaviors.

  8. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  9. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  10. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  11. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  12. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  13. Stability or instability in avoidant personality disorder:Mode fluctuations within schema therapy sessions.

    Science.gov (United States)

    Peled, Ofer; Bar-Kalifa, Eran; Rafaeli, Eshkol

    2017-12-01

    Avoidant personality disorder (APD) is among the most prevalent personality disorders, but has received relatively little empirical attention. This study aims to characterize the frequency, intensity, and fluctuation patterns seen in the modes (self-states) of APD clients over the course of schema therapy (ST), a psychotherapy approach developed especially for personality disorders. The newly-developed client mode rating scale (CMRS) was used to code every 5-min segment (n = 645) of 60 ST sessions. Each segment was coded by two independent raters, achieving adequate reliability. The avoidant/detached mode was present in 74% of therapy segments and was the most intense and unstable mode; the vulnerable child mode was present in 58% of segments and was the second most intense and unstable mode; the dysfunctional parent mode was present in 40% of segments, and was the third most intense and unstable mode; the over-compensator, compliant-surrenderer, and healthy adult modes were present in around 33% of segments, but the healthy adult mode was significantly more stable than all others. Although 645 segments were coded, they were drawn from only 15 APD clients with no control group. Further studies are needed to established specificity to APD. This study demonstrates the utility of the mode concept as a lexicon for capturing personality states and their instability. It highlights the use of in-session segment-by-segment ratings to assess client change within psychotherapy. Although DSM5 fails to address instability as a criterion for avoidant personality disorder, the APD clients in the current study were characterized by considerable mode instability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Therapist use of Socratic questioning predicts session-to-session symptom change in cognitive therapy for depression.

    Science.gov (United States)

    Braun, Justin D; Strunk, Daniel R; Sasso, Katherine E; Cooper, Andrew A

    2015-07-01

    Socratic questioning is a key therapeutic strategy in cognitive therapy (CT) for depression. However, little is known regarding its relation to outcome. In this study, we examine therapist use of Socratic questioning as a predictor of session-to-session symptom change. Participants were 55 depressed adults who participated in a 16-week course of CT (see Adler, Strunk, & Fazio, 2015). Socratic questioning was assessed through observer ratings of the first three sessions. Socratic ratings were disaggregated into scores reflecting within-patient and between-patient variability to facilitate an examination of the relation of within-patient Socratic questioning and session-to-session symptom change. Because we examined within-patient variability in Socratic questioning, the identification of such a relation cannot be attributed to any stable patient characteristics that might otherwise introduce a spurious relation. Within-patient Socratic questioning significantly predicted session-to-session symptom change across the early sessions, with a one standard deviation increase in Socratic-Within predicting a 1.51-point decrease in BDI-II scores in the following session. Within-patient Socratic questioning continued to predict symptom change after controlling for within-patient ratings of the therapeutic alliance (i.e., Relationship and Agreement), suggesting that the relation of Socratic questioning and symptom change was not only independent of stable characteristics, but also within-patient variation in the alliance. Our results provide the first empirical support for a relation of therapist use of Socratic questioning and symptom change in CT for depression. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Astronauts Armstrong and Scott during photo session outside KSC

    Science.gov (United States)

    1966-01-01

    Astronauts Neil A. Armstrong (left), command pilot, and David R. Scott, pilot, the Gemini 8 prime crew, during a photo session outside the Kennedy Space Center (KSC) Mission Control Center. They are standing in front of a radar dish.

  16. The evaluation process of short training sessions in organizations

    NARCIS (Netherlands)

    Overschie, M.G.F.; Lukosch, H.K.; De Vries, P.

    This paper presents a critical reflection of the evaluation of learning processes in organizations. Based on learning and evaluation theories and concepts we discuss qualitative and quantitative evaluation processes, and its relationship to short training sessions to foster sustainable development.

  17. What's new in multiple sclerosis spasticity research? Poster session highlights.

    Science.gov (United States)

    Linker, Ralf

    2017-11-01

    Each year at the Multiple Sclerosis Experts Summit, relevant research in the field of multiple sclerosis spasticity is featured in poster sessions. The main studies presented at this year's meeting are summarized herein.

  18. SESSION V: INTEGRATED APPROACHES IN LAND AND WATER ...

    African Journals Online (AJOL)

    SESSION V: INTEGRATED APPROACHES IN LAND AND WATER MANAGEMENT RESEARCH/LAND AND WATER MANAGEMENT ECONOMICS AND POLICY - Socioeconomic implications of improved forage species on smallholder farms in Kenya.

  19. ACTION RESEARCH : IMPROVING STUDENTS’ SPOKEN INTERACTIONS THROUGH POSTER SESSION

    Directory of Open Access Journals (Sweden)

    Seftika Seftika

    2015-10-01

    Full Text Available Abstract Spoken interaction is beneficial in learning a language. In fact the classrooom interaction did not take place well. Due to the lack of students’ interaction, this study aimed to improve students’ spoken interaction through Poster Session. A classroom action research was carried out at the English major students at the fourth semester of STKIP Muhammadiyah Pringsewu Lampung.In collecting the data the researcher used observation, test, and documentation. The data collected were analyzed and synthesized both qualitatively and quantitatively, and then meaning and interpretation were built to know clearly the process which was occurred during the research. The results indicate that there is improvement of Students’ spoken interaction using Poster Session. Poster Session facilitates students to practise English spoken interaction, it enhances them to be involved in learner-learner interaction. Due to the fact that their interaction is great, it influences their speaking skill.  Key Words: Interaction, speaking, Poster Session

  20. Does readiness to change predict in-session motivational language? Correspondence between two conceptualizations of client motivation.

    Science.gov (United States)

    Hallgren, Kevin A; Moyers, Theresa B

    2011-07-01

    Client language reflecting motivation for changing substance use (i.e. change talk) has been shown to predict outcomes in motivational interviewing. While previous work has shown that change talk may be elicited by clinician behaviors, little is known about intrapersonal factors that may elicit change talk, including clients' baseline motivation for change. The present study tested whether in-session change talk differs between clients based on their readiness for change. First-session audio recordings from Project MATCH, a large multi-site clinical trial of alcohol treatments. Project MATCH out-patients (n = 69) and aftercare patients (n = 48) receiving motivational enhancement therapy (MET). Client language from first-session MET was coded using the Sequential Code for Observing Process Exchanges. Readiness and stages of change were assessed using both categorical and dimensional variables derived from the University of Rhode Island Change Assessment and the Stages of Change Readiness and Treatment Eagerness Scale, administered prior to first treatment sessions. Stage of change scales followed some of the expected correspondence with change talk, although the associations were generally small in magnitude and inconsistent across measures and treatment arms. Higher overall readiness did not predict more overall change talk, contemplation had mixed associations with preparatory change talk, and preparation/action did not predict commitment language. Motivational language used in initial sessions by people receiving counselling for excessive alcohol consumption does not appear to be associated with readiness to change as construed by the Transtheoretical Model. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  1. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    because this would combine Ptolemy II with the GPL’d code and thus encumber Ptolemy II with the GPL. Another GNU license is the GNU Library General...permission on the source.eecs.berkeley.edu repositories, then use your local repository. bash-3.2$ svn co svn+ ssh ://source.eecs.berkeley.edu/chess

  2. Error Correcting Codes

    Indian Academy of Sciences (India)

    The images, which came from Oailleo's flyby of the moon on June 26-27. 1996 are reported to be 20 times better than those obtained from the Voyager. Priti Shankar .... a systematic way. Thus was born a brand new field,which has since been ..... mathematically oriented, compact book on coding, containing a few topics not ...

  3. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  4. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  5. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  6. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 10. Error Correcting Codes How Numbers Protect Themselves. Priti Shankar. Series Article Volume 1 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  7. Video Coding for ESL.

    Science.gov (United States)

    King, Kevin

    1992-01-01

    Coding tasks, a valuable technique for teaching English as a Second Language, are presented that enable students to look at patterns and structures of marital communication as well as objectively evaluate the degree of happiness or distress in the marriage. (seven references) (JL)

  8. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  9. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Computer Science and. Automation, liSe. Their research addresses various aspects of algebraic and combinatorial coding theory. 1 low Density Parity Check ..... lustrating how the variable Xd is decoded. As mentioned earlier, this algorithm runs iteratively. To start with, in the first iteration, only bits in the first level of the ...

  10. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives...

  11. Student Dress Codes.

    Science.gov (United States)

    Uerling, Donald F.

    School officials see a need for regulations that prohibit disruptive and inappropriate forms of expression and attire; students see these regulations as unwanted restrictions on their freedom. This paper reviews court litigation involving constitutional limitations on school authority, dress and hair codes, state law constraints, and school…

  12. Dress Codes and Uniforms.

    Science.gov (United States)

    Lumsden, Linda; Miller, Gabriel

    2002-01-01

    Students do not always make choices that adults agree with in their choice of school dress. Dress-code issues are explored in this Research Roundup, and guidance is offered to principals seeking to maintain a positive school climate. In "Do School Uniforms Fit?" Kerry White discusses arguments for and against school uniforms and summarizes the…

  13. Dress Codes. Legal Brief.

    Science.gov (United States)

    Zirkel, Perry A.

    2000-01-01

    As illustrated by two recent decisions, the courts in the past decade have demarcated wide boundaries for school officials considering dress codes, whether in the form of selective prohibitions or required uniforms. Administrators must warn the community, provide legitimate justification and reasonable clarity, and comply with state law. (MLH)

  14. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    titled 'A Mathematical Theory of Communication' in the Bell Systems Technical Journal in 1948. The paper set up a ... 'existential' result but nota 'constructive' one. The construction of such a code evolved from the work ... several papers on hyperbolic geometry. He shifted to the Department of Pure Mathematics at Calcutta.

  15. Cracking the Codes

    Science.gov (United States)

    Heathcote, Dorothy

    1978-01-01

    Prescribes an attitude that teachers can take to help students "crack the code" of a dramatic work, combining a flexible teaching strategy, the suspension of beliefs or preconceived notions about the work, focusing on the drams's text, and choosing a reading strategy appropriate to the dramatic work. (RL)

  16. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  17. Coded SQUID arrays

    NARCIS (Netherlands)

    Podt, M.; Weenink, J.; Weenink, J.; Flokstra, Jakob; Rogalla, Horst

    2001-01-01

    We report on a superconducting quantum interference device (SQUID) system to read out large arrays of cryogenic detectors. In order to reduce the number of SQUIDs required for an array of these detectors, we used code-division multiplexing. This simplifies the electronics because of a significantly

  18. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  19. Diversity and End User Context in Smartphone Usage Sessions

    OpenAIRE

    Soikkeli, Tapio; Karikoski, Juuso; Hämmäinen, Heikki

    2011-01-01

    Julkaisun kokoteksti on luettavissa vain Aalto-tunnuksilla. Please note that access to the fulltext is limited to Aalto staff and students. Mobile end user context has gained increasingattention in the mobile services industry. Context information isseen as an important component in developing new, morepersonalized, mobile services and applications. This paper studiesthe effect of end user context on smartphone usage sessions.Smartphone usage sessions are used to depict user behavior an...

  20. Causation, constructors and codes.

    Science.gov (United States)

    Hofmeyr, Jan-Hendrik S

    2017-09-13

    Relational biology relies heavily on the enriched understanding of causal entailment that Robert Rosen's formalisation of Aristotle's four causes has made possible, although to date efficient causes and the rehabilitation of final cause have been its main focus. Formal cause has been paid rather scant attention, but, as this paper demonstrates, is crucial to our understanding of many types of processes, not necessarily biological. The graph-theoretic relational diagram of a mapping has played a key role in relational biology, and the first part of the paper is devoted to developing an explicit representation of formal cause in the diagram and how it acts in combination with efficient cause to form a mapping. I then use these representations to show how Von Neumann's universal constructor can be cast into a relational diagram in a way that avoids the logical paradox that Rosen detected in his own representation of the constructor in terms of sets and mappings. One aspect that was absent from both Von Neumann's and Rosen's treatments was the necessity of a code to translate the description (the formal cause) of the automaton to be constructed into the construction process itself. A formal definition of codes in general, and organic codes in particular, allows the relational diagram to be extended so as to capture this translation of formal cause into process. The extended relational diagram is used to exemplify causal entailment in a diverse range of processes, such as enzyme action, construction of automata, communication through the Morse code, and ribosomal polypeptide synthesis through the genetic code. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Swedish adolescents' experiences of educational sessions at Youth Clinics.

    Science.gov (United States)

    Kånåhols, Anna Frida; Magnusson, Hanna; Alehagen, Siw

    2011-08-01

    Planning sex and relationship health education suitable for adolescents is a pedagogical challenge. To describe how secondary school pupils in Sweden experience health educational sessions at Youth Clinics. Data were collected from six focus groups within 2 weeks of an educational session. The groups consisted of pupils aged 14-16 years from three cities. The participants were 29 adolescents divided into groups of girls (n=15) and boys (n=14) and the interviews were audio taped. Data were analysed using qualitative content analysis. Five categories were identified: Impact of the educational session, The desirable educator, Didactic setup, Gender inequalities and Suitable age for the educational session. The adolescents were satisfied with the content of the education and the session was evaluated as a complement to school education. The educators were seen as competent with an ability to create a comfortable atmosphere which made it easier for participants to discuss the subject and ask questions. The session was experienced as secure which was appropriate for the intimate and personal subject and gender aspects were seen as influencing the conversation. This study can give an understanding of the needs and demands of adolescents which can be useful when planning and conducting sex and relationship health education. Copyright © 2011 Elsevier B.V. All rights reserved.

  2. Evidence of Online Performance Deterioration in User Sessions on Reddit

    Science.gov (United States)

    Singer, Philipp; Ferrara, Emilio; Kooti, Farshad; Strohmaier, Markus; Lerman, Kristina

    2016-01-01

    This article presents evidence of performance deterioration in online user sessions quantified by studying a massive dataset containing over 55 million comments posted on Reddit in April 2015. After segmenting the sessions (i.e., periods of activity without a prolonged break) depending on their intensity (i.e., how many posts users produced during sessions), we observe a general decrease in the quality of comments produced by users over the course of sessions. We propose mixed-effects models that capture the impact of session intensity on comments, including their length, quality, and the responses they generate from the community. Our findings suggest performance deterioration: Sessions of increasing intensity are associated with the production of shorter, progressively less complex comments, which receive declining quality scores (as rated by other users), and are less and less engaging (i.e., they attract fewer responses). Our contribution evokes a connection between cognitive and attention dynamics and the usage of online social peer production platforms, specifically the effects of deterioration of user performance. PMID:27560185

  3. Evidence of Online Performance Deterioration in User Sessions on Reddit.

    Directory of Open Access Journals (Sweden)

    Philipp Singer

    Full Text Available This article presents evidence of performance deterioration in online user sessions quantified by studying a massive dataset containing over 55 million comments posted on Reddit in April 2015. After segmenting the sessions (i.e., periods of activity without a prolonged break depending on their intensity (i.e., how many posts users produced during sessions, we observe a general decrease in the quality of comments produced by users over the course of sessions. We propose mixed-effects models that capture the impact of session intensity on comments, including their length, quality, and the responses they generate from the community. Our findings suggest performance deterioration: Sessions of increasing intensity are associated with the production of shorter, progressively less complex comments, which receive declining quality scores (as rated by other users, and are less and less engaging (i.e., they attract fewer responses. Our contribution evokes a connection between cognitive and attention dynamics and the usage of online social peer production platforms, specifically the effects of deterioration of user performance.

  4. A Proposal of Secure Session Provider Service over NGN

    Science.gov (United States)

    Kaji, Tadashi; Fujishiro, Takahiro; Susaki, Seiichi; Kawai, Eri; Hoshino, Kazuyoshi; Higashino, Teruo

    In these days, telecom operators in the world have been constructing Next Generation Network (NGN). NGN can provide QoS and security guaranteed communication to its users. However, the protection of communication is limited inside NGN. Therefore, when the interconnection between NGN and the Internet will be widely used in near future, it will become an important problem to solve how it protects the communications crossing over NGN and the Internet. This paper proposes a secure communication provider service that protects the confidentiality and integrity of communications crossing over NGN and the Internet by setting up and controlling the IPsec session in cooperation with NGN's call session control function (CSCF). In this service, the secure session control provider (sSCP) server and CSCF authenticate its user as Trusted Third Party on behalf of service providers. In addition, this service provides the ability of fast session establishment because sSCP distributes a security association for IPsec session between the user and service provider via the SIP session protected by NGN.

  5. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  6. Coding Theory and Projective Spaces

    Science.gov (United States)

    Silberstein, Natalia

    2008-05-01

    The projective space of order n over a finite field F_q is a set of all subspaces of the vector space F_q^{n}. In this work, we consider error-correcting codes in the projective space, focusing mainly on constant dimension codes. We start with the different representations of subspaces in the projective space. These representations involve matrices in reduced row echelon form, associated binary vectors, and Ferrers diagrams. Based on these representations, we provide a new formula for the computation of the distance between any two subspaces in the projective space. We examine lifted maximum rank distance (MRD) codes, which are nearly optimal constant dimension codes. We prove that a lifted MRD code can be represented in such a way that it forms a block design known as a transversal design. The incidence matrix of the transversal design derived from a lifted MRD code can be viewed as a parity-check matrix of a linear code in the Hamming space. We find the properties of these codes which can be viewed also as LDPC codes. We present new bounds and constructions for constant dimension codes. First, we present a multilevel construction for constant dimension codes, which can be viewed as a generalization of a lifted MRD codes construction. This construction is based on a new type of rank-metric codes, called Ferrers diagram rank-metric codes. Then we derive upper bounds on the size of constant dimension codes which contain the lifted MRD code, and provide a construction for two families of codes, that attain these upper bounds. We generalize the well-known concept of a punctured code for a code in the projective space to obtain large codes which are not constant dimension. We present efficient enumerative encoding and decoding techniques for the Grassmannian. Finally we describe a search method for constant dimension lexicodes.

  7. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  8. A Session-to-Session Examination of Homework Engagement in Cognitive Therapy for Depression: Do patients experience immediate benefits?

    OpenAIRE

    Conklin, Laren R.; Strunk, Daniel R.

    2015-01-01

    Homework is a key component of Cognitive Therapy (CT) for depression. Although previous research has found evidence for a positive relationship between homework compliance and treatment outcome, the methods used in previous studies have often not been optimal. In this study, we examine the relation of specific aspects of homework engagement and symptom change over successive session-to-session intervals. In a sample of 53 depressed adults participating in CT, we examined the relation of obser...

  9. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  10. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  11. Coding vs non-coding: Translatability of short ORFs found in putative non-coding transcripts.

    Science.gov (United States)

    Kageyama, Yuji; Kondo, Takefumi; Hashimoto, Yoshiko

    2011-11-01

    Genome analysis has identified a number of putative non-protein-coding transcripts that do not contain ORFs longer than 100 codons. Although evidence strongly suggests that non-coding RNAs are important in a variety of biological phenomena, the discovery of small peptide-coding mRNAs confirms that some transcripts that have been assumed to be non-coding actually have coding potential. Their abundance and importance in biological phenomena makes the sorting of non-coding RNAs from small peptide-coding mRNAs a key issue in functional genomics. However, validating the coding potential of small peptide-coding RNAs is complicated, because their ORF sequences are usually too short for computational analysis. In this review, we discuss computational and experimental methods for validating the translatability of these non-coding RNAs. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  12. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  13. Synthetic histone code.

    Science.gov (United States)

    Fischle, Wolfgang; Mootz, Henning D; Schwarzer, Dirk

    2015-10-01

    Chromatin is the universal template of genetic information in all eukaryotic cells. This complex of DNA and histone proteins not only packages and organizes genomes but also regulates gene expression. A multitude of posttranslational histone modifications and their combinations are thought to constitute a code for directing distinct structural and functional states of chromatin. Methods of protein chemistry, including protein semisynthesis, amber suppression technology, and cysteine bioconjugation, have enabled the generation of so-called designer chromatin containing histones in defined and homogeneous modification states. Several of these approaches have matured from proof-of-concept studies into efficient tools and technologies for studying the biochemistry of chromatin regulation and for interrogating the histone code. We summarize pioneering experiments and recent developments in this exciting field of chemical biology. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  15. Effects of caffeine on session ratings of perceived exertion.

    Science.gov (United States)

    Killen, L G; Green, J M; O'Neal, E K; McIntosh, J R; Hornsby, J; Coates, T E

    2013-03-01

    This study examined effects of caffeine on session ratings of perceived exertion (RPE) following 30 min constant-load cycling. Individuals (n = 15) of varying aerobic fitness completed a [Formula: see text] max trial and two 30 min cycling bouts (double-blind, counterbalanced) following ingestion of 6 mL/kg of caffeine or matched placebo. RPE overall, legs and breathing were estimated every 5 min and session RPE was estimated 30 min post-exercise using the OMNI pictorial scale. Session RPE for caffeine and placebo trails were compared using paired t test. Between-trial comparisons of HR, RPE overall, RPE legs and RPE breathing were analyzed using an independent 2 (trial) × 6 (time point) repeated measures analysis of variance (ANOVA) for each dependent variable. Caffeine resulted in a significantly lower session RPE (p < 0.05) for caffeine (6.1 ± 2.2) versus placebo (6.8 ± 2.1). Acute perceptual responses were significantly lower for caffeine for RPE overall (15, 20, 25, and 30 min), RPE breathing (15, 20, 25, and 30 min) and RPE legs (20 and 30 min). Survey responses post-exercise revealed greater feelings of nervousness, tremors, restlessness and stomach distress following caffeine versus placebo. Blunted acute RPE and survey responses suggest participants responded to caffeine ingestion. Caffeine decreased acute RPE during exercise which could partially account for lower session RPE responses. However, decreased session RPE could also reveal a latent analgesic affect of caffeine extending into recovery. Extending the understanding of session RPE could benefit coaches in avoiding overtraining when adjusting training programs.

  16. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  17. Hydra Code Release

    OpenAIRE

    Couchman, H. M. P.; Pearce, F. R.; Thomas, P. A.

    1996-01-01

    Comment: A new version of the AP3M-SPH code, Hydra, is now available as a tar file from the following sites; http://coho.astro.uwo.ca/pub/hydra/hydra.html , http://star-www.maps.susx.ac.uk/~pat/hydra/hydra.html . The release now also contains a cosmological initial conditions generator, documentation, an installation guide and installation tests. A LaTex version of the documentation is included here

  18. Adaptive Hybrid Picture Coding.

    Science.gov (United States)

    1983-02-05

    process, namely displacement or motion detection and estimation. DWSPLACEENT AD MOTION Simply stated, motion is defined to be a time series of spatial...regressive model in that the prediction is made with respect to a time series . That is future values of a time series are to be predicted on...B8 - 90. Robbins, John D., and Netravali, Arun N., "Interframe Telivision Coding Using Movement Compensation," Internation Conference on

  19. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  20. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  1. Radiation transport phenomena and modeling. Part A: Codes; Part B: Applications with examples

    Energy Technology Data Exchange (ETDEWEB)

    Lorence, L.J. Jr.; Beutler, D.E. [Sandia National Labs., Albuquerque, NM (United States). Simulation Technology Research Dept.

    1997-09-01

    This report contains the notes from the second session of the 1997 IEEE Nuclear and Space Radiation Effects Conference Short Course on Applying Computer Simulation Tools to Radiation Effects Problems. Part A discusses the physical phenomena modeled in radiation transport codes and various types of algorithmic implementations. Part B gives examples of how these codes can be used to design experiments whose results can be easily analyzed and describes how to calculate quantities of interest for electronic devices.

  2. Look at the Gato! Code-Switching in Speech to Toddlers

    Science.gov (United States)

    Bail, Amelie; Morini, Giovanna; Newman, Rochelle S.

    2015-01-01

    We examined code-switching (CS) in the speech of twenty-four bilingual caregivers when speaking with their 18- to 24-month-old children. All parents CS at least once in a short play session, and some code-switched quite often (over 1/3 of utterances). This CS included both inter-sentential and intra-sentential switches, suggesting that at least…

  3. On Some Ternary LCD Codes

    OpenAIRE

    Darkunde, Nitin S.; Patil, Arunkumar R.

    2018-01-01

    The main aim of this paper is to study $LCD$ codes. Linear code with complementary dual($LCD$) are those codes which have their intersection with their dual code as $\\{0\\}$. In this paper we will give rather alternative proof of Massey's theorem\\cite{8}, which is one of the most important characterization of $LCD$ codes. Let $LCD[n,k]_3$ denote the maximum of possible values of $d$ among $[n,k,d]$ ternary $LCD$ codes. In \\cite{4}, authors have given upper bound on $LCD[n,k]_2$ and extended th...

  4. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  5. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. \\paragraph*{Results:} Theoretical derivations showed that parameter...... coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being the best. \\paragraph*{Conclusions:} Different allele coding methods lead to the same inference in the marker-based and equivalent models when a fixed...

  6. Polynomial weights and code constructions.

    Science.gov (United States)

    Massey, J. L.; Costello, D. J., Jr.; Justesen, J.

    1973-01-01

    Study of certain polynomials with the 'weight-retaining' property that any linear combination of these polynomials with coefficients in a general finite field has Hamming weight at least as great as that of the minimum-degree polynomial included. This fundamental property is used in applications to Reed-Muller codes, a new class of 'repeated-root' binary cyclic codes, two new classes of binary convolutional codes derived from binary cyclic codes, and two new classes of binary convolutional codes derived from Reed-Solomon codes.

  7. Introduction and Overview of the Industrial Interactive Panel Session

    Science.gov (United States)

    Seiler, David

    2014-03-01

    A unique industrial panel covering the challenges and needs of various industries and how being innovative is important. The session involves two invited industry speakers (24 minutes each) who will set the stage for the interactive round table panel session. The Panel, led by moderator Mark Bernius (Morgan Advanced Materials), consists of the two invited speakers plus an additional five industry panelists. The first thirty minutes of the panel session has the five additional panelists introducing themselves and their work/company. These introductions could include what they or their company does, sharing one or two technical highlights, listing some challenges or needs for physicists, and what innovation breakthroughs are needed in their industries. The final hour of the session will be highly interactive with questions to the panel coming from the moderator, the audience, and the panelists themselves. Questions that might be addressed include: how physicists are or could be critical in advancing innovation; how can AIP/APS/FIAP help industry get the physics help they need to be innovative (knowledge, the right staff, etc.); what role can students and post docs play in advancing industry's mission; etc. We invite you to participate in this interactive session and ask our industry experts your own interesting and challenging questions. The invited speakers are George Thompson, Intel, and Rick Watkins, Nike. The panel members also include Jason Cleveland, Asylum Research; Robert Doering, Texas Instruments; William Gallagher, IBM T.J. Watson Research Center; James Hollenhorst, Agilent Technologies; and Martin Poitzsch, Schlumberger-Doll Research.

  8. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  9. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  10. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  11. New Code Matched Interleaver for Turbo Codes with Short Frames

    Directory of Open Access Journals (Sweden)

    LAZAR, G. A.

    2010-02-01

    Full Text Available Turbo codes are a parallel concatenation of two or more convolutional codes, separated by interleavers, therefore their performance is not influenced just by the constituent encoders, but also by the interleaver. For short frame turbo codes, the selection of a proper interleaver becomes critical. This paper presents a new algorithm of obtaining a code matched interleaver leading to a very high minimum distance and improved performance.

  12. New residential construction compliance: Evaluation of the Washington State Energy Code program

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, W.M.; Lee, A.D.; Sandahl, L.J.; Durfee, D.L.; Richman, E.E.

    1993-07-01

    This report describes the Pacific Northwest Laboratory`s (PNL`s) evaluation of the Washington State Energy Code Program (WSECP). In 1990, the Washington State Legislature passed a residential energy efficiency code to be effective July 1, 1992. Bonneville supported passage and implementation of the code to ensure that new residences in the State of Washington were as energy efficient as economically feasible. The Washington State Energy Office (WSEO) is conducting the WSECP for Bonneville to support code implementation. This support takes several forms, including providing training to code enforcement officials, technical support both in the field and through telephone ``hot lines,`` and computerized tools to review house plans for code compliance. WSEO began implementing the WSECP in 1992, prior to the effective date of the new code. This first phase of the WSECP was the subject of an earlier process evaluation conducted by PNL. From that evaluation PNL found that most new homes being built immediately after the code went into effect were ``grand-fathered`` under the old code. The training program for the new code was in place and sessions were being attended by the jurisdictions but it was too early to determine if the training was effective in improving code compliance and easing the transition to the new energy code. That is the subject of this evaluation.

  13. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  14. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    P. C. Catherine. K. M. S Soyjaudah. Department of Electrical and Electronics Engineering ... in the 1960's, Gallager in his PhD thesis worked on low-density parity-check (LDPC) codes (Gallager 1963). ..... In any case however, it is hoped that the ideas behind TG codes will help in the development of future intelligent coding ...

  15. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  16. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    This work proposes a blend of the two technologies, yielding a code that we nicknamed Turbo-Gallager or TG Code. The code has additional “intelligence” compared to its parents. It detects and corrects the so-called “undetected errors” and recovers from individual decoder failure by making use of a network of decoders.

  17. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist. Leadership Training           Training Course Title Next Session Language Duration Available places Needed to maintain the session Driving for Impact and Influence 13-Sep-2016 to 14-Sep-2016 French 2 days 4 0 Essentials of People Management for CERN Supervisors (Adapted from CDP for CERN Supervisors) 22-Sep-2016 to 23-Sep-2016, 18-Nov-2016, 17-Jan-2017 to 18-Jan-2017 English 5 days 5 0 Eléments essentiels de la gestion du personnel pour les superviseurs (adapt&a...

  18. Effects of traditional judo training session on muscle damage symptoms.

    Science.gov (United States)

    Detanico, Daniele; Dal Pupo, Juliano; Franchini, Emerson; Fukuda, David H; Dos Santos, Saray G

    2017-06-01

    This study aimed to analyze the acute effects of a judo training session on muscle strength, delayed-onset muscle soreness (DOMS), and serum creatine kinase (CK) activity. Ten male judo athletes participated in this study and performed a 90-min traditional judo training session. The following measurements were performed before and 48 hours after the training: shoulder external/internal rotation isokinetic torque, countermovement jump (CMJ), DOMS, and blood draw for serum CK analysis. Student's t-test with significance level set at 5% and, effect size analysis were used. Significant reduction was found in jump height in the CMJ after the training session (2.9%; moderate effect; P=0.02). No significant differences were observed in any of the measures of shoulder external/internal rotation isokinetic torque (P>0.05). An increase of the serum CK (49.4%; moderate effect; P=0.01) and DOMS (20.6%; large effect; P=0.003) were noted after the training session when compared to baseline. Judo training session resulted in increased serum CK activity, and muscle soreness. The decrease of CMJ performance indicates impairment in the lower-limbs muscle power production. However, the lack of difference of shoulder external/internal rotation torque before and 48 hours after the training session may indicate that the interval was enough to recover the upper-limbs strength in judokas of this study. These markers of muscle damage can be used to control muscle adaptation progress and to avoid sports-related disorders of athletes with similar characteristics to those evaluated in this study.

  19. The therapeutic focus in significant sessions of master therapists: a comparison of cognitive-behavioral and psychodynamic-interpersonal interventions.

    Science.gov (United States)

    Goldfried, M R; Raue, P J; Castonguay, L G

    1998-10-01

    Using the Coding System of Therapeutic Focus, this exploratory study was a comparative process analysis of clinically significant sessions obtained from 22 master cognitive-behavior and 14 master psychodynamic-interpersonal therapists. Therapists were nominated by experts in each of these orientations, and clients were seen in a naturalistic setting for problems with anxiety, depression, or both. Relatively few between-groups differences emerged with this master therapist sample. However, regardless of theoretical orientation, several differences were found between those portions of the session labeled by therapists as being clinically significant and those viewed as less significant. As these findings are different from those obtained in a previous study of the therapeutic focus in interventions carried out within the context of a controlled clinical trial, some of the possible factors contributing to these differences are noted.

  20. In-session processes of brief motivational interventions in two trials with mandated college students.

    Science.gov (United States)

    Borsari, Brian; Apodaca, Timothy R; Jackson, Kristina M; Mastroleo, Nadine R; Magill, Molly; Barnett, Nancy P; Carey, Kate B

    2015-02-01

    Each year, thousands of college students receive mandated intervention as a sanction for alcohol use or alcohol-related behavior. For these mandated students, brief motivational interventions (BMIs) are currently the most efficacious individual intervention. However, little is known about how the technical (therapist behaviors) and relational (e.g., global ratings of therapist empathy) components of BMIs influence client language as well as subsequent change in alcohol use and consequences. This study used the Motivational Interviewing Skills Code (MISC 2.0; Miller, Moyers, Ernst, & Amrhein, 2003) to code BMI sessions from 2 randomized clinical trials that facilitated significant reductions in alcohol use (Study 1, n = 91) and alcohol-related consequences (Study 2, n = 158) in mandated students. There were significant relationships among therapist behaviors, global scores, and client language both for and against change, yet there were no links between in-session client language and subsequent changes in alcohol use or problems. In contrast, relational aspects of motivational interviewing (MI; global ratings of therapist MI Spirit and client self-exploration) were most predictive of postsession alcohol use. Mediation models incorporating both technical and relational components revealed that higher levels of client self-exploration mediated the relationship between higher therapist ratings of MI Spirit and reduced drinking at follow-up. Findings highlight the importance of considering how both technical and relational components of MI may influence alcohol use in mandated college students and also suggest more exact analyses to better understand this complex relationship. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  1. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  2. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  3. USING SESSION RPE TO MONITOR DIFFERENT METHODS OF RESISTANCE EXERCISE

    Directory of Open Access Journals (Sweden)

    Alison D. Egan

    2006-06-01

    Full Text Available The purpose of this study was to compare session rating of perceived exertion for different resistance training techniques in the squat exercise. These techniques included traditional resistance training, super slow, and maximal power training. Fourteen college-age women (Mean ± SD; age = 22 ± 3 years; height = 1.68 ± 0. 07 m completed three experimental trials in a randomized crossover design. The traditional resistance training protocol consisted of 6 sets of 6 repetitions of squats using 80% of 1-RM. The super slow protocol consisted of 6 sets of 6 repetitions using 55% of 1-RM. The maximal power protocol consisted of 6 sets of 6 repetitions using 30% of 1-RM. Rating of perceived exertion (RPE measures were obtained following each set using Borg's CR-10 scale. In addition, a session RPE value was obtained 30 minutes following each exercise session. When comparing average RPE and session RPE, no significant difference was found. However, power training had significantly lower (p < 0.05 average and session RPE (4.50 ± 1.9 and 4.5 ± 2.1 compared to both super slow training (7.81 ± 1.75 and 7.43 ± 1.73 and traditional training (7.33 ± 1.52 and 7.13 ± 1.73. The results indicate that session RPE values are not significantly different from the more traditional methods of measuring RPE during exercise bouts. It does appear that the resistance training mode that is used results in differences in perceived exertion that does not relate directly to the loading that is used. Using session RPE provides practitioners with the same information about perceived exertion as the traditional RPE measures. Taking a single measure following a training session would appear to be much easier than using multiple measures of RPE throughout a resistance training workout. However, practitioners should also be aware that the RPE does not directly relate to the relative intensity used and appears to be dependent on the mode of resistance exercise that is used

  4. Session control using PHP and MySQL

    OpenAIRE

    Shi, Yang

    2011-01-01

    My project is to build an online shopping website. Recently, it has become a popular trend for an increasing amount of people to choose online shopping. It is very convenient and suitable for people’s fast-paced lifestyle nowadays. The main function I want to implement is shopping cart. Session control is the core technology to support me achieving shopping cart. The idea of it is to be able to track a user during a single session on a website. HTTP protocol has no built-in way of maintai...

  5. Mini-conference and Related Sessions on Laboratory Plasma Astrophysics

    Energy Technology Data Exchange (ETDEWEB)

    Hantao Ji

    2004-02-27

    This paper provides a summary of some major physics issues and future perspectives discussed in the Mini-Conference on Laboratory Plasma Astrophysics. This Mini-conference, sponsored by the Topical Group on Plasma Astrophysics, was held as part of the American Physical Society's Division of Plasma Physics 2003 Annual Meeting (October 27-31, 2003). Also included are brief summaries of selected talks on the same topic presented at two invited paper sessions (including a tutorial) and two contributed focus oral sessions, which were organized in coordination with the Mini-Conference by the same organizers.

  6. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  7. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  8. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  9. Coded nanoscale self-assembly

    Indian Academy of Sciences (India)

    the number of starting particles. Figure 6. Coded self-assembly results in specific shapes. When the con- stituent particles are coded to only combine in a certain defined rules, it al- ways manages to generate the same shape. The simplest case of linear coding with multiseed option is presented here. in place the resultant ...

  10. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  11. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...

  12. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  13. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  14. Time-Varying Space-Only Codes for Coded MIMO

    CERN Document Server

    Duyck, Dieter; Takawira, Fambirai; Boutros, Joseph J; Moeneclaey, Marc

    2012-01-01

    Multiple antenna (MIMO) devices are widely used to increase reliability and information bit rate. Optimal error rate performance (full diversity and large coding gain), for unknown channel state information at the transmitter and for maximal rate, can be achieved by approximately universal space-time codes, but comes at a price of large detection complexity, infeasible for most practical systems. We propose a new coded modulation paradigm: error-correction outer code with space-only but time-varying precoder (as inner code). We refer to the latter as Ergodic Mutual Information (EMI) code. The EMI code achieves the maximal multiplexing gain and full diversity is proved in terms of the outage probability. Contrary to most of the literature, our work is not based on the elegant but difficult classical algebraic MIMO theory. Instead, the relation between MIMO and parallel channels is exploited. The theoretical proof of full diversity is corroborated by means of numerical simulations for many MIMO scenarios, in te...

  15. Genetic code for sine

    Science.gov (United States)

    Abdullah, Alyasa Gan; Wah, Yap Bee

    2015-02-01

    The computation of the approximate values of the trigonometric sines was discovered by Bhaskara I (c. 600-c.680), a seventh century Indian mathematician and is known as the Bjaskara's I's sine approximation formula. The formula is given in his treatise titled Mahabhaskariya. In the 14th century, Madhava of Sangamagrama, a Kerala mathematician astronomer constructed the table of trigonometric sines of various angles. Madhava's table gives the measure of angles in arcminutes, arcseconds and sixtieths of an arcsecond. The search for more accurate formulas led to the discovery of the power series expansion by Madhava of Sangamagrama (c.1350-c. 1425), the founder of the Kerala school of astronomy and mathematics. In 1715, the Taylor series was introduced by Brook Taylor an English mathematician. If the Taylor series is centered at zero, it is called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. Some of the important Maclaurin series expansions include trigonometric functions. This paper introduces the genetic code of the sine of an angle without using power series expansion. The genetic code using square root approach reveals the pattern in the signs (plus, minus) and sequence of numbers in the sine of an angle. The square root approach complements the Pythagoras method, provides a better understanding of calculating an angle and will be useful for teaching the concepts of angles in trigonometry.

  16. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  17. Functions of Arabic-English Code-Switching: Sociolinguistic Insights from a Study Abroad Program

    Science.gov (United States)

    Al Masaeed, Khaled

    2013-01-01

    This sociolinguistic study examines the functions and motivations of code-switching, which is used here to mean the use of more than one language in the same conversation. The conversations studied here take place in a very particular context: one-on-one speaking sessions in a study abroad program in Morocco where English is the L1 and Arabic the…

  18. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  19. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  20. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  1. 2014 DOHaD ANZ conference early researcher session

    OpenAIRE

    Li, Minglan

    2015-01-01

    Poster designed for 2014 DOHaD ANZ conference early career researcher session by Minglan Li. Avaliable on official facebook page of DOHaD ANZ: https://www.facebook.com/pages/DOHaD-Society-of-ANZ/550495295025355  

  2. Session B1 Management for sustainable use — Rangeland auditing ...

    African Journals Online (AJOL)

    Adaptive frameworks which enhance sustainable strategic responses, and the state of art in scale dilemmas will be addressed. A hybrid session structure will be utilised: distilling wisdom from relevant posters; formal presentations; and stimulating structured debate. African Journal of Range & Forage Science 2003, 20(2): ...

  3. Factors contributing to defaulting scheduled therapy sessions by ...

    African Journals Online (AJOL)

    social stigma towards physical disabilities and socio-political and cultural histories all of which make it arduous for caregivers to adhere to scheduled therapy sessions12. Caregivers in our study could not specifically pin point whether they had accessed physiotherapy, occupational therapy or speech therapy services.

  4. Setting the Standards for Sessional Staff: Quality Learning and Teaching

    Science.gov (United States)

    Harvey, Marina

    2013-01-01

    Across the Australian Higher Education sector a focus on quality is driving a new paradigm for learning and teaching: quality standards. One challenge is to engage all academics with this progress towards systematic quality enhancement and assurance. Sessional staff, who provide most of the face-to-face teaching in Australian universities, remain…

  5. Characteristic bisimulation for higher-order session processes

    NARCIS (Netherlands)

    Kouzapas, Dimitrios; Pérez, Jorge A.; Yoshida, Nobuko

    For higher-order (process) languages, characterising contextual equivalence is a long-standing issue. In the setting of a higher-order ππ -calculus with session types, we develop characteristic bisimilarity, a typed bisimilarity which fully characterises contextual equivalence. To our knowledge,

  6. Our Place in the Universe. Session 1; History of Astronomy

    Science.gov (United States)

    Adams, Mitzi

    2016-01-01

    This session includes a very broad overview of a couple of the major ideas of astronomy, along with demonstrations of Earth's motions that, give rise to the seasons, show us the "faces" of Venus (and the Moon), and result in retrograde motion of the outer planets.

  7. A Student Experience of Peer Assisted Study Sessions in Physiotherapy

    Science.gov (United States)

    Sole, Gisela; Rose, Andrew; Bennet, Tracey; Jaques, Katrina; Rippon, Zoe; van der Meer, Jacques

    2012-01-01

    Peer Assisted Study Sessions (PASS) were introduced as an optional learning experience in a Bachelor of Physiotherapy programme. The aim of this study was to evaluate the use of PASS from the student perspective. Eight third year physiotherapy students who had participated in PASS during their second year of training attended a focus group, at…

  8. Effects of Psychotherapy Training and Intervention Use on Session Outcome

    Science.gov (United States)

    Boswell, James F.; Castonguay, Louis G.; Wasserman, Rachel H.

    2010-01-01

    Objective: This study was an investigation of the relationships among therapist training variables, psychotherapy process, and session outcome in a psychotherapy training clinic. The aims were to assess the relationship between "training as usual" and intervention use in individual psychotherapy, to investigate the relationship between therapist…

  9. Brief Classroom Training Sessions for Workplace Readiness: Are They Effective?

    Science.gov (United States)

    Palesy, Debra

    2017-01-01

    Classroom training sessions for new home care workers (HCWs) are often brief and ad hoc, varying in format and content. Yet the application of this training may be central to worker and client safety. A qualitative approach was adopted for this inquiry, comprising two separate but related practical studies. In the first, exploratory study,…

  10. CWI at TREC 2012, KBA track and Session Track

    NARCIS (Netherlands)

    S. Araújo (Samur); C. Boscarino (Corrado); G.G. Gebremeskel (Gebre); J. He (Jiyin); A.P. de Vries (Arjen); E.M. Voorhees; L. P. Buckland (Buckland, Lori P.)

    2013-01-01

    htmlabstractWe participated in two tracks: Knowledge Base Acceleration (KBA) Track and Session Track. In the KBA track, we focused on experi- menting with different approaches as it is the first time the track is launched. We experimented with supervised and unsupervised re- trieval models. Our

  11. Urban and Suburban Geographies of Ageing : session 1 and 2

    NARCIS (Netherlands)

    Lager, Debbie; Negrini, Chiara; van Hoven, Bettina; Schwanen, Tim

    2014-01-01

    We seek to organise two sessions to explore the relationships of older people and ageing with place, with a particular focus on urban and suburban environments. Up till now, research in the field of ageing and place has been dominated by social and environmental gerontologists. Recently, Schwanen et

  12. Premenstrual mood and empathy after a single light therapy session

    NARCIS (Netherlands)

    aan het Rot, Marije; Miloserdov, Kristina; Buijze, Anna L. F.; Meesters, Ybe; Gordijn, Marijke C. M.

    2017-01-01

    To examine whether acute changes in cognitive empathy might mediate the impact of light therapy on mood, we assessed the effects of a single light-therapy session on mood and cognitive empathy in 48 premenstrual women, including 17 who met Premenstrual Symptoms Screening Tool criteria for

  13. Measuring TPACK... Yes! But how? A working session

    NARCIS (Netherlands)

    Fisser, P.; Ervin, L.; Voogt, J.; Koehler, M.; Searson, M.; Ochoa, M.

    2014-01-01

    Many instruments are being developed within the international TPACK community. This roundtable session would serve as an opportunity to begin the dialogue necessary to the creation of an instrument that pulls together lessons learned from previous research and assessment design principles. We will

  14. Definitional Ceremonies: Integrating Community into Multicultural Counseling Sessions

    Science.gov (United States)

    Bitter, James Robert; Robertson, Patricia E.; Roig, Grace; Disqueact, J. Graham

    2004-01-01

    Definitional Ceremonies are used as a forum for integrating members of diverse cultures into multicultural counseling sessions. The authors provide a philosophical foundation, implementation process, and excerpts from a typescript of a recent definitional ceremony involving a women and her mother, both recently in the United States from Panama.

  15. Discussant Remarks on Session: Statistical Aspects of Measuring the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, Les

    1999-04-02

    These remarks will briefly summarize what we learn from the talks in this session, and add some more areas in Internet Measurement that may provide challenges for statisticians. It will also point out some reasons why statisticians may be interested in working in this area.

  16. Reversibility in session-based concurrency : A fresh look

    NARCIS (Netherlands)

    Mezzina, Claudio Antares; Pérez, Jorge A.

    Much research has studied foundations for correct and reliable communication-centric software systems. A salient approach to correctness uses verification based on session types to enforce structured communications; a recent approach to reliability uses reversible actions as a way of reacting to

  17. Secure bindings of SAML assertions to TLS sessions

    DEFF Research Database (Denmark)

    Kohlar, Florian; Schwenk, Jörg; Jensen, Meiko

    2010-01-01

    is to strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. In this paper, we present a third approach which is of further interest beyond IDM protocols: we bind the SAML assertion to the TLS session that has been agreed upon between client and the service...

  18. Hypnosis and Smoking: A Five-Session Approach.

    Science.gov (United States)

    Watkins, Helen H.

    An active five-session, individualized treatment approach to the stopping of smoking is described. This approach emphasized the following: (a) the feedback, in and out of hypnosis, of the client's own reasons for quitting, (b) the visualization of both positive and negative smoking experiences meaningful to the client, (c) maintaining contact with…

  19. 3rd Session of the Sant Cugat Forum on Astrophysics

    CERN Document Server

    Gravitational wave astrophysics

    2015-01-01

    This book offers review chapters written by invited speakers of the 3rd Session of the Sant Cugat Forum on Astrophysics — Gravitational Waves Astrophysics. All chapters have been peer reviewed. The book goes beyond normal conference proceedings in that it provides a wide panorama of the astrophysics of gravitational waves and serves as a reference work for researchers in the field.

  20. Attitudes of Healthcare Students on Gross Anatomy Laboratory Sessions

    Science.gov (United States)

    Kawashiro, Yukiko; Anahara, Reiko; Kohno, Toshihiko; Mori, Chisato; Matsuno, Yoshiharu

    2009-01-01

    At Chiba University, gross anatomy laboratory sessions ("laboratories") are required for physical therapy students. Though most physical therapy schools require their students to participate in laboratories so that they will better understand the structure of the human body, few data exist on the value of these laboratories specifically…

  1. Session A4 Rangelands as dynamic systems — Desertification ...

    African Journals Online (AJOL)

    The United Nations Convention to Combat Desertification (UNCCD) makes special mention of the desertification problem in Africa. This session will provide an up to date overview of the extent of desertification in Africa and reflect on some of the problems associated with the measurement of the phenomenon.

  2. 76 FR 41278 - Cargo Security Risk Reduction; Public Listening Sessions

    Science.gov (United States)

    2011-07-13

    ... SECURITY Coast Guard Cargo Security Risk Reduction; Public Listening Sessions AGENCY: Coast Guard, DHS... public and private sector stakeholders, across the Security Spectrum.\\1\\ \\1\\ The Security Spectrum... progress and development of a CDC Security National Strategy to reduce risks associated with the transport...

  3. Summary of the Open Session at the IMC 2016

    Science.gov (United States)

    Verbeeck, C.; Argo, M.; Brown, P.; Molau, S.; Rendtel, J.; Martínez Picar, A.

    2016-01-01

    The Open Session at the IMC 2016 took place on Friday, June 3rd 2016 evening (21:30-22:30) and was intended to accommodate beginners' questions about meteor astronomy. Megan Argo moderated a panel of experts, consisting of Peter Brown, Sirko Molau, Jürgen Rendtel, and Antonio Martínez Picar.

  4. The World of Organic Agriculture (Session at the BIOFACH 2017)

    OpenAIRE

    Willer, Helga; Lernoud, Julia; Huber, Beate; Sahota, Amarjit

    2017-01-01

    The World of Organic Agriculture 2017 www.organic-world.net Presentations at the Session "The World of Organic Agriculture" - Organic Agriculture Worldwide 2017: Current Statistics (Dr. Helga Willer, Julia Lernoud) - Global survey on Voluntary Sustainability Standards (VSS) (Julia Lernoud, Dr. Helga Willer) - Regulations and Certification Emerging Trends 2017 (Beate Huber) - Global Organic Food & Drink: Market Update & Challenges (Amarjit Sahota)

  5. Freshman Orientation Sessions Can Teach Incoming Students about Healthful Lifestyles

    Science.gov (United States)

    Freedman, Marjorie R.; Waldrop, Jennifer

    2011-01-01

    This GEM describes the "Freshman 15 Jeopardy" workshop, a 30-minute nutrition education session aimed to expose incoming college freshmen to the college food environment, to increase their awareness of factors that cause weight gain, and to instruct them on lifestyle choices they could employ to prevent weight gain. This short workshop has not…

  6. Peer Assisted Study Sessions for Postgraduate International Students in Australia

    Science.gov (United States)

    Zaccagnini, Melissa; Verenikina, Irina

    2013-01-01

    Peer Assisted Study Sessions (PASS), a peer led academic support program that has multiple documented academic, social, and transition benefits, is increasingly being utilised in Australian institutions. Whilst PASS has been evaluated from multiple angles in regard to the undergraduate cohort, there is limited research regarding the benefits of…

  7. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  8. POWERLIFTING SESSIONS PROMOTE SIGNIFICANT POST-EXERCISE HYPOTENSION

    Directory of Open Access Journals (Sweden)

    Gustavo Allegretti João

    Full Text Available ABSTRACT Introduction: Powerlifting (PWL is a worldwide method, frequently used in resistance training programs. However, the relationship between cardiovascular responses and PWL is still unclear in the literature. Objective: To evaluate acute cardiovascular overload and post-exercise hypotension (PEH after acute powerlifting exercise session in subjects with experience in the modality. Methods: Nine powerlifting athletes (34 ± 5 years participated voluntarily in this study. The following exercises were used in the session: squat, bench press and deadlift (95% of 1 RM, 2 to 5 repetitions. The anthropometric parameters and blood pressure (systolic, diastolic and mean were evaluated immediately, 5', 10', 30', 60' and 24 hours after the exercise session with a non-invasive automatic pressure monitor. Results: Significant differences (p<0.05 were found between rest and immediately after exercise on systolic (135 ± 6 vs. 153 ± 10 mmHg and mean (102 ± 3 vs. 108 ± 3 mmHg blood pressures, but no difference was found at diastolic (85 ± 3 vs. 85 ± 4 mmHg blood pressure. Additionally, the increase in systolic pressure did not reach values considered as a risk of cardiovascular overload. Significant PEH was found after 60 minutes (systolic: -12 ± 12%, diastolic: -5 ± 6% and mean: -7 ± 5% and 24 hours after PWL session (systolic: -5 ± 4%, diastolic: -8 ± 4% and mean: -7 ± 3%. Conclusion: Our data demonstrated that a PWL session does not increase systolic blood pressure up to the risk range and promotes PEH after 60 minutes of exercise and that this cardiovascular response persisted after 24 hours post-exertion in powerlifting athletes.

  9. Peripheral coding of taste

    Science.gov (United States)

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  10. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  11. [Neural codes for perception].

    Science.gov (United States)

    Romo, R; Salinas, E; Hernández, A; Zainos, A; Lemus, L; de Lafuente, V; Luna, R

    This article describes experiments designed to show the neural codes associated with the perception and processing of tactile information. The results of these experiments have shown the neural activity correlated with tactile perception. The neurones of the primary somatosensory cortex (S1) represent the physical attributes of tactile perception. We found that these representations correlated with tactile perception. By means of intracortical microstimulation we demonstrated the causal relationship between S1 activity and tactile perception. In the motor areas of the frontal lobe is to be found the connection between sensorial and motor representation whilst decisions are being taken. S1 generates neural representations of the somatosensory stimuli which seen to be sufficient for tactile perception. These neural representations are subsequently processed by central areas to S1 and seem useful in perception, memory and decision making.

  12. Code-labelling

    DEFF Research Database (Denmark)

    Spangsberg, Thomas Hvid; Brynskov, Martin

    in programming education collected in an Action Research cycle. The results support the use of a structural approach to teaching programming to this target audience; particularly, the translation-grammar method seems to integrate well with programming education. The paper also explores the potential underlying......The code-labelling exercise is an attempt to apply natural language education techniques for solving the challenge of teaching introductory programming to non-STEM novices in higher education. This paper presents findings from a study exploring the use of natural language teaching techniques...... reasons. It seems the exercise invokes an assimilation of student's existing cognitive schemata and supports a deep-learning experience. The exercise is an invitation to other teachers to create further iterations to improve their own teaching. It also seeks to enrich the portfolio of teaching activities...

  13. Transionospheric Propagation Code (TIPC)

    Science.gov (United States)

    Roussel-Dupre, Robert; Kelley, Thomas A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of VHF signals following propagation through the ionosphere. The code is written in FORTRAN 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, delta times of arrival (DTOA) study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of DTOAs vs TECs for a specified pair of receivers.

  14. Galois LCD Codes over Finite Fields

    OpenAIRE

    Liu, Xiusheng; Fan, Yun; Liu, Hualu

    2017-01-01

    In this paper, we study the complementary dual codes in more general setting (which are called Galois LCD codes) by a uniform method. A necessary and sufficient condition for linear codes to be Galois LCD codes is determined, and constacyclic codes to be Galois LCD codes are characterized. Some illustrative examples which constacyclic codes are Galois LCD MDS codes are provided as well. In particular, we study Hermitian LCD constacyclic codes. Finally, we present a construction of a class of ...

  15. Quantum Quasi-Cyclic LDPC Codes

    OpenAIRE

    Hagiwara, Manabu; Imai, Hideki

    2007-01-01

    In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known a...

  16. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  17. 75 FR 34418 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-06-17

    ... Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: The notice announces the Specialty Crop Committee's Stakeholder Listening Session. The... stakeholder listening session on July 21st, 2010 from 9 a.m.-3 p.m. Dated: June 10, 2010. Yvette Anderson...

  18. 77 FR 16074 - Notice of Listening Sessions on Implementation of Unemployment Insurance Provisions of the Middle...

    Science.gov (United States)

    2012-03-19

    ... Employment and Training Administration Notice of Listening Sessions on Implementation of Unemployment... listening sessions. SUMMARY: This notice announces listening sessions designed to gain input from employers... requirements. Times and Dates: The listening sessions for the STC and SEA programs are as follows: Short Time...

  19. 77 FR 55860 - Tribal Listening Sessions on Sacred Sites on Federal Lands

    Science.gov (United States)

    2012-09-11

    ... Bureau of Indian Affairs Tribal Listening Sessions on Sacred Sites on Federal Lands AGENCY: Bureau of Indian Affairs, Interior. ACTION: Notice. SUMMARY: Indian Affairs will conduct a listening session with... session in Tulsa, Oklahoma, is the sixth in a series of listening sessions held since the beginning of...

  20. Footprints in the Woods:"Tracking" a Nursery Child through a Forest School Session

    Science.gov (United States)

    Mackinder, Melanie

    2017-01-01

    Forest School has become increasingly popular in the UK, although little is known about what actually happens in sessions and how these sessions are planned. Using observations of two sessions and semi-structured interviews with two adult leaders this article sets out to explore how the sessions are planned, alongside a young child (aged 2-4…

  1. acute and session rPe responses during resistance training: Bouts ...

    African Journals Online (AJOL)

    developed the concept of session RPE. This RPE paradigm relative to the entire workout is estimated in the post- exercise period and is not associated with any specific time point in the bout. This permits a subjective estimation for an entire training session. Session RPE has been used to quantify RT sessions. A.

  2. Adaptations to short, frequent sessions of endurance and strength training are similar to longer, less frequent exercise sessions when the total volume is the same

    DEFF Research Database (Denmark)

    Kilen, Anders; Hjelvang, Line B; Dall, Niels

    2015-01-01

    ]: n = 21) performed nine 15-minute training sessions weekly, whereas a second group ("classical training" [CL]: n = 8) completed exactly the same training on a weekly basis but as three 45-minute sessions. For each group, each session comprised exclusively strength, high-intensity cardiovascular...

  3. Benchmarking Tokamak edge modelling codes

    Science.gov (United States)

    Contributors To The Efda-Jet Work Programme; Coster, D. P.; Bonnin, X.; Corrigan, G.; Kirnev, G. S.; Matthews, G.; Spence, J.; Contributors to the EFDA-JET work programme

    2005-03-01

    Tokamak edge modelling codes are in widespread use to interpret and understand existing experiments, and to make predictions for future machines. Little direct benchmarking has been done between the codes, and the users of the codes have tended to concentrate on different experimental machines. An important validation step is to compare the codes for identical scenarios. In this paper, two of the major edge codes, SOLPS (B2.5-Eirene) and EDGE2D-NIMBUS are benchmarked against each other. A set of boundary conditions, transport coefficients, etc. for a JET plasma were chosen, and the two codes were run on the same grid. Initially, large differences were seen in the resulting plasmas. These differences were traced to differing physics assumptions with respect to the parallel heat flux limits. Once these were switched off in SOLPS, or implemented and switched on in EDGE2D-NIMBUS, the remaining differences were small.

  4. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  5. IRIG Serial Time Code Formats

    Science.gov (United States)

    2016-08-01

    and G. It should be noted that this standard reflects the present state of the art in serial time code formatting and is not intended to constrain...separation for visual resolution. The LSB occurs first except for the fractional seconds subword that follows the day-of-year subword. The BCD TOY code...and P6 to complete the BCD time code word. An index marker occurs between the decimal digits in each subword to provide separation for visual

  6. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  7. Indices for Testing Neural Codes

    OpenAIRE

    Jonathan D. Victor; Nirenberg, Sheila

    2008-01-01

    One of the most critical challenges in systems neuroscience is determining the neural code. A principled framework for addressing this can be found in information theory. With this approach, one can determine whether a proposed code can account for the stimulus-response relationship. Specifically, one can compare the transmitted information between the stimulus and the hypothesized neural code with the transmitted information between the stimulus and the behavioral response. If the former is ...

  8. Session: Avoiding, minimizing, and mitigating avian and bat impacts

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Kerlinger, Paul

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question answer period. The session addressed a variety of questions related to avoiding, minimizing, and mitigating the avian and bat impacts of wind power development including: what has been learned from operating turbines and mitigating impacts where they are unavoidable, such as at Altamont Pass WRA, and should there be mitigation measures such as habitat creation or land conservation where impacts occur. Other impact minimization and mitigation approaches discussed included: location and siting evaluations; options for construction and operation of wind facilities; turbine lighting; and the physical alignment/orientation. Titles and authors of the presentations were: 'Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part II' by Carl Thelander and 'Prevention and Mitigation of Avian Impacts at Wind Power Facilities' by Paul Kerlinger.

  9. 1979 New Mexico legislative session: energy issues and legislation. [WIPP

    Energy Technology Data Exchange (ETDEWEB)

    Barsumian, L.; Vandevender, S.G.

    1979-10-01

    This report is an account of the energy legislation and associated issues considered during the 1979 session of the 34th New Mexico Legislature. The session's major issue was the federal study of a proposed nuclear Waste Isolation Pilot Plant (WIPP) in New Mexico. A large proportion of time and effort was spent on resolving the state's formal position toward the federal project. However, other energy concerns were also significant even though they were neither as controversial nor as visible as the primary issue. The two most important laws enacted were the Radioactive Waste Consultation Act and the Radioactive Waste Transportation Act. The Legislature considered 47 other energy-related bills, of which 17 were enacted.

  10. A Quantum Query Expansion Approach for Session Search

    Directory of Open Access Journals (Sweden)

    Peng Zhang

    2016-04-01

    Full Text Available Recently, Quantum Theory (QT has been employed to advance the theory of Information Retrieval (IR. Various analogies between QT and IR have been established. Among them, a typical one is applying the idea of photon polarization in IR tasks, e.g., for document ranking and query expansion. In this paper, we aim to further extend this work by constructing a new superposed state of each document in the information need space, based on which we can incorporate the quantum interference idea in query expansion. We then apply the new quantum query expansion model to session search, which is a typical Web search task. Empirical evaluation on the large-scale Clueweb12 dataset has shown that the proposed model is effective in the session search tasks, demonstrating the potential of developing novel and effective IR models based on intuitions and formalisms of QT.

  11. Exploration of session process: relationship to depth and alliance.

    Science.gov (United States)

    Lingiardi, Vittorio; Colli, Antonello; Gentile, Daniela; Tanzilli, Annalisa

    2011-12-01

    This study investigates the relationship between the Depth of elaboration, the therapeutic alliance, and dimensions of the psychotherapy process--the therapist interventions, the patient contributions, and patient/therapist patterns of interaction. Sixty psychotherapy sessions that were audio-taped and transcribed were rated by external judges by using a battery of instruments that included the Psychotherapy Process Q-Set (Jones, 1985, 2000), the Working Alliance Inventory-Observer (Horvath, 1981, 1982; Horvath & Greenberg, 1989), and the Depth Scale of Session Evaluation Questionnaire (Stiles & Snow, 1984a). The results show a significant positive correlation between Depth and therapeutic alliance, as well as between Depth, therapeutic alliance, and some variables of the therapeutic process. The findings indicate the importance of therapist interventions that focus on the patient's affects, relational patterns, and the "here and now" of the relationship in the increase of the Depth of elaboration and therapeutic alliance. The clinical implications of this study will be discussed.

  12. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  13. Type systems for distributed programs components and sessions

    CERN Document Server

    Dardha, Ornela

    2016-01-01

    In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. In particular, static analysis techniques based on types and type systems are an adequate methodology considering their success in guaranteeing not only basic safety properties, but also more sophisticated ones like deadlock or lock freedom in concurrent settings. The main contributions of this book are twofold. i) We design a type system for a concurrent object-oriented calculus to statically ensure consistency of dynamic reconfigurations. ii) We define an encoding of the session pi-calculus, which models communication in distributed systems, into the standard typed pi-calculus. We use this encoding to derive properties like type safety and progress in the session pi-calculus by exploiting the corresponding properties in the standard typed pi-calculus.

  14. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  15. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  16. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  17. The FLUKA code: an overview

    Energy Technology Data Exchange (ETDEWEB)

    Ballarini, F [University of Pavia and INFN (Italy); Battistoni, G [University of Milan and INFN (Italy); Campanella, M; Carboni, M; Cerutti, F [University of Milan and INFN (Italy); Empl, A [University of Houston, Houston (United States); Fasso, A [SLAC, Stanford (United States); Ferrari, A [CERN, CH-1211 Geneva (Switzerland); Gadioli, E [University of Milan and INFN (Italy); Garzelli, M V [University of Milan and INFN (Italy); Lantz, M [University of Milan and INFN (Italy); Liotta, M [University of Pavia and INFN (Italy); Mairani, A [University of Pavia and INFN (Italy); Mostacci, A [Laboratori Nazionali di Frascati, INFN (Italy); Muraro, S [University of Milan and INFN (Italy); Ottolenghi, A [University of Pavia and INFN (Italy); Pelliccioni, M [Laboratori Nazionali di Frascati, INFN (Italy); Pinsky, L [University of Houston, Houston (United States); Ranft, J [Siegen University, Siegen (Germany); Roesler, S [CERN, CH-1211 Geneva (Switzerland); Sala, P R [University of Milan and INFN (Italy); Scannicchio, D [University of Pavia and INFN (Italy); Trovati, S [University of Pavia and INFN (Italy); Villari, R; Wilson, T [Johnson Space Center, NASA (United States); Zapp, N [Johnson Space Center, NASA (United States); Vlachoudis, V [CERN, CH-1211 Geneva (Switzerland)

    2006-05-15

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  18. The FLUKA Code: an Overview

    Energy Technology Data Exchange (ETDEWEB)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M.V.; Lantz, M.; Liotta, M.; Mairani,; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P.R.; /Milan U. /INFN, Milan /Pavia U. /INFN, Pavia /CERN /Siegen U.

    2005-11-09

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  19. Understanding perception through neural "codes".

    Science.gov (United States)

    Freeman, Walter J

    2011-07-01

    A major challenge for cognitive scientists is to deduce and explain the neural mechanisms of the rapid transposition between stimulus energy and recalled memory-between the specific (sensation) and the generic (perception)-in both material and mental aspects. Researchers are attempting three explanations in terms of neural codes. The microscopic code: cellular neurobiologists correlate stimulus properties with the rates and frequencies of trains of action potentials induced by stimuli and carried by topologically organized axons. The mesoscopic code: cognitive scientists formulate symbolic codes in trains of action potentials from feature-detector neurons of phonemes, lines, odorants, vibrations, faces, etc., that object-detector neurons bind into representations of stimuli. The macroscopic code: neurodynamicists extract neural correlates of stimuli and associated behaviors in spatial patterns of oscillatory fields of dendritic activity, which self-organize and evolve on trajectories through high-dimensional brain state space. This multivariate code is expressed in landscapes of chaotic attractors. Unlike other scientific codes, such as DNA and the periodic table, these neural codes have no alphabet or syntax. They are epistemological metaphors that experimentalists need to measure neural activity and engineers need to model brain functions. My aim is to describe the main properties of the macroscopic code and the grand challenge it poses: how do very large patterns of textured synchronized oscillations form in cortex so quickly? © 2010 IEEE

  20. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  1. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  2. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  3. The FLUKA code: an overview

    Science.gov (United States)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fassò, A.; Ferrari, A.; Gadioli, E.; Garzelli, M. V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P. R.; Scannicchio, D.; Trovati, S.; Villari, R.; Wilson, T.; Zapp, N.; Vlachoudis, V.

    2006-05-01

    FLUKA is a multipurpose MonteCarlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  4. Golay and other box codes

    Science.gov (United States)

    Solomon, G.

    1992-01-01

    The (24,12;8) extended Golay Code can be generated as a 6x4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity. The odd-parity case provides the additional 12th dimension. Furthermore, any three columns and five rows of the 6 x 4 Golay form a BCH-Hamming (15,11;3) Code. Similarly a (80,58;8) code can be generated as a 10 x 8 binary matrix from the (63,57;3) BCH-Hamming Code represented as a 9 x 7 matrix by adding a row and a column both of odd and even parity. Furthermore, any seven columns along with the top nine rows is a BCH-Hamming (63,57;3) Code. A (80,40;16) 10 x 8 matrix binary code with weight structure identical to the extended (80,40;16) Quadratic Residue Code is generated from a (63,39;7) binary cyclic code represented as a 9 x 7 matrix, by adding a row and a column, both of odd or even parity.

  5. Mobility Outcomes Following Five Training Sessions with a Powered Exoskeleton.

    Science.gov (United States)

    Hartigan, Clare; Kandilakis, Casey; Dalley, Skyler; Clausen, Mike; Wilson, Edgar; Morrison, Scott; Etheridge, Steven; Farris, Ryan

    2015-01-01

    Loss of legged mobility due to spinal cord injury (SCI) is associated with multiple physiological and psychological impacts. Powered exoskeletons offer the possibility of regained mobility and reversal or prevention of the secondary effects associated with immobility. This study was conducted to evaluate mobility outcomes for individuals with SCI after 5 gait-training sessions with a powered exoskeleton, with a primary goal of characterizing the ease of learning and usability of the system. Sixteen subjects with SCI were enrolled in a pilot clinical trial at Shepherd Center, Atlanta, Georgia, with injury levels ranging from C5 complete to L1 incomplete. An investigational Indego exoskeleton research kit was evaluated for ease of use and efficacy in providing legged mobility. Outcome measures of the study included the 10-meter walk test (10 MWT) and the 6-minute walk test (6 MWT) as well as measures of independence including donning and doffing times and the ability to walk on various surfaces. At the end of 5 sessions (1.5 hours per session), average walking speed was 0.22 m/s for persons with C5-6 motor complete tetraplegia, 0.26 m/s for T1-8 motor complete paraplegia, and 0.45 m/s for T9-L1 paraplegia. Distances covered in 6 minutes averaged 64 meters for those with C5-6, 74 meters for T1-8, and 121 meters for T9-L1. Additionally, all participants were able to walk on both indoor and outdoor surfaces. Results after only 5 sessions suggest that persons with tetraplegia and paraplegia learn to use the Indego exoskeleton quickly and can manage a variety of surfaces. Walking speeds and distances achieved also indicate that some individuals with paraplegia can quickly become limited community ambulators using this system.

  6. Multi-user Session Control in Next Generation Wireless Systems

    OpenAIRE

    Eduardo Cerqueira; Paulo Mendes; Edmundo Monteiro

    2006-01-01

    Next generation IP wireless systems are envisioned to be heterogeneous and to provide ubiquitous services to mobile users with different quality of service requirements. Furthermore, in order to attract and keep customers, mobile operators are expanding their portfolio with the inclusion of publish-subscribe services, such as real-time multimedia sessions. This paper presents a signalling application layer based on the Next Steps in Signalling (NSIS) framework that aims to provide the c...

  7. Haemodialysis session: the perfect storm for vascular calcification.

    Science.gov (United States)

    Seras, Miguel; Martín de Francisco, Ángel Luis; Piñera, Celestino; Gundin, Simón; García-Unzueta, Marta; Kislikova, Maria; Albines, Zoila; Serrano, Mara; Arias, Manuel

    2015-01-01

    Vascular calcification (VC) associated to chronic kidney disease (CKD) is a complex phenomenon closely related to mineral bone metabolism disorders. Many are the factors implicated, as the drugs used in the treatment of CKD. Some in vitro studies suggest that electrolyte and acid-base disorders induced by hemodialysis (HD) may play a key role in VC. We analyzed electrolyte and acid-base disorders that occur during an HD session in 26 patients randomly assigned to 1,25 mM or 1,5 mM calcium bath. There is a calcium load in all the patients, independently of calcium bath concentration or basal serum calcium levels. At the end of the session, 100% of the patients dialyzed with 1,5 mM calcium bath have calcium serum levels > 1,3 mM. However, this only occurs in 15% of the patients dialysed with 1,25 mM calcium bath. During this calcium load, phosphorus levels persist uncontrolled. Besides, there is a progressive alkalinization in all the patients. In the end of the session 50% have serum bicarbonate > 30 mM and 23% pH > 7,5. During HD sessions occur electrolyte and acid-base disorders that induce VC: Calcium load and alkalization in presence of elevated phosphorus levels. It is necessary to perform studies with kinetic models of calcium load and alkalinization different from the actual ones. Copyright © 2015 The Authors. Published by Elsevier España, S.L.U. All rights reserved.

  8. Outpatient single-session yttrium-90 glass microsphere radioembolization.

    Science.gov (United States)

    Gates, Vanessa L; Marshall, Karen G; Salzig, Krystina; Williams, Melissa; Lewandowski, Robert J; Salem, Riad

    2014-02-01

    To investigate the feasibility of yttrium-90 ((90)Y) glass microsphere radioembolization (including angiography, lung shunt assessment, and treatment) as a single-session, outpatient procedure. Between January 2008 and June 2013, 14 patients underwent outpatient, single-session radioembolization with (90)Y glass microspheres. As part of the routine diagnostic work-up, all patients underwent either computed tomography (CT) or magnetic resonance imaging of the liver with three-dimensional analysis and had laboratory results forwarded to our center for confirmation of candidacy before treatment. On treatment day, all patients underwent planning mesenteric angiography with flat panel cone-beam CT imaging. Patients were administered 33-85 MBq of technetium-99m macroaggregated albumin ((99m)Tc-MAA) via a microcatheter positioned in a hepatic artery supplying the tumor of interest. Planar scintigraphy was initiated within 2 hours after the administration of (99m)Tc-MAA and lung shunt fraction was determined. Final dosimetry calculations were performed while the patient was being transferred back from nuclear medicine to interventional radiology. All patients successfully underwent planning angiography with administration of (99m)Tc-MAA and (90)Y radioembolization as a single-session treatment. There were no reportable or recordable medical events; treatment was carried out to the desired dose in all cases. The mean total procedure time was 2.70 hours ± 0.72 (range, 1.63-3.97 h). This study reports a novel proof of concept for performing radioembolization in a single-session setting. By using the described method, time between initial clinical assessments and radioembolization treatment is decreased, and costs are minimized. © 2014 Published by SIR on behalf of SIR.

  9. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist.  

  10. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...... are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...... related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry...

  11. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  12. The Physics session at the ATLAS overview week

    CERN Multimedia

    Takai, H.

    The Physics session at the ATLAS overview week at Clermont-Ferrand will be certainly remembered by the presentation of Blaise Pascal's historical experiment repeat. And why not? He is the local hero and by the looks of his primitive measurements it does take a lot of guts to explain his results on the basis of air columns. He was also lucky that he did not have to simulate his results on modern day computers but used the Pascaline. Certainly a man ahead of his time. Of course that wasn't all. Surrounded by a chain of (luckily) extinct volcanoes, rolling hills, and superb views, Clermont-Ferrand provided the perfect backdrop for the physics discussions. It was once more seen that the physics of ATLAS is diverse and that it is healthy and doing well. Many people contributed to the success of the session. Fabiola started the session precisely at 14:00 with a summary of the most recent activities from the physics coordination. Somehow what got stuck in my mind was the very positive statistics on how many prese...

  13. Summary of the most significant results reported in this session

    CERN Document Server

    Van De Walle, R T

    1980-01-01

    In the following a summary is presented of five parallel sessions on light quark had- ron spectroscopy. In general all topics which were discussed in the plenary sessions, and for which the proceedings contain separate (invited) papers, will be left out; only occa- sionally (and for reasons of completeness) will we make a reference to these presentations. Several other restrictions can be made. Nearly all papers submitted to the (parallel) hadron spectroscopy sessions were experimenta1 1 ), the only exceptions being a series of four theoretical papers on the baryonium problem. Furthermore, there was virtually no new information concerning the 'classical' baryons. In particular, no new facts were submitted on the problem of the possible existence of baryon states outside the so-called minimal spectrum, i.e. outside {56,L+ } and {70,L-dd}, the existence of the {ZO}'s, and the exis- even o tence of (baryon) exotic states. There was one contribution on a 'possible' new:".* 2 ), and a report on the final measureme...

  14. A method of conducting therapeutic sessions with MDMA.

    Science.gov (United States)

    Greer, G R; Tolbert, R

    1998-01-01

    A method for preparing clients and conducting therapeutic sessions with 3,4-methylenedioxymethamphetamine (MDMA) is described, with emphasis on the need for careful attention to the mental set of therapists and clients and the setting of the session. The therapists' belief was that MDMA inhibited the fear response to a perceived emotional threat, allowing the client to place the emotional sequelae of past experiences into a more realistic perspective in their current emotional lives and relationships. Clients were carefully screened and prepared until they had a clear purpose for the session, including a willingness to experience and to learn from anything that might happen. Sympathomimetic effects of MDMA determined the medical contraindications, and clients with histories of serious functional psychiatric impairments were excluded. Total doses of 75-150 mg, plus 50 mg if requested later, were administered, followed by clients lying down and listening to music with eyeshades and headphones during the peak MDMA effect. Screening and follow-up questionnaires were utilized. Two case histories are presented: a man achieving relief of pain from multiple myeloma, and a woman finding relief from problems as the daughter of Holocaust survivors. Use of consciousness-altering drugs in other contexts is discussed.

  15. Analysis and comparison of intensity in specific soccer training sessions

    Directory of Open Access Journals (Sweden)

    Luciano Antonacci Condessa

    2015-03-01

    Full Text Available This study compared the exercise intensity of four specific soccer training sessions (friendly and training match, tactical and technical workouts. Ten professional soccer players (24.2 ± 3.7 years, 177.9 ± 7.3 cm, 63.2 ± 4.6 mLO2•kg-1•min-l were recruited. A treadmill progressive interval test was performed to determine the players' VO2max, maximal heart rate (HRmax, HR-VO2 curve, and the heart rate corresponding to blood lactate concentrations of 2 and 4 mmol/L. The heart rate during the training sessions was used to estimate the exercise intensity and to classify them into intensity zones (low-intensity: 4 mmol/L. Exercise intensities were different among training sessions (friendly match: 86.0 ± 5.1% HRmax; training match: 81.2 ± 4.1% HRmax; tactical workout: 70.4 ± 5.3% HRmax; technical workout: 62.1 ± 3.6% HRmax. The friendly match presented the highest percentage of time performed in the high-intensity zone.

  16. Effects of an Intensive Resistant Training Sessions and Green Tea

    Directory of Open Access Journals (Sweden)

    Mohammad Esmaeil Afzalpour

    2014-03-01

    Full Text Available Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity women were randomly divided into 4 equal (n=10 groups including green tea supplementation, green tea supplementation plus resistance training, resistance training, and control groups. After supplementation period (600 mg/day, 14 days, resistance training and green tea supplementation plus resistance training groups performed an intensive resistance training session at 75-85 % of one repetition maximum. The malondialdehyde and total thiol were measured as oxidative stress indices. Data were analyzed by using of repeated measure ANOVA and LSD tests at p<0.056T. Results: Results showed that after 14 days of green tea consumption, malondialdehyde significantly decreased in green tea supplementation (p=0.03 and green tea supplementation plus resistance training (p=0.01 groups, while total thiol increased significantly (p=0.01 in two green tea supplementation groups. However, an intensive resistance training session increased malondialdehyde (p=0.01 without any significantly changes in total thiol (p=0.426T. Conclusion: It seems that green tea supplementation can inhibit exercise-induced protein and lipid oxidation in non-athletes women via enhancement of antioxidant defense system of the body6T.6T

  17. New Session of introductory “E-Groups Training”

    CERN Multimedia

    2013-01-01

    The session provides a short introduction of E-Groups and how to use it to efficiently manage mailing lists at CERN. Alongside a general overview of the E-Groups application, E-Groups specific terminology, the management of dynamic and static groups and the specific settings for mails and archives are discussed in detail.   The course is intended to give newcomers a clear idea of what E-Groups are and how they can be used at CERN. It should enable users to be more efficient when being confronted in particular with: the creation of dynamic and static E-groups and the decision whether the one or the other type is more appropriate, the management of E-group memberships, and the setting of mailing/archiving related properties. The session will also focus on some best practices and give general advice on how to use E-Groups. This introductory training session is given jointly by members of the IT-OIS and GS-AIS groups and is intended for any member at CERN potentially being confronted with the ...

  18. Design and evaluation of interprofessional cross-cultural communication sessions.

    Science.gov (United States)

    Liu, Min; Poirier, Therese; Butler, Lakesha; Comrie, Rhonda; Pailden, Junvie

    2015-01-01

    The 2013 National Standards for Culturally and Linguistically Appropriate Services (CLAS) call for healthcare professionals to provide quality care and services that are responsive to diverse cultural health beliefs and practices. Accreditation organizations for health professional programs require their curriculum to adequately prepare future practitioners for serving culturally and linguistically diverse populations. Another common curricular need of health professional programs is interprofessional education (IPE). This study presents data that evaluates two IPE culturally competent communication sessions designed for pharmacy and nursing students. Teams of nursing and pharmacy students (n = 160) engaged in case studies focused on developing cross-cultural communication skills, using the LEARN model. Quantitative survey data collected pre-test and post-test measured cultural competency (including subscales of perceived skills, perceived knowledge, confidence in encounter, and attitude) and knowledge related to culturally competent communication. Univariate ANOVA results indicate that actual knowledge as measured by the test and all four Clinical Cultural Competency Questionnaire (CCCQ) subscales significantly increased after the IPE sessions. Pharmacy students scored higher than nursing students on the knowledge pre-test, and nursing students had a more positive attitude at pre-test. The IPE sessions effectively addressed all learning outcomes and will continue in future course offerings. Using cross-cultural communication as a thematic area for IPE program development resulted in educational benefits for the students. To further strengthen nursing and pharmacy students' interprofessional practice, additional IPE opportunities are to be explored.

  19. Evolution of perceived footwear comfort over a prolonged running session.

    Science.gov (United States)

    Hintzy, F; Cavagna, J; Horvais, N

    2015-12-01

    The purpose of this study was to investigate the subjective perception of overall footwear comfort over a prolonged running session. Ten runners performed two similar sessions consisting of a 13-km trail run (5 laps of 2.6 km) as fast as possible. The overall footwear comfort was evaluated before running and at the end of each lap with a 150-mm visual analogic scale, as well as speed, heart rate and rate of perceived exertion. The results showed that both overall footwear comfort and speed decreased consistently during the run session, and significantly after 44 min of running (i.e. the 3rd lap). It could be hypothesized that the deterioration of overall footwear comfort was explained by mechanical and energetical parameter changes with time and/or fatigue occurring at the whole body, foot and footwear levels. These results justify the use of a prolonged running test for running footwear comfort evaluation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Proceedings of the conference on computer codes and the linear accelerator community

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R.K. (comp.)

    1990-07-01

    The conference whose proceedings you are reading was envisioned as the second in a series, the first having been held in San Diego in January 1988. The intended participants were those people who are actively involved in writing and applying computer codes for the solution of problems related to the design and construction of linear accelerators. The first conference reviewed many of the codes both extant and under development. This second conference provided an opportunity to update the status of those codes, and to provide a forum in which emerging new 3D codes could be described and discussed. The afternoon poster session on the second day of the conference provided an opportunity for extended discussion. All in all, this conference was felt to be quite a useful interchange of ideas and developments in the field of 3D calculations, parallel computation, higher-order optics calculations, and code documentation and maintenance for the linear accelerator community. A third conference is planned.

  1. Computer codes in nuclear safety, radiation transport and dosimetry; Les codes de calcul en radioprotection, radiophysique et dosimetrie

    Energy Technology Data Exchange (ETDEWEB)

    Bordy, J.M.; Kodeli, I.; Menard, St.; Bouchet, J.L.; Renard, F.; Martin, E.; Blazy, L.; Voros, S.; Bochud, F.; Laedermann, J.P.; Beaugelin, K.; Makovicka, L.; Quiot, A.; Vermeersch, F.; Roche, H.; Perrin, M.C.; Laye, F.; Bardies, M.; Struelens, L.; Vanhavere, F.; Gschwind, R.; Fernandez, F.; Quesne, B.; Fritsch, P.; Lamart, St.; Crovisier, Ph.; Leservot, A.; Antoni, R.; Huet, Ch.; Thiam, Ch.; Donadille, L.; Monfort, M.; Diop, Ch.; Ricard, M

    2006-07-01

    The purpose of this conference was to describe the present state of computer codes dedicated to radiation transport or radiation source assessment or dosimetry. The presentations have been parted into 2 sessions: 1) methodology and 2) uses in industrial or medical or research domains. It appears that 2 different calculation strategies are prevailing, both are based on preliminary Monte-Carlo calculations with data storage. First, quick simulations made from a database of particle histories built though a previous Monte-Carlo simulation and secondly, a neuronal approach involving a learning platform generated through a previous Monte-Carlo simulation. This document gathers the slides of the presentations.

  2. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  3. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  4. Error coding simulations in C

    Science.gov (United States)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  5. Asymmetric Quantum Codes on Toric Surfaces

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    2017-01-01

    Asymmetric quantum error-correcting codes are quantum codes defined over biased quantum channels: qubit-flip and phase-shift errors may have equal or different probabilities. The code construction is the Calderbank-Shor-Steane construction based on two linear codes. We present families of toric...... surfaces, toric codes and associated asymmetric quantum error-correcting codes....

  6. Verbal expressions used by anaclitic and introjective patients with depressive symptomatology: Analysis of change and stuck episodes within therapeutic sessions

    Directory of Open Access Journals (Sweden)

    Nelson Valdés

    2015-01-01

    Full Text Available A person’s speech makes it possible to identify significant indicators which reflect certain characteristics of his/her personality organization, but also can vary depending on the relevance of specific moments of the session and the symptoms type. The present study analyzed 10 completed and successful therapeutic processes using a mixed methodology. The therapies were video–and audio-taped, as well as observed through a one-way mirror by trained observers. All the sessions of each therapy were considered (N = 230 in order to identify, delimit, transcribe, and analyze Change Episodes (CEs = 24 and Stuck Episodes (SEs = 26. Each episode was made up by patients’ speech segments (N = 1,282, which were considered as the sampling unit. The Therapeutic Activity Coding System (TACS-1.0 was used to manually code each patient’s verbalizations, nested within episodes and individuals, in order to analyze them using Hierarchical Linear Modelling (HLM. The findings suggest that anaclitic patients tend to use more verbalizations in order to ask for feedback or to be understood by their therapists (attune, whereas introjective patients tend to use more verbalizations in order to construct new meanings (resignify during therapeutic conversation, but especially during SEs. Clinical implications to enrich the therapeutic practice are discussed.

  7. Improving Orthopedic Resident Knowledge of Documentation, Coding, and Medicare Fraud.

    Science.gov (United States)

    Varacallo, Matthew A; Wolf, Michael; Herman, Martin J

    Most residency programs still lack formal education and training on the basic clinical documentation and coding principles. Today's physicians are continuously being held to increasing standards for correct coding and documentation, yet little has changed in the residency training curricula to keep pace with these increasing standards. Although there are many barriers to implementing these topics formally, the main concern has been the lack of time and resources. Thus, simple models may have the best chance for success at widespread implementation. The first goal of the study was to assess a group of orthopedic residents' fund of knowledge regarding basic clinical documentation guidelines, coding principles, and their ability to appropriately identify cases of Medicare fraud. The second goal was to analyze a single, high-yield educational session's effect on overall resident knowledge acquisition and awareness of these concepts. Orthopedic residents belonging to 1 of 2 separate residency programs voluntarily and anonymously participated. All were asked to complete a baseline assessment examination, followed by attending a 45-minute lecture given by the same orthopedic faculty member who remained blinded to the test questions. Each resident then completed a postsession examination. Each resident was also asked to self-rate his or her documentation and coding level of comfort on a Likert scale (1-5). Statistical significance was set at p examination scores were no different between senior and junior residents (p > 0.20). The high-yield teaching session significantly improved the average total examination scores at both sites (p 0.10). The current healthcare environment necessitates better physician awareness regarding clinical documentation guidelines and coding principles. Very few adjustments to incorporate these teachings have been made to most residency training curricula, and the lack of time and resources remains the concern of many surgical programs. We have

  8. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  9. Code & order in polygonal billiards

    OpenAIRE

    Bobok, Jozef; Troubetzkoy, Serge

    2011-01-01

    Two polygons $P,Q$ are code equivalent if there are billiard orbits $u,v$ which hit the same sequence of sides and such that the projections of the orbits are dense in the boundaries $\\partial P, \\partial Q$. Our main results show when code equivalent polygons have the same angles, resp. are similar, resp. affinely similar.

  10. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  11. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a ...

  12. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...

  13. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  14. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Given a linear code $C$, one can define the $d$-th power of $C$ as the span of all componentwise products of $d$ elements of $C$. A power of $C$ may quickly fill the whole space. Our purpose is to answer the following question: does the square of a code ``typically'' fill the whole space? We give...

  15. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...

  16. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consisten...

  17. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence

  18. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  19. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  20. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  1. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  2. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  3. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  4. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  5. Orthogonality of binary codes derived from Reed-Solomon codes

    Science.gov (United States)

    Retter, Charles T.

    1991-07-01

    A simple method is developed for determining the orthogonality of binary codes derived from Reed-Solomon codes and other cyclic codes of length (2 exp m) - 1 over GF(2 exp m) for m bits. Depending on the spectra of the codes, it is sufficient to test a small number of single-frequency pairs for orthogonality, and a pair of bases may be tested in each case simply by summing the appropriate powers of elements of the dual bases. This simple test can be used to find self-orthogonal codes. For even values of m, the author presents a technique that can be used to choose a basis that produces a self-orthogonal, doubly-even code in certain cases, particularly when m is highly composite. If m is a power of 2, this technique can be used to find self-dual bases for GF(2 exp m). Although the primary emphasis is on testing for self orthogonality, the fundamental theorems presented apply also to the orthogonality of two different codes.

  6. Adaptive error correction codes for face identification

    Science.gov (United States)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2012-06-01

    Face recognition in uncontrolled environments is greatly affected by fuzziness of face feature vectors as a result of extreme variation in recording conditions (e.g. illumination, poses or expressions) in different sessions. Many techniques have been developed to deal with these variations, resulting in improved performances. This paper aims to model template fuzziness as errors and investigate the use of error detection/correction techniques for face recognition in uncontrolled environments. Error correction codes (ECC) have recently been used for biometric key generation but not on biometric templates. We have investigated error patterns in binary face feature vectors extracted from different image windows of differing sizes and for different recording conditions. By estimating statistical parameters for the intra-class and inter-class distributions of Hamming distances in each window, we encode with appropriate ECC's. The proposed approached is tested for binarised wavelet templates using two face databases: Extended Yale-B and Yale. We shall demonstrate that using different combinations of BCH-based ECC's for different blocks and different recording conditions leads to in different accuracy rates, and that using ECC's results in significantly improved recognition results.

  7. The Astrophysics Source Code Library: Supporting software publication and citation

    Science.gov (United States)

    Allen, Alice; Teuben, Peter

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net), established in 1999, is a free online registry for source codes used in research that has appeared in, or been submitted to, peer-reviewed publications. The ASCL is indexed by the SAO/NASA Astrophysics Data System (ADS) and Web of Science and is citable by using the unique ascl ID assigned to each code. In addition to registering codes, the ASCL can house archive files for download and assign them DOIs. The ASCL advocations for software citation on par with article citation, participates in multidiscipinary events such as Force11, OpenCon, and the annual Workshop on Sustainable Software for Science, works with journal publishers, and organizes Special Sessions and Birds of a Feather meetings at national and international conferences such as Astronomical Data Analysis Software and Systems (ADASS), European Week of Astronomy and Space Science, and AAS meetings. In this presentation, I will discuss some of the challenges of gathering credit for publishing software and ideas and efforts from other disciplines that may be useful to astronomy.

  8. Improving residents' code status discussion skills: a randomized trial.

    Science.gov (United States)

    Szmuilowicz, Eytan; Neely, Kathy J; Sharma, Rashmi K; Cohen, Elaine R; McGaghie, William C; Wayne, Diane B

    2012-07-01

    Inpatient Code Status Discussions (CSDs) are commonly facilitated by resident physicians, despite inadequate training. We studied the efficacy of a CSD communication skills training intervention for internal medicine residents. This was a prospective, randomized controlled trial of a multimodality communication skills educational intervention for postgraduate year (PGY) 1 residents. Intervention group residents completed a 2 hour teaching session with deliberate practice of communication skills, online modules, self-reflection, and a booster training session in addition to assigned clinical rotations. Control group residents completed clinical rotations alone. CSD skills of residents in both groups were assessed 2 months after the intervention using an 18 item behavioral checklist during a standardized patient encounter. Average scores for intervention and control group residents were calculated and between-group differences on the CSD skills assessment were evaluated using two-tailed independent sample t tests. Intervention group residents displayed higher overall scores on the simulated CSD (75.1% versus 53.2%, pgroup residents. The intervention group also displayed a greater number of key CSD communication behaviors and facilitated significantly longer conversations. The training, evaluation, and feedback sessions were rated highly. A focused, multimodality curriculum can improve resident performance of simulated CSDs. Skill improvement lasted for at least 2 months after the intervention. Further studies are needed to assess skill retention and to set minimum performance standards.

  9. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  10. XSC plasma control: Tool development for the session leader

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosino, G. [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy)]. E-mail: ambrosin@unina.it; Albanese, R. [Associazione Euratom-ENEA-CREATE, University Mediterranea Reggio Calabria (Italy); Ariola, M. [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy); Cenedese, A. [Associazione Euratom-ENEA-Consorzio RFX (Italy); Crisanti, F. [Associazione Euratom-ENEA-Frascati (Italy); Tommasi, G. De [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy); Mattei, M. [Associazione Euratom-ENEA-CREATE, University Mediterranea Reggio Calabria (Italy); Piccolo, F. [EURATOM-UKAEA Fusion Association (United Kingdom); Pironti, A. [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy); Sartori, F. [EURATOM-UKAEA Fusion Association (United Kingdom); Villone, F. [Associazione Euratom-ENEA-CREATE, University Cassino (Italy)

    2005-11-15

    A new model-based shape controller (XSC, i.e., eXtreme Shape Controller) able to operate with high elongation and triangularity plasmas has been designed and implemented at JET in 2003. The use of the XSC needs a number of steps, which at present are not automated and therefore imply the involvement of several experts. To help the session leader in preparing an experiment, a number of software tools are needed. The paper describes the SW tools that are currently in the developing phase, and describes the new framework for the preparation of a JET experiment.

  11. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  12. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  13. The Flutter Shutter Code Calculator

    Directory of Open Access Journals (Sweden)

    Yohann Tendero

    2015-08-01

    Full Text Available The goal of the flutter shutter is to make uniform motion blur invertible, by a"fluttering" shutter that opens and closes on a sequence of well chosen sub-intervals of the exposure time interval. In other words, the photon flux is modulated according to a well chosen sequence calledflutter shutter code. This article provides a numerical method that computes optimal flutter shutter codes in terms of mean square error (MSE. We assume that the observed objects follow a known (or learned random velocity distribution. In this paper, Gaussian and uniform velocity distributions are considered. Snapshots are also optimized taking the velocity distribution into account. For each velocity distribution, the gain of the optimal flutter shutter code with respectto the optimal snapshot in terms of MSE is computed. This symmetric optimization of theflutter shutter and of the snapshot allows to compare on an equal footing both solutions, i.e. camera designs. Optimal flutter shutter codes are demonstrated to improve substantially the MSE compared to classic (patented or not codes. A numerical method that permits to perform a reverse engineering of any existing (patented or not flutter shutter codes is also describedand an implementation is given. In this case we give the underlying velocity distribution fromwhich a given optimal flutter shutter code comes from. The combination of these two numerical methods furnishes a comprehensive study of the optimization of a flutter shutter that includes a forward and a backward numerical solution.

  14. Surface code implementation of block code state distillation

    Science.gov (United States)

    Fowler, Austin G.; Devitt, Simon J.; Jones, Cody

    2013-01-01

    State distillation is the process of taking a number of imperfect copies of a particular quantum state and producing fewer better copies. Until recently, the lowest overhead method of distilling states produced a single improved |A〉 state given 15 input copies. New block code state distillation methods can produce k improved |A〉 states given 3k + 8 input copies, potentially significantly reducing the overhead associated with state distillation. We construct an explicit surface code implementation of block code state distillation and quantitatively compare the overhead of this approach to the old. We find that, using the best available techniques, for parameters of practical interest, block code state distillation does not always lead to lower overhead, and, when it does, the overhead reduction is typically less than a factor of three. PMID:23736868

  15. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  16. Lossless Coding with Generalised Criteria

    CERN Document Server

    Charalambous, Charalambos D; Rezaei, Farzad

    2011-01-01

    This paper presents prefix codes which minimize various criteria constructed as a convex combination of maximum codeword length and average codeword length or maximum redundancy and average redundancy, including a convex combination of the average of an exponential function of the codeword length and the average redundancy. This framework encompasses as a special case several criteria previously investigated in the literature, while relations to universal coding is discussed. The coding algorithm derived is parametric resulting in re-adjusting the initial source probabilities via a weighted probability vector according to a merging rule. The level of desirable merging has implication in applications where the maximum codeword length is bounded.

  17. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  18. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  19. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Blackwell, Alan; Cox, Geoff; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  20. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  1. i-Review: Sharing Code

    Directory of Open Access Journals (Sweden)

    Jonas Kubilius

    2014-02-01

    Full Text Available Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF. GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  2. Neural Decoder for Topological Codes

    Science.gov (United States)

    Torlai, Giacomo; Melko, Roger G.

    2017-07-01

    We present an algorithm for error correction in topological codes that exploits modern machine learning techniques. Our decoder is constructed from a stochastic neural network called a Boltzmann machine, of the type extensively used in deep learning. We provide a general prescription for the training of the network and a decoding strategy that is applicable to a wide variety of stabilizer codes with very little specialization. We demonstrate the neural decoder numerically on the well-known two-dimensional toric code with phase-flip errors.

  3. Introduction to the internal fluid mechanics research session

    Science.gov (United States)

    Miller, Brent A.; Povinelli, Louis A.

    1990-01-01

    Internal fluid mechanics research at LeRC is directed toward an improved understanding of the important flow physics affecting aerospace propulsion systems, and applying this improved understanding to formulate accurate predictive codes. To this end, research is conducted involving detailed experimentation and analysis. The following three papers summarize ongoing work and indicate future emphasis in three major research thrusts: inlets, ducts, and nozzles; turbomachinery; and chemical reacting flows. The underlying goal of the research in each of these areas is to bring internal computational fluid mechanic to a state of practical application for aerospace propulsion systems. Achievement of this goal requires that carefully planned and executed experiments be conducted in order to develop and validate useful codes. It is critical that numerical code development work and experimental work be closely coupled. The insights gained are represented by mathematical models that form the basis for code development. The resultant codes are then tested by comparing them with appropriate experiments in order to ensure their validity and determine their applicable range. The ultimate user community must be a part of this process to assure relevancy of the work and to hasten its practical application. Propulsion systems are characterized by highly complex and dynamic internal flows. Many complex, 3-D flow phenomena may be present, including unsteadiness, shocks, and chemical reactions. By focusing on specific portions of a propulsion system, it is often possible to identify the dominant phenomena that must be understood and modeled for obtaining accurate predictive capability. The three major research thrusts serve as a focus leading to greater understanding of the relevant physics and to an improvement in analytic tools. This in turn will hasten continued advancements in propulsion system performance and capability.

  4. Session: What can we learn from developed wind resource areas

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Erickson, Wally

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop was composed of two parts intended to examine what existing science tells us about wind turbine impacts at existing wind project sites. Part one dealt with the Altamont Wind Resource area, one of the older wind projects in the US, with a paper presented by Carl Thelander titled ''Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part 1''. Questions addressed by the presenter included: how is avian habitat affected at Altamont and do birds avoid turbine sites; are birds being attracted to turbine strings; what factors contribute to direct impacts on birds by wind turbines at Altamont; how do use, behavior, avoidance and other factors affect risk to avian species, and particularly impacts those species listed as threatened, endangered, or of conservation concern, and other state listed species. The second part dealt with direct impacts to birds at new generation wind plants outside of California, examining such is sues as mortality, avoidance, direct habitat impacts from terrestrial wind projects, species and numbers killed per turbine rates/MW generated, impacts to listed threatened and endangered species, to USFWS Birds of Conservation Concern, and to state listed species. This session focused on newer wind project sites with a paper titled ''Bird Fatality and Risk at New Generation Wind Projects'' by Wally Erickson. Each paper was followed by a discussion/question and answer period.

  5. Neuromechanical adaptations during a robotic powered exoskeleton assisted walking session.

    Science.gov (United States)

    Ramanujam, Arvind; Cirnigliaro, Christopher M; Garbarini, Erica; Asselin, Pierre; Pilkar, Rakesh; Forrest, Gail F

    2017-04-20

    To evaluate gait parameters and neuromuscular profiles of exoskeleton-assisted walking under Max Assist condition during a single-session for; (i) able bodied (AB) individuals walking assisted with (EXO) and without (non-EXO) a powered exoskeleton, (ii) non-ambulatory SCI individuals walking assisted with a powered exoskeleton. Single-session. Motion analysis laboratory. Four AB individuals and four individuals with SCI. Powered lower extremity exoskeleton. Temporal-spatial parameters, kinematics, walking velocity and electromyography data. AB individuals in exoskeleton showed greater stance time and a significant reduction in walking velocity (P exoskeleton movements, they walked with an increased velocity and lowered stance time to resemble that of slow walking. For SCI individuals, mean percent stance time was higher and walking velocity was lower compared to all AB walking conditions (P exoskeleton and moreover with voluntary control there is a greater temporal-spatial response of the lower limbs. Also, there are neuromuscular phasic adaptions for both AB and SCI groups while walking in the exoskeleton that are inconsistent to non-EXO gait muscle activation.

  6. Collaborative environment for clinical reasoning and distance learning sessions.

    Science.gov (United States)

    Medélez Ortega, Elizabeth; Burgun, Anita; Le Duff, Franck; Le Beux, Pierre

    2003-07-01

    The medical curriculum has changed with the adoption of the student-centered learning paradigm. Clinical reasoning learning (CRL) is used in order to develop and improve students' clinical reasoning and problem-solving skills. We have observed that, in complement to traditional CRL sessions, students commonly consult resources available on the internet. Based on this observation, our objective is to create computer tools to coordinate CRL sessions at distance, integrating these electronic resources at every step of the reasoning process. In order to create the system, we elaborated an object-oriented model of a computer-supported collaborative learning environment. The proposed system includes a local web-server to store electronic resources and a relational database to store their electronic addresses (urls). JAVA was used as the programming language. We developed a set of cooperative platform-independent tools. This environment includes a communication tool. Multimedia data exchange is possible. Information is shared thanks to an electronic notepad and whiteboard tools. This learning environment will be integrated in the French Virtual Medical University project, and is intended to be used for undergraduate, internships, residency or continuing medical education.

  7. Materials & Engineering: Propelling Innovation MRS Bulletin Special Issue Session

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Gopal [Materials Research Society, Warrendale, PA (United States)

    2016-05-06

    Materials enable engineering; and, engineering in turn depends on materials to transform design concepts and equations into physical entities. This relationship continues to grow with expanding societal demand for new products and processes. MRS Bulletin, a publication of the Materials Research Society (MRS) and Cambridge University Press, planned a special issue for December 2015 on Materials and Engineering: Propelling Innovation. This special issue of MRS Bulletin captured the unique relationship between materials and engineering, which are closely intertwined. A special half day session at the 2015 MRS Fall Meeting in Boston captured this discussion through presentations by high level experts followed by a panel discussion on what it takes to translate materials discoveries into products to benefit society. The Special Session included presentations by experts who are practitioners in materials as well as engineering applications, followed by a panel discussion. Participants discussed state-of-the-art in materials applications in engineering, as well as how engineering needs have pushed materials developments, as also reflected in the 20 or so articles published in the special issue of MRS Bulletin. As expected, the discussions spanned the broad spectrum of materials and provided very strong interdisciplinary interactions and discussions by participants and presenters.

  8. Working session 5: Operational aspects and risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cizelj, L. [Jozef Stefan Institute, Ljubljana (Slovenia); Donoghue, J. [Nuclear Regulatory Commission, Washington, DC (United States)

    1997-02-01

    A general observation is that both operational aspects and risk analysis cannot be adequately discussed without information presented in other sessions. Some overlap of conclusions and recommendations is therefore to be expected. Further, it was assumed that recommendations concerning improvements in some related topics were generated by other sessions and are not repeated here. These include: (1) Knowledge on degradation mechanisms (initiation, progression, and failure). (2) Modeling of degradation (initiation, progression, and failure). (3) Capabilities of NDE methods. (4) Preventive maintenance and repair. One should note here, however, that all of these directly affect both operational and risk aspects of affected plants. A list of conclusions and recommendations is based on available presentations and discussions addressing risk and operational experience. The authors aimed at reaching as broad a consensus as possible. It should be noted here that there is no strict delineation between operational and safety aspects of degradation of steam generator tubes. This is caused by different risk perceptions in different countries/societies. The conclusions and recommendations were divided into four broad groups: human reliability; leakage monitoring; risk impact; and consequence assessment.

  9. Safety Training: scheduled sessions in September and October 2011

    CERN Multimedia

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personnel électricien effectuant des opérations du domaine de tension BTA...

  10. Safety Training: scheduled sessions in September and October 2011

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Chemical Safety – Introduction 11-OCT-11, 9.00 – 11.30, in English Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personne...

  11. Takotsubo cardiomyopathy after a dancing session: a case report

    Directory of Open Access Journals (Sweden)

    Ibrahim Ammar A

    2011-10-01

    Full Text Available Abstract Introduction Stress-induced (Takotsubo cardiomyopathy is a rare form of cardiomyopathy which presents in a manner similar to that of acute coronary syndrome. This sometimes leads to unnecessary thrombolysis therapy. The pathogenesis of this disease is still poorly understood. We believe that reporting all cases of Takotsubo cardiomyopathy will contribute to a better understanding of this disease. Here, we report a patient who, in the absence of any recent stressful events in her life, developed the disease after a session of dancing. Case presentation A 69-year-old Caucasian woman presented with features suggestive of acute coronary syndrome shortly after a session of dancing. Echocardiography and a coronary angiogram showed typical features of Takotsubo cardiomyopathy and our patient was treated accordingly. Eight weeks later, her condition resolved completely and the results of echocardiography were totally normal. Conclusions Takotsubo cardiomyopathy, though transient, is a rare and serious condition. Although it is commonly precipitated by stressful life events, these are not necessarily present. Our patient was enjoying one of her hobbies (that is, dancing when she developed the disease. This case has particular interest in medicine, especially for the specialties of cardiology and emergency medicine. We hope that it will add more information to the literature about this rare condition.

  12. Stimulant alcohol effects prime within session drinking behavior.

    Science.gov (United States)

    Corbin, William R; Gearhardt, Ashley; Fromme, Kim

    2008-04-01

    Individual differences in subjective alcohol effects have been shown to differ by risk status (e.g., family history of alcoholism) and to predict future risk for alcohol-related problems. Presumably, individual differences in both stimulant and sedative responses affect the rewarding value of drinking which, in turn, impacts future drinking behavior. Although plausible, this theoretical model is largely untested. The current study attempted to provide experimental evidence for the impact of subjective alcohol responses on within session drinking behavior. Using a placebo-controlled between-subjects alcohol administration paradigm, experiences and evaluations of stimulant and sedative alcohol effects (after a target dose of 0.06 g%) were assessed as predictors of ad-libitum consumption in the context of anticipatory stress. Analyses indicated that an initial dose of alcohol increased experiences of both stimulation and sedation although stimulant effects were evaluated much more positively. In addition, stimulant effects after a priming dose predicted further consumption, whereas sedative effects did not. At least among moderate to heavy drinking college students, stimulant alcohol effects are more reinforcing and predict within session drinking behavior under social stress. Increased attention should be given to stimulant alcohol effects as a risk factor for excessive consumption in this population. Incorporating information about stimulant alcohol effects in prevention and intervention programs may also be important if additional research supports the current results.

  13. Session Introduction: Challenges of Pattern Recognition in Biomedical Data.

    Science.gov (United States)

    Verma, Shefali Setia; Verma, Anurag; Basile, Anna Okula; Bishop, Marta-Byrska; Darabos, Christian

    2018-01-01

    The analysis of large biomedical data often presents with various challenges related to not just the size of the data, but also to data quality issues such as heterogeneity, multidimensionality, noisiness, and incompleteness of the data. The data-intensive nature of computational genomics problems in biomedical informatics warrants the development and use of massive computer infrastructure and advanced software tools and platforms, including but not limited to the use of cloud computing. Our session aims to address these challenges in handling big data for designing a study, performing analysis, and interpreting outcomes of these analyses. These challenges have been prevalent in many studies including those which focus on the identification of novel genetic variant-phenotype associations using data from sources like Electronic Health Records (EHRs) or multi-omic data. One of the biggest challenges to focus on is the imperfect nature of the biomedical data where a lot of noise and sparseness is observed. In our session, we will present research articles that can help in identifying innovative ways to recognize and overcome newly arising challenges associated with pattern recognition in biomedical data.

  14. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  15. The Serializability of Network Codes

    CERN Document Server

    Blasiak, Anna

    2010-01-01

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of entropic vectors subject to constraints imposed by the network structure. In the case of directed acyclic graphs, these constraints are completely understood, but for general graphs the problem of enumerating them remains open: it is not known how to classify the constraints implied by a property that we call serializability, which refers to the absence of paradoxical circular dependencies in a network code. In this work we initiate the first systematic study of the constraints imposed on a network code by serializability. We find that serializability cannot be detected solely by evaluating the Shannon entropy of edge sets in the graph, but nevertheless, we give a polynomial-time algorithm tha...

  16. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    probabilities to an arithmetic coder. The conditional probabilities are estimated from co-occurrence statistics of past pixels, the statistics are stored in a tree. By organizing the code length calculations properly, a vast number of possible models (trees) reflecting different pixel orderings can...... be investigated within reasonable time prior to generating the code. A number of general-purpose coders are constructed according to this principle. Rissanen's (1989) one-pass algorithm, context, is presented in two modified versions. The baseline is proven to be a universal coder. The faster version, which...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...

  17. FLYCHK Collisional-Radiative Code

    Science.gov (United States)

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  18. Multimedia signal coding and transmission

    CERN Document Server

    Ohm, Jens-Rainer

    2015-01-01

    This textbook covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory with regard to the principles and design of image, video and audio compression systems. The theoretical concepts are augmented by practical examples of algorithms for multimedia signal coding technology, and related transmission aspects. On this basis, principles behind multimedia coding standards, including most recent developments like High Efficiency Video Coding, can be well understood. Furthermore, potential advances in future development are pointed out. Numerous figures and examples help to illustrate the concepts covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by exercises. The book is also a self-contained introduction both for researchers and developers of multimedia compression systems in industry.

  19. The Aesthetics of Code Switching

    National Research Council Canada - National Science Library

    Ali Mohammadi Asiabadi

    2010-01-01

    ... explained. However, the aesthetic aspects of these figures can be shown through several theories that discuss code switching considering the fact that some of the theories are commonly used in literature and literary criticism...

  20. Interlibrary Loan Codes and Guidelines.

    Science.gov (United States)

    RQ, 1980

    1980-01-01

    Presents a model interlibrary loan policy for regional, state, local, and other special groups of libraries; the 1980 national interlibrary loan code; and the 1978 procedural guidelines for international lending. (FM)

  1. Zip Codes - MDC_WCSZipcode

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — The WCSZipcode polygon feature class was created by Miami-Dade Enterprise Technology Department to be used in the WCS batch jobs to assign the actual zip code of...

  2. The Aesthetics of Code Switching

    National Research Council Canada - National Science Library

    Ali Mohammadi Asiabadi

    2010-01-01

    .... However, the aesthetic aspects of these figures can be shown through several theories that discuss code switching considering the fact that some of the theories are commonly used in literature and literary criticism...

  3. Adaptive decoding of convolutional codes

    Directory of Open Access Journals (Sweden)

    K. Hueske

    2007-06-01

    Full Text Available Convolutional codes, which are frequently used as error correction codes in digital transmission systems, are generally decoded using the Viterbi Decoder. On the one hand the Viterbi Decoder is an optimum maximum likelihood decoder, i.e. the most probable transmitted code sequence is obtained. On the other hand the mathematical complexity of the algorithm only depends on the used code, not on the number of transmission errors. To reduce the complexity of the decoding process for good transmission conditions, an alternative syndrome based decoder is presented. The reduction of complexity is realized by two different approaches, the syndrome zero sequence deactivation and the path metric equalization. The two approaches enable an easy adaptation of the decoding complexity for different transmission conditions, which results in a trade-off between decoding complexity and error correction performance.

  4. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County. These are not clipped to the Allgeheny County boundary. If viewing this...

  5. Universal codes of the natural numbers

    OpenAIRE

    Filmus, Yuval

    2013-01-01

    A code of the natural numbers is a uniquely-decodable binary code of the natural numbers with non-decreasing codeword lengths, which satisfies Kraft's inequality tightly. We define a natural partial order on the set of codes, and show how to construct effectively a code better than a given sequence of codes, in a certain precise sense. As an application, we prove that the existence of a scale of codes (a well-ordered set of codes which contains a code better than any given code) is independen...

  6. Beam-dynamics codes used at DARHT

    Energy Technology Data Exchange (ETDEWEB)

    Ekdahl, Jr., Carl August [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-01

    Several beam simulation codes are used to help gain a better understanding of beam dynamics in the DARHT LIAs. The most notable of these fall into the following categories: for beam production – Tricomp Trak orbit tracking code, LSP Particle in cell (PIC) code, for beam transport and acceleration – XTR static envelope and centroid code, LAMDA time-resolved envelope and centroid code, LSP-Slice PIC code, for coasting-beam transport to target – LAMDA time-resolved envelope code, LSP-Slice PIC code. These codes are also being used to inform the design of Scorpius.

  7. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  8. ErythropoieSIS stimulating agent (ESA use is increased following missed dialysis sessions

    Directory of Open Access Journals (Sweden)

    T. Christopher Bond

    2012-06-01

    Missed session episodes result in significant increases in ESA utilization in the post-miss period, and also in total monthly ESA use. Such increases should be considered in any assessment of impact of missed sessions: both clinical and economic.

  9. 76 FR 50224 - Medicare Program; Accountable Care Organization Accelerated Development Learning Sessions; Center...

    Science.gov (United States)

    2011-08-12

    ... Accelerated Development Learning Sessions; Center for Medicare and Medicaid Innovation, September 15th and... second Accelerated Development Learning Session (ADLS) hosted by CMS to help Accountable Care... while improving the quality of care for our beneficiaries. Through Accelerated Development Learning...

  10. CERN Technical Training 2006: Office Software Curriculum Scheduled Course Sessions (October-December 2006)

    CERN Multimedia

    2006-01-01

    The Office Software Curriculum of the CERN Technical Training Programme currently offers comprehensive training in Microsoft Office (Word, Excel, Powerpoint, Access, Outlook), MS Project, Frontpage, Dreamweaver, Indesign, LaTeX, and CERN EDMS. There are some places available on the following Microsoft Office 2003 course sessions, currently scheduled until December 2007: EXCEL 2003 - niveau 2 : ECDL - 16-17 October (2 days, session in French) WORD 2003 (Short Course II) - HowTo... Mail merge - 2 November (morning, bilingual session) WORD 2003 (Short Course IV) - HowTo... Work with master document - 2 November (afternoon, bilingual session) OUTLOOK 2003 (Short Course III) - Meetings and Delegation - 3 November (morning, bilingual session) EXCEL 2003 (Short Course IV) - HowTo... Link cells, worksheets and workbooks - 3 November (afternoon, bilingual session) EXCEL 2003 - Level 1: ECDL - 13-14 November (2 days, session in English) ACCESS 2003 - Level 2: ECDL - 5-6 December (2 days, session in English) The abo...

  11. Psychophysiological Responses to Group Exercise Training Sessions: Does Exercise Intensity Matter?

    Directory of Open Access Journals (Sweden)

    Matteo Vandoni

    Full Text Available Group exercise training programs were introduced as a strategy for improving health and fitness and potentially reducing dropout rates. This study examined the psychophysiological responses to group exercise training sessions. Twenty-seven adults completed two group exercise training sessions of moderate and vigorous exercise intensities in a random and counterbalanced order. The %HRR and the exertional and arousal responses to vigorous session were higher than those during the moderate session (p<0.05. Consequently, the affective responses to vigorous session were less pleasant than those during moderate session (p<0.05. These results suggest that the psychophysiological responses to group exercise training sessions are intensity-dependent. From an adherence perspective, interventionists are encouraged to emphasize group exercise training sessions at a moderate intensity to maximize affective responses and to minimize exertional responses, which in turn may positively affect future exercise behavior.

  12. UNIX code management and distribution

    Energy Technology Data Exchange (ETDEWEB)

    Hung, T.; Kunz, P.F.

    1992-09-01

    We describe a code management and distribution system based on tools freely available for the UNIX systems. At the master site, version control is managed with CVS, which is a layer on top of RCS, and distribution is done via NFS mounted file systems. At remote sites, small modifications to CVS provide for interactive transactions with the CVS system at the master site such that remote developers are true peers in the code development process.

  13. Verification of ONED90 code

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Jong Hwa; Lee, Ki Bog; Zee, Sung Kyun; Lee, Chang Ho [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1993-12-01

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs.

  14. Training course on code implementation.

    Science.gov (United States)

    Allain, A; De Arango, R

    1992-01-01

    The International Baby Food Action Network (IBFAN) is a coalition of over 40 citizen groups in 70 countries. IBFAN monitors the progress worldwide of the implementation of the International Code of Marketing of Breastmilk Substitutes. The Code is intended to regulate the advertising and promotional techniques used to sell infant formula. The 1991 IBFAN report shows that 75 countries have taken some action to implement the International Code. During 1992, the IBFAN Code Documentation Center in Malaysia conducted 2 training courses to help countries draft legislation to implement and monitor compliance with the International Code. In April, government officials from 19 Asian and African countries attended the first course in Malaysia; the second course was conducted in Spanish in Guatemala and attended by officials from 15 Latin American and Caribbean countries. The resource people included representatives from NGOs in Africa, Asia, Latin America, Europe and North America with experience in Code implementation and monitoring at the national level. The main purpose of each course was to train government officials to use the International Code as a starting point for national legislation to protect breastfeeding. Participants reviewed recent information on lactation management, the advantages of breastfeeding, current trends in breastfeeding and the marketing practices of infant formula manufacturers. The participants studied the terminology contained in the International Code and terminology used by infant formula manufacturers to include breastmilk supplements such as follow-on formulas and cereal-based baby foods. Relevant World Health Assembly resolutions such as the one adopted in 1986 on the need to ban free and low-cost supplies to hospitals were examined. The legal aspects of the current Baby Friendly Hospital Initiative (BFHI) and the progress in the 12 BFHI test countries concerning the elimination of supplies were also examined. International Labor

  15. Continuous speech recognition with sparse coding

    CSIR Research Space (South Africa)

    Smit, WJ

    2009-04-01

    Full Text Available Sparse coding is an efficient way of coding information. In a sparse code most of the code elements are zero; very few are active. Sparse codes are intended to correspond to the spike trains with which biological neurons communicate. In this article...

  16. Facilitating Internet-Scale Code Retrieval

    Science.gov (United States)

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  17. Error-erasure decoding of product codes.

    Science.gov (United States)

    Wainberg, S.

    1972-01-01

    Two error-erasure decoding algorithms for product codes that correct all the error-erasure patterns guaranteed correctable by the minimum Hamming distance of the product code are given. The first algorithm works when at least one of the component codes is majority-logic decodable. The second algorithm works for any product code. Both algorithms use the decoders of the component codes.

  18. Sensorimotor transformation via sparse coding

    Science.gov (United States)

    Takiyama, Ken

    2015-01-01

    Sensorimotor transformation is indispensable to the accurate motion of the human body in daily life. For instance, when we grasp an object, the distance from our hands to an object needs to be calculated by integrating multisensory inputs, and our motor system needs to appropriately activate the arm and hand muscles to minimize the distance. The sensorimotor transformation is implemented in our neural systems, and recent advances in measurement techniques have revealed an important property of neural systems: a small percentage of neurons exhibits extensive activity while a large percentage shows little activity, i.e., sparse coding. However, we do not yet know the functional role of sparse coding in sensorimotor transformation. In this paper, I show that sparse coding enables complete and robust learning in sensorimotor transformation. In general, if a neural network is trained to maximize the performance on training data, the network shows poor performance on test data. Nevertheless, sparse coding renders compatible the performance of the network on both training and test data. Furthermore, sparse coding can reproduce reported neural activities. Thus, I conclude that sparse coding is necessary and a biologically plausible factor in sensorimotor transformation. PMID:25923980

  19. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus

    2014-01-01

    Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged......-malleable codes where the adversary only is allowed to tamper a single time with an encoding. We show how to construct continuous non-malleable codes in the common split-state model where an encoding consist of two parts and the tampering can be arbitrary but has to be independent with both parts. Our main...... contributions are outlined below: We propose a new uniqueness requirement of split-state codes which states that it is computationally hard to find two codewords X = (X 0,X 1) and X′ = (X 0,X 1′) such that both codewords are valid, but X 0 is the same in both X and X′. A simple attack shows that uniqueness...

  20. The cosmic code comparison project

    Energy Technology Data Exchange (ETDEWEB)

    Heitmann, Katrin; Fasel, Patricia; Habib, Salman; Warren, Michael S; Ahrens, James; Ankeny, Lee; O' Shea, Brian [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Lukic, Zarija; Ricker, Paul M [Department of Astronomy, University of Illinois, Urbana, IL 61801 (United States); White, Martin [Department of Astronomy, University of California, Berkeley, CA 94720-3411 (United States); Armstrong, Ryan [Department of Computer Science, UC Davis, Davis, CA 95616 (United States); Springel, Volker [Max-Planck-Institute for Astrophysics, 85741 Garching (Germany); Stadel, Joachim [Institute of Theoretical Physics, University of Zurich, 8057 Zurich (Switzerland); Trac, Hy [Department of Astrophysical Sciences, Princeton University, NJ 08544 (United States)], E-mail: heitmann@lanl.gov

    2008-10-01

    Current and upcoming cosmological observations allow us to probe structures on smaller and smaller scales, entering highly nonlinear regimes. In order to obtain theoretical predictions in these regimes, large cosmological simulations have to be carried out. The promised high accuracy from observations makes the simulation task very demanding: the simulations have to be at least as accurate as the observations. This requirement can only be fulfilled by carrying out an extensive code verification program. The first step of such a program is the comparison of different cosmology codes including gravitational interactions only. In this paper, we extend a recently carried out code comparison project to include five more simulation codes. We restrict our analysis to a small cosmological volume which allows us to investigate properties of halos. For the matter power spectrum and the mass function, the previous results hold, with the codes agreeing at the 10% level over wide dynamic ranges. We extend our analysis to the comparison of halo profiles and investigate the halo count as a function of local density. We introduce and discuss ParaView as a flexible analysis tool for cosmological simulations, the use of which immensely simplifies the code comparison task.

  1. Enhancing the Radio Link Protocol for VoIP Session Establishment Signalling Over Satellite-UMTS

    OpenAIRE

    Kueh, Victor Y H; Tafazolli, Rahim; Evans, Barry

    2004-01-01

    Session Initiation Protocol (SIP) is an application layer signalling protocol used in the IP-based UMTS network for establishing multimedia sessions. With a satellite component identified to play an integral role in UNITS, there is a need to support SIP-based session establishment over Satellite-UMTS (SUNITS) as well. Due to the inherent characteristics of SIP, the transport of SIP over an unreliable wireless link with a larger propagation delay is inefficient. To improve the session setup pe...

  2. SESSION – PACKET INSPECTOR MOBILE AGENT TO PREVENT ENCRYPTED COOKIES AND HTTP POST HIJACKING IN MANET

    Directory of Open Access Journals (Sweden)

    ARUN V.

    2016-12-01

    Full Text Available A statistics states that public Wi-Fi hotspots are set to grow from 1.3 million in 2011 to 5.8 million by 2015. Due to increase in public free Wi-Fi access, userscount increases rapidly letting them to expose in vulnerable intrusion attacks. Accessing the social network and other confidential sites such as banking in public Wi-Fi, exposes the credential to the intruder. Man-in-the-middle attack plays a major role in accessing the user credential. Analysing the packets exposes the HTTP post information in the network. Capturing encrypted cookies by the man-in-the-middle can access the secure site and allows the intruder to be an authorized person. Mobile agent is a piece of code that migrates and performs actions in the host and is used to prevent intrusion. We propose a model to prevent intrusion in the wireless ad-hoc network using mobile agent. Session-Packet inspector is proposed to handle HTTP post hijacking and encrypted cookie usage by the intruder.

  3. 77 FR 75491 - Entry-Level Driver Training; Public Listening Session

    Science.gov (United States)

    2012-12-20

    ... Federal Motor Carrier Safety Administration Entry-Level Driver Training; Public Listening Session AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION: Notice of public listening session. SUMMARY: FMCSA announces that it will hold a public listening session to solicit ideas and information on...

  4. 77 FR 46106 - Tribal Listening Sessions on Sacred Sites on Federal Lands

    Science.gov (United States)

    2012-08-02

    ...] [FR Doc No: 2012-18891] DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Tribal Listening Sessions...: Indian Affairs will conduct listening sessions with Indian tribes to obtain oral and written comments... tribal listening sessions. We will consider all comments received [[Page 46107

  5. On SIP Session setup delay for VoIP services over correlated fading channels

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam S.; Prasad, Ramjee

    2006-01-01

    In this paper, the session setup delay of the session initiation protocol (SIP) is studied. The transmissions on both the forward and reverse channel are assumed to experience Markovian errors. The session setup delay is evaluated for different transport protocols, and with the use of the radio l...

  6. 78 FR 37553 - Maternal Health Town Hall Listening Session; Notice of Meeting

    Science.gov (United States)

    2013-06-21

    ... ideas in support of the National Maternal Health Initiative. The Town Hall Listening Session will serve... HUMAN SERVICES Health Resources and Services Administration Maternal Health Town Hall Listening Session; Notice of Meeting Name: Maternal Health Town Hall Listening Session. Date and Time: August 27, 2013, 2:00...

  7. 76 FR 66931 - Medicare Program; Accountable Care Organization Accelerated Development Learning Sessions; Center...

    Science.gov (United States)

    2011-10-28

    ... Accelerated Development Learning Sessions; Center for Medicare and Medicaid Innovation November 17 and 18... third and final Accelerated Development Learning Session (ADLS) hosted by CMS to help Accountable Care... while improving the quality of care for beneficiaries. Through Accelerated Development Learning Sessions...

  8. Counseling Session Impact as Viewed by Novice Counselors and Their Clients.

    Science.gov (United States)

    Stiles, William B.; Snow, James Steven

    1984-01-01

    Used the Session Evaluation Questionnaire (SEQ) to measure the perspectives of 17 novice counselors and their 72 clients on 942 individual counseling sessions. Results suggested novice counselors' judgments of session depth and value may bear little relation to their clients' evaluations, but counselors' comfort and mood were moderately…

  9. 77 FR 43106 - Tribal Consultation Sessions-Department of the Interior Information Technology Infrastructure...

    Science.gov (United States)

    2012-07-23

    ... Office of the Secretary Tribal Consultation Sessions--Department of the Interior Information Technology... sessions. The purpose of the sessions is to obtain tribal input on the 2012 Information Technology transformation realignment proposal as well as on how Information Technology transformation should be implemented...

  10. Patterns of Client Emotion in Helpful Sessions of Cognitive-Behavioral and Psychodynamic-Interpersonal Therapy

    Science.gov (United States)

    Mackay, Hannah C.; Barkham, Michael; Stiles, William B.; Goldfried, Marvin R.

    2002-01-01

    Whereas cognitive-behavioral (CB) therapy sessions aim to be instructive and encouraging, psychodynamic-interpersonal (PI) sessions aim to be exploratory and may be emotionally painful. Raters rated degree of pleasure and arousal in each sentence of client speech in CB and PI sessions (N=18) that therapists had identified as particularly helpful.…

  11. Rotational Seismology: AGU Session, Working Group, and Website

    Science.gov (United States)

    Lee, William H.K.; Igel, Heiner; Todorovska, Maria I.; Evans, John R.

    2007-01-01

    Introduction Although effects of rotational motions due to earthquakes have long been observed (e. g., Mallet, 1862), nevertheless Richter (1958, p. 213) stated that: 'Perfectly general motion would also involve rotations about three perpendicular axes, and three more instruments for these. Theory indicates, and observation confirms, that such rotations are negligible.' However, Richter provided no references for this claim. Seismology is based primarily on the observation and modeling of three-component translational ground motions. Nevertheless, theoretical seismologists (e.g., Aki and Richards, 1980, 2002) have argued for decades that the rotational part of ground motions should also be recorded. It is well known that standard seismometers are quite sensitive to rotations and therefore subject to rotation-induced errors. The paucity of observations of rotational motions is mainly the result of a lack, until recently, of affordable rotational sensors of sufficient resolution. Nevertheless, in the past decade, a number of authors have reported direct observations of rotational motions and rotations inferred from rigid-body rotations in short baseline accelerometer arrays, creating a burgeoning library of rotational data. For example, ring laser gyros in Germany and New Zealand have led to the first significant and consistent observations of rotational motions from distant earthquakes (Igel et al., 2005, 2007). A monograph on Earthquake Source Asymmetry, Structural Media and Rotation Effects was published recently as well by Teisseyre et al. (2006). Measurement of rotational motions has implications for: (1) recovering the complete ground-displacement history from seismometer recordings; (2) further constraining earthquake rupture properties; (3) extracting information about subsurface properties; and (4) providing additional ground motion information to earthquake engineers for seismic design. A special session on Rotational Motions in Seismology was convened by H

  12. A computer code for analysis of severe accidents in LWRs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The ICARE2 computer code, developed and validated since 1988 at IPSN (nuclear safety and protection institute), calculates in a mechanistic way the physical and chemical phenomena involved in the core degradation process during possible severe accidents in LWR's. The coupling between ICARE2 and the best-estimate thermal-hydraulics code CATHARE2 was completed at IPSN and led to the release of a first ICARE/CATHARE V1 version in 1999, followed by 2 successive revisions in 2000 and 2001. This documents gathers all the contributions presented at the first international ICARE/CATHARE users'club seminar that took place in November 2001. This seminar was characterized by a high quality and variety of the presentations, showing an increase of reactor applications and user needs in this area (2D/3D aspects, reflooding, corium slumping into the lower head,...). 2 sessions were organized. The first one was dedicated to the applications of ICARE2 V3mod1 against small-scale experiments such as PHEBUS FPT2 and FPT3 tests, PHEBUS AIC, QUENCH experiments, NRU-FLHT-5 test, ACRR-MP1 and DC1 experiments, CORA-PWR tests, and PBF-SFD1.4 test. The second session involved ICARE/CATHARE V1mod1 reactor applications and users'guidelines. Among reactor applications we found: code applicability to high burn-up fuel rods, simulation of the TMI-2 transient, simulation of a PWR-900 high pressure severe accident sequence, and the simulation of a VVER-1000 large break LOCA scenario. (A.C.)

  13. Codes That Support Smart Growth Development

    Science.gov (United States)

    Provides examples of local zoning codes that support smart growth development, categorized by: unified development code, form-based code, transit-oriented development, design guidelines, street design standards, and zoning overlay.

  14. Convolutional Goppa codes defined on fibrations

    CERN Document Server

    Curto, J I Iglesias; Martín, F J Plaza; Sotelo, G Serrano

    2010-01-01

    We define a new class of Convolutional Codes in terms of fibrations of algebraic varieties generalizaing our previous constructions of Convolutional Goppa Codes. Using this general construction we can give several examples of Maximum Distance Separable (MDS) Convolutional Codes.

  15. Session: What do we know about cumulative or population impacts

    Energy Technology Data Exchange (ETDEWEB)

    Kerlinger, Paul; Manville, Al; Kendall, Bill

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of a panel discussion followed by a discussion/question and answer period. The panelists were Paul Kerlinger, Curry and Kerlinger, LLC, Al Manville, U.S. Fish and Wildlife Service, and Bill Kendall, US Geological Service. The panel addressed the potential cumulative impacts of wind turbines on bird and bat populations over time. Panel members gave brief presentations that touched on what is currently known, what laws apply, and the usefulness of population modeling. Topics addressed included which sources of modeling should be included in cumulative impacts, comparison of impacts from different modes of energy generation, as well as what research is still needed regarding cumulative impacts of wind energy development on bird and bat populations.

  16. Summary Of Session 3: How Should Accelerator Operations Be Organized?

    Energy Technology Data Exchange (ETDEWEB)

    Bloemhard, R.; Stanek, M

    2001-07-01

    The underlying structure and organization of a group strongly influences its effectiveness and efficiency. An operations group may develop a 'persistence of form' that prevents it from responding to changes in responsibilities and technology. Even if a group has been in existence for a long time, it is a good idea to re-evaluate its structure periodically. An organization can possess an aesthetic quality related to how simple and transparent its functions appear to users and other outsiders. Information and tasks should flow freely without undue impedance. In this session we examined the issue of group design from a variety of perspectives including both large and small labs, commercial operations and that of an 'expert' consultant. (author)

  17. Astronomy and Space Technologies, WILGA 2012; EuCARD Sessions

    CERN Document Server

    Romaniuk, R S

    2012-01-01

    Wilga Sessions on HEP experiments, astroparticle physics and accelerator technology were organized under the umbrella of the EU FP7 Project EuCARD – European Coordination for Accelerator Research and Development. This paper is the first part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with photonics and electronics applications in astronomy and space technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JE...

  18. Proceedings of the Areva Technical Days. Session 5

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document presents the proceedings of the Areva technical days, presented during the session 5 the 9 and 10 december 2004, at Istanbul. It deals with the operations of the transmission and distribution division. With manufacturing facilities in over 40 countries and a sales network in over 100, Areva offers customers technological solutions for nuclear power generation and electricity transmission and distribution (the Group also provides interconnect systems to the telecommunications, computer and automotive markets). It provides five topics: a general presentation of Areva, the strategic stakes for transmission and distribution by world-zone, economic and strategic stakes of business unit products, business unit systems and business unit automation. (A.L.B.)

  19. The Schrödinger Sessions: Science for Science Fiction

    Science.gov (United States)

    Orzel, Chad; Edwards, Emily; Rolston, Steven

    In July 2015, we held a workshop for 17 science fiction writers working in a variety of media at the Joint Quantum Institute at the University of Maryland, College Park. ''The Schrödinger Sessions,'' funded by an outreach grant from APS, provided a three-day ''crash course'' on quantum physics and technology, including lectures from JQI scientists and tours of JQI labs. The goal was to better inform and inspire stories making use of quantum physics, as a means of outreach to inspire a broad audience of future scientists. We will report on the contents of the workshop, reactions from the attendees and presenters, and future plans. Funded by an Outreach Mini-Grant from the APS.

  20. First Doctoral student assembly and poster session at CERN

    CERN Multimedia

    2010-01-01

    Presently, 130 doctoral students at CERN do their research on “technical” subjects such as magnets and cryogenics, beam and detector physics, computing and vacuum, among others.   Student present  their scientific achievements at the first doctoral student assembly. To present their scientific achievements and to bring together the students with CERN supervisors and CERN’s management was the main objective of the first doctoral student assembly and poster session, held June 30. The photograph shows about half of those who presented posters, all in their second year of assignment, and ready to attach their work to the panels. Another aim of the assembly was to discuss the outcome of the anonymous questionnaire and to gain feedback for the improvement of the doctoral student program. While there is vast overall satisfaction, improvements should aim at strengthening the links between students, CERN supervisors, and university professors. With 24 posters prese...