WorldWideScience

Sample records for asms2004 session code

  1. Monte Carlo Codes Invited Session

    International Nuclear Information System (INIS)

    Trama, J.C.; Malvagi, F.; Brown, F.

    2013-01-01

    This document lists 22 Monte Carlo codes used in radiation transport applications throughout the world. For each code the names of the organization and country and/or place are given. We have the following computer codes. 1) ARCHER, USA, RPI; 2) COG11, USA, LLNL; 3) DIANE, France, CEA/DAM Bruyeres; 4) FLUKA, Italy and CERN, INFN and CERN; 5) GEANT4, International GEANT4 collaboration; 6) KENO and MONACO (SCALE), USA, ORNL; 7) MC21, USA, KAPL and Bettis; 8) MCATK, USA, LANL; 9) MCCARD, South Korea, Seoul National University; 10) MCNP6, USA, LANL; 11) MCU, Russia, Kurchatov Institute; 12) MONK and MCBEND, United Kingdom, AMEC; 13) MORET5, France, IRSN Fontenay-aux-Roses; 14) MVP2, Japan, JAEA; 15) OPENMC, USA, MIT; 16) PENELOPE, Spain, Barcelona University; 17) PHITS, Japan, JAEA; 18) PRIZMA, Russia, VNIITF; 19) RMC, China, Tsinghua University; 20) SERPENT, Finland, VTT; 21) SUPERMONTECARLO, China, CAS INEST FDS Team Hefei; and 22) TRIPOLI-4, France, CEA Saclay

  2. Energy and Data Throughput for Asymmetric Inter-Session Network Coding

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Heide, Janus; Pahlevani, Peyman

    2012-01-01

    on commercial platforms. The outcome of this paper confirms the analytical expression, and the results shows that even with a large asymmetric data rate there is a gain in terms of energy consumption and throughput when network coding is applied in compare to the case when network coding is not applied.......In this paper we investigate the impact of asymmetric traffic patterns on the energy consumption and throughput in a wireless multi hop network. Network coding is a novel technique for communication systems and a viable solution for wireless multi hop networks. State-of-the-art research is mainly...

  3. Closing session

    International Nuclear Information System (INIS)

    2014-01-01

    This part makes a summary of the different sessions and discussions of the workshop in a series of slide presentations: Summary of Opening Session; Summary of Session 1: Analysis of External Hazard Potential; Summary of session 2: Specific features of analysis and modeling of particular natural external hazards; Summary of session-3: Practices and research efforts on natural external events PSA; Summary of session 4: Modeling of NPP response to natural external events in PSA; Summary of session 5: Seismic Risk Analysis; Summary of session 6: Use of external events PSA with the focus on regulatory body role; Facilitated discussion 1 summary: Where do we stand in the analysis of external events?; Summary Facilitated Discussion 2: Findings and Good Practices for External Events Analysis

  4. Panel Session

    DEFF Research Database (Denmark)

    Bertelsen, Olav Wedege

    2004-01-01

    In this panel session, four researchers will discuss the role of a theoretical foundation, in particular AT, in the design of information technology based artefacts. The general discussion will take of from a specific examination of the ActAD approach.......In this panel session, four researchers will discuss the role of a theoretical foundation, in particular AT, in the design of information technology based artefacts. The general discussion will take of from a specific examination of the ActAD approach....

  5. Breakout Sessions

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Participants are split into small groups for detailed discussion on their chosen topic. To register please click on 'See details' link from the agenda and then on the link to send an email to the session for which you would like to book. Please don't change the subject line of the email.

  6. Twenty-fifth water reactor safety information meeting: Proceedings. Volume 1: Plenary sessions; Pressure vessel research; BWR strainer blockage and other generic safety issues; Environmentally assisted degradation of LWR components; Update on severe accident code improvements and applications

    International Nuclear Information System (INIS)

    Monteleone, S.

    1998-03-01

    This three-volume report contains papers presented at the conference. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Japan, Norway, and Russia. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume contains the following information: (1) plenary sessions; (2) pressure vessel research; (3) BWR strainer blockage and other generic safety issues; (4) environmentally assisted degradation of LWR components; and (5) update on severe accident code improvements and applications. Selected papers have been indexed separately for inclusion in the Energy Science and Technology Database

  7. Twenty-fifth water reactor safety information meeting: Proceedings. Volume 1: Plenary sessions; Pressure vessel research; BWR strainer blockage and other generic safety issues; Environmentally assisted degradation of LWR components; Update on severe accident code improvements and applications

    Energy Technology Data Exchange (ETDEWEB)

    Monteleone, S. [comp.] [Brookhaven National Lab., Upton, NY (United States)

    1998-03-01

    This three-volume report contains papers presented at the conference. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Japan, Norway, and Russia. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume contains the following information: (1) plenary sessions; (2) pressure vessel research; (3) BWR strainer blockage and other generic safety issues; (4) environmentally assisted degradation of LWR components; and (5) update on severe accident code improvements and applications. Selected papers have been indexed separately for inclusion in the Energy Science and Technology Database.

  8. Session summaries

    International Nuclear Information System (INIS)

    Sudo, Y.

    2002-01-01

    In the summary session, possible international activities in the field of basic studies on high-temperature engineering were discussed within the framework of the OECD/NEA Nuclear Science Committee (NSC). It was recommended to include topics relevant to fission-product behaviour and safety issues of HTGR in next meeting, in addition to the topics discussed in this meeting. The chairperson of the last session summarised the recommendations to be presented to the NSC into the following five topics as possible international activities: - Basic studies on behaviour of irradiated graphite/carbon and ceramic materials including their composites under both operation and storage conditions. - Development of in-core material characterisation and instrumentation methods. - Improvement in material properties through high-temperature irradiation. - Basic studies on HTGR fuel fabrication and performance including fission-product release. - Basic studies on safety issues of HTGR. It was also recommended that a further information exchange meeting focused on the organisation of the interactive collaboration activity with regard to the above topics be planned in 2003, tentatively in Oarai, Japan. (author)

  9. Session Introduction

    Science.gov (United States)

    Eliane Lessner, Co-Chair:

    2009-03-01

    A panel discussion session providing a worldwide assessment of the status and experiences of women in physics, paying attention to the different cultures and environments they work in and to how the age of the physicist affects their perspective. We will hear about women physicists in Korea in particular and Asia in general, in Egypt in particular and Africa in general, and in the Caribbean. Six invited speakers will present analyses of the progress being made in promoting women in physics from their personal experiences and as assessed from their participation in the Third International Conference on Women In Physics (ICWIP2008) convened in Seoul, Korea in October 2008. From Albania to Zimbabwe, with representation of all the continents, ICWIP2008 congregated 283 women and men physicists from 57 countries to share the participants' scientific accomplishments and evaluate international progress in improving the status of women in physics. This three-hour session is organized jointly by the Committee on the Status of Women in Physics of the APS (CSWP) and the Forum on International Physics of the APS (FIP). Audience participation in the panel discussion will be strongly encouraged.

  10. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session....... In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication...

  11. Post-Session Authentication

    OpenAIRE

    Ahmed , Naveed; Jensen , Christian ,

    2012-01-01

    Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of a...

  12. The Public Poster Session

    Science.gov (United States)

    Levine-Rasky, Cynthia

    2009-01-01

    This note describes the use of a student poster session as an innovative approach to student learning. The local context for the assignment is provided, followed by a description of the course for which the poster was prepared, details about the assignment including its evaluation, and practical considerations for planning a poster session. The…

  13. Multiparty Asynchronous Session Types

    DEFF Research Database (Denmark)

    Honda, Kohei; Yoshida, Nobuko; Carbone, Marco

    2016-01-01

    . This work extends the foregoing theories of binary session types to multiparty, asynchronous sessions, which often arise in practical communication-centered applications. Presented as a typed calculus for mobile processes, the theory introduces a new notion of types in which interactions involving multiple......Communication is a central elements in software development. As a potential typed foundation for structured communication-centered programming, session types have been studied over the past decade for a wide range of process calculi and programming languages, focusing on binary (two-party) sessions...... peers are directly abstracted as a global scenario. Global types retain the friendly type syntax of binary session types while specifying dependencies and capturing complex causal chains of multiparty asynchronous interactions. A global type plays the role of a shared agreement among communication peers...

  14. Session 8: biofuels; Session 8: Les biocarburants

    Energy Technology Data Exchange (ETDEWEB)

    Botte, J.M.

    2006-01-15

    Here are given the summaries of the speeches of Mr Daniel Le Breton (Total): the transports of the future: the role of biofuels; of Mr Pierre Rouveirolles (Renault): the future expectations and needs; of Mr Frederic Monot (IFP): the developments of new generations of biofuels from biomass; of Mr Willem Jan Laan (Unilever): the use of bio resources for food and fuel: a fair competition? All these speeches have been presented at the AFTP yearly days (12-13 october 2005) on the session 8 concerning the biofuels. (O.M.)

  15. Summary of Technical Sessions - Summary and Recommendations

    International Nuclear Information System (INIS)

    2013-01-01

    Technical Session 1 - Development achievements of BEPU methods and State of the Art: The objective of this session was to present the different approaches dealing with Best Estimate codes and uncertainties evaluations. Existing methods were summarized and different papers were focused on specific methods stressing their bases, peculiarities, advantages and limitations. As a result of the session a picture of the current State of the Art was obtained. The session comprised six papers. Technical Session 2 - International comparative activities: This session had as a main objective to review the activities launched in the past and present from the NEA in connection with BEPU methods, with focus on the applicability of conclusions derived from former benchmarks like UMS, the main outcomes of the recently finished BEMUSE project, and the objectives and relevance of UAM and PREMIUM projects. The session comprised four papers. Technical Session 3 - Applications: Licensing, safety analysis support, regulatory body views and industry activities: This session focused on the application of current methods in safety analyses. Contributions from industry, technical safety organizations and regulatory bodies were provided. As a result, a view of the penetration of BEPU methods in current safety analyses was obtained, as well as an indication of the evolution in the near future. Elements such as licensing practices, assessment process, etc. were considered. The session comprised nine papers. Technical Session 4. BEPU methods extension to new fields The session addressed the extension of BEPU methods beyond their current use. By now such methods are mainly applied to classic deterministic environment but it is believed that their benefits could be extended to other fields. Seven papers were presented in the session dealing with subjects that fit in the objectives established in the workshop programme. The papers cover areas like: extension to CFD, quantification of global safety

  16. Summary: Hadron dynamics sessions

    International Nuclear Information System (INIS)

    Carroll, A.S.; Londergan, J.T.

    1993-01-01

    Four sessions on Hadron Dynamics were organized at this Workshop. The first topic, QCD Exclusive Reactions and Color Transparency, featured talks by Ralston, Heppelman and Strikman; the second, QCD and Inclusive Reactions had talks by Garvey, Speth and Kisslinger. The third dynamics session, Medium Modification of Elementary Interactions had contributions from Kopeliovich, Alves and Gyulassy; the fourth session Pre-QCD Dynamics and Scattering, had talks by Harris, Myhrer and Brown. An additional joint Spectroscopy/Dynamics session featured talks by Zumbro, Johnson and McClelland. These contributions are reviewed briefly in this summary. Two additional joint sessions between Dynamics and η physics are reviewed by the organizers of the Eta sessions. In such a brief review there is no way the authors can adequately summarize the details of the physics presented here. As a result, they concentrate only on brief impressionistic sketches of the physics topics discussed and their interrelations. They include no bibliography in this summary, but simply refer to the talks given in more detail in the Workshop proceedings. They focus on topics which were common to several presentations in these sessions. First, nuclear and particle descriptions of phenomena are now clearly converging, in both a qualitative and quantitative sense; they show several examples of this convergence. Second, an important issue in hadron dynamics is the extent to which elementary interactions are modified in nuclei at high energies and/or densities, and they illustrate some of these medium effects. Finally, they focus on those dynamical issues where hadron facilities can make an important, or even a unique, contribution to the knowledge of particle and nuclear physics

  17. Linearly Refined Session Types

    Directory of Open Access Journals (Sweden)

    Pedro Baltazar

    2012-11-01

    Full Text Available Session types capture precise protocol structure in concurrent programming, but do not specify properties of the exchanged values beyond their basic type. Refinement types are a form of dependent types that can address this limitation, combining types with logical formulae that may refer to program values and can constrain types using arbitrary predicates. We present a pi calculus with assume and assert operations, typed using a session discipline that incorporates refinement formulae written in a fragment of Multiplicative Linear Logic. Our original combination of session and refinement types, together with the well established benefits of linearity, allows very fine-grained specifications of communication protocols in which refinement formulae are treated as logical resources rather than persistent truths.

  18. Workshop: poster session

    International Nuclear Information System (INIS)

    Schell, W.R.; Colgan, P.A.

    1990-01-01

    The poster session consisted of a microcosm of projects encompassing the wide range of problems in the radioecology of natural and semi-natural ecosystems. The authors presented a brief resume of the poster at a plenary session during which highlights were pointed out. The range of studies covered microbial transfer, fungi, insects herbicides, lichens, solid speciation of cesium, soil properties, plant cover, transfer factors from soil to plants, uptake by sludge fertilizers, fertilizer remediation and compartmental models for soil-plant uptake. (author)

  19. Session 2: Machine studies

    International Nuclear Information System (INIS)

    Assmann, R.W.; Papotti, G.

    2012-01-01

    This document summarizes the talks and discussion that took place in the second session of the Chamonix 2012 workshop concerning results from machine studies performed in 2011. The session consisted of the following presentations: -) LHC experience with different bunch spacings by G. Rumolo; -) Observations of beam-beam effects in MDs in 2011 by W. Herr; -) Beam-induced heating/ bunch length/RF and lessons for 2012 by E. Metral; -) Lessons in beam diagnostics by R. Jones; -) Quench margins by M. Sapinski; and -) First demonstration with beam of the Achromatic Telescopic Squeeze (ATS) by S. Fartoukh. (authors)

  20. Session 7: Reserve

    International Nuclear Information System (INIS)

    Bailey, R.; Crockford, G.

    2001-01-01

    The reserve session was devoted to some issues that came up through the workshop, which were grouped into three main areas: The Global Accelerator Network, Problems of stress and how to get organized to minimize them, What should an operations group be responsible for? This paper summarizes the discussions that took place. (author)

  1. Session 2: Availability

    CERN Document Server

    Uythoven, J

    2012-01-01

    This session concentrated on the main players affecting the availability of the LHC: the Quench Protection System (QPS), the cryogenics system, the regularly foreseen technical stops and the effect of radiation on equipment failures. A forecast for operation in 2012 was made for all these items.

  2. Summary of Session 3

    International Nuclear Information System (INIS)

    Fleischer, J.

    2004-01-01

    In Session 3, the speakers were dealing with the following topics: Automatization of Feynman Diagram Calculations (FDC), Event generators, Analytical approaches to FDC and various Mathematical innovations related to different physical problems. A more general, 'brainstorming', talk was given by J. Vermaseren as first talk

  3. Summary of Session III

    International Nuclear Information System (INIS)

    Furman, M.A.

    2002-01-01

    This is a summary of the talks presented in Session III ''Simulations of Electron-Cloud Build Up'' of the Mini-Workshop on Electron-Cloud Simulations for Proton and Positron Beams ECLOUD-02, held at CERN, 15-18 April 2002

  4. Abstracts of SIG Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1994

    1994-01-01

    Includes abstracts of 18 special interest group (SIG) sessions. Highlights include natural language processing, information science and terminology science, classification, knowledge-intensive information systems, information value and ownership issues, economics and theories of information science, information retrieval interfaces, fuzzy thinking…

  5. NSSS vendors session

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    A transcription of a question and answer session at the 1982 Nuclear Commerce Conference was presented. Standardization of nuclear power plant design, and the effects it would have on Nuclear Regulatory Commission licensing and regulations, was of particular interest. Forecasts of the demand for nuclear power for the rest of this country were also discussed

  6. Session 1 - discussion

    International Nuclear Information System (INIS)

    Wells, C.; Richards, K.M.; McKerrow, J.F.

    1991-01-01

    This discussion session of the Landfill Gas-Energy and Environment 90 Conference covered the landfill gas potential, the setting up of the Non-Fossil Fuel Obligation; anticipated developments in the post 1998 period, the problem of smell for those who live near a landfill, and the length of time a landfill site is productive in terms of gas evolution. Relevant regulations in California are briefly discussed. (author)

  7. ICALEPS 2005 : opening session

    CERN Multimedia

    Maximilien Brice

    2005-01-01

    ICALEPCS 2005, the tenth International Conference on Accelerator and Large Experimental Physics Control Systems, will be held in Geneva, Switzerland, 10-14 Oct. 2005 at the International Conference Center Geneva (CICG). ICALEPCS 2005 thus falls in the year that UNESCO has declared the "World Year of Physics". ICALEPCS covers all aspects of control and operation of Experimental Physics facilities such as particle accelerators, particle detectors, optical telescopes, radio telescopes, nuclear fusion facilities like Tokamaks, nuclear reactors, lasers, etc .... Opening session by . A. Daneels (CERN): Introducting ICALEPCS 2005 . C.Lamprecht (Republic & State of Geneva): Welcome speech . J. Lister (EPFL): Welcome speech . J. Engelen (CERN): The machine and experiment challenges of LHC

  8. 98th LHCC meeting Agenda OPEN Session and CLOSED Session

    CERN Document Server

    CERN. Geneva

    2009-01-01

    OPEN Session on Wednesday, 8 July at 9h00-11h00 in Main Auditorium, Live webcast, followed by CLOSED Session, Conference room 160-1-009 11h20-17h00. CLOSED Session continued on Thursday, 9 July at 9h00-12h30

  9. Session Types at the Mirror

    Directory of Open Access Journals (Sweden)

    Luca Padovani

    2009-12-01

    Full Text Available We (redefine session types as projections of process behaviors with respect to the communication channels they use. In this setting, we give session types a semantics based on fair testing. The outcome is a unified theory of behavioral types that shares common aspects with conversation types and that encompass features of both dyadic and multi-party session types. The point of view we provide sheds light on the nature of session types and gives us a chance to reason about them in a framework where every notion, from well-typedness to the subtyping relation between session types, is semantically -rather than syntactically- grounded.

  10. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  11. Formal description of the OSI session layer: session service

    NARCIS (Netherlands)

    van Sinderen, Marten J.; van Eijk, P.H.J.; Vissers, C.A.; Diaz, M.

    1989-01-01

    The LOTOS formal description of the OSI session service is presented on basis of specification samples from the full description, giving account of how specification styles and session service architectural elements are reflected in the description. Both information (data types) and process

  12. Review for session K - benchmarks

    International Nuclear Information System (INIS)

    McCracken, A.K.

    1980-01-01

    Eight of the papers to be considered in Session K are directly concerned, at least in part, with the Pool Critical Assembly (P.C.A.) benchmark at Oak Ridge. The remaining seven papers in this session, the subject of this review, are concerned with a variety of topics related to the general theme of Benchmarks and will be considered individually

  13. Executive summary. Session summaries

    International Nuclear Information System (INIS)

    2011-01-01

    The possibility of stopping and/or delaying the progression of a core melt accident by the use of a recovered water source or by taking benefit of specific engineered systems is taken into account in a number of PSA (Probabilistic Safety Assessment) studies. The likelihood to stop the progression of a core melt-down accident by water injection is generally considered as high in the early phase of core degradation and depends on reactor specific features, nevertheless even in later sequences, e.g. during the relocation in the lower head, cooling still can be achieved but depends on reactor specific features and the accident scenario.. Ongoing, starting and planned experimental programmes address the coolability issues in the different relevant configurations, i.e. reflooding of bundles, debris beds, molten pools and Reactor Pressure Vessel external cooling. There is still a difficulty with present models to predict reliably if reflooding during the early core degradation would or not trigger a cladding oxidation runaway. Whether this is due to deficiencies in thermal-hydraulics description or problems for taking into account the oxidation of melts is a matter of discussion. The code developments are promisingly directed towards a more mechanistic approach using a porous medium modelling able to treat the different configurations of a degraded core. Secondly, the models to describe adequately the relocation of parts of the molten core to the lower head and the debris bed formation still need further development and qualification. Their validation is expected against the results of ongoing experimental programmes. The transposition of results to the reactor scale where multi-dimensional effects are expected needs to be evaluated, all the more as larger scale experiments are probably not feasible

  14. Towards deductive verification of MPI programs against session types

    Directory of Open Access Journals (Sweden)

    Eduardo R. B. Marques

    2013-12-01

    Full Text Available The Message Passing Interface (MPI is the de facto standard message-passing infrastructure for developing parallel applications. Two decades after the first version of the library specification, MPI-based applications are nowadays routinely deployed on super and cluster computers. These applications, written in C or Fortran, exhibit intricate message passing behaviours, making it hard to statically verify important properties such as the absence of deadlocks. Our work builds on session types, a theory for describing protocols that provides for correct-by-construction guarantees in this regard. We annotate MPI primitives and C code with session type contracts, written in the language of a software verifier for C. Annotated code is then checked for correctness with the software verifier. We present preliminary results and discuss the challenges that lie ahead for verifying realistic MPI program compliance against session types.

  15. Poster Session B

    Science.gov (United States)

    2014-01-01

    Monitoring (SRM) mass spectrometry combined with perturbations, we analyzed OP9 cells to detect peptides of TFs which can serve as probes. We validated these probes with isotopically coded internal peptide standards and established a SRM library of transcriptional key regulators. These probes were subsequently used to quantitatively profile different stages of adipogenesis to obtain time courses of different TFs. To achieve our major goal to elucidate the TF control network in more detail, we furthermore searched for hidden feedback loops in this differentiation system. To do so we chemically manipulated the activity level of PPARg and its potential feedback partners individually. If a protein was a component of one or several feedback loops and was experimentally manipulated, all the other components of feedback loops associated with this protein should display a relative change in abundance and vice versa. Results: We developed a SRM methodology to monitor the concentration changes of TFs during adipogenesis. Using this SRM methodology together the perturbation of PPARg, and single cell analysis we were able to validate known feedback loops (C/EBPa, C/EBPb) and to identify several new feedback Loops. Conclusions: PPARg is the master regulator of adipogenesis. To successfully differentiate preadipocytes into adipocytes, its activity needs to be tightly regulated by a network of feedback loops. Overall, the study provides a new SRM MS-based method to uncover novel feedback loops regulating TFs. Based on this method; we have identified 7 new proteins which are fundamental regulators of PPARg and the fat cell commitment decision. B.6 Application of Quantitative and Functional Phosphoproteomics In Study of Ethylene Signaling Ning Li 1 1The Hong Kong University of Science and Technology, Hong Kong, China Ethylene is a major plant hormone that regulates a diverse aspect of plant growth and development. The regulatory roles of ethylene in plants include promotion of leaf and

  16. Human Reliability Analysis: session summary

    International Nuclear Information System (INIS)

    Hall, R.E.

    1985-01-01

    The use of Human Reliability Analysis (HRA) to identify and resolve human factors issues has significantly increased over the past two years. Today, utilities, research institutions, consulting firms, and the regulatory agency have found a common application of HRA tools and Probabilistic Risk Assessment (PRA). The ''1985 IEEE Third Conference on Human Factors and Power Plants'' devoted three sessions to the discussion of these applications and a review of the insights so gained. This paper summarizes the three sessions and presents those common conclusions that were discussed during the meeting. The paper concludes that session participants supported the use of an adequately documented ''living PRA'' to address human factors issues in design and procedural changes, regulatory compliance, and training and that the techniques can produce cost effective qualitative results that are complementary to more classical human factors methods

  17. From In-Session Behaviors to Drinking Outcomes: A Causal Chain for Motivational Interviewing

    Science.gov (United States)

    Moyers, Theresa B.; Martin, Tim; Houck, Jon M.; Christopher, Paulette J.; Tonigan, J. Scott

    2009-01-01

    Client speech in favor of change within motivational interviewing sessions has been linked to treatment outcomes, but a causal chain has not yet been demonstrated. Using a sequential behavioral coding system for client speech, the authors found that, at both the session and utterance levels, specific therapist behaviors predict client change talk.…

  18. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  19. Code Team Training: Demonstrating Adherence to AHA Guidelines During Pediatric Code Blue Activations.

    Science.gov (United States)

    Stewart, Claire; Shoemaker, Jamie; Keller-Smith, Rachel; Edmunds, Katherine; Davis, Andrew; Tegtmeyer, Ken

    2017-10-16

    Pediatric code blue activations are infrequent events with a high mortality rate despite the best effort of code teams. The best method for training these code teams is debatable; however, it is clear that training is needed to assure adherence to American Heart Association (AHA) Resuscitation Guidelines and to prevent the decay that invariably occurs after Pediatric Advanced Life Support training. The objectives of this project were to train a multidisciplinary, multidepartmental code team and to measure this team's adherence to AHA guidelines during code simulation. Multidisciplinary code team training sessions were held using high-fidelity, in situ simulation. Sessions were held several times per month. Each session was filmed and reviewed for adherence to 5 AHA guidelines: chest compression rate, ventilation rate, chest compression fraction, use of a backboard, and use of a team leader. After the first study period, modifications were made to the code team including implementation of just-in-time training and alteration of the compression team. Thirty-eight sessions were completed, with 31 eligible for video analysis. During the first study period, 1 session adhered to all AHA guidelines. During the second study period, after alteration of the code team and implementation of just-in-time training, no sessions adhered to all AHA guidelines; however, there was an improvement in percentage of sessions adhering to ventilation rate and chest compression rate and an improvement in median ventilation rate. We present a method for training a large code team drawn from multiple hospital departments and a method of assessing code team performance. Despite subjective improvement in code team positioning, communication, and role completion and some improvement in ventilation rate and chest compression rate, we failed to consistently demonstrate improvement in adherence to all guidelines.

  20. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  1. Topical Session on Materials Management

    International Nuclear Information System (INIS)

    2002-01-01

    At its second meeting, in Paris, 5-7 December 2001, the WPDD held two topical sessions on the D and D Safety Case and on the Management of Materials from D and D, respectively. This report documents the topical session on the management of materials. Presentations during the topical session covered key aspects of the management of materials and meant to provide an exchange of information and experience, including: Experience and lessons learnt from VLLW and non-radioactive material management in Spain and Germany with special attention to recycling (How specific solutions came about? Are there 'generic' examples for wider adoption?); Risk assessment of recycling and non-recycling: a CPD study; Waste acceptance issues within different national contexts (What constraints are there on the waste receiving body and what flexibility can the latter have? What constraints does this impose on D and D implementers? What about wastes are without current solution? What needs to be done? What about large items and 'difficult' waste in general?); Radiological characterisation of materials during decommissioning, particularly difficult situations - large volumes, large items,.. wastes, heterogeneous streams (What examples of established practice? What are the approaches or aspects that set the regulatory requirements? How can the flow rates be large but the answers acceptable? How much is needed to be known for later action, e. g., disposal, release, protection of worker, etc.); Radiological characterisation of buildings as they stand, in order to allow conventional demolition (What are strategies for optimisation of characterisation? How much needs to be known to take action later? e.g. for storage, disposal, release, cost estimation and ALARA? What needs to be done in advance and after decommissioning/dismantling?). At the end of each presentation time was allotted for discussion of the paper. Integral to the Topical Session was a facilitated plenary discussion on the topical

  2. Beam instability Workshop - plenary sessions

    International Nuclear Information System (INIS)

    2001-01-01

    The purpose of this workshop was to provide a review of the mechanisms of limiting beam instabilities, their cures, including feedback, and beam measurement for synchrotron radiation light sources. 12 plenary sessions took place whose titles are: 1) challenging brilliance and lifetime issues with increasing currents; 2) limiting instabilities in multibunch; 3) experience from high currents in B factories; 4) longitudinal dynamics in high intensity/bunch; 5) Transverse instabilities for high intensity/bunch; 6) working group introduction from ESRF experience; 7) impedance modelling: simulations, minimization; 8) report on the broadband impedance measurements and modelling workshop; 9) feedback systems for synchrotron light sources; 10) beam instabilities diagnostics; 11) harmonic cavities: the pros and cons; and 12) experimental study of fast beam-ion instabilities at PLS. This document gathers the 12 articles that were presented during these sessions

  3. Beam instability Workshop - plenary sessions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The purpose of this workshop was to provide a review of the mechanisms of limiting beam instabilities, their cures, including feedback, and beam measurement for synchrotron radiation light sources. 12 plenary sessions took place whose titles are: 1) challenging brilliance and lifetime issues with increasing currents; 2) limiting instabilities in multibunch; 3) experience from high currents in B factories; 4) longitudinal dynamics in high intensity/bunch; 5) Transverse instabilities for high intensity/bunch; 6) working group introduction from ESRF experience; 7) impedance modelling: simulations, minimization; 8) report on the broadband impedance measurements and modelling workshop; 9) feedback systems for synchrotron light sources; 10) beam instabilities diagnostics; 11) harmonic cavities: the pros and cons; and 12) experimental study of fast beam-ion instabilities at PLS. This document gathers the 12 articles that were presented during these sessions.

  4. National Sessions of Radiation Protection

    International Nuclear Information System (INIS)

    Sociedad Argentina de Radioproteccion

    2012-01-01

    The Radioprotection Argentine Society (SAR) was organized the National Sessions on Radiation Protection 2012 in order to continue the exchange in the radiation protection community in the country, on work areas that present a challenge to the profession. The new recommendations of the ICRP and the IAEA Safety Standards (2011), among others, includes several topics that are necessary to develop. The SAR wants to encourage different organizations from Argentina, to submit projects that are developing in order to strengthen radiation protection.

  5. Scientific conference proceedings. Session 3

    International Nuclear Information System (INIS)

    Bartosek, V.

    1985-01-01

    The Radiochemical Technology session met at UJV Rez on June 7, 1985 to hear 13 papers of which 11 were incorporated in INIS. The papers inform of results attained in the field of processing liquid radioactive wastes from nuclear power plants, processing spent nuclear fuel using the fluoride process, of the separation of fission products by dicarbolide extraction, the chemistry of complex uranium compounds, etc. The cooperation of UJV with VUJE and VUCHZ is also dealt with. (E.S.)

  6. Working session 3: Tubing integrity

    International Nuclear Information System (INIS)

    Cueto-Felgueroso, C.; Strosnider, J.

    1997-01-01

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group's discussions on these subjects, including conclusions and recommendations, are summarized in this article

  7. CIME Session on Pluripotential Theory

    CERN Document Server

    Patrizio, Giorgio; Berteloot, Francois; Demailly, Jean Pierre

    2013-01-01

    Pluripotential theory is a very powerful tool in geometry, complex analysis and dynamics. This volume brings together the lectures held at the 2011 CIME session on "pluripotential theory" in Cetraro, Italy. This CIME course focused on complex Monge-Ampére equations, applications of pluripotential theory to Kahler geometry and algebraic geometry and to holomorphic dynamics. The contributions provide an extensive description of the theory and its very recent developments, starting from basic introductory materials and concluding with open questions in current research.

  8. Summary of spin physics sessions

    International Nuclear Information System (INIS)

    Roser, T.

    1988-01-01

    The list of topics in the many talks given during the Spin Physics sessions of this Intersections conference is nearly as long as the one of this conference: P and T Violation NN Interaction πp and πd Elastic Scattering Nuclear Matter Spin Effects Muon (g-2) Polarized Proton Beams Polarized Gas Targets This points to the almost trivial fact that spin is fundamental to our understanding of nuclear and particle physics. I will discuss in some detail only four of these topics. Needless to say this choice is very much personally biased and I apologize to all the speakers whose excellent contributions I did not include

  9. Working session 1: Tubing degradation

    International Nuclear Information System (INIS)

    Kharshafdjian, G.; Turluer, G.

    1997-01-01

    A general introductory overview of the purpose of the group and the general subject area of SG tubing degradation was given by the facilitator. The purpose of the session was described as to open-quotes develop conclusions and proposals on regulatory and technical needs required to deal with the issues of SG tubing degradation.close quotes Types, locations and characteristics of tubing degradation in steam generators were briefly reviewed. The well-known synergistic effects of materials, environment, and stress and strain/strain rate, subsequently referred to by the acronym open-quotes MESSclose quotes by some of the group members, were noted. The element of time (i.e., evolution of these variables with time) was emphasized. It was also suggested that the group might want to consider the related topics of inspection capabilities, operational variables, degradation remedies, and validity of test data, and some background information in these areas was provided. The presentation given by Peter Millet during the Plenary Session was reviewed; Specifically, the chemical aspects and the degradation from the secondary side of the steam generator were noted. The main issues discussed during the October 1995 EPRI meeting on secondary side corrosion were reported, and a listing of the potential SG tube degradations was provided and discussed

  10. Emotion episodes during psychotherapy sessions among women newly diagnosed with gynecological cancers.

    Science.gov (United States)

    Myers Virtue, Shannon; Manne, Sharon L; Darabos, Kathleen; Heckman, Carolyn J; Ozga, Melissa; Kissane, David; Rubin, Stephen; Rosenblum, Norman

    2015-09-01

    The aim of this study was to describe emotion episodes during early and late psychotherapy sessions among women newly diagnosed with gynecological cancer and to examine whether the total number of emotion episodes during early and later sessions was associated with baseline psychological distress, dispositional emotion expressivity, and patient-rated therapeutic progress. The study utilized data from an ongoing study examining the efficacy of two psychotherapy interventions, a coping and communication intervention and a supportive counseling intervention, for women diagnosed with gynecological cancer. Emotion episode coding was completed for the first and sixth psychotherapy sessions for each patient randomized to receive psychotherapy (N = 173). Patients completed baseline survey measures of psychological distress and dispositional emotional expressivity and post-session ratings of therapeutic progress. The average number of emotion episodes was 7.4 in the first session and 5.2 episodes in the sixth session. In both sessions, the majority of emotion episodes contained only negative emotions and focused on a cancer-related topic. A higher number of emotion episodes in the first session was associated with higher psychological distress reported in the baseline survey (p = 0.02). A higher number of emotion episodes in the sixth session was associated with a higher number of emotion episodes in the first session (p psychotherapy among women diagnosed with gynecological cancer. Copyright © 2014 John Wiley & Sons, Ltd.

  11. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  12. Working session 2: Tubing inspection

    International Nuclear Information System (INIS)

    Guerra, J.; Tapping, R.L.

    1997-01-01

    This session was attended by delegates from 10 countries, and four papers were presented. A wide range of issues was tabled for discussion. Realizing that there was limited time available for more detailed discussion, three topics were chosen for the more detailed discussion: circumferential cracking, performance demonstration (to focus on POD and sizing), and limits of methods. Two other subsessions were organized: one dealt with some challenges related to the robustness of current inspection methods, especially with respect to leaving cracked tubes in service, and the other with developing a chart of current NDE technology with recommendations for future development. These three areas are summarized in turn, along with conclusions and/or recommendations. During the discussions there were four presentations. There were two (Canada, Japan) on eddy current probe developments, both of which addressed multiarray probes that would detect a range of flaws, one (Spain) on circumferential crack detection, and one (JRC, Petten) on the recent PISC III results

  13. Cinema Sessions in Primary Care

    Directory of Open Access Journals (Sweden)

    Francisco Ignacio MORETA-VELAYOS

    2016-04-01

    Full Text Available For a long time films have been used in teaching and at various levels of professional training  and more specifically in the medical area. In this case, through the description of a project developed in a Primary Care Health Center, we intend to justify the use of movies as a tool that could ease, the sometimes difficult task of continued education among Primary Care professionals. We propose different aspects of everyday practice in which cinema can be potentially useful, as well as the way to include it in the Plan of Continued Education of the Centre and its accreditation.Films and issues discussed in each session, and the project evaluation, are detailed.

  14. DWPF recycle minimization: Brainstorming session

    International Nuclear Information System (INIS)

    Jacobs, R.A.; Poirier, M.R.

    1993-01-01

    The recycle stream from the DWPF constitutes a major source of water addition to the High Level Waste evaporator system. As now designed, the entire flow of 3.5 to 6.5 gal/min (at sign 25% and 75% attainment, respectively), or 2 gal/min during idling, flow to the 2H evaporator system (Tank 43). Substantial improvement in the HLW water balance and tank volume management is expected if the DWPF recycle to the HLW evaporator system can be significantly reduced. A task team has been appointed to study alternatives for reducing the flow to the HLW evaporator system and make recommendations for implementation and/or further study and evaluation. The brainstorming session detailed in this report was designed to produce the first cut options for the task team to further evaluate

  15. Celebrating the tenth conference session

    International Nuclear Information System (INIS)

    1966-01-01

    Full text: This number of the Bulletin appears during a month when the tenth regular session of the Agency's General Conference is being held. It is fitting that among the special arrangements made to give added significance to such an historical landmark should be an opening address by Herr Franz Jonas, Federal President of the host country, Austria. The Festsaal of the Kongresszentrum, in the Hofburg, has now been the centre for every annual session held in Austria, except the first. On that occasion, recorded in the photograph on the cover, the Konzerthaus was made available. A commemorative series of talks dealing with topics of particular interest in the international development of the peaceful uses of atomic energy, delivered by scientists of world distinction was another idea which will add much profound thought to the records of nuclear energy. Under the chairmanship of Professor L.C. Prado, with Dr. W.B. Lewis as Moderator, the subjects chosen by the participants were : The Impact of Atomic Energy in our Society - Sir John Cockcroft; Nuclear Power Systems and their Technical Potentialities - Prof. Alexandre Leipunski; The Commercial Future of Nuclear Power - Dr. William Webster; Nuclear Science in Life Sciences - Dr. A.R. Gopal-Ayengar; Fundamental Research in Atomic Energy Centres - Prof. Louis Neel. These speeches will be reproduced in full in the Agency's Atomic Energy Review. The pages of this issue of the Bulletin are intended to give indications of the stage which the Agency has now reached in some, but by no means all, of its activities in promoting the techniques of atomic energy for the benefit of mankind. (author)

  16. A Video Recall Study of In-session Changes in Sentiment Override.

    Science.gov (United States)

    Johnson, Lee N; Tambling, Rachel B; Anderson, Shayne R

    2015-09-01

    This study examines in-session changes in sentiment override over the first three sessions of couple therapy. Couples viewed a video recording of therapy sessions immediately after each of the first three sessions and continuously rated their level of sentiment override. Ninety-eight changes were randomly chosen for analysis. Three talk turns prior to each change was coded using the Family Relational Communication Control Coding System. Results show that changes in sentiment override occur frequently. Repeated incidents of communication control were related to negative change in sentiment override for females. Repeated incidents of being left out of the conversation were related to negative changes in sentiment override for females and positive changes for males. © 2014 Family Process Institute.

  17. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  18. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  19. Summary of session W2

    International Nuclear Information System (INIS)

    Deitrich, L.W.

    1988-01-01

    This paper reports on the development and validation of the SASSYS-1 code which is being used to analyze the transient behavior of the U.S. innovative designs, SAFR and PRISM, as well as the future metal fueled core for FFTF. The description emphasized the high degree of flexibility of SASSYS-1 and its capability to do detailed core calculations needed to accurately model reactivity feedbacks. Validation work based on calculations of EBR-II SHRT (shutdown neat removal) tests and FFTF transient experiments was presented. The paper presents a discussion of the modifications to the SSC code required to model the ATWS events in SAFR and PRISM, along with results of calculations done with the modified SSC. The probability that passive shutdown could be defeated and severe core damage sustained has been investigated, and some results are presented in this paper. It was stated that simple design choices can keep risk almost arbitrarily low, and that the leading uncertainties will be reduced through future R ampersand D and demonstration testing. Uncertainties exist due to uncertainties in feedback coefficients and in the models and codes used to do the calculations. Large margin and relatively small uncertainties lead to low probabilities (less than 10-3) of defeat of passive shutdown by exceeding temperature limits. The given value is considered to be conservative to allow for uncertainties in knowledge of all relevant accident sequences at this stage in design and analysis. This paper also deals with experimental work on decay heat removal in PRISM and SAFR. Experiments on air-side heat transfer in the RVACS/RACS passive decay heat removal path, was reported. A data correlation for use in predicting heat transfer has been discussed for the RVACS conditions

  20. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  1. Session Report - S. Voinis (Andra)

    International Nuclear Information System (INIS)

    Voinis, Sylvie

    2014-01-01

    The session addressed key issues related to the industrial feasibility of construction. It covered the implementer and regulator points of view. The conclusions derive from three presentations completed by the outcomes of six WG. At the Morsleben Repository, Germany, the licensing of the closure of the repository has been initiated by BfS. The closure concept is based on extensive backfilling with salt concrete complemented by seals. In order to demonstrate the feasibility of constructing such a seal structure an in-situ experiment is performed in a drift of the repository. In the UK, the framework for implementing geological disposal of the higher activity radioactive waste is described in the White Paper published by the UK Government in June 2008. The process to site a facility will be staged and based on voluntarism and partnership with local communities. This process is in its early stage. The paper outlines the work being undertaken by the NDA. In canada, Ontario Power Generation (OPG) has submitted information required for a CNSC licence to prepare the site and construct a DGR for the disposal of low and intermediate level waste from the operation of their nuclear power reactors. That submission includes an Environmental Impact Statement (EIS), as required for a Panel Review under the Canadian Environmental Assessment Act (CEAA), and the information required for a licence application under the NSCA Regulations. Discussions between the proponent and the regulator in the pre-licensing phase, clarified CNSC expectations for the characterization of the site and for the development of the EIS and application. They also helped to ensure that OPG understood these expectations. Outcomes WG session-1: - Start with construction but during operational phase: Simultaneous construction and operation activities. - Need for technical requirements/criteria: So that it can be judged whether 'products' meet the requirements; LT safety issues to be considered during

  2. Synchrony in Dyadic Psychotherapy Sessions

    Science.gov (United States)

    Ramseyer, Fabian; Tschacher, Wolfgang

    Synchrony is a multi-faceted concept used in diverse domains such as physics, biology, and the social sciences. This chapter reviews some of the evidence of nonverbal synchrony in human communication, with a main focus on the role of synchrony in the psychotherapeutic setting. Nonverbal synchrony describes coordinated behavior of patient and therapist. Its association with empathy, rapport and the therapeutic relationship has been pointed out repeatedly, yet close evaluation of empirical studies suggests that the evidence remains inconclusive. Particularly in naturalistic studies, research with quantitative measures of synchrony is still lacking. We introduce a new empirical approach for the study of synchrony in psychotherapies under field conditions: Motion Energy Analysis (MEA). This is a video-based algorithm that quantifies the amount of movement in freely definable regions of interest. Our statistical analysis detects synchrony on a global level, irrespective of the specific body parts moving. Synchrony thus defined can be considered as a general measure of movement coordination between interacting individuals. Data from a sequence of N = 21 therapy sessions taken from one psychotherapy dyad shows a high positive relationship between synchrony and the therapeutic bond. Nonverbal synchrony can thus be considered a promising concept for research on the therapeutic alliance. Further areas of application are discussed.

  3. Session II-D. Systems

    International Nuclear Information System (INIS)

    Hall, R.J.

    1981-01-01

    The objectives of the Systems Task in the NWTS Program include: development of program requirements, allocation of the requirements to subsystems or tasks, integration of the task activities towards meeting the overall requirements, and assessment of progress towards achievement of the program mission. The Systems Task also includes a number of ancillary activities which are necessary to the program but which do not logically fall into other work-breakdown structure elements. Activities in the Systems Task, which in the NWTS Program are conducted at both the program and project levels, are generally grouped under the heading systems engineering and include identification of requirements, development of a baseline, integration of the system, baseline control, functional analyses, trade-off studies, and system analyses. The following papers in this session address some of the activities and progress that was achieved in the Systems Task in FY 1981: (1) waste isolation system alternatives: a cost comparison; (2) BWIP technical integration and control; (3) BWIP performance evaluation process: a criteria based method; (4) impacts of waste age; (5) systems studies of subseabed disposal; and (6) systems studies of waste transportation

  4. Statistical theory applications and associated computer codes

    International Nuclear Information System (INIS)

    Prince, A.

    1980-01-01

    The general format is along the same lines as that used in the O.M. Session, i.e. an introduction to the nature of the physical problems and methods of solution based on the statistical model of the nucleus. Both binary and higher multiple reactions are considered. The computer codes used in this session are a combination of optical model and statistical theory. As with the O.M. sessions, the preparation of input and analysis of output are thoroughly examined. Again, comparison with experimental data serves to demonstrate the validity of the results and possible areas for improvement. (author)

  5. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  6. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  7. Poster session ELIPGRID-PC

    International Nuclear Information System (INIS)

    Davidson, J.R.

    1995-01-01

    ELIPGRID-PC, a new personal computer program, has been developed to provide easy access to Singer's ELIPGRID algorithm for hot-spot detection probabilities. Three features of the program are the ability to determine: (1) the grid size required for specified conditions, (2) the smallest hot spot that can be sampled with a given probability, and (3) the approximate grid size resulting from specified conditions and sampling cost. ELIPGRID-PC also provides probability of detection versus cost data for graphing with spreadsheets or graphics software. The program has been successfully tested using Singer's published ELIPGRID results. An apparent error in the published ELIPGRID code has been uncovered and an appropriate modification incorporated into the new program

  8. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  9. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  10. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  11. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  12. Code-switching and communicative competence in the language ...

    African Journals Online (AJOL)

    Code-switching and communicative competence in the language classroom. ... that both teachers and learners engage in CS behaviour in classroom interaction. The paper examines language teaching sessions of Grade 8 and 9 learners in ...

  13. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  14. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  15. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  16. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  17. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  18. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  19. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  20. Undergraduate Researchers and the Poster Session

    Science.gov (United States)

    Johnson, Gail; Green, Raymond

    2007-01-01

    Undergraduates presented original research in classroom poster sessions open to students, faculty, and friends. We assessed the reaction of the students to the experience and their reported change in their interest in presenting at conferences. Students enjoyed the poster session experience and indicated they preferred this method over other…

  1. Multiparty session types as coherence proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2017-01-01

    We propose a Curry–Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof nor...

  2. Summary of southeastern group breakout sessions

    Science.gov (United States)

    Bob Ford; Charles P. Nicholson

    1993-01-01

    The breakout sessions held by the southeastern representatives at the Partners In Flight meeting in Colorado were extremely well attended Most states were represented, as well as several federal agencies (including USFS, USFWS, TVA, EPA), and non-government organizations. Two sessions were held, one to discuss a strategy of management by...

  3. Summary of the session on other effects

    International Nuclear Information System (INIS)

    Chao, A.

    1997-07-01

    The theme of this workshop is to discuss the effects of foreign particles on the native beam in a storage ring. This paper summarizes the session on effects not covered in sessions on fast ion instability, electron cloud instability, and cures. The topics discussed are the beam, the foreign particle, how are foreign particles trapped, and how do foreign particles and beam couple

  4. Ann Arbor Session I: Breaking Ground.

    Science.gov (United States)

    Music Educators Journal, 1979

    1979-01-01

    Summarizes the first session of the National Symposium on the Applications of Psychology to the Teaching and Learning of Music held at Ann Arbor from October 30 to November 2, 1978. Sessions concerned auditory perception, motor learning, child development, memory and information processing, and affect and motivation. (SJL)

  5. BILATERAL SINGLE SESSION URETEROSCOPY FOR URETERAL ...

    African Journals Online (AJOL)

    Objectives: To determine the feasibility, safety and success rate of bilateral single session rigid retrograde ureteroscopy (URS) for bilateral ureteral calculi. Patients and Methods: Thirty-five patients underwent bilateral single session ureteroscopic calculus removal. Results: Out of 70 renal units in 35 patients treated, ...

  6. Using session types as an effect system

    Directory of Open Access Journals (Sweden)

    Dominic Orchard

    2016-02-01

    Full Text Available Side effects are a core part of practical programming. However, they are often hard to reason about, particularly in a concurrent setting. We propose a foundation for reasoning about concurrent side effects using sessions. Primarily, we show that session types are expressive enough to encode an effect system for stateful processes. This is formalised via an effect-preserving encoding of a simple imperative language with an effect system into the pi-calculus with session primitives and session types (into which we encode effect specifications. This result goes towards showing a connection between the expressivity of session types and effect systems. We briefly discuss how the encoding could be extended and applied to reason about and control concurrent side effects.

  7. Content Coding of Psychotherapy Transcripts Using Labeled Topic Models.

    Science.gov (United States)

    Gaut, Garren; Steyvers, Mark; Imel, Zac E; Atkins, David C; Smyth, Padhraic

    2017-03-01

    Psychotherapy represents a broad class of medical interventions received by millions of patients each year. Unlike most medical treatments, its primary mechanisms are linguistic; i.e., the treatment relies directly on a conversation between a patient and provider. However, the evaluation of patient-provider conversation suffers from critical shortcomings, including intensive labor requirements, coder error, nonstandardized coding systems, and inability to scale up to larger data sets. To overcome these shortcomings, psychotherapy analysis needs a reliable and scalable method for summarizing the content of treatment encounters. We used a publicly available psychotherapy corpus from Alexander Street press comprising a large collection of transcripts of patient-provider conversations to compare coding performance for two machine learning methods. We used the labeled latent Dirichlet allocation (L-LDA) model to learn associations between text and codes, to predict codes in psychotherapy sessions, and to localize specific passages of within-session text representative of a session code. We compared the L-LDA model to a baseline lasso regression model using predictive accuracy and model generalizability (measured by calculating the area under the curve (AUC) from the receiver operating characteristic curve). The L-LDA model outperforms the lasso logistic regression model at predicting session-level codes with average AUC scores of 0.79, and 0.70, respectively. For fine-grained level coding, L-LDA and logistic regression are able to identify specific talk-turns representative of symptom codes. However, model performance for talk-turn identification is not yet as reliable as human coders. We conclude that the L-LDA model has the potential to be an objective, scalable method for accurate automated coding of psychotherapy sessions that perform better than comparable discriminative methods at session-level coding and can also predict fine-grained codes.

  8. Effects of Post-Session Wheel Running on Within-Session Changes in Operant Responding

    Science.gov (United States)

    Aoyama, Kenjiro

    2007-01-01

    This study tested the effects of post-session wheel running on within-session changes in operant responding. Lever-pressing by six rats was reinforced by a food pellet under a continuous reinforcement (CRF) schedule in 30-min sessions. Two different flavored food pellets were used as reinforcers. In the wheel conditions, 30-min operant-sessions…

  9. Session-RPE for quantifying the load of different youth basketball training sessions.

    Science.gov (United States)

    Lupo, C; Tessitore, A; Gasperi, L; Gomez, Mar

    2017-03-01

    The aim of the study was to evaluate youth basketball training, verifying the reliability of the session-RPE method in relation to session duration (session) categories. Six male youth basketball players (age, 16.5±0.5 years; height, 195.5±6.75 cm; body mass, 93.9±10.9 kg; and body mass index, 23.6±2.8 kg.m -2 ) were monitored (HR, type and duration of workouts) during 15 (66 individual) training sessions (80±26 minutes). Edwards' HR method was used as a reference measure of internal training load (ITL); the CR-10 RPE scale was administered 30 minutes after the end of each session. The results obtained showed that all comparisons between different session durations and workout portions revealed effects in term of Edwards' ITLs except for warm-up portions. Moderate to strong relationships between Edwards' and session- RPE methods emerged for all sessions (r = .85, P sessions (r range = .79 - .95, P session durations (session-RPE to monitor the ITL, regardless of session durations and workout portions.

  10. Session-RPE for quantifying the load of different youth basketball training sessions

    Directory of Open Access Journals (Sweden)

    C Lupo

    2016-12-01

    Full Text Available The aim of the study was to evaluate youth basketball training, verifying the reliability of the session-RPE method in relation to session duration (< and ≥ 80 minutes and workout typology (reduced and high warm-up, conditioning, technical, tactical, game portions within a single session categories. Six male youth basketball players (age, 16.5±0.5 years; height, 195.5±6.75 cm; body mass, 93.9±10.9 kg; and body mass index, 23.6±2.8 kg.m-2 were monitored (HR, type and duration of workouts during 15 (66 individual training sessions (80±26 minutes. Edwards’ HR method was used as a reference measure of internal training load (ITL; the CR-10 RPE scale was administered 30 minutes after the end of each session. The results obtained showed that all comparisons between different session durations and workout portions revealed effects in term of Edwards’ ITLs except for warm-up portions. Moderate to strong relationships between Edwards’ and session- RPE methods emerged for all sessions (r = .85, P < .001, player’s sessions (r range = .79 - .95, P < .001, session durations (< 80 minutes: r = .67, P < .001; ≥ 80 minutes: r = .75, P < .001, and workout portions (r range = .78 - .89, P range = .002 - < .001. The findings indicated that coaches of youth basketball players can successfully use session-RPE to monitor the ITL, regardless of session durations and workout portions.

  11. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  12. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  13. H.R. 2738: A bill to amend title 38, United States Code, with respect to benefits for individuals who may have been exposed to ionizing radiation during military service, and for other purposes, introduced in the US House of Representatives, One Hundred Second Congress, First Session, June 24, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill was introduced into the US House of Representatives on June 24, 1991 to amend title 38, United States Code with respect to benefits for individuals who may have been exposed to ionizing radiation during military service. Key features addressed in separate sections include the following: expansion of a list of diseases presumed to be service-connected for certain radiation-exposed veteran and elimination of latency-period limitations; and adjudication of claims based on exposure to ionizing radiation

  14. Flexible session management in a distributed environment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Zach; /Wisconsin U., Madison; Bradley, Dan; /Wisconsin U., Madison; Tannenbaum, Todd; /Wisconsin U., Madison; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  15. Flexible session management in a distributed environment

    International Nuclear Information System (INIS)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  16. Flexible session management in a distributed environment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd [University of Wisconsin, Madison, WI (United States); Sfiligoi, Igor, E-mail: zmiller@cs.wisc.ed [Fermi National Acceleartor Laboratory, Batavia, IL (United States)

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  17. Flexible session management in a distributed environment

    Science.gov (United States)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  18. Ethics case reflection sessions: Enablers and barriers.

    Science.gov (United States)

    Bartholdson, Cecilia; Molewijk, Bert; Lützén, Kim; Blomgren, Klas; Pergert, Pernilla

    2018-03-01

    In previous research on ethics case reflection (ECR) sessions about specific cases, healthcare professionals in childhood cancer care were clarifying their perspectives on the ethical issue to resolve their main concern of consolidating care. When perspectives were clarified, consequences in the team included 'increased understanding', 'group strengthening' and 'decision grounding'. Additional analysis of the data was needed on conditions that could contribute to the quality of ECR sessions. The aim of this study was to explore conditions for clarifying perspectives during ECR sessions. Data were collected from observations and interviews and the results emerged from an inductive analysis using grounded theory. Participants and research context: Six observations during ECR sessions and 10 interviews were performed with healthcare professionals working in childhood cancer care and advanced paediatric homecare. Ethical considerations: The study was approved by a regional ethical review board. Participants were informed about their voluntary involvement and that they could withdraw their participation without explaining why. Two categories emerged: organizational enablers and barriers and team-related enablers and barriers. Organizational enablers and barriers included the following sub-categories: the timing of the ECR session, the structure during the ECR session and the climate during the ECR session. Sub-categories to team-related enablers and barriers were identified as space for inter-professional perspectives, varying levels of ethical skills and space for the patient's and the family's perspectives. Space for inter-professional perspectives included the dominance of a particular perspective that can result from hierarchical positions. The medical perspective is relevant for understanding the child's situation but should not dominate the ethical reflection. Conditions for ECR sessions have been explored and the new knowledge can be used when training

  19. Network Coding in the Bidirectional Cross

    DEFF Research Database (Denmark)

    Ertli, Gergö; Paramanathan, Achuthan; Rein, Stephan Alexander

    2013-01-01

    This paper presents a detailed performance evaluation of inter-session network coding in wireless meshed networks in terms of throughput and energy consumption. A full analytical model is given for three different communication approaches for the bidirectional cross topology using an IEEE 802.11 ...

  20. Teaching Students about Research: Classroom Poster Sessions.

    Science.gov (United States)

    Crowley-Long, Kathleen; And Others

    1997-01-01

    Finds that undergraduate students in an introductory psychology class acquired more favorable attitudes toward research as a result of their active participation in the creation and presentation of a poster that illustrates their independent work. Appends poster session instructions. (RS)

  1. Work session on the SAR. Pt. 2

    International Nuclear Information System (INIS)

    Burkart, K.

    1980-01-01

    The present paper contains the tables of the contribution of K. Burkart 'Work Session on the SAR' to the IAEA Interregional Training Course held in Sept/Oct. 1980 at the Kernforschungszentrum Karlsruhe. (RW)

  2. Session summary: Electronics, triggering and data acquisition

    International Nuclear Information System (INIS)

    Rescia, S.

    1991-12-01

    The session focused on the requirements for calorimetry at the SSC/LHC. Results on new readout techniques, calibration, radiation hard electronics and semiconductor devices, analog and digital front and electronics, and trigger strategies are presented

  3. Summary of the relativistic heavy ion sessions

    International Nuclear Information System (INIS)

    Harris, J.W.

    1988-01-01

    The topics covered in the Relativistic Heavy Ion Sessions span four orders of magnitude in energy in the laboratory and a few more in theory. In the two years since the last Intersections conference, experiments in the field of very high energy heavy ion research have begun at CERN and Brookhaven. The prime motivation for these experiments is the possibility of forming quark matter. This paper is a review of the topics covered in the Relativistic Heavy Ion Sessions

  4. H.R. 804: A Bill to amend the Internal Revenue Code of 1986 to reduce emissions of carbon dioxide by imposing a tax on certain fuels based on their carbon content. Introduced in the House of Representatives, One Hundred Third Congress, First Session, February 3, 1993

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    H.R. 804 proposes the imposition of a carbon tax on primary fossil fuels. In general, Chapter 38 of the Internal Revenue Code of 1986 is to be amended by adding at the end thereof the following new subchapter: open-quotes Subchapter E--Carbon Tax on Primary Fossil Fuels.close quotes Section 4691 will be concerned with the tax on coal; Section 4692 with the tax on petroleum; Section 4693 with the tax on natural gas; and Section 4694 will discuss inflation adjustments

  5. H.R. 1972: A bill to amend title 38, United States Code, with respect to benefits for veterans who may have been exposed to ionizing radiation during military service, and for other purposes, introduced in the US House of Representatives, One Hundred Second Congress, First Session, April 22, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill was introduced into the US House of Representatives on April 22, 1991 to amend title 38, United States Code. This legislation involves benefits for veterans who may have been exposed to ionizing radiation during military service. Individual sections address the following: expansion of presumption of service connection for certain radiation-exposed reservists; expansion of list of diseases presumed to be service-connected for certain radiation-exposed veterans and elimination of latency-period limitations; and adjudication of claims based on exposure to ionizing radiation

  6. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  7. Assessing treatment integrity in cognitive-behavioral therapy: comparing session segments with entire sessions.

    Science.gov (United States)

    Weck, Florian; Grikscheit, Florian; Höfling, Volkmar; Stangier, Ulrich

    2014-07-01

    The evaluation of treatment integrity (therapist adherence and competence) is a necessary condition to ensure the internal and external validity of psychotherapy research. However, the evaluation process is associated with high costs, because therapy sessions must be rated by experienced clinicians. It is debatable whether rating session segments is an adequate alternative to rating entire sessions. Four judges evaluated treatment integrity (i.e., therapist adherence and competence) in 84 randomly selected videotapes of cognitive-behavioral therapy for major depressive disorder, social anxiety disorder, and hypochondriasis (from three different treatment outcome studies). In each case, two judges provided ratings based on entire therapy sessions and two on session segments only (i.e., the middle third of the entire sessions). Interrater reliability of adherence and competence evaluations proved satisfactory for ratings based on segments and the level of reliability did not differ from ratings based on entire sessions. Ratings of treatment integrity that were based on entire sessions and session segments were strongly correlated (r=.62 for adherence and r=.73 for competence). The relationship between treatment integrity and outcome was comparable for ratings based on session segments and those based on entire sessions. However, significant relationships between therapist competence and therapy outcome were only found in the treatment of social anxiety disorder. Ratings based on segments proved to be adequate for the evaluation of treatment integrity. The findings demonstrate that session segments are an adequate and cost-effective alternative to entire sessions for the evaluation of therapist adherence and competence. Copyright © 2014. Published by Elsevier Ltd.

  8. Energy and Power Measurements for Network Coding in the Context of Green Mobile Clouds

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani

    2013-01-01

    results for inter-session network coding in Open-Mesh routers underline that the energy invested in performing network coding pays off by dramatically reducing the total energy for the transmission of data over wireless links. We also show measurements for intra-session network coding in three different......This paper presents an in-depth power and energy measurement campaign for inter- and intra-session network coding enabled communication in mobile clouds. The measurements are carried out on different commercial platforms with focus on routers and mobile phones with different CPU capabilities. Our...

  9. 47 CFR 97.513 - VE session manager requirements.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false VE session manager requirements. 97.513 Section... SERVICES AMATEUR RADIO SERVICE Qualifying Examination Systems § 97.513 VE session manager requirements. (a) A VE session manager may be selected by the VE team for each examination session. The VE session...

  10. Attendance at NHS mandatory training sessions.

    Science.gov (United States)

    Brand, Darren

    2015-02-17

    To identify factors that affect NHS healthcare professionals' attendance at mandatory training sessions. A quantitative approach was used, with a questionnaire sent to 400 randomly selected participants. A total of 122 responses were received, providing a mix of qualitative and quantitative data. Quantitative data were analysed using statistical methods. Open-ended responses were reviewed using thematic analysis. Clinical staff value mandatory training sessions highly. They are aware of the requirement to keep practice up-to-date and ensure patient safety remains a priority. However, changes to the delivery format of mandatory training sessions are required to enable staff to participate more easily, as staff are often unable to attend. The delivery of mandatory training should move from classroom-based sessions into the clinical area to maximise participation. Delivery should be assisted by local 'experts' who are able to customise course content to meet local requirements and the requirements of different staff groups. Improved arrangements to provide staff cover, for those attending training, would enable more staff to attend training sessions.

  11. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...... normalisation to executing communications. Our key contribution is generalising duality, from CLL, to a new notion of n-ary compatibility, called coherence. Building on coherence as a principle of compositionality, we generalise the cut rule of CLL to a new rule for composing many processes communicating...... in a multiparty session. We prove the soundness of our model by showing the admissibility of our new rule, which entails deadlock-freedom via our correspondence....

  12. Intersections and Unions of Session Types

    Directory of Open Access Journals (Sweden)

    Coşku Acay

    2017-02-01

    Full Text Available Prior work has extended the deep, logical connection between the linear sequent calculus and session-typed message-passing concurrent computation with equi-recursive types and a natural notion of subtyping. In this paper, we extend this further by intersection and union types in order to express multiple behavioral properties of processes in a single type. We prove session fidelity and absence of deadlock and illustrate the expressive power of our system with some simple examples. We observe that we can represent internal and external choice by intersection and union, respectively, which was previously suggested by Padovani for a different language of session types motivated by operational rather than logical concerns.

  13. Instruments for documentation of music therapy sessions

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner

    It is an important part of the clinical music therapy work to document the daily sessions. For the clinician it is necessary to have a brief overview of each session in order to assess the methods and the process, and not least to be able to give clear reports of these issues to other health care...... professionals at staff meetings, conferences, etc. For music therapists with many clients there is not time enough during a working day to provide comprehensive process descriptions in the music therapy log. Therefore instruments that help the clinician in reducing and structuring this information are needed....... Danish and Norwegian music therapist have collaborated on developing a one page sheet with a structured form where they after each music therapy session document their use of methods and techniques in individual music therapy with persons with dementia. With this instrument therapists have easy access...

  14. Improving coding accuracy in an academic practice.

    Science.gov (United States)

    Nguyen, Dana; O'Mara, Heather; Powell, Robert

    2017-01-01

    Practice management has become an increasingly important component of graduate medical education. This applies to every practice environment; private, academic, and military. One of the most critical aspects of practice management is documentation and coding for physician services, as they directly affect the financial success of any practice. Our quality improvement project aimed to implement a new and innovative method for teaching billing and coding in a longitudinal fashion in a family medicine residency. We hypothesized that implementation of a new teaching strategy would increase coding accuracy rates among residents and faculty. Design: single group, pretest-posttest. military family medicine residency clinic. Study populations: 7 faculty physicians and 18 resident physicians participated as learners in the project. Educational intervention: monthly structured coding learning sessions in the academic curriculum that involved learner-presented cases, small group case review, and large group discussion. overall coding accuracy (compliance) percentage and coding accuracy per year group for the subjects that were able to participate longitudinally. Statistical tests used: average coding accuracy for population; paired t test to assess improvement between 2 intervention periods, both aggregate and by year group. Overall coding accuracy rates remained stable over the course of time regardless of the modality of the educational intervention. A paired t test was conducted to compare coding accuracy rates at baseline (mean (M)=26.4%, SD=10%) to accuracy rates after all educational interventions were complete (M=26.8%, SD=12%); t24=-0.127, P=.90. Didactic teaching and small group discussion sessions did not improve overall coding accuracy in a residency practice. Future interventions could focus on educating providers at the individual level.

  15. Effect of patients' rights training sessions for nurses on perceptions of nurses and patients.

    Science.gov (United States)

    Ibrahim, Sanaa A; Hassan, Mona A; Hamouda, Seham Ibrahim; Abd Allah, Nama M

    2017-11-01

    Patients' rights are universal values that must be respected; however, it is not easy to put such values and principles into effect as approaches and attitudes differ from individual to individual, from society to society, and from country to country. If we want to reach a general conclusion about the status of patient rights in the world as whole, we should examine the situation in individual countries. To study the effect of training sessions for nurses about patients' rights on the perceptions of nurses and patients in two Egyptian hospitals. Quasi-experimental with pre- and posttest design was used in this study. Two groups of participants were included in the study: the first with 97 nurses and the second with 135 patients. A questionnaire sheet was used for nurses and patients to assess their perceptions about patients' rights before starting sessions. The training sessions were developed based on the baseline information gathered in the assessment phase and related literature. After the implementation of the sessions, a posttest was immediately conducted for nurses, while for patients the posttest was conducted 1 month after implementation to evaluate the effect of the nurses' training sessions on the patients' perceptions. The same tools were used in pretest and posttest. Ethical considerations: Written approval was sought and obtained from the administrators of the studied hospitals prior to conducting the study. Oral consent was obtained from nurses and patients willing to participate. Confidentiality and anonymity of the participants were strictly maintained through code numbers on the questionnaires. The improvement in nurses' knowledge and perceptions about patients' rights after implementation of the training sessions was remarkable. Moreover, an improvement in patients' perceptions regarding their rights was reported. Repetition of the training sessions is suggested to achieve continuous improvement. Provision of posters and booklets about a bill of

  16. Poster session in instructional technology course

    Science.gov (United States)

    Diniaty, Artina; Fauzi'ah, Lina; Wulan Febriana, Beta; Arlianty, Widinda Normalia

    2017-12-01

    Instructional technology course must be studied by students in order to 1) understand the role of technology in learning, 2) capable of analyzing advantages and disadvantages of using technology in teaching, 3) capable of performing technology in teaching. A poster session in instructional technology course was performed to 1) enhance students' interest in this course and develop students' creativity. The step of this research includes: planning, implementation, and evaluation. The result showed that students' responses towards poster session in instructional technology course were good.

  17. Summary of Session 2 "Machine Studies"

    CERN Document Server

    Assmann, R W

    2012-01-01

    This document summarizes the talks and discussion that took place in the second session of the Chamonix 2012 workshop concerning results from machine studies performed in 2011. The session consisted of the following presentations: “LHC experience with different bunch spacings” by G. Rumolo; “Observations of beam-beam effects in MDs in 2011” by W. Herr; “Beam-induced heating/ bunch length/RF and lessons for 2012” by E. Metral; “Lessons in beam diagnostics” by R. Jones; “Quench margins” by M. Sapinski; “First demonstration with beam of the Achromatic Telescopic Squeeze (ATS)” by S. Fartoukh.

  18. Summary of Session 2 'Machine Studies'

    Energy Technology Data Exchange (ETDEWEB)

    Assmann, R W; Papotti, G [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    This document summarizes the talks and discussion that took place in the second session of the Chamonix 2012 workshop concerning results from machine studies performed in 2011. The session consisted of the following presentations: “LHC experience with different bunch spacings” by G. Rumolo; “Observations of beam-beam effects in MDs in 2011” by W. Herr; “Beam-induced heating/ bunch length/RF and lessons for 2012” by E. Metral; “Lessons in beam diagnostics” by R. Jones; “Quench margins” by M. Sapinski; “First demonstration with beam of the Achromatic Telescopic Squeeze (ATS)” by S. Fartoukh. (author)

  19. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  20. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  1. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  2. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  3. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  4. Undergraduate Seminars: The Poster Session Solution.

    Science.gov (United States)

    Chute, Douglas L.; Bank, Barry

    1983-01-01

    A good alternative to the undergraduate psychology seminar is the poster session. During the course each student wrote a review paper. For use in his/her class presentation, the student provided the following information on poster paper: title, author, abstract, a few graphs or illustrations from the literature, conclusions, and references. (RM)

  5. IAEA General Conference begins annual session

    International Nuclear Information System (INIS)

    2001-01-01

    The document gives general information about the opening and the programme of the 45th regular session of the IAEA General Conference (17-21 September 2001, Austria Center Vienna). The conference is attended by ministers and high-level governmental representatives from 132 Member States of the IAEA

  6. IAEA General Conference begins annual session

    International Nuclear Information System (INIS)

    2000-01-01

    The document gives general information about the opening and the programme of the 44th regular session of the IAEA General Conference (18 -22 September 2000, Austria Center Vienna). The conference is attended by ministers and high-level governmental representatives from 130 Member States of the IAEA

  7. Declarative interpretations of session-based concurrency

    DEFF Research Database (Denmark)

    Cano, Mauricio; Rueda, Camilo; López-Acosta, Hugo-Andrés

    2015-01-01

    Session-based concurrency is a type-based approach to the analysis of communication-intensive systems. Correct behavior in these systems may be specified in an operational or declarative style: the former defines how interactions are structured; the latter defines governing conditions...

  8. Working session 4: Preventative and corrective measures

    International Nuclear Information System (INIS)

    Clark, R.; Slama, G.

    1997-01-01

    The Preventive and Corrective Measures working session included 13 members from France, Germany, Japan, Spain, Slovenia, and the United States. Attendee experience included regulators, utilities, three steam generator vendors, consultants and researchers. Discussions centered on four principal topics: (1) alternate materials, (2) mechanical mitigation, (3) maintenance, and (4) water chemistry. New or replacement steam generators and original equipment steam generators were separately addressed. Four papers were presented to the session, to provide information and stimulate various discussion topics. Topics discussed and issues raised during the several meeting sessions are provided below, followed by summary conclusions and recommendations on which the group was able to reach a majority consensus. The working session was composed of individuals with diverse experience and varied areas of specialized expertise. The somewhat broad range of topics addressed by the group at times saw discussion participation by only a few individuals. As in any technical meeting where all are allowed the opportunity to speak their mind, straying from an Individual topic was not unusual. Where useful, these stray topics are also presented below within the context In which they occurred. The main categories of discussion were: minimize sludge; new steam generators; maintenance; mechanical mitigation; water chemistry

  9. 9. Biennial session of nuclear physics

    International Nuclear Information System (INIS)

    1987-03-01

    As every two years the 9th biennial session of nuclear physics shall try to make a survey of the recent experimental developments as well as the evolution of the theoretical ideas in Nuclear Physics. Communications are indexed and analysed separately

  10. Summary of the Relativistic Heavy Ion Sessions

    International Nuclear Information System (INIS)

    Harris, J.W.

    1988-07-01

    This paper briefly discusses the topics covered in the relativistic heavy ion in sessions. The prime motivation for these investigations is the possibility of forming quark matter, therefore the formation of a quark-gluon plasma. Topics on suppression of J//psi/ production, th equation of state of nuclear matter, transverse energy distributions and two pion interferometry techniques are discussed. 38 refs

  11. An Erlang Implementation of Multiparty Session Actors

    Directory of Open Access Journals (Sweden)

    Simon Fowler

    2016-08-01

    Full Text Available By requiring co-ordination to take place using explicit message passing instead of relying on shared memory, actor-based programming languages have been shown to be effective tools for building reliable and fault-tolerant distributed systems. Although naturally communication-centric, communication patterns in actor-based applications remain informally specified, meaning that errors in communication are detected late, if at all. Multiparty session types are a formalism to describe, at a global level, the interactions between multiple communicating entities. This article describes the implementation of a prototype framework for monitoring Erlang/OTP gen_server applications against multiparty session types, showing how previous work on multiparty session actors can be adapted to a purely actor-based language, and how monitor violations and termination of session participants can be reported in line with the Erlang mantra of "let it fail". Finally, the framework is used to implement two case studies: an adaptation of a freely-available DNS server, and a chat server.

  12. Posters. [Poster Session at AHRD Conference, 2001].

    Science.gov (United States)

    2001

    The first of the papers in this poster session, "Developing the Employment Brand: Targeting MBA Campus Hires" (Diane M. Bergeron), posits that employment branding benefits both individuals and organizations. It functions as a campus recruiting tool in a competitive labor market and communicates the organization's values and work…

  13. Session-RPE for quantifying load of different youth taekwondo training sessions.

    Science.gov (United States)

    Lupo, Corrado; Capranica, Laura; Cortis, Cristina; Guidotti, Flavia; Bianco, Antonino; Tessitore, Antonio

    2017-03-01

    The session rating of perceived exertion (session-RPE) proved to be a valuable method to quantify the internal training load (ITL) in taekwondo. However, no study validated this method in youth taekwondo athletes performing different training sessions. Thus this study aimed at evaluating the reliability of the session-RPE to monitor the ITL of prepubescent taekwondo athletes during pre-competitive (PC) and competitive (C) training sessions. Five female (age: 12.0±0.7 y; height: 1.54±0.08 m; body mass: 48.8±7.3 kg) and four male (age: 12.0±0.8 yrs; height: 1.55±0.07 m; body mass: 47.3±5.3 kg) taekwondo athletes were monitored during 100 individual sessions (PC: N.=33; C: N.=67). The Edwards' HR method was used as reference measure of ITL; the CR-10 RPE scale was administered at 1- and 30-minutes from the end of each session. No difference for gender emerged. The ITLs of C (Edwards: 228±40 arbitrary units, AU) resulted higher than that of PC (192±26 AU; P=0.04). Although all training typologies and data collections achieved significant correlations between Edwards' and session-RPE methods, a large relationship (r =0.71, Psessions evaluated at 30 minutes of the recovery phases. Findings support coaches of prepubescent taekwondo athletes to successfully use session-RPE to monitor the ITL of different training typologies. However, PC training evaluated at 30 minutes of the recovery phase represents the best condition for a highly reliable ITL perception.

  14. Poster Sessions in Marketing Education: An Empirical Examination

    Science.gov (United States)

    Stegemann, Nicole; Sutton-Brady, Catherine

    2009-01-01

    Poster sessions provide a creative and stimulating alternative to traditional assessment methods in marketing. Poster sessions, as a means of assessment, have long been used in science fields. This article presents the successful implementation of poster sessions as a means of assessment in a postgraduate unit of study. Poster sessions in…

  15. Graph Transformation for Consolidation of Creativity Sessions Results

    DEFF Research Database (Denmark)

    Dolog, Peter

    2010-01-01

    Graph transformation approach for consolidation of creativity sessions results is part of the FP7 EU/IST project idSpace: Tooling of and training for collaborative, distributed product innovation. The goal of graph transformation approach is to provide a tool for merging results of various sessions...... (such as brainstorming sessions), which are represented as graphs, when the session participants- are physically distributed....

  16. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  17. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  18. Messengers of the universe: Session IV Summary

    International Nuclear Information System (INIS)

    Bernardini, Elisa; Serpico, Pasquale Dario

    2013-01-01

    Being stable, light and neutral weakly interacting particles, neutrinos are ideal messengers of the deep universe and a channel of choice in particular to explore the very high energy Galactic and Extragalactic sky, playing a synergic role most notably with gamma-ray observations. Neutrino astronomy—long after the SN1987A detection in the MeV range—is mature enough for decisive tests of astrophysical paradigms. Its current status constitutes one of the two big pillars of the “Messengers of the universe” session of the Neutrino Oscillation Workshop 2012. Neutrinos may also play a role in some cosmological contexts, such as the early universe and the dark matter problem. We review both aspects in this session summary report

  19. Buffered Communication Analysis in Distributed Multiparty Sessions

    Science.gov (United States)

    Deniélou, Pierre-Malo; Yoshida, Nobuko

    Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchrony, the communication buffers can happen to grow inconsiderately over time. This paper proposes a static verification methodology based on multiparty session types which can efficiently compute the upper bounds on buffer sizes. Our analysis relies on a uniform causality audit of the entire collaboration pattern - an examination that is not always possible from each end-point type. We extend this method to design algorithms that allocate communication channels in order to optimise the memory requirements of session executions. From these analyses, we propose two refinements methods which respect buffer bounds: a global protocol refinement that automatically inserts confirmation messages to guarantee stipulated buffer sizes and a local protocol refinement to optimise asynchronous messaging without buffer overflow. Finally our work is applied to overcome a buffer overflow problem of the multi-buffering algorithm.

  20. Parameterized Concurrent Multi-Party Session Types

    Directory of Open Access Journals (Sweden)

    Minas Charalambides

    2012-08-01

    Full Text Available Session types have been proposed as a means of statically verifying implementations of communication protocols. Although prior work has been successful in verifying some classes of protocols, it does not cope well with parameterized, multi-actor scenarios with inherent asynchrony. For example, the sliding window protocol is inexpressible in previously proposed session type systems. This paper describes System-A, a new typing language which overcomes many of the expressiveness limitations of prior work. System-A explicitly supports asynchrony and parallelism, as well as multiple forms of parameterization. We define System-A and show how it can be used for the static verification of a large class of asynchronous communication protocols.

  1. Electron and muon physics sessions: Summary

    International Nuclear Information System (INIS)

    Montgomery, H.E.

    1988-06-01

    The electromagnetic interaction needs no introduction as a probe of the structure of systems on many scales. The continued use of this technique dominated the sessions on Electron and Muon Physics at the Samoset Meeting. The experimental results continue to stimulate large numbers of theorists and the results on polarized deep inelastic muon scattering and their various interpretations permeated beyond these sessions. The breadth of physics attacked with electrons and muons makes a summary such as this rather peculiar. As one of my nuclear physics friends (I think) commented after my summary, ''it was interesting to see Nuclear Physics from a long distance with the telescope inverted.'' The comment may well be applied to this written version of the summary talk. 21 refs

  2. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  3. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  4. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  5. Robust and Scalable DTLS Session Establishment

    OpenAIRE

    Tiloca, Marco; Gehrmann, Christian; Seitz, Ludwig

    2016-01-01

    The Datagram Transport Layer Security (DTLS) protocol is highly vulnerable to a form of denial-of-service attack (DoS), aimed at establishing a high number of invalid, half-open, secure sessions. Moreover, even when the efficient pre-shared key provisioning mode is considered, the key storage on the server side scales poorly with the number of clients. SICS Swedish ICT has designed a security architecture that efficiently addresses both issues without breaking the current standard.

  6. Bilingual practices in the process of initiating and resolving lexical problems in students' collaborative writing sessions

    OpenAIRE

    Jansson, Gunilla

    2007-01-01

    International audience; This study deals with the sequential organization of language choice and code-switching between Persian as a first language and Swedish as a second language in the process of initiating and resolving a problem of understanding and producing the correct version of a lexical item. The data consist of detailed transcripts of audio tapings of two bilingual students' collaborative writing sessions within the frame of a one-year master's program in computer science in a mult...

  7. Safety Training: scheduled sessions in April

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in April. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 26-APR-11 (08.30 – 10.00) in French 26-APR-11 (10.30 – 12.00) in French Conduite de plates-formes élévatrices mobiles de personnel (PEMP) 28-APR-11 to 29-APR-11 (08.00 – 17.30) in French* Sécurité chimique – Introduction 29-APR-11 (09.00 – 11.30) in French (*) session in French with the possibility of receiving the documentation in English   By Isabelle Cusato (H...

  8. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  9. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  10. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  11. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  12. Advancing methods for reliably assessing motivational interviewing fidelity using the motivational interviewing skills code.

    Science.gov (United States)

    Lord, Sarah Peregrine; Can, Doğan; Yi, Michael; Marin, Rebeca; Dunn, Christopher W; Imel, Zac E; Georgiou, Panayiotis; Narayanan, Shrikanth; Steyvers, Mark; Atkins, David C

    2015-02-01

    The current paper presents novel methods for collecting MISC data and accurately assessing reliability of behavior codes at the level of the utterance. The MISC 2.1 was used to rate MI interviews from five randomized trials targeting alcohol and drug use. Sessions were coded at the utterance-level. Utterance-based coding reliability was estimated using three methods and compared to traditional reliability estimates of session tallies. Session-level reliability was generally higher compared to reliability using utterance-based codes, suggesting that typical methods for MISC reliability may be biased. These novel methods in MI fidelity data collection and reliability assessment provided rich data for therapist feedback and further analyses. Beyond implications for fidelity coding, utterance-level coding schemes may elucidate important elements in the counselor-client interaction that could inform theories of change and the practice of MI. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  14. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  15. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    International Nuclear Information System (INIS)

    1994-07-01

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately

  16. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately.

  17. Moderator report on workshop session 3

    International Nuclear Information System (INIS)

    Isaacs, T.

    2004-01-01

    While much in Stakeholder confidence work is focused on the periods of project conceptualization, siting, and development, eventually a successful waste programme will result in a set of facilities with visual, aesthetic, and other physical impacts on the host community. This most interesting and interactive session explored both the artistic and aesthetic aspects of the waste management process and the relationship among the stakeholders, particularly the affected local communities and those who might help develop both the products and processes associated with implementation. Two insightful presentations were made, followed by a lively panel discussion and interactions with the broader FSC participants. (author)

  18. Parallel Monitors for Self-adaptive Sessions

    Directory of Open Access Journals (Sweden)

    Mario Coppo

    2016-06-01

    Full Text Available The paper presents a data-driven model of self-adaptivity for multiparty sessions. System choreography is prescribed by a global type. Participants are incarnated by processes associated with monitors, which control their behaviour. Each participant can access and modify a set of global data, which are able to trigger adaptations in the presence of critical changes of values. The use of the parallel composition for building global types, monitors and processes enables a significant degree of flexibility: an adaptation step can dynamically reconfigure a set of participants only, without altering the remaining participants, even if the two groups communicate.

  19. Summary of Session 4 "Beam Energy"

    CERN Document Server

    Siemko, A

    2011-01-01

    In this session, the possible scenarios for the beam energy in the LHC 2011 run were discussed. The benefits for the physics reach for physics operations at s larger than 7 TeV were reviewed. The main goal was, however, to establish the necessary information for a sound risk analysis by assessing the probability of thermal runaway and evaluating the consequences of a hypothetical incident. A new technique to improve the knowledge of joint resistances of the cooper busbars and therefore the reliability of the risk analysis has also been discussed.

  20. Summary of the electron accelerators session

    International Nuclear Information System (INIS)

    Prescott, C.Y.

    1988-10-01

    Since the last High Energy Physics Symposium, there has been considerable progress in the field of polarized electron accelerators. Projects well into construction include the SLC, HERA, and LEP. The status of polarized beams for these projects is discussed in this session. Semiclassical and quantum mechanical calculations of polarizing and depolarizing effects are discussed, for both linear colliders and for storage rings. Substantial progress is continuing in the understanding of depolarizing mechanisms for circular machines. Modelling of these machines is underway. Activities with polarized electron beams at Novosibirsk are described. 8 refs

  1. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  2. Coding gaze tracking data with chromatic gradients for VR Exposure Therapy

    DEFF Research Database (Denmark)

    Herbelin, Bruno; Grillon, Helena; De Heras Ciechomski, Pablo

    2007-01-01

    This article presents a simple and intuitive way to represent the eye-tracking data gathered during immersive virtual reality exposure therapy sessions. Eye-tracking technology is used to observe gaze movements during vir- tual reality sessions and the gaze-map chromatic gradient coding allows to...... is fully compatible with different VR exposure systems and provides clinically meaningful data....

  3. Ideas for Advancing Code Sharing: A Different Kind of Hack Day

    Science.gov (United States)

    Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.

    2014-05-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  4. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  5. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  6. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  7. Innovative Software Algorithms and Tools parallel sessions summary

    International Nuclear Information System (INIS)

    Gaines, Irwin

    2001-01-01

    A variety of results were presented in the poster and 5 parallel sessions of the Innovative Software, Algorithms and Tools (ISAT) sessions. I will briefly summarize these presentations and attempt to identify some unifying trends

  8. 78 FR 53497 - Commercial Space Transportation Advisory Committee; Closed Session

    Science.gov (United States)

    2013-08-29

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Commercial Space Transportation... Commercial Space Transportation Advisory Committee Special Closed Session. SUMMARY: Pursuant to Section 10(a...), notice is hereby given of a special closed session of the Commercial Space Transportation Advisory...

  9. Chapter II: Twenty Eighth General Assembly Business Sessions

    Science.gov (United States)

    Williams, Robert

    2015-08-01

    The President of the IAU, Prof. Robert Williams, welcomed the delegates and members to this first business session of the General Assembly. The President invited the General Secretary, Dr. Ian Corbett, to start the business session.

  10. Music Education and Music Therapy. Introduction to Plenary Session 3

    DEFF Research Database (Denmark)

    Bonde, Lars Ole

    2002-01-01

    Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics......Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics...

  11. Safety Training: scheduled sessions in March

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 08-MAR-11 (08.30 – 10.00) in English 08-MAR-11 (10.30 – 12.00) in French 15-MAR-11 (08.30 – 10.00) in French 15-MAR-11 (10.30 – 12.00) in French 17-MAR-11 (08.30 – 10.00) in English 17-MAR-11 (10.30 – 12.00) in English 22-MAR-11 (08.30 – 10.00) in French 22-MAR-11 (10.30 – 12.00) in French 24-MAR-11 (08.30 – 10.00) in French 24-MAR-11 (10.30 – 12.00) in French 29-MAR...

  12. Safety Training: scheduled sessions in May

    CERN Multimedia

    Isabelle Cusato (HSE Unit)

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year.   Biocell Training 10-MAY-11 (08.30 – 10.00) in French 10-MAY-11 (10.30 – 12.00) in French 12-MAY-11 (08.30 – 10.00) in English 12-MAY-11 (10.30 – 12.00) in English 19-MAY-11 (08.30 – 10.00) in French 19-MAY-11 (10.30 – 12.00) in French 24-MAY-11 (08.30 – 10.00) in English 24-MAY-11 (10.30 – 12.00) in English   Champs Magnétiques 13-MAY-11 (09.30 – 11.30) in French...

  13. Round table discussion during session 2

    International Nuclear Information System (INIS)

    Mays, C.

    2004-01-01

    The round table discussions of the second session of the FSC Belgium Workshop addressed the following questions: - Do local stakeholders have, internally or externally, all the expertise they need in order to address the issues raised by radioactive waste management projects? - Do institutional stakeholders have all the expertise they need to take local impacts into account? - What kinds of expert input are sought and attained by the different stakeholders? - Were any formal methods used to aid local partnerships perform technology assessments? Or other types of assessment? - How to maintain the knowledge and expertise achieved by the stakeholders? Discussion took place after the plenary presentations, at tables grouping Belgian stakeholders and FSC delegates. As in Session I, most of the round table discussion focussed specifically on the experience of the local partnerships. Many insights were shared about the nature and role of expertise in complex decision making. They are summarised below, on the basis of the feedback provided to the plenary by each round table. Some of these insights can be generalised to other contexts. All in all, a profile emerged of the local partnerships as a unique and effective tool to deal with knowledge issues in managing risk. (author)

  14. Aspen Global Change Institute Summer Science Sessions

    Energy Technology Data Exchange (ETDEWEB)

    Katzenberger, John; Kaye, Jack A

    2006-10-01

    The Aspen Global Change Institute (AGCI) successfully organized and convened six interdisciplinary meetings over the course of award NNG04GA21G. The topics of the meetings were consistent with a range of issues, goals and objectives as described within the NASA Earth Science Enterprise Strategic Plan and more broadly by the US Global Change Research Program/Our Changing Planet, the more recent Climate Change Program Strategic Plan and the NSF Pathways report. The meetings were chaired by two or more leaders from within the disciplinary focus of each session. 222 scholars for a total of 1097 participants-days were convened under the auspices of this award. The overall goal of each AGCI session is to further the understanding of Earth system science and global environmental change through interdisciplinary dialog. The format and structure of the meetings allows for presentation by each participant, in-depth discussion by the whole group, and smaller working group and synthesis activities. The size of the group is important in terms of the group dynamics and interaction, and the ability for each participant's work to be adequately presented and discussed within the duration of the meeting, while still allowing time for synthesis

  15. Session 5 summarizing statements and panel discussion

    International Nuclear Information System (INIS)

    1977-01-01

    A set of contributions proposes synthetic overviews on different topics: zircaloy oxidation under accident conditions, zircaloy deformation and rupture behaviour, fuel behaviour code development, applications of fuel research results to reactor licensing, research on accident behaviour of fuel, fuel accident behaviour research in risk perspective. The last contribution gives the main conclusions and recommendation from the meeting

  16. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  17. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  18. Asynchronous Session Types – Exceptions and Multiparty Interactions

    DEFF Research Database (Denmark)

    Carbone, Marco; Yoshida, Nobuko; Honda, Kohei

    2009-01-01

    Session types are a formalism for structuring communication based on the notion of session: the structure of a conversation is abstracted as a type which is then used as a basis of validating programs through an associated type discipline. While standard session types have proven to be able to ca...

  19. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    Science.gov (United States)

    Allen, A.; Berriman, B.; Brunner, R.; Burger, D.; DuPrie, K.; Hanisch, R. J.; Mann, R.; Mink, J.; Sandin, C.; Shortridge, K.; Teuben, P.

    2013-10-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published scientific results should be made available, and there should be discovery mechanisms to allow these to be found easily. With increased use of resources such as GitHub (for code availability), ASCL (for code discovery), and a stated strong preference from the new journal Astronomy & Computing for code release, we expect to see additional progress over the next few years.

  20. Working through: In-Session Processes that Promote Between-Session Thoughts and Activities

    Science.gov (United States)

    Owen, Jesse; Quirk, Kelley; Hilsenroth, Mark J.; Rodolfa, Emil

    2012-01-01

    This study examined whether clients' ratings of the working alliance as well as their perception of cognitive-behavioral (CB) and psychodynamic-interpersonal (PI) techniques (delivered by therapists who used both) were associated with clients' intersession processes (i.e., their thoughts about therapy and therapeutic activity between sessions).…

  1. Session A5: hadron spectroscopy, experimental

    International Nuclear Information System (INIS)

    Ozaki, S.

    1978-01-01

    Reports 55 contubutions made by mini-rapporteurs and individual contributors are assembled. It is clear, from the contributions made to this session, that there has been steady progress in solving the problem of the hadron spectroscopy of the old style. The picture on the scalar mesons has become clearer. Among the vector meson group, we started to understand Q mesons, though the situation with A 1 is still not clear. Mesons with higher spin have been found and, in some cases, confirmed. In a sense, the jigsaw puzzle on the mesons is gradually being completed while more complex features are found. The same can be said on the baryons. An active study is in progress in the experiment on the exotic states such as narrow baryonium and dibaryon states. However, owing to the difficulty of such experiments and interpretation of the data, a definitive result is yet to come. 94 references

  2. Session Report - F. Boydon (UK-ONR)

    International Nuclear Information System (INIS)

    Boydon, Frans

    2014-01-01

    This report summarises presentations nationally (France, Switzerland, Canada) and identify specific areas of interest followed by general comments observations out of all the presentations in this session about the challenges to the Regulator and the Implementer preparing for construction and operation of geological repositories: stepwise phased approach, early engagement with regulators, the need for regulators to be clear about their expectations including any R and D requirements especially on how to deal with ageing effects, information management both in terms of volume and format, importance of the organisational structure of the license applicant (this structure is likely to evolve with time from that of a design organisation to one of a constructor/contractor to an operator (and constructor combined)), importance for regulators to consider in advance what the challenges of a DGR are and to implement suitable recruitment and training processes for its staff

  3. Report on session 1984-1985

    International Nuclear Information System (INIS)

    Wilson, H.W.

    1985-01-01

    During this session the centre changed ownership, so that as from 1st October 1985 it will be operated by Edinburgh, Glasgow and Strathclyde Universities. Aberdeen and St. Andrews are associate members for access to the isotope geology facilities. Other Universities will use the centre on a commercial basis. The research activities are summarized; these are divided into reactor related activities with brief outlines of the projects undertaken in radiochemistry and physics, health physics and nuclear medicine and engineering. The number of analyses undertaken in isotope Geology increased to over 4,000. Sulphur isotope techniques were introduced during the year. The work at the NERC radiocarbon laboratory is also described. The teaching aspects of the reactor and its operation during the year are recorded. There were no problems with the reactor operation and it achieved its highest energy output of 232.5MWH. (U.K.)

  4. Ecole de Physique des Houches: session 96

    CERN Document Server

    Huard, Benjamin; Schoelkopf, Robert; Cugliandolo, Leticia F; Quantum Machines : Measurement and Control of Engineered Quantum Systems

    2014-01-01

    This book gathers the lecture notes of courses given at the 2011 summer school in theoretical physics in Les Houches, France, Session XCVI. What is a quantum machine? Can we say that lasers and transistors are quantum machines? After all, physicists advertise these devices as the two main spin-offs of the understanding of quantum mechanical phenomena. However, while quantum mechanics must be used to predict the wavelength of a laser and the operation voltage of a transistor, it does not intervene at the level of the signals processed by these systems. Signals involve macroscopic collective variables like voltages and currents in a circuit or the amplitude of the oscillating electric field in an electromagnetic cavity resonator. In a true quantum machine, the signal collective variables, which both inform the outside on the state of the machine and receive controlling instructions, must themselves be treated as quantum operators, just as the position of the electron in a hydrogen atom. Quantum superconducting...

  5. Precise subtyping for synchronous multiparty sessions

    Directory of Open Access Journals (Sweden)

    Mariangiola Dezani-Ciancaglini

    2016-02-01

    Full Text Available The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with respect to type safety, i.e. the safe replacement of a term of a smaller type when a term of a bigger type is expected. The latter preciseness is based on the denotation of a type which is a mathematical object that describes the meaning of the type in accordance with the denotations of other expressions from the language. The result of this paper is the operational and denotational preciseness of the subtyping for a synchronous multiparty session calculus. The novelty of this paper is the introduction of characteristic global types to prove the operational completeness.

  6. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  7. Summary of session C1: experimental gravitation

    International Nuclear Information System (INIS)

    Laemmerzahl, C

    2008-01-01

    The fact that gravity is a metric theory follows from the Einstein equivalence principle. This principle consists of (i) the universality of free fall, (ii) the universality of the gravitational redshift and (iii) the local validity of Lorentz invariance. Many experiments searching for deviations from standard general relativity test the various aspects of the Einstein equivalence principle. Here we report on experiments covering the whole Einstein equivalence principle. Until now all experiments have been in agreement with the Einstein equivalence principle. As a consequence, gravity has to be described by a metric theory. Any metric theory of gravity leads to effects such as perihelion shift, deflection of light, gravitational redshift, gravitational time delay, Lense-Thirring effect, Schiff effect, etc. A particular theory of that sort is Einstein's general relativity. For weak gravitational fields which are asymptotically flat any deviation from Einstein's general relativity can be parametrized by a few constants, the PPN parameters. Many astrophysical observations and space experiments are devoted to a better measurement of the effects and, thus, of the PPN parameters. It is clear that gravity is best tested for intermediate ranges, that is, for distances between 1 m and several astronomical units. It is highly interesting to push forward our domain of experience and to strengthen the experimental foundation of gravity also beyond these scales. This point is underlined by the fact that many quantum gravity and unification-inspired theories suggest deviation from the standard laws of gravity at very small or very large scales. In this session summary we briefly outline the status and report on the talks presented in session C1 about experimental gravitation

  8. Detailed session outputs by the groups

    International Nuclear Information System (INIS)

    2008-01-01

    Session 1 (What are we trying to look at and when should we do it?) discussed the following points: - What are the key characteristics of safety culture that we should look at as nuclear regulators? - Should/can the regulator look at attitudes, values and behaviours as well as processes and documents? - Can safety culture be regarded as a separate topic or is it best considered as part of other regulatory areas e.g. safety management? - When do we/should we gather information about safety culture? Session 2a (How do we gather and interpret data? Tools, methods, resources and competencies needed to gather safety culture data) discussed the following points: - What methods can/do we use to gather data on licensee safety culture? What are their advantages and disadvantages? - How do we ensure that regulatory staff carrying out safety culture interventions are competent to do so - and what knowledge/skills and training are needed? - Who should gather safety culture data for regulatory use - regulators? Specialist contractors or others? Session 2b (How to gather and interpret the data? How to interpret data and codify it, qualitative versus quantitative data) discussed the following points: - How do we make a judgement on licensee safety culture? Do we have adequate indicators/criteria? - Can we meaningfully extrapolate from a finding on one part of plant to the whole organisation? If not, what should we conclude? - Is it meaningful to rate/score licensee safety culture numerically? - Are safety cultures methods mature enough to numerically score? What are the risks of this approach? Session 3 (How can we use the data?) discussed the following points: - How can safety culture data collection be built into existing regulatory activities? - How do we engage with licensees so that they accept and act on safety culture findings? - How do we expect licensees to respond to issues raised? - Is interaction with licensees on safety culture compatible with other regulatory

  9. Flipped versus Traditional Classroom Information Literacy Sessions: Student Perceptions and Cognitions

    Directory of Open Access Journals (Sweden)

    Torstein Låg

    2016-12-01

    Full Text Available Teaching effectively with limited classroom time is a challenge for information literacy teachers. In the flipped classroom (FC teaching model, information transmission teaching is delivered outside of class, freeing up class time for learning activities. I adopted the FC model in sessions that were previously taught using a traditional classroom (TC model. The aim of this paper is to evaluate the FC model's relative impact on (1 student perceptions of usefulness and quality, and (2 student cognitions about the IL sessions. Responses to evaluation forms from the TC model (N = 65, were compared to those from FC model (N = 78. Students judged usefulness and quality on two 4-point rating scales. Student cognitions were elicited with an open-ended question asking for suggestions for improvement and other comments. Responses to the latter were coded by an assistant blind to the conditions. Ratings were near ceiling and similar for both conditions. Responses to the open-ended question revealed interesting trends. Students in the FC condition provided wordier comments, were more concerned with what they themselves did and could do, and with the subject matter of the session. Students in the TC condition were more concerned with how information was presented to them. Results indicate that the FC teaching model is a viable alternative for IL sessions, and that it may encourage students to engage more with IL and their own learning process.

  10. Evaluation of a mock interview session on residency interview skills.

    Science.gov (United States)

    Buckley, Kelsey; Karr, Samantha; Nisly, Sarah A; Kelley, Kristi

    2018-04-01

    To evaluate the impact of student pharmacist participation in a mock interview session on confidence level and preparation regarding residency interview skills. The study setting was a mock interview session, held in conjunction with student programming at the American College of Clinical Pharmacy (ACCP) Annual Meeting. Prior to the mock interview session, final year student pharmacists seeking residency program placement were asked to complete a pre-session survey assessing confidence level for residency interviews. Each student pharmacist participated in up to three mock interviews. A post-session survey evaluating confidence level was then administered to consenting participants. Following the American Society for Health-System Pharmacists (ASHP) Pharmacy Resident Matching Program (RMP), a post-match electronic survey was sent to study participants to determine their perception of the influence of the mock interview session on achieving successful interactions during residency interviews. A total of 59 student pharmacists participated in the mock interview session and completed the pre-session survey. Participants completing the post-session survey (88%, n = 52) unanimously reported an enhanced confidence in interviewing skills following the session. Thirty responders reported a program match rate of 83%. Approximately 97% (n = 29) of the respondents agreed or strongly agreed that the questions asked during the mock interview session were reflective of questions asked during residency interviews. Lessons learned from this mock interview session can be applied to PGY1 residency mock interview sessions held locally, regionally, and nationally. Students participating in the ACCP Mock Interview Session recognized the importance of the interview component in obtaining a postgraduate year 1 (PGY1) pharmacy residency. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  12. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  13. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  14. Individualized music played for agitated patients with dementia: analysis of video-recorded sessions.

    Science.gov (United States)

    Ragneskog, H; Asplund, K; Kihlgren, M; Norberg, A

    2001-06-01

    Many nursing home patients with dementia suffer from symptoms of agitation (e.g. anxiety, shouting, irritability). This study investigated whether individualized music could be used as a nursing intervention to reduce such symptoms in four patients with severe dementia. The patients were video-recorded during four sessions in four periods, including a control period without music, two periods where individualized music was played, and one period where classical music was played. The recordings were analysed by systematic observations and the Facial Action Coding System. Two patients became calmer during some of the individualized music sessions; one patient remained sitting in her armchair longer, and the other patient stopped shouting. For the two patients who were most affected by dementia, the noticeable effect of music was minimal. If the nursing staff succeed in discovering the music preferences of an individual, individualized music may be an effective nursing intervention to mitigate anxiety and agitation for some patients.

  15. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  16. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  17. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  18. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  19. Session-based Choreography with Exceptions

    DEFF Research Database (Denmark)

    Carbone, Marco

    2009-01-01

    Choreography has recently emerged as a pragmatic and concise way of describing communication-based systems such as web services and financial protocols. Recent studies have investigated the transition from the design stage of a system to its implementation providing an automatic way of mapping...... a choreograhy into executable code. In this work, we focus on an extension of choreography with a communication-based (interactional) exception mechanism by giving its formal semantics. In particular, we discuss through some examples how interactional exceptions at choreography level can be implemented into end...

  20. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  1. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  2. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  3. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  4. Session II-H. Regulatory implementation

    International Nuclear Information System (INIS)

    Farzin, M.H.

    1981-01-01

    During FY 1981, the program concepts for implementing the NRC and EPA regulations were formed. These concepts consist of: review and critique of proposed rules; interpretation of rules into practical performance objectives; and planning to achieve compliance of total system performance with the rules. Although still flexible because of the lack of final rules, notable advances in implementation of these concepts were achieved in FY 1981. Technically, proposed and draft rules were evaluated and resulting radionuclide release limits were compared for consistency. For issue identification and resolution activity, six LTR's were initiated, and other topics were identified. In activities leading to total system compliance with regulations, planning and implementation efforts were more clearly defined and integrated. Papers reported in this session are: (1) regulatory implementation concepts and program overview; (2) licensing issue resolution; (3) status of NEPA activities in the NNWSI Program; (4) status of NEPA activities in the ONWI Program; (5) NWTS approach to site characterization reporting; and (6) quality assurance perspectives relative to licensing needs

  5. General Report on the Technical Sessions

    International Nuclear Information System (INIS)

    Carré, Frank

    2013-01-01

    General Remarks: • Research & Projects on Fast Neutron Reactors & related Fuel Cycles remain at sustained level worldwide; • Active participation in Technical Oral & Poster Sessions & Sustained exchanges; • Emphasis on Safety in the aftermath of Fukushima accident: → Gen-IV initiative on “Common design/safety criteria” in relation with the IAEA; • Diversity & Complementarity of National Projects of near term large power Fast Reactors & Technology Demonstrators of Next Generation Fast Reactors: – Ambitious SFR deployment scenarios of Russia, India, China…; – Near term Demonstrators of LFR technology in Russia; – Active research, promising innovations and plans for demonstrations in all major nuclear countries on SFRs but also LFR, GFR, MSFR… • Continuing improvements & Search for breakthroughs: two approaches with their own rationale & timeline that may complement each other in a global international roadmap. Key role of operating FRs for feedback & testing; • Increasing importance of numerical simulation and basic research; • Attractiveness of Gen-IV systems for Nuclear Education & Training

  6. Session II-J. Sociopolitical initiatives

    International Nuclear Information System (INIS)

    Mountain, J.M.

    1981-01-01

    The following papers were presented in this session: (1) state interactions in the NWTS Program; (2) state legislation on nuclear waste disposal; (3) federal legislation - United States House of Representatives; (4) federal legislation - United States Senate; (5) policy aspects of federal-state relations; (6) inplementing a federal-state partnership on repository siting. In the first paper the project manager for the ONWI contractor for sociopolitical research activities discusses the status of state interactions in all of the states covered by the program, including those states where activities are being conducted on federal reservations of the Department of Energy. In the second paper, the legal staff of the Battelle Project Management Division reports on legislative developments affecting the NWTS Program in various states where activities are under way and in states where legislation of interest has been enacted even though there may not be a program presence at this time. Various bills now before Congress and trends in the congressional mood or developing concepts are discussed in papers 3 and 4 by two key members of the Congressional committee. The policy aspects of federal-state relationships as viewed from the general perspective of the National Governors Association are discussed in the fifth paper. The final paper is a discussion on the real-world implementation of federal-state interactions on repository siting, particularly from the state perspective

  7. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  8. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  9. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  10. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  11. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  12. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  13. Summary Of Session 5: How Should We Handle Safety?

    Energy Technology Data Exchange (ETDEWEB)

    Albert, M.; Roy, G

    2001-07-01

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  14. ECG changes after a session of regional intraarterial hyperglycemia

    International Nuclear Information System (INIS)

    Korobchenko, Z.A.; Livshits, L.I.

    1988-01-01

    ECG changes after a session of regional intraarterial hyperglycemia (RIH) in 13 patients (the mean age of 49 years) with locally advanced cancer of the tongue, oral mucosa and oropharynx were presented. Taking into account the mean age of patients and the negative ECG time course after a RIH session, the necessity of patients' examination (including ECG after a RIH session and, when indicated, a consultation by a cardiologist) was emphasized

  15. Summary Of Session 5: How Should We Handle Safety?

    International Nuclear Information System (INIS)

    Albert, M.; Roy, G.

    2001-01-01

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  16. Secret Sessions of Congress: A Brief Historical Overview

    National Research Council Canada - National Science Library

    Amer, Mildred

    2005-01-01

    "Secret" or "closed door" sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...

  17. Secret Sessions of Congress: A Brief Historical Overview

    National Research Council Canada - National Science Library

    Amer, Mildred

    2004-01-01

    Secret or closed door sessions of the House of Representatives and Senate are held periodically to discuss business, including impeachment deliberations, deemed to require confidentiality and secrecy...

  18. Research on design of dialogue session concerning nuclear technology

    International Nuclear Information System (INIS)

    Karikawa, Daisuke; Takahashi, Makoto; Yagi, Ekou; Toba, Tae; Kitamura, Masaharu

    2010-01-01

    Toward resolving nuclear conflict, deep dialogue sessions among stakeholders having different opinions concerning nuclear technology are strongly required. In order to realize a fair and constructive dialogue session, it is necessary to pay attention to the design of the dialogue session, e.g., participant selection, agenda setting, facilitation, and rules of dialogue. The basic requirements for a dialogue session have been proposed in this study based on theoretical and empirical analyses of previous dialogue sessions on nuclear issues. The theoretical analysis has been performed based on various aspects concerning defects in nuclear communication mentioned in science and technology studies. The empirical analysis has been performed by analyzing participants' responses and by systematizing practical findings of previous dialogues. The proposed requirements for a dialogue session were utilized for the design and operation of a preliminary attempt of a dialogue session named 'Open Forum for Nuclear Communication.' Through the analysis of data, such as minutes and recorded conversations collected after the session, it has been confirmed that the prespecified requirements have been satisfied. In addition, the participants' responses have shown a high acceptance for an open forum. According to these results, the basic validity and effectiveness of the proposed requirements in the design of a dialogue session have been successfully demonstrated. (author)

  19. Round table discussion during session 1

    International Nuclear Information System (INIS)

    Aebersold, M.

    2004-01-01

    The round table discussions of the first session of the Belgium Workshop addressed the following questions: - Accepting or refusing a person, an institution or a grouping as a legitimate Stakeholder who makes the decision and how? - How are the local partnerships built and organised? - How to obtain community support for the partnership's legitimate decisions/findings? - Experience teaches that no decision is reached solely by formal and legal processes. What role do informal processes play? - How can the informal procedures be accepted? Do they need to be made explicit? Discussion took place after the plenary presentations, at tables grouping Belgian stakeholders and FSC delegates. After the discussion, each table's findings were reported to the plenary. Most of the discussion concerned the local partnerships. Important findings were that the statutes for the partnerships were developed by the partnerships themselves and there were no legally binding rules handed down by the federal level. The partnerships are part of an informal process. A legally binding participation (i.e. within the EIA) will be initiated at a later stage. As the partnerships function outside of the formal legal procedure, they can function in a more flexible way. It was noted that the partnerships make recommendations, but it is not clear what the government will do with these recommendations. It was also argued that the process may cause conflicts between neighboring communities. As in other contexts visited by the FSC, the importance of the right of veto of the community was stressed, although this may cause a conflict between technical suitability and social acceptance. Access of the community to the local partnership is necessary. Finally it was accepted that time is needed to explain the recommendations to the broader community before any decisions are taken. (author)

  20. CBiOS Science Sessions - 2013

    Directory of Open Access Journals (Sweden)

    Nelson Alexandre Rodrigues Tavares

    2013-06-01

    Full Text Available CBiOS Science Sessions - 2013 - Nutrition: pregnancy counselling website (http://nutricao.ulusofona.pt Nutrição: website de aconselhamento durante a gravidez, Nelson Alexandre Rodrigues Tavares; Relationship between daily water intake and skin physiology, Impacto Cutâneo do consumo dietário de água, Maria Lídia Laginha Mestre Guerreiro da Palma; Development of different types of nanosystems: polymeric, lipid-based and metallic nanoparticles. Desenvolvimento de diferentes tipos de nanosistemas: poliméricos, lipid-based e de nanoparticulas metálicas, Catarina Silva, Patrícia Rijo, Catarina Reis; Interaction between propofol and HES 130/0.4: Chemical, physiological and toxicological. Interação entre Propofol e HES 130/0.4: Química, Fisiológica e Toxicológica, Aura Silva, Ana Ortiz, Carlos Venâncio, Rui Silva, Joaquim Mendes, Paula Guedes, Helena Vala, David Ferreira; Study the potential applicability of the by-products of the Prunus cerasus in promoting health and skin care. Estudo da aplicabilidade dos sub-produtos de Prunus cerasus na promoção de saúde cutânea, Elisabete Maurício, Catarina Rosado, Diaz Diaz Lanza; Cell migration and adhesion - impact of ROS in tumour metastasis Migração celular e adesão - impacto de ROS na metástase tumural, Nuno Saraiva; Bioactive and Non-Conventional Photoprotection Fotoproteção Bioactiva e Não-Convencional, André Rolim Baby.

  1. Anaphora in question-answer sessions in university ELF contexts.

    Directory of Open Access Journals (Sweden)

    Thomas Wulstan Christiansen

    2015-07-01

    Full Text Available Abstract - Identity chains (Hasan 1984 ˗ strings of co-referential noun phrases ˗ constitute a lesser researched area in the field of ELF, as has the more general area of cohesion (but see Hüttner 2009, Christiansen 2011. Following on the work on anaphora of such scholars as Reinhart (1983 and Cornish (1999, and on cohesion (e.g. Halliday and Hasan 1976, Halliday 2004, Christiansen (2009a/b, 2011 focuses on the link between text cohesion and discourse coherence. The interactive perspective of discourse (seen as the process of which text is the product: see Widdowson 1984: 100 is especially relevant to an ELF context of spontaneous spoken interaction. As Guido (2008 evidences, different inter-cultural concerns constitute a crucial dimension to the complex multi-code interaction. Consequently, the diverse ways in which speakers from different L1 backgrounds employ anaphors and construct identity chains are key elements in the co-construction of a dialogic text. In this case study, six extracts of transcripts taken from the VOICE corpus (2011 of conference question and answer sessions set in multicultural contexts are analysed qualitatively. The different ways that participants construct identity chains (e.g. whether they use full forms of various kinds or anaphoric pro-forms are classified. The analysis focuses on both how individual anaphors are resolved and how relations between anaphors and antecedent triggers are encoded, and how identity chains are constructed and organized individually. The objective is to identify which kinds of noun phrase (various subtypes of full and pro-forms are used by diverse groups of EFL speakers both in relation to their own contributions and to those of other speakers (with a threefold distinction made between the same turn of the same speaker, a different turn of the same speaker, and a different turn by a different speaker.

  2. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  3. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  4. 76 FR 50224 - Medicare Program; Accountable Care Organization Accelerated Development Learning Sessions; Center...

    Science.gov (United States)

    2011-08-12

    ...] Medicare Program; Accountable Care Organization Accelerated Development Learning Sessions; Center for... (CMS). This two-day training session is the second Accelerated Development Learning Session (ADLS.... Through Accelerated Development Learning Sessions (ADLS), the Innovation Center will test whether...

  5. Session Report - S. Smith (US NRC)

    International Nuclear Information System (INIS)

    Smith, Shawn

    2014-01-01

    - environment needed for safety functions; some degree of flexibility in regulatory review and assessment; education of workers: identify differences as compared to conventional rock engineering; applicability of mining regulations. In Sweden the site selection process for the final repository for spent nuclear fuel was initiated in 1992 and resulted, in June 2009, in the selection of Forsmark as the selected site for the final repository. Nuclear facilities require permits in accordance with the Swedish Environmental Code and the Nuclear Activities Act. SKB has submitted two applications to SSM (the Swedish Radiation Safety Authority) according to the Nuclear Activities Act and one to the Environmental Court according to the Environmental Code. The application according the Environmental Code includes the whole KBS-3-system - the final repository in Forsmark, the existing interim storage facility and the encapsulation plant in Oskarshamn. The challenges for the implementer and the regulator are the following: number of documents to elaborate and structure of these documents; right of veto of municipalities; management of a complex licensing process; change from R and D to industrial operations implying the creation of a sizeable construction department in SKB; strengthening of technical bases; application of regulatory framework in a different situation compared to conventional process type nuclear facilities; understanding and addressing constraints from post-closure safety related to the construction and operation of the repository; management of the time frames of repository operation requiring flexibility and continued development of disposal concept; flexible regulations: first use as basis for licensing a new nuclear facility; making adjustments for structural changes during construction and operation; ensuring excavation/construction/backfill activities do not jeopardize conditions for passive post-closure; application of general regulations for a KBS-3 type repository

  6. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  7. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  8. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  9. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  10. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  11. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  12. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  13. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  14. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  15. Energy and the public: public awareness workshop and plenary session

    Energy Technology Data Exchange (ETDEWEB)

    1979-07-01

    This publication of these two sessions of the conference on February 22 and 23, 1979 was prepared from a verbatim record made by a reporting firm. A separate abstract was prepared for each of the seventeen papers of the public awareness workshops and of the six papers of the plenary session.

  16. Quality Assurance of Assessment and Moderation Discourses Involving Sessional Staff

    Science.gov (United States)

    Grainger, Peter; Adie, Lenore; Weir, Katie

    2016-01-01

    Quality assurance is a major agenda in tertiary education. The casualisation of academic work, especially in teaching, is also a quality assurance issue. Casual or sessional staff members teach and assess more than 50% of all university courses in Australia, and yet the research in relation to the role sessional staff play in quality assurance of…

  17. Speed Posters: An Alternative to Traditional Poster and Podium Sessions.

    Science.gov (United States)

    Wagnes, Lisa D

    2016-08-01

    Speed posters were used as an alternative concurrent session option during a national nursing education conference. The session format was received positively by both participants and presenters, and, as a result, recommendations for use were developed by the conference planners. J Contin Educ Nurs. 2016;47(8):344-346. Copyright 2016, SLACK Incorporated.

  18. Type Inference for Session Types in the Pi-Calculus

    DEFF Research Database (Denmark)

    Graversen, Eva Fajstrup; Harbo, Jacob Buchreitz; Huttel, Hans

    2014-01-01

    In this paper we present a direct algorithm for session type inference for the π-calculus. Type inference for session types has previously been achieved by either imposing limitations and restriction on the π-calculus, or by reducing the type inference problem to that for linear types. Our approach...

  19. STS-32 Commander Brandenstein adjusts IMAX camera during training session

    Science.gov (United States)

    1989-01-01

    STS-32 Commander Daniel C. Brandenstein adjusts IMAX camera setting during briefing and training session as technician looks on. The session was conducted in the JSC Mockup and Integration Laboratory (MAIL) Bldg 9B. The IMAX camera will be used onboard Columbia, Orbiter Vehicle (OV) 102, during the STS-32 mission.

  20. Summary of Session 5 and 6 'Long Shutdown 1'

    Energy Technology Data Exchange (ETDEWEB)

    Bordry, F; Foraz, K [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    This paper summarizes the sessions devoted to Long Shutdown 1 (LS1) in the LHC, injectors and experiments. The time frame and start date were discussed, with the main activities from powering tests prior to warm-up up to physics were presented. The session finished with a discussion on the maximum reasonable energy. (author)

  1. 76 FR 42112 - Specialty Crop Committee Stakeholder Listening Sessions

    Science.gov (United States)

    2011-07-18

    ... Specialty Crop Committee Stakeholder Listening Sessions AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening sessions. SUMMARY: In accordance with the Federal Advisory Committee Act, 5 U.S.C. App 2, the United States Department of Agriculture announces two stakeholder...

  2. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  3. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  4. Annual meeting on nuclear technology '85. Technical session on nuclear power plant simulators. Jahrestagung Kerntechnik '85. Fachsitzung Simulatoren bei Kernkraftwerken

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    The ten lectures read at this Technical Session deal with nuclear power plant simulators and their functions for the training of control room personnel, with test facilities for analysis and simulation of incidents and the relevant plant behaviour, and with the computer codes for fast simulation of reactor processes. The papers explain in particular the HAMMLAB project, the COSIMA fast core simulator, and the OPAL simulator for the KWU convoy process information system named PRINS.

  5. Proceedings of the 21st DOE/NRC nuclear air cleaning conference; Volume 2, Sessions 9--16

    Energy Technology Data Exchange (ETDEWEB)

    First, M.W. [ed.] [Harvard Univ., Boston, MA (United States). Harvard Air Cleaning Lab.

    1991-02-01

    The 21st meeting of the Department of Energy/Nuclear Regulatory Commission (DOE/NRC) Nuclear Air Cleaning Conference was held in San Diego, CA on August 13--16, 1990. The proceedings have been published as a two volume set. Volume 2 contains sessions covering adsorbents, nuclear codes and standards, modelling, filters, safety, containment venting and a review of nuclear air cleaning programs around the world. Also included is the list of attendees and an index of authors and speakers. (MHB)

  6. A report on the UN special session on disarmament

    International Nuclear Information System (INIS)

    1978-01-01

    Slow progress in disarmament led many of the United Nations Member States, particularly the non-aligned countries, to request the convening of a Special Session of the General Assembly Devoted to Disarmament. The idea of such a special session had evolved over the past few years as an alternative to a World Disarmament Conference and in contrast to the limited possibilities for discussion provided by a regular session of the General Assembly. A special session was perceived as offering the appropriate opportunity to discuss comprehensive disarmament in a practically universal forum The decision to hold the special session was taken by the General Assembly on 21 December 1976 by resolution 31/189 B, which also established a Preparatory Committee to examine all questions relevant to the special session. Fifty-four countries were appointed members of the Preparatory Committee, which met in five sessions. The United Nations Special Session on Disarmament (SSOD) was held in New York from May 23 to June 30, 1978. One hundred and forty-five nations attended and this was the first time since the Disarmament Conference of 1932 that virtually all countries of the world met to discuss all aspects of disarmament. The agenda for the SSOD included inter alia: a review and appraisal of the present international situation, the adoption of a Declaration on Disarmament, the adoption of a Programme of Action on Disarmament, a review of the role of the UN in disarmament and of the international machinery for negotiations on disarmament, including, in particular, the question of convening a world disarmament conference. The various proposals made at the sessions of the Preparatory Committee and at the SSOD itself were consolidated into one document. Consensus on this Final Document was reached on June 30, the concluding day of the session. The Final Document consists of three major parts: Declaration of Principles, Programme of Action and Disarmament Machinery

  7. Intra-session and inter-session variability of nitric oxide pulmonary diffusing capacity in adults with cystic fibrosis.

    Science.gov (United States)

    Radtke, Thomas; Benden, Christian; Maggi-Beba, Marion; Kriemler, Susi; van der Lee, Ivo; Dressel, Holger

    2017-12-01

    We evaluated the intra-session and inter-session variability of the diffusing capacity of nitric oxide (DLNO), carbon monoxide (DLCO), alveolar-capillary membrane diffusing capacity for carbon monoxide (DMCO) and pulmonary capillary blood volume (Vc) in patients with cystic fibrosis (CF). Patients performed single-breath diffusing capacity measurements during all of 3 consecutive study visits. Precision of gas diffusing parameters was quantified by within-subject standard deviation (SD ws ) and coefficient of variation (CV). Intra-session and inter-session reproducibility was determined by SD ws *2.77. 15 clinically stable patients were included. The intra-session precision of gas diffusing parameters improved over the study visits. The inter-session SD ws for DLNO, DLCO, DMCO, and Vc was 4.8, 1.3, 2.4, and 4.3, respectively. Reproducibility was 13.3, 3.8, 6.7 and 12.0mLmin -1 mmHg -1 ; CV was 4.4, 4.7, 4.4 and 5.8%, respectively. The intra-session variability of DLNO, DLCO, DMCO and Vc improves with breath-hold maneuver training in test-naïve patients with CF, indicating a learning effect. Inter-session reproducibility data are lower than those previously reported in healthy subjects. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways

    Directory of Open Access Journals (Sweden)

    Akbar AliHammad

    2010-01-01

    Full Text Available 6LoWPAN (IPv6 based Low-Power Personal Area Network is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inter-connected. This interconnection is especially required in commercial and enterprise applications of sensor networks where reliable and timely data transfers such as multiple code updates are needed from Internet nodes to sensor nodes. For this type of inbound traffic which is mostly bulk, TCP as transport layer protocol is essential, resulting in end-to-end TCP session through a default gateway. In this scenario, a single gateway tends to become the bottleneck because of non-uniform connectivity to all the sensor nodes besides being vulnerable to buffer overflow. We propose SET; a management architecture for multiple split-TCP sessions across a number of serving gateways. SET implements striping and multiple TCP session management through a shim at session layer. Through analytical modeling and ns2 simulations, we show that our proposed architecture optimizes communication for ingress bulk data transfer while providing associated load balancing services. We conclude that multiple split-TCP sessions managed in parallel across a number of gateways result in reduced latency for bulk data transfer and provide robustness against gateway failures.

  9. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  10. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  11. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  12. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  13. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  14. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  15. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  16. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  17. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  18. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  19. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  20. Semi-Automated Discovery of Application Session Structure

    Energy Technology Data Exchange (ETDEWEB)

    Kannan, J.; Jung, J.; Paxson, V.; Koksal, C.

    2006-09-07

    While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a higher level---the structure of user-initiated sessions comprised of groups of related connections---remains much less explored. Some types of session structure, such as the coupling between an FTP control connection and the data connections it spawns, have prespecified forms, though the specifications do not guarantee how the forms appear in practice. Other types of sessions, such as a user reading email with a browser, only manifest empirically. Still other sessions might exist without us even knowing of their presence, such as a botnet zombie receiving instructions from its master and proceeding in turn to carry them out. We present algorithms rooted in the statistics of Poisson processes that can mine a large corpus of network connection logs to extract the apparent structure of application sessions embedded in the connections. Our methods are semi-automated in that we aim to present an analyst with high-quality information (expressed as regular expressions) reflecting different possible abstractions of an application's session structure. We develop and test our methods using traces from a large Internet site, finding diversity in the number of applications that manifest, their different session structures, and the presence of abnormal behavior. Our work has applications to traffic characterization and monitoring, source models for synthesizing network traffic, and anomaly detection.

  1. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  2. [The paradoxical effect of persuasive communication in health education sessions].

    Science.gov (United States)

    Piperini, Marie-Christine

    2012-01-01

    The purpose of this study was to examine the communication dynamics leading to the adoption of new attitudes and cognitions in health education sessions. We examined the verbal interactions at work in persuasive communication in 16 health education sessions. The study found that the medical expertise of the educator and the initial level of commitment of the participants had a positive effect on adherence to recommendations. However, persuasive communication in health education sessions appears to involve a paradoxical process in which criticism of the message can go hand in hand with the expression of an intention to implement new risk-reducing behaviors.

  3. 2011 annual meeting on nuclear technology. Pt. 4. Topical sessions

    International Nuclear Information System (INIS)

    Schoenfelder, Christian; Dams, Wolfgang

    2011-01-01

    Summary report on the Topical Session of the Annual Conference on Nuclear Technology held in Berlin, 17 to 19 May 2011: - Nuclear Competence in Germany and Europe. The Topical Session: - Sodium Cooled Fast Reactors -- will be covered in a report in a further issue of atw. The reports on the Topical Sessions: - CFD-Simulations for Safety Relevant Tasks; and - Final Disposal: From Scientific Basis to Application; - Characteristics of a High Reliability Organization (HRO) Considering Experience Gained from Events at Nuclear Power Stations -- have been covered in atw 7, 8/9, and 10 (2011). (orig.)

  4. Predicting E-commerce Consumer Behaviour Using Sparse Session Data

    OpenAIRE

    Thorrud, Thorstein Kaldahl; Myklatun, Øyvind

    2015-01-01

    This thesis research consumer behavior in an e-commerce domain by using a data set of sparse session data collected from an anonymous European e-commerce site. The goal is to predict whether a consumer session results in a purchase, and if so, which items are purchased. The data is supplied by the ACM Recommender System Challenge, which is a yearly challenge held by the ACM Recommender System Conference. Classification is used for predicting whether or not a session made a purchase, as w...

  5. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  6. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  7. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  8. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  9. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  10. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  11. The Neuromuscular, Biochemical, and Endocrine Responses to a Single-Session Vs. Double-Session Training Day in Elite Athletes.

    Science.gov (United States)

    Johnston, Michael J; Cook, Christian J; Drake, David; Costley, Lisa; Johnston, Julie P; Kilduff, Liam P

    2016-11-01

    Johnston, MJ, Cook, CJ, Drake, D, Costley, L, Johnston, JP, and Kilduff, LP. The neuromuscular, biochemical, and endocrine responses to a single-session vs. double-session training day in elite athletes. J Strength Cond Res 30(11): 3098-3106, 2016-The aim of this study was to compare the acute neuromuscular, biochemical, and endocrine responses of a training day consisting of a speed session only with performing a speed-and-weights training session on the same day. Fifteen men who were academy-level rugby players completed 2 protocols in a randomized order. The speed-only protocol involved performing 6 maximal effort repetitions of 50-m running sprints with 5 minutes of recovery between each sprint, whereas the speed-and-weights protocol involved the same sprinting session but was followed 2 hours later by a lower-body weights session consisting of 4 sets of 5 backsquats and Romanian deadlift at 85% one repetition maximum. Testosterone, cortisol, creatine kinase, lactate, and perceived muscle soreness were determined immediately before, immediately after, 2 hours after, and 24 hours after both the protocols. Peak power, relative peak power, jump height, and average rate of force development were determined from a countermovement jump (CMJ) at the same time points. After 24-hours, muscle soreness was significantly higher after the speed-and-weights protocol compared with the speed-only protocol (effect size η = 0.253, F = 4.750, p ≤ 0.05). There was no significant difference between any of the CMJ variables at any of the posttraining time points. Likewise, creatine kinase, testosterone, and cortisol were unaffected by the addition of a weight-training session. These data indicate that the addition of a weight-training session 2 hours after a speed session, whereas increasing the perception of fatigue the next day does not result in a difference in endocrine response or in neuromuscular capability.

  12. Stability or instability in avoidant personality disorder:Mode fluctuations within schema therapy sessions.

    Science.gov (United States)

    Peled, Ofer; Bar-Kalifa, Eran; Rafaeli, Eshkol

    2017-12-01

    Avoidant personality disorder (APD) is among the most prevalent personality disorders, but has received relatively little empirical attention. This study aims to characterize the frequency, intensity, and fluctuation patterns seen in the modes (self-states) of APD clients over the course of schema therapy (ST), a psychotherapy approach developed especially for personality disorders. The newly-developed client mode rating scale (CMRS) was used to code every 5-min segment (n = 645) of 60 ST sessions. Each segment was coded by two independent raters, achieving adequate reliability. The avoidant/detached mode was present in 74% of therapy segments and was the most intense and unstable mode; the vulnerable child mode was present in 58% of segments and was the second most intense and unstable mode; the dysfunctional parent mode was present in 40% of segments, and was the third most intense and unstable mode; the over-compensator, compliant-surrenderer, and healthy adult modes were present in around 33% of segments, but the healthy adult mode was significantly more stable than all others. Although 645 segments were coded, they were drawn from only 15 APD clients with no control group. Further studies are needed to established specificity to APD. This study demonstrates the utility of the mode concept as a lexicon for capturing personality states and their instability. It highlights the use of in-session segment-by-segment ratings to assess client change within psychotherapy. Although DSM5 fails to address instability as a criterion for avoidant personality disorder, the APD clients in the current study were characterized by considerable mode instability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. 78 FR 44922 - Notice of an Education Listening Session Meeting

    Science.gov (United States)

    2013-07-25

    ... for all interested agricultural education stakeholders. DATES: The Education Listening Session will be..., Technology, Engineering, and Mathematics (STEM) education rearrangement. In the late morning, the audience... their perception of needs and potential improvements in the field of agricultural education. Following...

  14. SESSION V: INTEGRATED APPROACHES IN LAND AND WATER ...

    African Journals Online (AJOL)

    SESSION V: INTEGRATED APPROACHES IN LAND AND WATER MANAGEMENT RESEARCH/LAND AND WATER MANAGEMENT ECONOMICS AND POLICY - Socioeconomic implications of improved forage species on smallholder farms in Kenya.

  15. An improved anti-leech mechanism based on session identifier

    Science.gov (United States)

    Zhang, Jianbiao; Zhu, Tong; Zhang, Han; Lin, Li

    2012-01-01

    With the rapid development of information technology and extensive requirement of network resource sharing, plenty of resource hotlinking phenomenons appear on the internet. The hotlinking problem not only harms the interests of legal websites but also leads to a great affection to fair internet environment. The anti-leech technique based on session identifier is highly secure, but the transmission of session identifier in plaintext form causes some security flaws. In this paper, a proxy hotlinking technique based on session identifier is introduced firstly to illustrate these security flaws; next, this paper proposes an improved anti-leech mechanism based on session identifier, the mechanism takes the random factor as the core and detects hotlinking request using a map table that contains random factor, user's information and time stamp; at last the paper analyzes the security of mechanism in theory. The result reveals that the improved mechanism has the merits of simple realization, high security and great flexibility.

  16. Resume and discussion of session on direct heavy ion reactions

    International Nuclear Information System (INIS)

    Hansen, O.

    1983-01-01

    A conference divides into sessions, but the physics does not always respect such divisions. I found the subject of barrier penetrabilities viewed in a coupled channels picture new, exciting and central to all heavy-ion reaction dynamics. The subject was discussed in bits and pieces over three different sessions, partly in the talks by Winther, Landowne, Braun-Munzinger and Broglia, and partly from the floor by the same people and by Smilanski, I have concentrated on that subject alone and I therefore must apologize to the speakers in my session who covered different material, that definitely merited further discussions. Also, I apologize to other session chairmen, whose territory I have invaded. (orig.)

  17. Astronaut Robert L. Crippen prepares for underwater training session

    Science.gov (United States)

    1983-01-01

    Astronaut Robert L. Crippen, STS-7 crew commander, adjusts his extravehicular mobility unit's (EMU) gloves prior to donning his helmet for a training session in the weightless environment test facility (WETF).

  18. Astronauts and cosmonauts during emergency bailout training session

    Science.gov (United States)

    1994-01-01

    Using small life rafts, several cosmonauts and astronauts participating in joint Russia - United States space missions take part in an emergency bailout training session in the JSC Weightless Environment Training Facility (WETF) 25-feet-deep pool. In the

  19. What's new in multiple sclerosis spasticity research? Poster session highlights.

    Science.gov (United States)

    Linker, Ralf

    2017-11-01

    Each year at the Multiple Sclerosis Experts Summit, relevant research in the field of multiple sclerosis spasticity is featured in poster sessions. The main studies presented at this year's meeting are summarized herein.

  20. Raymark Public Open House and General Information Session

    Science.gov (United States)

    The USEPA, CTDEEP, CT DPH, & the Stratford Health Department will host an Open House & General Information Session for Stratford, CT residents to learn more about the Raymark Industries, Inc. Superfund Site, on Tuesday, May 23, 2017...

  1. Astronauts Armstrong and Scott during photo session outside KSC

    Science.gov (United States)

    1966-01-01

    Astronauts Neil A. Armstrong (left), command pilot, and David R. Scott, pilot, the Gemini 8 prime crew, during a photo session outside the Kennedy Space Center (KSC) Mission Control Center. They are standing in front of a radar dish.

  2. The evaluation process of short training sessions in organizations

    NARCIS (Netherlands)

    Overschie, M.G.F.; Lukosch, H.K.; De Vries, P.

    This paper presents a critical reflection of the evaluation of learning processes in organizations. Based on learning and evaluation theories and concepts we discuss qualitative and quantitative evaluation processes, and its relationship to short training sessions to foster sustainable development.

  3. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  4. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  5. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  6. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  7. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  8. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  9. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  10. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  11. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  12. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  13. Astronauts Parise and Jernigan check helmets prior to training session

    Science.gov (United States)

    1994-01-01

    Attired in training versions of the Shuttle partial-pressure launch and entry suits, payload specialist Dr. Ronald A Parise (left) and astronaut Tamara E. Jernigan, payload commander, check over their helmets prior to a training session. Holding the helmets is suit expert Alan M. Rochford, of NASA. The two were about to join their crew mates in a session of emergency bailout training at JSC's Weightless Environment Training Facility (WETF).

  14. Helix Nebula Science Cloud pilot phase open session

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    This Helix Nebula Science Cloud (HNSciCloud) public session is open to everyone and will be webcast. The session will provide the audience with an overview of the HNSciCloud pre-commercial procurement project and the innovative cloud platforms that have been developed. A number of practical use-cases from the physics community will be presented as well as the next steps to be undertaken.

  15. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  16. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  17. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  18. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  19. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  20. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  1. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  2. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  3. NEDO Forum 2000. Industrial technology development session; Sangyo gijutsu kenkyu kaihatsu session

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-09-01

    This session presented the following subjects: I. IT innovation, II. Bio-seminar, III. Nano-technology, IV. Machine technology seminar, and V. 'Development subsidy project to put industrial technologies into practical use'. The theme in I relates to (1) influence of IT innovation on the society, (2) the theory of semiconductor evolution, (3) the theory of liquid crystal evolution, and (4) the theory of disk evolution. The theme II searches (1) how far have bio-technologies come?, (2) search of human evolution from genes, (3) can human being live up to 150 years by bio-technologies?, and (4) what is a DNA array (chip)?. The theme III covers (1) product innovation in polymers (new polymeric materials brought about by polymer nano-technology, taking polyolefin as an example), and (2) creation of ceramics materials by using nano-technologies. The theme IV relates to (1) ITS changes the car society into this way, (2) the current status and outlook on research and development of micro-machine technologies, and (3) the futuristic society and new industries opened by the Humanoid project. The theme V describes (1) practical application of ultra-small medical device production technologies, (2) development of next generation semiconductor manufacturing resists, (3) development for practical application of an optical brain function imaging device, and (4) development for practical application of new screening technologies toward creation of medicines using genome. (NEDO)

  4. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  5. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  6. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  7. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  8. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  9. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  10. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  11. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  12. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  13. Assessing play-based activities, child talk, and single session outcome in family therapy with young children.

    Science.gov (United States)

    Willis, Amber B; Walters, Lynda H; Crane, D Russell

    2014-07-01

    This exploratory, observational study was designed to reveal descriptive information regarding therapists' actual practices with preschool- and school-aged children in a single session of family therapy and to investigate change mechanisms in family play therapy that have been proposed to make this approach effective. A purposive sample of 30 families receiving family therapy was recruited and video-taped during a family session where at least one child between the ages of 4 and 12 was present. Following the session, the therapist and parent(s) completed questionnaires while one of the children (aged 4-12) was interviewed. Session recordings were coded, minute-by-minute, for participant talk time, visual aids or props used, and therapy technique type (e.g., play-based/activity vs. talk-only techniques). Hierarchical regression and canonical correlational analyses revealed evidence supporting the theory that play-based techniques promote young children's participation, enhance the quality of the child-therapist relationship, and build positive emotional experiences in family therapy. © 2013 American Association for Marriage and Family Therapy.

  14. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  15. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  16. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  18. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  19. Introduction and Overview of the Industrial Interactive Panel Session

    Science.gov (United States)

    Seiler, David

    2014-03-01

    A unique industrial panel covering the challenges and needs of various industries and how being innovative is important. The session involves two invited industry speakers (24 minutes each) who will set the stage for the interactive round table panel session. The Panel, led by moderator Mark Bernius (Morgan Advanced Materials), consists of the two invited speakers plus an additional five industry panelists. The first thirty minutes of the panel session has the five additional panelists introducing themselves and their work/company. These introductions could include what they or their company does, sharing one or two technical highlights, listing some challenges or needs for physicists, and what innovation breakthroughs are needed in their industries. The final hour of the session will be highly interactive with questions to the panel coming from the moderator, the audience, and the panelists themselves. Questions that might be addressed include: how physicists are or could be critical in advancing innovation; how can AIP/APS/FIAP help industry get the physics help they need to be innovative (knowledge, the right staff, etc.); what role can students and post docs play in advancing industry's mission; etc. We invite you to participate in this interactive session and ask our industry experts your own interesting and challenging questions. The invited speakers are George Thompson, Intel, and Rick Watkins, Nike. The panel members also include Jason Cleveland, Asylum Research; Robert Doering, Texas Instruments; William Gallagher, IBM T.J. Watson Research Center; James Hollenhorst, Agilent Technologies; and Martin Poitzsch, Schlumberger-Doll Research.

  20. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  1. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  2. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  3. 76 FR 66931 - Medicare Program; Accountable Care Organization Accelerated Development Learning Sessions; Center...

    Science.gov (United States)

    2011-10-28

    ...] Medicare Program; Accountable Care Organization Accelerated Development Learning Sessions; Center for... Services (CMS). This two-day training session is the third and final Accelerated Development Learning... the quality of care for beneficiaries. Through Accelerated Development Learning Sessions (ADLS), the...

  4. 75 FR 34418 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-06-17

    ... Notice of the Specialty Crop Committee's Stakeholder Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: The notice announces the Specialty Crop Committee's Stakeholder Listening Session. The document contained the wrong date for the...

  5. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  6. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  7. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  8. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  9. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  10. Summary of session D2: quantum aspects of cosmology

    International Nuclear Information System (INIS)

    Bojowald, Martin

    2008-01-01

    This is a summary of talks about quantum aspects of cosmology. Topics involve the properties of quantum matter fields on an expanding spacetime as well as issues in the quantization of gravity itself. This session had three parts, one of which was in a joint session with quantum aspects of black holes (D1) and other quantum aspects (D3). The first block of talks was related to quantum aspects of field theories on a classical spacetime (with possible back-reaction), while the second block dealt in several ways with quantizations of gravity itself. The two talks in the combined session discussed issues in quantum theory on de Sitter space and will therefore be included here in the summary of the first block. For each talk, a reference is given for further details

  11. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist. Leadership Training           Training Course Title Next Session Language Duration Available places Needed to maintain the session Driving for Impact and Influence 13-Sep-2016 to 14-Sep-2016 French 2 days 4 0 Essentials of People Management for CERN Supervisors (Adapted from CDP for CERN Supervisors) 22-Sep-2016 to 23-Sep-2016, 18-Nov-2016, 17-Jan-2017 to 18-Jan-2017 English 5 days 5 0 Eléments essentiels de la gestion du personnel pour les superviseurs (adapt&a...

  12. Topical Session on the Decommissioning and Dismantling Safety Case

    International Nuclear Information System (INIS)

    2002-01-01

    Set up by the Radioactive Waste Management Committee (RWMC), the WPDD brings together senior representatives of national organisations who have a broad overview of Decommissioning and Dismantling (D and D) issues through their work as regulators, implementers, R and D experts or policy makers. These include representatives from regulatory authorities, industrial decommissioners from the NEA Cooperative Programme on Exchange of Scientific and Technical Information on Nuclear Installation Decommissioning Projects (CPD), and cross-representation from the NEA Committee on Nuclear Regulatory Activities, the Committee on Radiation Protection and Public Health, and the RWMC. The EC is a member of the WPDD and the IAEA also participates. This ensures co-ordination amongst activities in these international programmes. Participation from civil society organisations is considered on a case by case basis, and has already taken place through the active involvement of the Group of Municipalities with Nuclear Installations at the first meeting of the WPDD At its second meeting, in Paris, 5-7 December 2001, the WPDD held two topical sessions on the D and D Safety Case and on the Management of Materials from D and D, respectively. This report documents the topical session on the safety case. The topical session was meant to provide an exchange of information and experience on the following issues: What topics should be included in a safety case? Of what should it consist? Is there sufficient and complete guidance nationally and internationally? How do practices differ internationally? Main boundary condition to this session was that it would deal with plants where spent fuel has been removed. Also the topical sessions was kept at a level that makes the most of the varied constituency of the WPDD. Namely, interface issues are important, and issue-identification and discussion was the immediate goal. There was less interest in examining areas where variability amongst national

  13. Clarifying perspectives: Ethics case reflection sessions in childhood cancer care.

    Science.gov (United States)

    Bartholdson, Cecilia; Lützén, Kim; Blomgren, Klas; Pergert, Pernilla

    2016-06-01

    Childhood cancer care involves many ethical concerns. Deciding on treatment levels and providing care that infringes on the child's growing autonomy are known ethical concerns that involve the whole professional team around the child's care. The purpose of this study was to explore healthcare professionals' experiences of participating in ethics case reflection sessions in childhood cancer care. Data collection by observations, individual interviews, and individual encounters. Data analysis were conducted following grounded theory methodology. Healthcare professionals working at a publicly funded children's hospital in Sweden participated in ethics case reflection sessions in which ethical issues concerning clinical cases were reflected on. The children's and their parents' integrity was preserved through measures taken to protect patient identity during ethics case reflection sessions. The study was approved by a regional ethical review board. Consolidating care by clarifying perspectives emerged. Consolidating care entails striving for common care goals and creating a shared view of care and the ethical concern in the specific case. The inter-professional perspectives on the ethical aspects of care are clarified by the participants' articulated views on the case. Different approaches for deliberating ethics are used during the sessions including raising values and making sense, leading to unifying interactions. The findings indicate that ethical concerns could be eased by implementing ethics case reflection sessions. Conflicting perspectives can be turned into unifying interactions in the healthcare professional team with the common aim to achieve good pediatric care. Ethics case reflection sessions is valuable as it permits the discussion of values in healthcare-related issues in childhood cancer care. Clarifying perspectives, on the ethical concerns, enables healthcare professionals to reflect on the most reasonable and ethically defensible care for the child

  14. IFESS 2005 Special Session 5 Artifical Vision. Final progress report

    Energy Technology Data Exchange (ETDEWEB)

    Weiland, James D.

    2005-07-05

    A special session on visual prostheses was held during the Annual Meeting of the International Functional Electrical Stimulation Society (IFESS), in Montreal, Canada, July 5-9, 2005. IFESS is a meeting that typically attracts researchers in implantable nerve stimulators, functional electrical stimulation, and rehabilitation. All of these areas have significant overlap with the retinal prosthesis, but these areas have decades of research behind them. The special session provided a forum for researchers with vast experience in nerve stimulation to interact with leading research in retinal and cortical visual prostheses. The grant paid for the travel and conference costs of the presenters in the session. The session was chaired by James Weiland (the PI on this grant). The session co-chair was Phil Troyk, Ph.D., from the Illinois Institute of Technology. The Department of Energy was acknowledged at the start of the session as the sponsor. The following talks were delivered: Clinical Trial of a Prototype Retinal Prosthesis James Weiland, Ph.D. Doheny Eye Institute, Los Angeles, California The U.S. Department of Energy's Artificial Sight Program Elias Greenbaum, Ph.D. Oak Ridge National Laboratory, Oak Ridge, Tennessee A 16-Channel stimulator ASIC for use in an intracortical visual prosthesis Phillip R. Troyk, Ph.D. Illinois Institute of Technology, Chicago, Illinois Two approaches to the Optic Nerve Visual Prosthesis Jean Delbeke, M.D. University Cath de Louvain, Louvain, Belgium Design and Implementation of High Power Efficiency Modules for a Cortical Visual Stimulator Mohammad Sawan, Ph.D. Ecole Polytechnique de Montreal, Montreal, Canada Remaining funds from the grant were used to support Dr. Weiland's travel to the Association for Research in Vision and Ophthalmology in May 2006, with DOE approval, where several projects, supported by the DOE artificial retina program, were presented.

  15. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  16. Theory, practice, and history in critical GIS: Reports on an AAG panel session

    Science.gov (United States)

    Wilson, M.W.; Poore, B.S.

    2009-01-01

    Extending a special session held at the 2008 annual meeting of the Association of American Geographers in Boston, this commentary collection highlights elements of the critical GIS research agenda that are particularly pressing. Responding to a Progress report on critical GIS written by David O'Sullivan in 2006, these six commentaries discuss how different interpretations of 'critical' are traced through critical GIS research. Participants in the panel session discussed the need for a continued discussion of a code of ethics in GIS use in the context of ongoing efforts to alter or remake the software and its associated practices, of neo-geographies and volunteered geographies. There were continued calls for hope and practical ways to actualize this hope, and a recognition that critical GIS needs to remain relevant to the technology. This 'relevance' can be variously defined, and in doing so, researchers should consider their positioning vis-??-vis the technology. Throughout the commentaries collected here, a question remains as to what kind of work disciplinary sub-fields such as critical GIS and GIScience perform. This is a question about language, specifically the distance that language can create among practitioners and theoreticians, both in the case of critical GIS and more broadly throughout GIScience.

  17. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  18. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  19. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  20. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  1. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  2. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  3. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  4. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  5. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  6. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  7. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  8. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  9. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  10. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  11. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  12. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  13. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  14. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  15. Mini-conference and Related Sessions on Laboratory Plasma Astrophysics

    International Nuclear Information System (INIS)

    Hantao Ji

    2004-01-01

    This paper provides a summary of some major physics issues and future perspectives discussed in the Mini-Conference on Laboratory Plasma Astrophysics. This Mini-conference, sponsored by the Topical Group on Plasma Astrophysics, was held as part of the American Physical Society's Division of Plasma Physics 2003 Annual Meeting (October 27-31, 2003). Also included are brief summaries of selected talks on the same topic presented at two invited paper sessions (including a tutorial) and two contributed focus oral sessions, which were organized in coordination with the Mini-Conference by the same organizers

  16. ITER session at the IAEA fusion energy conference

    International Nuclear Information System (INIS)

    Stewart, M.J.

    2003-01-01

    A highlight of this year's Fusion Energy Conference, held in Lyon, France, on 14-19 October, was the participation by the ITER Parties in both a Special ITER Informal Session and in the Fusion Institute Exhibition at the Paella's des Congres de Lyon. These gave conference participants an opportunity to hear the latest on this collaborative international fusion energy research and development project, and to speak with the experts from each of the four sites being offered for the construction of ITER. The Special ITER Informal Session was held on the evening of 16 October and it was very well attended, with approximately 350 conference participants attending

  17. Mini-conference and Related Sessions on Laboratory Plasma Astrophysics

    Energy Technology Data Exchange (ETDEWEB)

    Hantao Ji

    2004-02-27

    This paper provides a summary of some major physics issues and future perspectives discussed in the Mini-Conference on Laboratory Plasma Astrophysics. This Mini-conference, sponsored by the Topical Group on Plasma Astrophysics, was held as part of the American Physical Society's Division of Plasma Physics 2003 Annual Meeting (October 27-31, 2003). Also included are brief summaries of selected talks on the same topic presented at two invited paper sessions (including a tutorial) and two contributed focus oral sessions, which were organized in coordination with the Mini-Conference by the same organizers.

  18. Coherence Generalises Duality: A Logical Explanation of Multiparty Session Types

    DEFF Research Database (Denmark)

    Carbone, Marco; Lindley, Sam; Montesi, Fabrizio

    2016-01-01

    the duality of classical linear logic (relating two types) with a more general notion of coherence (relating an arbitrary number of types). This paper introduces variants of CP and MCP, plus a new intermediate calculus of Globally-governed Classical Processes (GCP). We show a tight relation between......Wadler introduced Classical Processes (CP), a calculus based on a propositions-as-types correspondence between propositions of classical linear logic and session types. Carbone et al. introduced Multiparty Classical Processes, a calculus that generalises CP to multiparty session types, by replacing...

  19. USING SESSION RPE TO MONITOR DIFFERENT METHODS OF RESISTANCE EXERCISE

    Directory of Open Access Journals (Sweden)

    Alison D. Egan

    2006-06-01

    Full Text Available The purpose of this study was to compare session rating of perceived exertion for different resistance training techniques in the squat exercise. These techniques included traditional resistance training, super slow, and maximal power training. Fourteen college-age women (Mean ± SD; age = 22 ± 3 years; height = 1.68 ± 0. 07 m completed three experimental trials in a randomized crossover design. The traditional resistance training protocol consisted of 6 sets of 6 repetitions of squats using 80% of 1-RM. The super slow protocol consisted of 6 sets of 6 repetitions using 55% of 1-RM. The maximal power protocol consisted of 6 sets of 6 repetitions using 30% of 1-RM. Rating of perceived exertion (RPE measures were obtained following each set using Borg's CR-10 scale. In addition, a session RPE value was obtained 30 minutes following each exercise session. When comparing average RPE and session RPE, no significant difference was found. However, power training had significantly lower (p < 0.05 average and session RPE (4.50 ± 1.9 and 4.5 ± 2.1 compared to both super slow training (7.81 ± 1.75 and 7.43 ± 1.73 and traditional training (7.33 ± 1.52 and 7.13 ± 1.73. The results indicate that session RPE values are not significantly different from the more traditional methods of measuring RPE during exercise bouts. It does appear that the resistance training mode that is used results in differences in perceived exertion that does not relate directly to the loading that is used. Using session RPE provides practitioners with the same information about perceived exertion as the traditional RPE measures. Taking a single measure following a training session would appear to be much easier than using multiple measures of RPE throughout a resistance training workout. However, practitioners should also be aware that the RPE does not directly relate to the relative intensity used and appears to be dependent on the mode of resistance exercise that is used

  20. The Second ICASE/LaRC Industry Roundtable: Session Proceedings

    Science.gov (United States)

    Girimaji, Sharath

    1997-01-01

    The second ICASE/LaRC Industry Roundtable was held October 7-9, 1996 at the Williamsburg Hospitality House, Williamsburg, Virginia. Like the first roundtable in 1994, this meeting had two objectives: (1) to expose ICASE and LaRC scientists to industrial research agendas; and (2) to acquaint industry with the capabilities and technology available at ICASE, LaRC and academic partners of ICASE. Nineteen sessions were held in three parallel tracks. Of the 170 participants, over one third were affiliated with various industries. Proceedings from the different sessions are summarized in this report.

  1. Further experience with radiotherapy by multiple daily sessions

    Energy Technology Data Exchange (ETDEWEB)

    Svoboda, V H.J. [Saint Mary' s Hospital, Portsmouth (UK). Dept. of Radiotherapy and Oncology

    1978-05-01

    Since 1972 over 100 patients have been treated by frequent daily sessions of radiotherapy with a short overall time. Cobalt 60 teletherapy and 250 kV X-ray beams have been used with radical or palliative dosage. The tolerance to these regimes of the skin, breast, chest wall, neck, lung and pelvis is discussed and the tumour responses described. Radiotherapy by multiple daily sessions is clinically possible and often an advantage. Its therapeutic ratio is not inferior to comparable regimes using longer intervals.

  2. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  3. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. Breakout Session A: Safety Issues. Report from breakout session and discussion on safety issues

    International Nuclear Information System (INIS)

    Petit, Marc

    2013-01-01

    The first issue discussed during the breakout session on safety aspects of accident-tolerant fuels was the objective that must be assigned to the development of such concepts. The first goal should be to avoid, or at least limit, the release of radioactive materials into the environment in case of an accident. This implies that severe accidents (core melt) situations must be avoided. To reach this goal, the core geometry must remain coolable, even for accident scenarios worse than what current fuel designs are able to sustain. There was a consensus that the station blackout (SBO) is a good reference transient to evaluate the potential benefits from new, more robust, fuel designs. With respect to the present situation, the merits of new designs can be analysed with respect to three figures: - the 'grace period', i.e. the additional amount of time before the onset of core melt, during which more recovery actions can be made; - the amount of combustible gases produced; - the amount of radioactive materials released. It is important to note that those three values are not independent from one another. They may be understood as three different ways to measure the improvements arising from accident tolerant fuels. The notion of 'grace period' was discussed and it was suggested that it should be compared to the amount of time needed to switch from normal operation to accident management type of procedures. The participants agreed that the 'grace period' should be counted in hours (or even days but the realism of this last goal was questioned). In other words, there was a consensus that a 'grace period' of some minutes is pointless and definitely not worth the effort of developing and characterising the behaviour of new concepts. Although the purpose of accident-tolerant fuel development is to improve the core robustness in design basis accidents (DBA) and situations somewhat beyond like SBO, it was recognised that new concepts must

  5. Radiation transport phenomena and modeling. Part A: Codes; Part B: Applications with examples

    International Nuclear Information System (INIS)

    Lorence, L.J. Jr.; Beutler, D.E.

    1997-09-01

    This report contains the notes from the second session of the 1997 IEEE Nuclear and Space Radiation Effects Conference Short Course on Applying Computer Simulation Tools to Radiation Effects Problems. Part A discusses the physical phenomena modeled in radiation transport codes and various types of algorithmic implementations. Part B gives examples of how these codes can be used to design experiments whose results can be easily analyzed and describes how to calculate quantities of interest for electronic devices

  6. Look at the Gato! Code-Switching in Speech to Toddlers

    Science.gov (United States)

    Bail, Amelie; Morini, Giovanna; Newman, Rochelle S.

    2015-01-01

    We examined code-switching (CS) in the speech of twenty-four bilingual caregivers when speaking with their 18- to 24-month-old children. All parents CS at least once in a short play session, and some code-switched quite often (over 1/3 of utterances). This CS included both inter-sentential and intra-sentential switches, suggesting that at least…

  7. IAEA Workshop (Training Course) on Codes and Standards for Sodium Cooled Fast Reactors. Working Material

    International Nuclear Information System (INIS)

    2010-01-01

    The training course consisted of lectures and Q&A sessions. The lectures dealt with the history of the development of Design Codes and Standards for Sodium Cooled Fast Reactors (SFRs) in the respective country, the detailed description of the current design Codes and Standards for SFRs and their application to ongoing Fast Reactor design projects, as well as the ongoing development work and plans for the future in this area. Annex 1 contains the detailed Workshop program

  8. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  9. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  10. The effects of session length on demand functions generated using FR schedules.

    Science.gov (United States)

    Foster, T Mary; Kinloch, Jennifer; Poling, Alan

    2011-05-01

    In comparing open and closed economies, researchers often arrange shorter sessions under the former condition than under the latter. Several studies indicate that session length per se can affect performance and there are some data that indicate that this variable can influence demand functions. To provide further data, the present study exposed domestic hens to series of increasing fixed-ratio schedules with the length of the open-economy sessions varied over 10, 40, 60, and 120 min. Session time affected the total-session response rates and pause lengths. The shortest session gave the greatest response rates and shortest pauses and the longest gave the lowest response rates and longest pauses. The total-session demand functions also changed with session length: The shortest session gave steeper initial slopes (i.e., the functions were more elastic at small ratios) and smaller rates of change of elasticity than the longest session. Response rates, pauses, and demand functions were, however, similar for equivalent periods of responding taken from within sessions of different overall lengths (e.g., total-session data for 10-min sessions and the data for the first 10 min of 120-min sessions). These findings suggest that differences in session length can confound the results of studies comparing open and closed economies when those economies are arranged in sessions that differ substantially in length, hence data for equivalent-length periods of responding, rather than total-session data, should be of primary interest under these conditions.

  11. Nuclear power in Europe. Session 1985-86. 18. report

    International Nuclear Information System (INIS)

    1986-01-01

    Oral and written evidence received by the Committee in 14 sessions over the months January - June 1986 from at least 20 organizations or individuals has been collected together in this one volume. Memoranda are printed and a verbatim account of the subsequent examination of witnesses is given. (UK) (author)

  12. Child-Computer Interaction: ICMI 2012 special session

    NARCIS (Netherlands)

    Nijholt, Antinus; Morency, L.P.; Bohus, L.; Aghajan, H.; Nijholt, Antinus; Cassell, J.; Epps, J.

    2012-01-01

    This is a short introduction to the special session on child computer interaction at the International Conference on Multimodal Interaction 2012 (ICMI 2012). In human-computer interaction users have become participants in the design process. This is not different for child computer interaction

  13. Session B1 Management for sustainable use — Rangeland auditing ...

    African Journals Online (AJOL)

    We need to monitor the capacity of healthy rangeland to support a broad suite of ecosystem services for a wide range of stakeholders — in a fair, objective and representative way. ... A hybrid session structure will be utilised: distilling wisdom from relevant posters; formal presentations; and stimulating structured debate.

  14. Hypnosis and Smoking: A Five-Session Approach.

    Science.gov (United States)

    Watkins, Helen H.

    An active five-session, individualized treatment approach to the stopping of smoking is described. This approach emphasized the following: (a) the feedback, in and out of hypnosis, of the client's own reasons for quitting, (b) the visualization of both positive and negative smoking experiences meaningful to the client, (c) maintaining contact with…

  15. Our Place in the Universe. Session 1; History of Astronomy

    Science.gov (United States)

    Adams, Mitzi

    2016-01-01

    This session includes a very broad overview of a couple of the major ideas of astronomy, along with demonstrations of Earth's motions that, give rise to the seasons, show us the "faces" of Venus (and the Moon), and result in retrograde motion of the outer planets.

  16. Y-Notes; Introductory Sessions on Nuclear Technology

    International Nuclear Information System (INIS)

    2001-01-01

    This chapter is divided into next parts: What is 'Y-Notes ; Young generation opening session; Nuclear education and transfer of know-how; Nuclear technology; Other applications of nuclear technology; Nuclear programs and technical cooperation; Political aspects; Environment and safety; Communication and public perception; Economics; Fuel cycle challenges; Video

  17. Premenstrual mood and empathy after a single light therapy session

    NARCIS (Netherlands)

    aan het Rot, Marije; Miloserdov, Kristina; Buijze, Anna L. F.; Meesters, Ybe; Gordijn, Marijke C. M.

    2017-01-01

    To examine whether acute changes in cognitive empathy might mediate the impact of light therapy on mood, we assessed the effects of a single light-therapy session on mood and cognitive empathy in 48 premenstrual women, including 17 who met Premenstrual Symptoms Screening Tool criteria for

  18. Closed Conference Signalling Using the Session Initiation Protocol.

    Science.gov (United States)

    Miladinovic, Igor; Stadler, Johannes

    2003-01-01

    Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…

  19. Changes in Left Ventricular Diastolic Function During Hemodialysis Sessions

    NARCIS (Netherlands)

    Assa, Solmaz; Hummel, Yoran M.; Voors, Adriaan A.; Kuipers, Johanna; Groen, Henk; de Jong, Paul E.; Westerhuis, Ralf; Franssen, Casper F. M.

    Background: Left ventricular diastolic dysfunction is common in hemodialysis patients and is associated with worse outcome. Previous studies have shown that diastolic function worsens from pre- to post-dialysis session, but this has not been studied during hemodialysis. We studied the evolution of

  20. A Student Experience of Peer Assisted Study Sessions in Physiotherapy

    Science.gov (United States)

    Sole, Gisela; Rose, Andrew; Bennet, Tracey; Jaques, Katrina; Rippon, Zoe; van der Meer, Jacques

    2012-01-01

    Peer Assisted Study Sessions (PASS) were introduced as an optional learning experience in a Bachelor of Physiotherapy programme. The aim of this study was to evaluate the use of PASS from the student perspective. Eight third year physiotherapy students who had participated in PASS during their second year of training attended a focus group, at…

  1. Special Session 4: Astronomy Education between Past and Future

    Science.gov (United States)

    de Greve, Jean-Pierre

    2010-11-01

    The special session aims at discussing an integrated approach of the different efforts to increase and promote the teaching and learning of astronomy in the world, with emphasis on developing countries. To this end, attention will be given to research on education, specifically in the field of physics, to best practices of the use of astronomy in educational systems (specifically in developing countries), and to innovative learning initiatives other than formal education. The Special Session aims also at creating a universal perspective wherein modern (post-Copernican) astronomy will presented as an intellectual cumulus. The objective of the session is to disseminate best practices in teaching and learning activities of astronomy and to give an opportunity to learn about initiatives in different cultural and socio-economic settings. The special session also wants to give food-for-thought and proposals for reflection for an integrative approach, and for optimization processes, to enhance the interest in astronomy and its role as a trigger towards science education in the educational systems, with emphasis on the developing countries. The outcome should be a sensitization of teachers and students alike to the concept of a universal history of astronomy and creation of some reliable source material which can be used as a teaching aid in a culture-specific context. The outcome could be a set of recommendations for future integrated actions, and eventually recommendations on new initiatives, framed into the new decadal policy plan.

  2. Proceedings of the Session of Radiological Protection in Medicine

    International Nuclear Information System (INIS)

    2016-01-01

    The Argentine Society for Radiation Protection has organized the Radiological Protection Session in Medicine 2016 in order to continue with the radiological update on specific radiological topics in radiology, nuclear medicine and interventional medicine, as well as to optimize the radiological protection of workers, patients and the public. [es

  3. Definitional Ceremonies: Integrating Community into Multicultural Counseling Sessions

    Science.gov (United States)

    Bitter, James Robert; Robertson, Patricia E.; Roig, Grace; Disqueact, J. Graham

    2004-01-01

    Definitional Ceremonies are used as a forum for integrating members of diverse cultures into multicultural counseling sessions. The authors provide a philosophical foundation, implementation process, and excerpts from a typescript of a recent definitional ceremony involving a women and her mother, both recently in the United States from Panama.

  4. Formal description of the OSI session layer: introduction

    NARCIS (Netherlands)

    Ajubi, I.; Scollo, Giuseppe; van Sinderen, Marten J.; van Eijk, P.H.J.; Vissers, C.A.; Diaz, M.

    1989-01-01

    The LOTOS formal description of the OSI session layer is introduced with the purpose of familiarizing the reader with the design choices that influenced the development of the formal description. Such design choices concern the adoptation of specification styles and the reflection of elements of the

  5. Discussion summary of session 4: strategy for 2012 (part II)

    International Nuclear Information System (INIS)

    Bruning, O.; Ponce, L.

    2012-01-01

    The fourth session of the 2012 LHC Performance Workshop included the following topics: -) beam Energy (it was decided to step back in energy from 4 TeV to 3.5 TeV in case of excessive number of quenches), -) optics options, -) collimation settings and performance, -) performance reach in the LHC for 2012, -) MD plans in 2012, and -) Ions in 2012

  6. The World of Organic Agriculture (Session at the BIOFACH 2017)

    OpenAIRE

    Willer, Helga; Lernoud, Julia; Huber, Beate; Sahota, Amarjit

    2017-01-01

    The World of Organic Agriculture 2017 www.organic-world.net Presentations at the Session "The World of Organic Agriculture" - Organic Agriculture Worldwide 2017: Current Statistics (Dr. Helga Willer, Julia Lernoud) - Global survey on Voluntary Sustainability Standards (VSS) (Julia Lernoud, Dr. Helga Willer) - Regulations and Certification Emerging Trends 2017 (Beate Huber) - Global Organic Food & Drink: Market Update & Challenges (Amarjit Sahota)

  7. 3rd Session of the Sant Cugat Forum on Astrophysics

    CERN Document Server

    Gravitational wave astrophysics

    2015-01-01

    This book offers review chapters written by invited speakers of the 3rd Session of the Sant Cugat Forum on Astrophysics — Gravitational Waves Astrophysics. All chapters have been peer reviewed. The book goes beyond normal conference proceedings in that it provides a wide panorama of the astrophysics of gravitational waves and serves as a reference work for researchers in the field.

  8. Parents Exhibit Children's Progress at a Poster Session.

    Science.gov (United States)

    Donley, Corrine R.; Williams, Gladys

    1997-01-01

    Describes a program of New York's Keller School (a school for toddlers and preschoolers with communication, cognitive, and emotional disorders), which promotes meaningful family involvement through parent education. Activities to promote parent participation are described, including an annual poster session to present the parents' own data on…

  9. Implementing Problem-Based Learning in the Counseling Session.

    Science.gov (United States)

    Hall, Kimberly R.

    This study examined the use of problem-based learning (PBL) in an actual counseling session and the effects on student assertiveness skills. A group of seventh-grade students, who were all victims of bullies, participated in the study. The students, two boys and one girls, were 13 and 14 years old. Teachers rated the level of assertiveness skills…

  10. Urban and Suburban Geographies of Ageing : session 1 and 2

    NARCIS (Netherlands)

    Lager, Debbie; Negrini, Chiara; van Hoven, Bettina; Schwanen, Tim

    2014-01-01

    We seek to organise two sessions to explore the relationships of older people and ageing with place, with a particular focus on urban and suburban environments. Up till now, research in the field of ageing and place has been dominated by social and environmental gerontologists. Recently, Schwanen et

  11. INC93: international nuclear congress. Technical sessions summaries

    International Nuclear Information System (INIS)

    Boulton, J.

    1993-01-01

    The conference dealt mainly with safety, environmental and human aspects of nuclear energy, including waste management. This volume consists of summaries of the technical sessions contained in Volumes 2 and 3. The individual papers have also been abstracted separately for INIS, with the summaries abridged

  12. Discussant Remarks on Session: Statistical Aspects of Measuring the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, Les

    1999-04-02

    These remarks will briefly summarize what we learn from the talks in this session, and add some more areas in Internet Measurement that may provide challenges for statisticians. It will also point out some reasons why statisticians may be interested in working in this area.

  13. Astronaut Wendy Lawrence participates in training session in the CCT

    Science.gov (United States)

    1994-01-01

    Seated in the pilot's seat of a JSC Shuttle trainer, astronaut Wendy B. Lawrence, STS-67 flight engineer, participates in a training session. The 1992 astronaut class graduate is in the crew compartment trainer (CCT) of JSC's Shuttle mockup and integration laboratory.

  14. Brief Classroom Training Sessions for Workplace Readiness: Are They Effective?

    Science.gov (United States)

    Palesy, Debra

    2017-01-01

    Classroom training sessions for new home care workers (HCWs) are often brief and ad hoc, varying in format and content. Yet the application of this training may be central to worker and client safety. A qualitative approach was adopted for this inquiry, comprising two separate but related practical studies. In the first, exploratory study,…

  15. Astronaut Tamara Jernigan in the CCT during a training session

    Science.gov (United States)

    1994-01-01

    Astronaut Tamara E. Jernigan, STS-67 payload commander, is shown here in the Shuttle Training Facility at JSC participating in a training session. Jernigan is training with the RMS controls in the Crew Compartment Trainer (CCT) of JSC's Shuttle mockup and integration laboratory.

  16. Training Sessions Provide Working Knowledge of National Animal Identification System

    Science.gov (United States)

    Glaze, J. Benton, Jr.; Ahola, Jason K.

    2010-01-01

    One in-service and two train-the-trainer workshops were conducted by University of Idaho Extension faculty, Idaho State Department of Agriculture personnel, and allied industry representatives to increase Extension educators' knowledge and awareness of the National Animal Identification System (NAIS) and related topics. Training sessions included…

  17. STS-9 payload specialists and backup in training session

    Science.gov (United States)

    1983-01-01

    Two Spacelab 1 payload specialists and a backup for that flight prepare for a training session in the JSC mockup and integration laboratory. Fully decked out in the Shuttle constant wear garments (foreground) are Ulf Merbold, left, and Byron K. Licktenberg, prime crewmembers on the STS-9 team. In civilian clothes is payload specialist backup Michael L. Lampton.

  18. STS-46 TCDT Slideware Training and Photo Session

    Science.gov (United States)

    1992-01-01

    The crew of STS-46, Commander Loren J. Shriver, Pilot Andrew M. Allen, Payload Specialist Franco Malerba, Mission Specialists Jeffrey A. Hoffman, Franklin R. Chang-Diaz, Claude Nicollier, and Marsha S. Ivins are seen introducing themselves and discussing the mission during a photo session. The crew then answers questions from the press.

  19. INC93: international nuclear congress. Technical sessions summaries

    Energy Technology Data Exchange (ETDEWEB)

    Boulton, J

    1994-12-31

    The conference dealt mainly with safety, environmental and human aspects of nuclear energy, including waste management. This volume consists of summaries of the technical sessions contained in Volumes 2 and 3. The individual papers have also been abstracted separately for INIS, with the summaries abridged.

  20. Commentary on session II: The politics of migration and trade

    OpenAIRE

    Gary P. Freeman

    2006-01-01

    Summary and discussion of the two papers in this session: "U.S.-Mexican migration cooperation: obstacles and opportunities" by Marc R. Rosenblum; "Political implications of U.S. public attitudes toward immigration on the immigration policymaking process" by Valerie F. Hunt

  1. Summary of Session 4 'Strategy for 2012 (II)'

    Energy Technology Data Exchange (ETDEWEB)

    Bruning, Oliver; Ponce, Laurette [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    The fourth session of the 2012 LHC Performance Workshop included the following presentations: • Beam Energy by Andrzej Siemko; • Optics Options by Massimo Giovannozzi; • Collimation settings and performance by Roderik Bruce; • Performance Reach in the LHC for 2012 by Gianluigi Arduini; • MD plans in 2012 by Ralph Wolfgang Assmann; • Ions in 2012 by John Jowett.

  2. 78 FR 33074 - Army Science Board Summer Study Session

    Science.gov (United States)

    2013-06-03

    ...--This study evaluates what science and technology competencies the Army must maintain and/or develop as... DEPARTMENT OF DEFENSE Department of the Army Army Science Board Summer Study Session AGENCY... the Army announces the following committee meeting: 1. Name of Committee: Army Science Board (ASB). 2...

  3. Evaluating Modeling Sessions Using the Analytic Hierarchy Process

    NARCIS (Netherlands)

    Ssebuggwawo, D.; Hoppenbrouwers, S.J.B.A.; Proper, H.A.; Persson, A.; Stirna, J.

    2008-01-01

    In this paper, which is methodological in nature, we propose to use an established method from the field of Operations Research, the Analytic Hierarchy Process (AHP), in the integrated, stakeholder- oriented evaluation of enterprise modeling sessions: their language, pro- cess, tool (medium), and

  4. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  5. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  6. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  7. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  8. Practical session assessments in human anatomy: Weightings and performance.

    Science.gov (United States)

    McDonald, Aaron C; Chan, Siew-Pang; Schuijers, Johannes A

    2016-07-08

    Assessment weighting within a given module can be a motivating factor for students when deciding on their commitment level and time given to study a specific topic. In this study, an analysis of assessment performances of second year anatomy students was performed over four years to determine if (1) students performed better when a higher weighting was given to a set of practical session assessments and (2) whether an improved performance in the practical session assessments had a carry-over effect on other assessment tasks within that anatomy module and/or other anatomy modules that follow. Results showed that increasing the weighting of practical session assessments improved the average mark in that assessment and also improved the percentage of students passing that assessment. Further, it significantly improved performance in the written end-semester examination within the same module and had a carry-over effect on the anatomy module taught in the next teaching period, as students performed better in subsequent practical session assessments as well as subsequent end-semester examinations. It was concluded that the weighting of assessments had significant influences on a student's performance in that, and subsequent, assessments. It is postulated that practical session assessments, designed to develop deep learning skills in anatomy, improved efficacy in student performance in assessments undertaken in that and subsequent anatomy modules when the weighting of these assessments was greater. These deep learning skills were also transferable to other methods of assessing anatomy. Anat Sci Educ 9: 330-336. © 2015 American Association of Anatomists. © 2015 American Association of Anatomists.

  9. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  10. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  11. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  12. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  13. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  14. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  15. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  16. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  17. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  18. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  19. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  20. SUMMARY OF GENERAL WORKING GROUP A+B+D: CODES BENCHMARKING.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.; SHAPOSHNIKOVA, E.; ZIMMERMANN, F.; HOFMANN, I.

    2006-05-29

    Computer simulation is an indispensable tool in assisting the design, construction, and operation of accelerators. In particular, computer simulation complements analytical theories and experimental observations in understanding beam dynamics in accelerators. The ultimate function of computer simulation is to study mechanisms that limit the performance of frontier accelerators. There are four goals for the benchmarking of computer simulation codes, namely debugging, validation, comparison and verification: (1) Debugging--codes should calculate what they are supposed to calculate; (2) Validation--results generated by the codes should agree with established analytical results for specific cases; (3) Comparison--results from two sets of codes should agree with each other if the models used are the same; and (4) Verification--results from the codes should agree with experimental measurements. This is the summary of the joint session among working groups A, B, and D of the HI32006 Workshop on computer codes benchmarking.

  1. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  2. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  3. Functions of Arabic-English Code-Switching: Sociolinguistic Insights from a Study Abroad Program

    Science.gov (United States)

    Al Masaeed, Khaled

    2013-01-01

    This sociolinguistic study examines the functions and motivations of code-switching, which is used here to mean the use of more than one language in the same conversation. The conversations studied here take place in a very particular context: one-on-one speaking sessions in a study abroad program in Morocco where English is the L1 and Arabic the…

  4. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  5. Network Coding for Wireless Cooperative Networks

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Barros, João

    2014-01-01

    We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets to the recei......We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets...... to the receivers or transmit using unicast sessions at each time slot. We assume that the receivers can share their knowledge with each other by sending RLNC packets using unicast transmissions. We model this problem by using a Markov Decision Process (MDP), where the actions include the source of and type...... of transmission to be used in a given time slot given perfect knowledge of the system state. We study the distribution of actions selected by the MDP in terms of the knowledge at the receivers, the channel erasure probabilities, and the ratio between the cost of broadcast and unicast. This allowed us to learn...

  6. Comparison of Everyday and Every-Fourth-Day Probe Sessions with the Simultaneous Prompting Procedure

    Science.gov (United States)

    Reichow, Brian; Wolery, Mark

    2009-01-01

    Simultaneous prompting is a response-prompting procedure requiring two daily sessions: an instructional session in which a controlling prompt is provided on all trials, and a probe session in which no prompt is provided on any trials. In this study, two schedules of conducting the probe sessions (daily vs. every fourth day) were compared using the…

  7. 77 FR 55860 - Tribal Listening Sessions on Sacred Sites on Federal Lands

    Science.gov (United States)

    2012-09-11

    ... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Tribal Listening Sessions on Sacred Sites on... conduct a listening session with Indian tribes to obtain oral and written comments concerning sacred sites located on Federal lands. This session in Tulsa, Oklahoma, is the sixth in a series of listening sessions...

  8. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  9. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  10. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  11. Adaptations to short, frequent sessions of endurance and strength training are similar to longer, less frequent exercise sessions when the total volume is the same

    DEFF Research Database (Denmark)

    Kilen, Anders; Hjelvang, Line B; Dall, Niels

    2015-01-01

    ]: n = 21) performed nine 15-minute training sessions weekly, whereas a second group ("classical training" [CL]: n = 8) completed exactly the same training on a weekly basis but as three 45-minute sessions. For each group, each session comprised exclusively strength, high-intensity cardiovascular...

  12. Comparative analysis of a client's verbal responses in counseling sessions: quantitative case study.

    Science.gov (United States)

    Lee, Han-Jong

    2011-04-01

    This study investigated how the in-session change in a client's verbal behavior might influence the effectiveness of counseling sessions. 10 sessions of counseling with a male undergraduate suffering from depressive mood were conducted by a humanistically oriented counselor. The two most effective and the two least effective sessions were identified according to the client's evaluation of the effectiveness of counseling sessions. Results indicated that over the three segments of the most effective sessions, the client gradually increased responses that indicated exploration of his own emotions, thoughts, and behaviors. By contrast, the client continued talking mainly about past events in a storytelling manner throughout the least effective sessions.

  13. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  14. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  15. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    Gabriel, T.A.

    1985-09-01

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  16. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  17. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  18. WWER reactor physics code applications

    International Nuclear Information System (INIS)

    Gado, J.; Kereszturi, A.; Gacs, A.; Telbisz, M.

    1994-01-01

    The coupled steady-state reactor physics and thermohydraulic code system KARATE has been developed and applied for WWER-1000 and WWER-440 operational calculations. The 3 D coupled kinetic code KIKO3D has been developed and validated for WWER-440 accident analysis applications. The coupled kinetic code SMARTA developed by VTT Helsinki has been applied for WWER-440 accident analysis. The paper gives a summary of the experience in code development and application. (authors). 10 refs., 2 tabs., 5 figs

  19. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  20. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  1. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  2. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially-available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  3. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  4. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  5. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  6. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  7. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  8. SPRAY code user's report

    International Nuclear Information System (INIS)

    Shire, P.R.

    1977-03-01

    The SPRAY computer code has been developed to model the effects of postulated sodium spray release from LMFBR piping within containment chambers. The calculation method utilizes gas convection, heat transfer and droplet combustion theory to calculate the pressure and temperature effects within the enclosure. The applicable range is 0-21 mol percent oxygen and .02-.30 inch droplets with or without humidity. Droplet motion and large sodium surface area combine to produce rapid heat release and pressure rise within the enclosed volume

  9. The FLIC conversion codes

    Energy Technology Data Exchange (ETDEWEB)

    Basher, J C [General Reactor Physics Division, Atomic Energy Establishment, Winfrith, Dorchester, Dorset (United Kingdom)

    1965-05-15

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  10. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  11. Session: Avoiding, minimizing, and mitigating avian and bat impacts

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Kerlinger, Paul

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question answer period. The session addressed a variety of questions related to avoiding, minimizing, and mitigating the avian and bat impacts of wind power development including: what has been learned from operating turbines and mitigating impacts where they are unavoidable, such as at Altamont Pass WRA, and should there be mitigation measures such as habitat creation or land conservation where impacts occur. Other impact minimization and mitigation approaches discussed included: location and siting evaluations; options for construction and operation of wind facilities; turbine lighting; and the physical alignment/orientation. Titles and authors of the presentations were: 'Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part II' by Carl Thelander and 'Prevention and Mitigation of Avian Impacts at Wind Power Facilities' by Paul Kerlinger.

  12. Summary of discussions at the ''HIGH pT'' session

    International Nuclear Information System (INIS)

    Tannenbaum, M.J.

    1990-12-01

    A summary of the discussion at the HIGH p T session is presented. There was a clear consensus at this session that Jets and Jet Phenomena in Relativistic Heavy Ion collisions would best be studied using leading particles, in the same way that these phenomena were originally mapped out in p-p collisions. The new topic of ''Jet Quenching in Nuclei'' was extensively discussed. It was clear that this proposed phenomenon could also be studied by measuring fragmentation functions in Deeply Inelastic Lepton-Nucleus Scattering; but there was controversy over whether the effect should be seen in proton-Nucleus reactions. Other hard-scattering phenomena, including ''Mini-jets,'' single particle inclusive production, the ''Cronin Effect,'' and direct photon production, are mentioned. 26 refs., 3 figs

  13. Reporting session of UWTF operation. Compilation of documents

    International Nuclear Information System (INIS)

    Shimizu, Kaoru; Togashi, Akio; Irinouchi, Shigenori

    1999-07-01

    This is the compilation of the papers and OHP transparencies presented, as well as discussions and comments, on the occasion of UWTF reporting session. UWTF stands for The Second Uranium Waste Treatment Facility, which was constructed for compression of metallic wastes and used filters, which are parts of uranium bearing solid wastes generated from Tokai Works, Japan Nuclear Cycle Development Institute. UWTF has been processing wastes since June 4 1998. In the session, based on the one year experience of UWTF operation, the difficulties met and the suggestions to the waste sources are mainly discussed. A brief summary of the UWTF construction, description of waste treatment process, and operation report of fiscal year 1998 are attached. (A. Yamamoto)

  14. Construction of group exercise sessions in geriatric inpatient rehabilitation.

    Science.gov (United States)

    Wallin, Marjo; Talvitie, Ulla; Cattan, Mima; Karppi, Sirkka-Liisa

    2008-01-01

    There is little knowledge about the ways geriatric physiotherapy is being carried out in practice and about the situational construction of formal policies for promoting physical activity. This article examines how professional physiotherapists and frail community-dwelling older adults as their clients use talk and action to construct a group exercise session in an inpatient rehabilitation setting in Finland. The analysis of 7 group exercise sessions with a total of 52 clients and 9 professional physiotherapists revealed 3 different practitioner approaches, which served different functions in older adults' empowerment and lifestyle activity change. The highly structured approach favored taciturn physical performances completed independently and successfully by frail older adults. The guided exercise approach with individualized guidance encouraged occasional coconstruction of shared understanding of learning the exercises. The circuit training approach facilitated occasional self-regulation by the clients. The results of this study indicate that a combination of different approaches is required to address the multifaceted needs of heterogeneous frail older adults.

  15. Type systems for distributed programs components and sessions

    CERN Document Server

    Dardha, Ornela

    2016-01-01

    In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. In particular, static analysis techniques based on types and type systems are an adequate methodology considering their success in guaranteeing not only basic safety properties, but also more sophisticated ones like deadlock or lock freedom in concurrent settings. The main contributions of this book are twofold. i) We design a type system for a concurrent object-oriented calculus to statically ensure consistency of dynamic reconfigurations. ii) We define an encoding of the session pi-calculus, which models communication in distributed systems, into the standard typed pi-calculus. We use this encoding to derive properties like type safety and progress in the session pi-calculus by exploiting the corresponding properties in the standard typed pi-calculus.

  16. 1979 New Mexico legislative session: energy issues and legislation

    International Nuclear Information System (INIS)

    Barsumian, L.; Vandevender, S.G.

    1979-10-01

    This report is an account of the energy legislation and associated issues considered during the 1979 session of the 34th New Mexico Legislature. The session's major issue was the federal study of a proposed nuclear Waste Isolation Pilot Plant (WIPP) in New Mexico. A large proportion of time and effort was spent on resolving the state's formal position toward the federal project. However, other energy concerns were also significant even though they were neither as controversial nor as visible as the primary issue. The two most important laws enacted were the Radioactive Waste Consultation Act and the Radioactive Waste Transportation Act. The Legislature considered 47 other energy-related bills, of which 17 were enacted

  17. Session: Avoiding, minimizing, and mitigating avian and bat impacts

    International Nuclear Information System (INIS)

    Thelander, Carl; Kerlinger, Paul

    2004-01-01

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question answer period. The session addressed a variety of questions related to avoiding, minimizing, and mitigating the avian and bat impacts of wind power development including: what has been learned from operating turbines and mitigating impacts where they are unavoidable, such as at Altamont Pass WRA, and should there be mitigation measures such as habitat creation or land conservation where impacts occur. Other impact minimization and mitigation approaches discussed included: location and siting evaluations; options for construction and operation of wind facilities; turbine lighting; and the physical alignment/orientation. Titles and authors of the presentations were: 'Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part II' by Carl Thelander and 'Prevention and Mitigation of Avian Impacts at Wind Power Facilities' by Paul Kerlinger

  18. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  19. Resources for Education and Outreach Activities discussion session

    CERN Document Server

    Barney, David; The ATLAS collaboration; Bourdarios, Claire; Kobel, Michael; Kourkoumelis, Christine; Melo, Ivan; Rangel-Smith, Camila; Alexopoulos, Angelos

    2015-01-01

    Over the past few years a variety of resources have been developed, by individuals and groups, to support Education & Outreach activities in particle physics. Following short (five-minute) presentations by six speakers, a discussion session allowed the audience to go further in depth in activities they found particularly interesting. This paper presents brief overviews from each of the six speakers, followed by a summary of the ensuing discussion

  20. Panel session: Disposal of HLW - ready for implementation

    International Nuclear Information System (INIS)

    Heremans, R.; Come, B.; Barbreau, A.; Girardi, F.

    1986-01-01

    The paper is a report of a panel session at the European Community conference on radioactive waste management and disposal, Luxembourg 1985, concerning the safe and long-term disposal of high-activity and long-lived waste. The subjects discussed include: geological barriers including deep sea-bed sediments, engineered barriers, technological problems (repository construction, waste emplacement, backfilling and sealing), safety analysis, performance assessment of disposal system components, and finally institutional, legal and financial aspects of geological disposal. (U.K.)

  1. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  2. STS 51-L crewmembers briefed during training session

    Science.gov (United States)

    1986-01-01

    Five members of the STS 51-L crew and a backup crewmember are briefed during a training session in JSC's Shuttle mockup and integration laboratory. From left to right are Astronauts Ellison S. Onizuka, mission specialist; Ronald E. McNair, mission specialist; Gregory Jarvis, Hughes payload specialist; Judith A. Resnik, mission specialist; Sharon Christa McAuliffe, citizen observer/payload specialist representing the Teacher in Space project. Barbara R. Morgan, backup to McAuliffe, is in the right foreground.

  3. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist.  

  4. Proceedings of the Fourth Session of Radioprotection of the patient

    International Nuclear Information System (INIS)

    2009-01-01

    The Radiology Argentine Society and the Radioprotection Argentine Society have organized the 4. Session of the Protection to the Patient, in order to inform to the technical and scientific community about the scopes of the radioprotection to the patient. The principal treated topics were the following: effects of the radiation in radiodiagnostic; radioprotection of the fetus and the pregnancy woman; radioprotection in dental radiology; radiological protection in TAC; radiation doses in radiodiagnostic; treatment of radiation injuries; fatal accidents in radiotherapy. [es

  5. Address at the opening session of the Niels Bohr Symposium

    International Nuclear Information System (INIS)

    Mayor, F.

    1998-01-01

    In his address at the opening session of the Niels Bohr Symposium organized jointly by UNESCO and the Niels Bohr Institute in Copenhagen in May 1998 in order to examine the latest developments in key fields of physics, the Director General of UNESCO presented the scientific work and the spirit of Niels Bohr, emphasizing the impact of his discoveries for new openings in science and in society in general

  6. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  7. Direct-semidirect (DSD) codes

    International Nuclear Information System (INIS)

    Cvelbar, F.

    1999-01-01

    Recent codes for direct-semidirect (DSD) model calculations in the form of answers to a detailed questionnaire are reviewed. These codes include those embodying the classical DSD approach covering only the transitions to the bound states (RAF, HIKARI, and those of the Bologna group), as well as the code CUPIDO++ that also treats transitions to unbound states. (author)

  8. Dual Coding, Reasoning and Fallacies.

    Science.gov (United States)

    Hample, Dale

    1982-01-01

    Develops the theory that a fallacy is not a comparison of a rhetorical text to a set of definitions but a comparison of one person's cognition with another's. Reviews Paivio's dual coding theory, relates nonverbal coding to reasoning processes, and generates a limited fallacy theory based on dual coding theory. (PD)

  9. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  10. Lattice polytopes in coding theory

    Directory of Open Access Journals (Sweden)

    Ivan Soprunov

    2015-05-01

    Full Text Available In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized toric codes for special lattice point configurations.

  11. Computer codes for safety analysis

    International Nuclear Information System (INIS)

    Holland, D.F.

    1986-11-01

    Computer codes for fusion safety analysis have been under development in the United States for about a decade. This paper will discuss five codes that are currently under development by the Fusion Safety Program. The purpose and capability of each code will be presented, a sample given, followed by a discussion of the present status and future development plans

  12. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  13. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  14. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  15. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  16. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  17. Converter of a continuous code into the Grey code

    International Nuclear Information System (INIS)

    Gonchar, A.I.; TrUbnikov, V.R.

    1979-01-01

    Described is a converter of a continuous code into the Grey code used in a 12-charged precision amplitude-to-digital converter to decrease the digital component of spectrometer differential nonlinearity to +0.7% in the 98% range of the measured band. To construct the converter of a continuous code corresponding to the input signal amplitude into the Grey code used is the regularity in recycling of units and zeroes in each discharge of the Grey code in the case of a continuous change of the number of pulses of a continuous code. The converter is constructed on the elements of 155 series, the frequency of continuous code pulse passing at the converter input is 25 MHz

  18. Al Gore attends Fall Meeting session on Earth observing satellite

    Science.gov (United States)

    Richman, Barbara T.

    2011-12-01

    Former U.S. vice president Al Gore, making unscheduled remarks at an AGU Fall Meeting session, said, "The reason you see so many pictures" of the Deep Space Climate Observatory (DSCOVR) satellite at this session is "that it already has been built." However, "because one of its primary missions was to help document global warming, it was canceled. So for those who are interested in struggling against political influence," Gore said, "the benefits have been documented well here." Gore made his comments after the third oral presentation at the 8 December session entitled "Earth Observations From the L1 (Lagrangian Point No. 1)," which focused on the capabilities of and progress on refurbishing DSCOVR. The satellite, formerly called Triana, had been proposed by Gore in 1998 to collect climate data. Although Triana was built, it was never launched: Congress mandated that before the satellite could be sent into space the National Academies of Science needed to confirm that the science it would be doing was worthwhile. By the time the scientific validation was complete, the satellite "was no longer compatible with the space shuttle manifest," Robert C. Smith, program manager for strategic integration at the NASA Goddard Space Flight Center, told Eos.

  19. Summary of the most significant results reported in this session

    CERN Document Server

    Van De Walle, R T

    1980-01-01

    In the following a summary is presented of five parallel sessions on light quark had- ron spectroscopy. In general all topics which were discussed in the plenary sessions, and for which the proceedings contain separate (invited) papers, will be left out; only occa- sionally (and for reasons of completeness) will we make a reference to these presentations. Several other restrictions can be made. Nearly all papers submitted to the (parallel) hadron spectroscopy sessions were experimenta1 1 ), the only exceptions being a series of four theoretical papers on the baryonium problem. Furthermore, there was virtually no new information concerning the 'classical' baryons. In particular, no new facts were submitted on the problem of the possible existence of baryon states outside the so-called minimal spectrum, i.e. outside {56,L+ } and {70,L-dd}, the existence of the {ZO}'s, and the exis- even o tence of (baryon) exotic states. There was one contribution on a 'possible' new:".* 2 ), and a report on the final measureme...

  20. Effects of an Intensive Resistant Training Sessions and Green Tea

    Directory of Open Access Journals (Sweden)

    Mohammad Esmaeil Afzalpour

    2014-03-01

    Full Text Available Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity women were randomly divided into 4 equal (n=10 groups including green tea supplementation, green tea supplementation plus resistance training, resistance training, and control groups. After supplementation period (600 mg/day, 14 days, resistance training and green tea supplementation plus resistance training groups performed an intensive resistance training session at 75-85 % of one repetition maximum. The malondialdehyde and total thiol were measured as oxidative stress indices. Data were analyzed by using of repeated measure ANOVA and LSD tests at p<0.056T. Results: Results showed that after 14 days of green tea consumption, malondialdehyde significantly decreased in green tea supplementation (p=0.03 and green tea supplementation plus resistance training (p=0.01 groups, while total thiol increased significantly (p=0.01 in two green tea supplementation groups. However, an intensive resistance training session increased malondialdehyde (p=0.01 without any significantly changes in total thiol (p=0.426T. Conclusion: It seems that green tea supplementation can inhibit exercise-induced protein and lipid oxidation in non-athletes women via enhancement of antioxidant defense system of the body6T.6T

  1. Analysis and comparison of intensity in specific soccer training sessions

    Directory of Open Access Journals (Sweden)

    Luciano Antonacci Condessa

    2015-03-01

    Full Text Available This study compared the exercise intensity of four specific soccer training sessions (friendly and training match, tactical and technical workouts. Ten professional soccer players (24.2 ± 3.7 years, 177.9 ± 7.3 cm, 63.2 ± 4.6 mLO2•kg-1•min-l were recruited. A treadmill progressive interval test was performed to determine the players' VO2max, maximal heart rate (HRmax, HR-VO2 curve, and the heart rate corresponding to blood lactate concentrations of 2 and 4 mmol/L. The heart rate during the training sessions was used to estimate the exercise intensity and to classify them into intensity zones (low-intensity: 4 mmol/L. Exercise intensities were different among training sessions (friendly match: 86.0 ± 5.1% HRmax; training match: 81.2 ± 4.1% HRmax; tactical workout: 70.4 ± 5.3% HRmax; technical workout: 62.1 ± 3.6% HRmax. The friendly match presented the highest percentage of time performed in the high-intensity zone.

  2. Premenstrual mood and empathy after a single light therapy session.

    Science.gov (United States)

    Aan Het Rot, Marije; Miloserdov, Kristina; Buijze, Anna L F; Meesters, Ybe; Gordijn, Marijke C M

    2017-10-01

    To examine whether acute changes in cognitive empathy might mediate the impact of light therapy on mood, we assessed the effects of a single light-therapy session on mood and cognitive empathy in 48 premenstrual women, including 17 who met Premenstrual Symptoms Screening Tool criteria for moderate-to-severe premenstrual syndrome / premenstrual dysphoric disorder (PMS/PMDD). Using a participant-blind between-groups design, 23 women underwent 30min of morning light therapy (5,000lx; blue-enriched polychromatic light, 17,000K) while 25 women had a sham session (200lx, polychromatic light, 5,000K). We administered the Positive Affect and Negative Affect Schedule and the Affect Grid right before and after the intervention, and 60min later upon completion of a computerized empathic accuracy task. There were no significant effects of light condition on cognitive empathy as assessed using the computer task. Nonetheless, bright light reduced negative affect, specifically in women not using hormonal contraceptives. No effects of bright light on mood were observed in women who were using contraceptives. If a single light-therapy session does not alter cognitive empathy, then cognitive empathy may not mediate the impact of light therapy on mood in premenstrual women. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Fungal Nomenclature at IMC10: Report of the Nomenclature Sessions.

    Science.gov (United States)

    Redhead, Scott A; Demoulin, Vincent; Hawksworth, David L; Seifert, Keith A; Turland, Nicholas J

    2014-12-01

    Three Nomenclature Sessions were convened during the 10(th) International Mycological Congress (IMC10) in Bangkok on 3-8 August 2014. In addition a Questionnaire was given to all delegates. This Report reviews and summarizes the views expressed in the Sessions and in the responses to the Questionnaire. The issues covered related to aspects of: registration, protected names, forgotten names, pleomorphic fungi, lichenized fungi, typification, diagnoses, and governance. In addition, reports were received from working groups preparing lists of names to be proposed for protection, and controversial cases of competing names were discussed. The Congress was mandated to ratify decisions of the Nomenclature Committee for Fungi (NCF) on the appointment of repositories for the registration of new fungal names. After discussion in the Sessions on the decision of the NCF to appoint three such bodies, a Resolution to that effect was approved by the Congress. The Congress also adopted a Resolution asking that the opinions of mycologists on future directions for the nomenclature of fungi be taken into account in formulating changes in the rules for consideration at the International Botanical Congress in 2017.

  4. Within-session spacing improves delayed recall in children.

    Science.gov (United States)

    Zigterman, Jessica R; Simone, Patricia M; Bell, Matthew C

    2015-01-01

    Multiple retrievals of a memory over a spaced manner improve long-term memory performance in infants, children, younger and older adults; however, few studies have examined spacing effects with young school-age children. To expand the understanding of the spacing benefit in children, the current study presented weakly associated English word-pairs to children aged 7-11 and cued their recall two times immediately (massed), after a delay of 5 or 10 items (spaced) or not at all (control). After this encoding session with or without two retrievals, participants were tested two times for memory of all word-pairs: immediately and 30 minutes after the encoding session. Multiple retrievals significantly improved memory on the tests. However, words repeated in a spaced design were remembered at higher rates than those that were massed, while gap size between repetitions (5 or 10) did not differentially impact performance. The data show that a within-session spacing strategy can benefit children's ability to remember word-pairs after 30 minutes. Thus, asking students to recall what they have learned within a lesson is a technique that can be used in a classroom to improve long-term recall.

  5. The Physics session at the ATLAS overview week

    CERN Multimedia

    Takai, H.

    The Physics session at the ATLAS overview week at Clermont-Ferrand will be certainly remembered by the presentation of Blaise Pascal's historical experiment repeat. And why not? He is the local hero and by the looks of his primitive measurements it does take a lot of guts to explain his results on the basis of air columns. He was also lucky that he did not have to simulate his results on modern day computers but used the Pascaline. Certainly a man ahead of his time. Of course that wasn't all. Surrounded by a chain of (luckily) extinct volcanoes, rolling hills, and superb views, Clermont-Ferrand provided the perfect backdrop for the physics discussions. It was once more seen that the physics of ATLAS is diverse and that it is healthy and doing well. Many people contributed to the success of the session. Fabiola started the session precisely at 14:00 with a summary of the most recent activities from the physics coordination. Somehow what got stuck in my mind was the very positive statistics on how many prese...

  6. Evolution of perceived footwear comfort over a prolonged running session.

    Science.gov (United States)

    Hintzy, F; Cavagna, J; Horvais, N

    2015-12-01

    The purpose of this study was to investigate the subjective perception of overall footwear comfort over a prolonged running session. Ten runners performed two similar sessions consisting of a 13-km trail run (5 laps of 2.6 km) as fast as possible. The overall footwear comfort was evaluated before running and at the end of each lap with a 150-mm visual analogic scale, as well as speed, heart rate and rate of perceived exertion. The results showed that both overall footwear comfort and speed decreased consistently during the run session, and significantly after 44 min of running (i.e. the 3rd lap). It could be hypothesized that the deterioration of overall footwear comfort was explained by mechanical and energetical parameter changes with time and/or fatigue occurring at the whole body, foot and footwear levels. These results justify the use of a prolonged running test for running footwear comfort evaluation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. New Session of introductory “E-Groups Training”

    CERN Multimedia

    2013-01-01

    The session provides a short introduction of E-Groups and how to use it to efficiently manage mailing lists at CERN. Alongside a general overview of the E-Groups application, E-Groups specific terminology, the management of dynamic and static groups and the specific settings for mails and archives are discussed in detail.   The course is intended to give newcomers a clear idea of what E-Groups are and how they can be used at CERN. It should enable users to be more efficient when being confronted in particular with: the creation of dynamic and static E-groups and the decision whether the one or the other type is more appropriate, the management of E-group memberships, and the setting of mailing/archiving related properties. The session will also focus on some best practices and give general advice on how to use E-Groups. This introductory training session is given jointly by members of the IT-OIS and GS-AIS groups and is intended for any member at CERN potentially being confronted with the ...

  8. Group versus individual sessions delivered by a physiotherapist for female urinary incontinence: an interview study with women attending group sessions nested within a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Smith Jan

    2009-09-01

    Full Text Available Abstract Background The aim was to explore the concerns and expectations of women invited to attend group physiotherapy sessions for the management of female urinary incontinence and whether the experience changed their views; and to gather recommendations from women attending group sessions on the design and delivery of these sessions Methods An interview study nested within a randomised controlled trial in five British NHS physiotherapy departments, including 22 women who had expressed a preference for an individual physiotherapy session but were randomised to, and attended, group sessions. Results Embarrassment was woven throughout women's accounts of experiencing urinary incontinence and seeking health care. Uncertainty about the nature of group sessions was a source of concern. Attending the first session was seen as a big hurdle by many women. However, a sense of relief was common once the session started, with most women describing some benefit from attendance. Recommendations for design and delivery of the sessions from women focused on reducing embarrassment and uncertainty prior to attendance. Conclusion Taking account of women's embarrassment and providing detailed information about the content of group sessions will enable women to benefit from group physiotherapy sessions for the management of female urinary incontinence. Trial Registration Trial registration number: ISRCTN 16772662

  9. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  10. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  11. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  12. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  13. Verbal expressions used by anaclitic and introjective patients with depressive symptomatology: Analysis of change and stuck episodes within therapeutic sessions

    Directory of Open Access Journals (Sweden)

    Nelson Valdés

    2015-01-01

    Full Text Available A person’s speech makes it possible to identify significant indicators which reflect certain characteristics of his/her personality organization, but also can vary depending on the relevance of specific moments of the session and the symptoms type. The present study analyzed 10 completed and successful therapeutic processes using a mixed methodology. The therapies were video–and audio-taped, as well as observed through a one-way mirror by trained observers. All the sessions of each therapy were considered (N = 230 in order to identify, delimit, transcribe, and analyze Change Episodes (CEs = 24 and Stuck Episodes (SEs = 26. Each episode was made up by patients’ speech segments (N = 1,282, which were considered as the sampling unit. The Therapeutic Activity Coding System (TACS-1.0 was used to manually code each patient’s verbalizations, nested within episodes and individuals, in order to analyze them using Hierarchical Linear Modelling (HLM. The findings suggest that anaclitic patients tend to use more verbalizations in order to ask for feedback or to be understood by their therapists (attune, whereas introjective patients tend to use more verbalizations in order to construct new meanings (resignify during therapeutic conversation, but especially during SEs. Clinical implications to enrich the therapeutic practice are discussed.

  14. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2010-04-16

    ... documents from ICC's Chicago District Office: International Code Council, 4051 W Flossmoor Road, Country... Energy Conservation Code. International Existing Building Code. International Fire Code. International...

  15. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm.......For any nonzero elementcof a general finite fieldGF(q), it is shown that the polynomials(x - c)^i, i = 0,1,2,cdots, have the "weight-retaining" property that any linear combination of these polynomials with coefficients inGF(q)has Hamming weight at least as great as that of the minimum degree...

  16. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  17. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  18. A comparison of pre-dropout and temporary rupture sessions in psychotherapy.

    Science.gov (United States)

    Gülüm, I Volkan; Soygüt, Gonca; Safran, Jeremy D

    2016-11-15

    Although numerous studies have investigated the relationship between the therapeutic alliance and dropout, most have focused on the relationship between alliance quality and psychotherapy outcomes. To compare sessions with therapeutic alliance ruptures and two sessions prior to treatment dropout (pre-dropout) in terms of rupture subtypes, psychotherapists' behavior, attitudes, and session content. We implemented quantitative methods to select the sessions and qualitative methods to analyze them. We analyzed 16 temporary rupture sessions from 12 therapist-patient dyads and 16 pre-dropout sessions from 8 different therapist-patient dyads. The sessions originate from clinical psychology Master's or Doctoral students under supervision in either cognitive behavioral or schema therapy. Pre-dropout sessions were considered unrepaired rupture sessions while rupture sessions were subsequently repaired. Results revealed apparent differences and similarities between the session types in positive and negative psychotherapist behaviors, content intensity, and the type and frequency of ruptures. We explored three new rupture subtypes: attributing positive developments to other sources, indirect speech, and sarcastic hostility. A striking implication is that the frequency of positive and negative psychotherapist behaviors, ruptures, and session content is more likely to decrease in the pre-dropout sessions than in the temporary rupture sessions.

  19. Modular Modeling System (MMS) code: a versatile power plant analysis package

    International Nuclear Information System (INIS)

    Divakaruni, S.M.; Wong, F.K.L.

    1987-01-01

    The basic version of the Modular Modeling System (MMS-01), a power plant systems analysis computer code jointly developed by the Nuclear Power and the Coal Combustion Systems Divisions of the Electric Power Research Institute (EPRI), has been released to the utility power industry in April 1983 at a code release workshop held in Charlotte, North Carolina. Since then, additional modules have been developed to analyze the Pressurized Water Reactors (PWRs) and the Boiling Water Reactors (BWRs) when the safety systems are activated. Also, a selected number of modules in the MMS-01 library have been modified to allow the code users more flexibility in constructing plant specific systems for analysis. These new PWR and BWR modules constitute the new MMS library, and it includes the modifications to the MMS-01 library. A year and half long extensive code qualification program of this new version of the MMS code at EPRI and the contractor sites, back by further code testing in an user group environment is culminating in the MMS-02 code release announcement seminar. At this seminar, the results of user group efforts and the code qualification program will be presented in a series of technical sessions. A total of forty-nine papers will be presented to describe the new code features and the code qualification efforts. For the sake of completion, an overview of the code is presented to include the history of the code development, description of the MMS code and its structure, utility engineers involvement in MMS-01 and MMS-02 validations, the enhancements made in the last 18 months to the code, and finally the perspective on the code future in the fossil and nuclear industry

  20. Computer codes in nuclear safety, radiation transport and dosimetry

    International Nuclear Information System (INIS)

    Bordy, J.M.; Kodeli, I.; Menard, St.; Bouchet, J.L.; Renard, F.; Martin, E.; Blazy, L.; Voros, S.; Bochud, F.; Laedermann, J.P.; Beaugelin, K.; Makovicka, L.; Quiot, A.; Vermeersch, F.; Roche, H.; Perrin, M.C.; Laye, F.; Bardies, M.; Struelens, L.; Vanhavere, F.; Gschwind, R.; Fernandez, F.; Quesne, B.; Fritsch, P.; Lamart, St.; Crovisier, Ph.; Leservot, A.; Antoni, R.; Huet, Ch.; Thiam, Ch.; Donadille, L.; Monfort, M.; Diop, Ch.; Ricard, M.

    2006-01-01

    The purpose of this conference was to describe the present state of computer codes dedicated to radiation transport or radiation source assessment or dosimetry. The presentations have been parted into 2 sessions: 1) methodology and 2) uses in industrial or medical or research domains. It appears that 2 different calculation strategies are prevailing, both are based on preliminary Monte-Carlo calculations with data storage. First, quick simulations made from a database of particle histories built though a previous Monte-Carlo simulation and secondly, a neuronal approach involving a learning platform generated through a previous Monte-Carlo simulation. This document gathers the slides of the presentations