WorldWideScience

Sample records for asms2004 session code

  1. 06301 Working Session Summary: Presentation and Visualization of Redundant Code

    OpenAIRE

    Walenstein, Andrew; Cordy, James R.; Evans, William S.; Hassan, Ahmed; Kamiya, Toshihiro; Kapser, Cory; Merlo, Ettore

    2007-01-01

    This report summarizes the proceedings of a workshop discussion session presentation and visualization of aspects relating to duplicated, copied, or cloned code. The main outcomes of the working session were: (a) a realization that two researchers had independently generated very similar methods for browsing and visualization clone "clusters," and (b) a list of questions for visualization, particularly in relation to how the "proximity" of clones may relate to interest in t...

  2. On Detecting Pollution Attacks in Inter-Session Network Coding

    CERN Document Server

    Le, Anh

    2011-01-01

    Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this work, we precisely define corrupted packets in inter-session pollution based on the commitment of the source packets. We then propose three detection schemes: one hash-based and two MAC-based schemes: InterMacCPK and SpaceMacPM. InterMacCPK is the first multi-source homomorphic MAC scheme that supports multiple keys. Both MAC schemes can replace traditional MACs, e.g., HMAC, in networks that employ inter-session coding. All three schemes provide in-network detection, are collusion-resistant, and have very low online bandwidth and computation overhead.

  3. An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game

    Directory of Open Access Journals (Sweden)

    Zhuoqun Xia

    2012-02-01

    Full Text Available There are some selfish nodes in wireless mesh networks multi-path inter-session network coding; and all selfish nodes maximize their earnings through the game. In this paper, a stimulus scheme is proposed which is suit for selfish nodes game in a multi-path inter-session network coding game. In the multi-path transmission, we use the watch dog checks the existence of selfish nodes. After selfish nodes are detected, we modified the multi-path protocols. For multi-path selfish nodes, we adopt non-cooperation method to punish it; and that the priority forwarding is used to active cooperation nodes. It is proved that Nash equilibrium is acquired for all players to obey the incentive scheme honestly. Experiments verify the theoretical analysis.

  4. Code-switching across brainstorming sessions: implications for the revised hierarchical model of bilingual language processing.

    Science.gov (United States)

    Blot, Kevin J; Zárate, Michael A; Paulus, Paul B

    2003-01-01

    The revised hierarchical model (RHM) of bilingual language processing posits independent word form representations for the dominant language (L1) and the nondominant language (L2), facilitated translation from L2 words to L1 words, access to common concepts for L1 and L2, and stronger activation of concepts for L1 than for L2. Spanish-English and English-Spanish bilinguals brainstormed for two sessions; half switched languages (L1-L2 or L2-L1) and half stayed in the same language (L1-L1 or L2-L2) across sessions. In both sessions, L1 brainstorming resulted in more efficient idea productivity than L2 brainstorming, supporting stronger concept activation for L1, consistent with the RHM. Switching languages from L2 to L1 resulted in the most efficient idea productivity in Session 2, suggesting that switching to L1 not only permits strong concept activation, but also the activation of concepts that are relatively different than those activated by L2, inconsistent with the RHM. Switching languages increased the proportion of Session 1 ideas repeated during Session 2, despite instructions not to repeat. This finding suggests that there is activation of concepts as well as word forms in same language brainstorming and that this dual activation aids in following instructions not to repeat, consistent with the RHM. It is suggested that the RHM be re-specified to accommodate the notion that L1 and L2 access relatively different concepts.

  5. Energy and Data Throughput for Asymmetric Inter-Session Network Coding

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Heide, Janus; Pahlevani, Peyman

    2012-01-01

    on commercial platforms. The outcome of this paper confirms the analytical expression, and the results shows that even with a large asymmetric data rate there is a gain in terms of energy consumption and throughput when network coding is applied in compare to the case when network coding is not applied....

  6. Energy and Data Throughput for Asymmetric Inter-Session Network Coding

    OpenAIRE

    Paramanathan, Achuthan; Heide, Janus; Pahlevani, Peyman; Hundebøll, Martin; Rein, Stephan Alexander; Fitzek, Frank; Ertli, Gergő

    2012-01-01

    In this paper we investigate the impact of asymmetric traffic patterns on the energy consumption and throughput in a wireless multi hop network. Network coding is a novel technique for communication systems and a viable solution for wireless multi hop networks. State-of-the-art research is mainly focusing on ideal scenarios with symmetric traffic patterns that are not realistic in a real life scenario. The main contribution of this paper is the investigation of the asymmetric traffic patterns...

  7. Coding into the Great Unknown: Analyzing Instant Messaging Session Transcripts to Identify User Behaviors and Measure Quality of Service

    Science.gov (United States)

    Maximiek, Sarah; Rushton, Erin; Brown, Elizabeth

    2010-01-01

    After one year of providing virtual reference service through an instant messaging (IM) service, Binghamton University (BU) Libraries, under the purview of its Digital Reference Committee (DRC), undertook a study of collected session transcripts. The goals of this work were to determine who was using the IM service and why; if staffing for the…

  8. Panel Session

    DEFF Research Database (Denmark)

    Bertelsen, Olav Wedege

    2004-01-01

    In this panel session, four researchers will discuss the role of a theoretical foundation, in particular AT, in the design of information technology based artefacts. The general discussion will take of from a specific examination of the ActAD approach.......In this panel session, four researchers will discuss the role of a theoretical foundation, in particular AT, in the design of information technology based artefacts. The general discussion will take of from a specific examination of the ActAD approach....

  9. Panel Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Mid-Year Meeting, 1992

    1992-01-01

    Lists the speakers and summarizes the issues addressed for 12 panel sessions on topics related to networking, including libraries and national networks, federal national resources and energy programs, multimedia issues, telecommuting, remote image serving, accessing the Internet, library automation, scientific information, applications of Z39.50,…

  10. Session 2

    Science.gov (United States)

    2014-01-01

    identified tryptic peptides due to the high acetonitrile concentration in the HILIC mobile phase. Since HILIC mode LC-MS shows orthogonal selectivity to RPLC mode LC-MS, it is useful as a complementary tool to increase proteome coverage in proteomics studies. 4.2 NeuCode Mouse and One Hour Proteomes Alexander S. Hebert1, Anna E. Merrill1, Alicia L. Richards1, Matthew E. MacGilvray1, Nicholas W. Kwiecien1, Christopher M. Rose1, Derek J. Bailey1, Joel C. Bradley2, William W. Wood2, Marwan ElMasri2, Michael S. Westphall1, Audrey P. Gasch1, Joshua J. Coon1 1University of Wisconsin-Madison, Madison, WI, USA; 2Cambridge Isotope Laboratories, Andover, MA, USA Modern biological and medicinal researchers increasingly rely on large-scale technologies for the comparative analysis of proteomes. To satisfy this growing demand, maturing proteomic methods must achieve high-throughput, quantitative analyses of near-complete proteomes. Here we describe two efforts in this vein. The first is the identification of ∼4,000 yeast proteins, a comprehensive yeast proteome, from just over an hour of analysis time. We achieved this expedited proteome characterization through improved sample preparation, chromatographic separations, and by using a new Orbitrap hybrid mass spectrometer equipped with a mass filter, a collision cell, a high-field Orbitrap analyzer, and, finally, a dual cell linear ion trap analyzer (Q-OT-qIT, Orbitrap Fusion). The second is a quantitative approach that blends the accuracy of SILAC with the impressive throughput of isobaric tagging methods. The strategy – neutron encoding (NeuCode) – relies on the mass defect of atoms and their isotopes and harnesses the exceptional resolving power of modern FT-MS systems to selectively reveal or conceal quantitative information when desired. Recently, a new Orbitrap hybrid mass spectrometer comprised of a mass filter, a collision cell, a high-field Orbitrap analyzer, and a dual cell linear ion trap analyzer was introduced (Q

  11. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    . In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post...

  12. Team Exploratory Testing Sessions

    OpenAIRE

    Soili Saukkoriipi; Ilkka Tervonen

    2012-01-01

    Exploratory testing (ET) is popular, especially among agile development teams. In this paper, we study the team aspect in the ET context and explore how to use ET in team sessions to complement other testing activities. The goal was to define a team exploratory testing (TET) session approach and to provide evidence that the approach is worth using. A TET session approach is defined by means of parameters, roles, and process. Also, instructions for using the approach are given. The team is the...

  13. The Public Poster Session

    Science.gov (United States)

    Levine-Rasky, Cynthia

    2009-01-01

    This note describes the use of a student poster session as an innovative approach to student learning. The local context for the assignment is provided, followed by a description of the course for which the poster was prepared, details about the assignment including its evaluation, and practical considerations for planning a poster session. The…

  14. OLYMPICS IN TWO SESSIONS

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The counting-down clock is ticking:Beijing Olympic Games are just 4 months away.When China's "Two Sessions',the top political sessions,held in the national capital this spring,this heated topic has been inevitably stamped with the remarks among the CPPCC members and NPC deputies.

  15. Abstracts of SIG Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1997

    1997-01-01

    Presents abstracts of SIG Sessions. Highlights include digital collections; information retrieval methods; public interest/fair use; classification and indexing; electronic publication; funding; globalization; information technology projects; interface design; networking in developing countries; metadata; multilingual databases; networked…

  16. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant;

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding co...

  17. Abstracts of SIG Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1995

    1995-01-01

    Presents abstracts of 15 special interest group (SIG) sessions. Topics include navigation and information utilization in the Internet, natural language processing, automatic indexing, image indexing, classification, users' models of database searching, online public access catalogs, education for information professions, information services,…

  18. The outreach sessions

    Energy Technology Data Exchange (ETDEWEB)

    Trache, Livius [Horia Hulubei National Institute for Physics and Nuclear Engineering, P.O. Box MG-6, 077125 Bucharest-Magurele (Romania)

    2015-02-24

    These are moderator’s remarks about the outreach day in the middle of the CSSP14, and in particular about the afternoon outreach session in round table format with the announced theme: “CERN at 60 and the internationalization of science”.

  19. Multiparty Asynchronous Session Types

    DEFF Research Database (Denmark)

    Honda, Kohei; Yoshida, Nobuko; Carbone, Marco

    2016-01-01

    peers are directly abstracted as a global scenario. Global types retain the friendly type syntax of binary session types while specifying dependencies and capturing complex causal chains of multiparty asynchronous interactions. A global type plays the role of a shared agreement among communication peers...

  20. ICALEPS 2005 : opening session

    CERN Multimedia

    Maximilien Brice

    2005-01-01

    ICALEPCS 2005, the tenth International Conference on Accelerator and Large Experimental Physics Control Systems, will be held in Geneva, Switzerland, 10-14 Oct. 2005 at the International Conference Center Geneva (CICG). ICALEPCS 2005 thus falls in the year that UNESCO has declared the "World Year of Physics". ICALEPCS covers all aspects of control and operation of Experimental Physics facilities such as particle accelerators, particle detectors, optical telescopes, radio telescopes, nuclear fusion facilities like Tokamaks, nuclear reactors, lasers, etc .... Opening session by . A. Daneels (CERN): Introducting ICALEPCS 2005 . C.Lamprecht (Republic & State of Geneva): Welcome speech . J. Lister (EPFL): Welcome speech . J. Engelen (CERN): The machine and experiment challenges of LHC

  1. Session: Hard Rock Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Dunn, James C.; Drumheller, Douglas S.; Glowka, David A.; Lysne, Peter

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five presentations: ''Hard Rock Penetration - Summary'' by George P. Tennyson, Jr.; ''Overview - Hard Rock Penetration'' by James C. Dunn; ''An Overview of Acoustic Telemetry'' by Douglas S. Drumheller; ''Lost Circulation Technology Development Status'' by David A. Glowka; ''Downhole Memory-Logging Tools'' by Peter Lysne.

  2. Orchestrated Session Compliance

    Directory of Open Access Journals (Sweden)

    Franco Barbanera

    2015-08-01

    Full Text Available We investigate the notion of orchestrated compliance for client/server interactions in the context of session contracts. Devising the notion of orchestrator in such a context makes it possible to have orchestrators with unbounded buffering capabilities and at the same time to guarantee any message from the client to be eventually delivered by the orchestrator to the server, while preventing the server from sending messages which are kept indefinitely inside the orchestrator. The compliance relation is shown to be decidable by means of 1 a procedure synthesising the orchestrators, if any, making a client compliant with a server, and 2 a procedure for deciding whether an orchestrator behaves in a proper way as mentioned before.

  3. From In-Session Behaviors to Drinking Outcomes: A Causal Chain for Motivational Interviewing

    Science.gov (United States)

    Moyers, Theresa B.; Martin, Tim; Houck, Jon M.; Christopher, Paulette J.; Tonigan, J. Scott

    2009-01-01

    Client speech in favor of change within motivational interviewing sessions has been linked to treatment outcomes, but a causal chain has not yet been demonstrated. Using a sequential behavioral coding system for client speech, the authors found that, at both the session and utterance levels, specific therapist behaviors predict client change talk.…

  4. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  5. Poster Session C

    Science.gov (United States)

    2014-01-01

    therapeutics to combat hRSV. A key to the pathogenicity of hRSV is its ability to suppress host antiviral responses, including innate immune pathways. Innate immune responses are initiated upon host cell detection of viral-specific molecular patterns, such as virus-specific RNA features. This detection system activates the production of immunomodulatory cytokines (induction), which in turn stimulate the production of antiviral protein effectors (signalling), some of which amplify the cytokine induction process. hRSV produces two small non-structural proteins (NS1 and NS2) which dampen the host cell innate immune system by targeting key players in both induction and signalling pathways. We are working on the hypothesis that it may be possible to identify avenues for vaccine and/or therapeutic developments to combat hRSV by gaining a better understanding of the interactions between hRSV NS1 and NS2 and host cell antiviral pathways. We have developed a comprehensive suite of proteomic approaches to identify specific targets of hRSV NS1 and NS2. This includes workflows based on in-solution protein IEF of cell lysates with downstream bottom-up mass spectrometric label free quantification of individual IEF fractions to discern differences between hRSV-infected and uninfected cells. Another workflow involves bottom-up analyses of digests of unfractionated whole cell lysates combined with label free quantification. Our infectious experiments include hRSV encoding the complete wild-type genome and genotypes lacking NS1 and/or NS2 coding capacities. As a consequence we have identified key pathways that are promoted and/or blocked in order to achieve survival of the infected host cell in a state conducive to hRSV propagation. Although some observations were common to both proteomic workflows, the in-solution IEF workflow uniquely enabled observation of some regulation at a global level due to selective enrichment of low abundance proteins. Furthermore, the in-solution IEF workflow

  6. Aeropropulsion 1987. Session 3: Internal Fluid Mechanics Research

    Science.gov (United States)

    1987-01-01

    Internal fluid mechanics research at Lewis is directed toward an improved understanding of the important flow physics affecting aerospace propulsion systems, and applying this improved understanding to formulate accurate predictive codes. To this end, research is conducted involving detailed experimentation and analysis. The presentations in this session summarize ongoing work and indicated future emphasis in three major research thrusts: namely, inlets, ducts, and nozzles; turbomachinery; and chemical reacting flows.

  7. Introduction to Session 1B

    Science.gov (United States)

    Sticklen, Mariam B.

    Topics presented in the "Plant Biotechnology and Genomics" session focused on technologies that highlight the important role of plant biotechnology and genomics in the development of future energy crops. Several excellent presentations demonstrated the latest advances in energy crop development through the use of plant cell wall regulation and by engineering new energy crops such as brown midrib sweet sorghum. Approaches included the control of cellulose production by increased expression of cellulase synthase genes and the selection of high-yield varieties of shrub willows. The potential of producing hydrolytic enzymes using transgenic plants as a cost-effective means for the large-scale production of these enzymes was also explored in the session, as was the role of posttranslational modifications on the activities of heterologous expressed cellulases in hosts such as Pichia pastoris.

  8. Beam instability Workshop - plenary sessions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The purpose of this workshop was to provide a review of the mechanisms of limiting beam instabilities, their cures, including feedback, and beam measurement for synchrotron radiation light sources. 12 plenary sessions took place whose titles are: 1) challenging brilliance and lifetime issues with increasing currents; 2) limiting instabilities in multibunch; 3) experience from high currents in B factories; 4) longitudinal dynamics in high intensity/bunch; 5) Transverse instabilities for high intensity/bunch; 6) working group introduction from ESRF experience; 7) impedance modelling: simulations, minimization; 8) report on the broadband impedance measurements and modelling workshop; 9) feedback systems for synchrotron light sources; 10) beam instabilities diagnostics; 11) harmonic cavities: the pros and cons; and 12) experimental study of fast beam-ion instabilities at PLS. This document gathers the 12 articles that were presented during these sessions.

  9. SIRA: TREC Session Track 2014

    Science.gov (United States)

    2014-11-01

    including query topics, initial retrieved webpages , clicked on links, visit times, etc. SIRA has used several methods to improve search results that...sessions include many aspects of a search, including query topics, initial retrieved webpages , clicked on links, visit times, etc. SIRA has used several...which was designed for intelligence analysts researching weapons of mass destruction [5]. In these domains, a small number of specific frames can

  10. Mind the gap: In-session silences are associated with client attachment insecurity, therapeutic alliance, and treatment outcome

    DEFF Research Database (Denmark)

    Daniel, Sarah Ingrid Franksdatter; Folke, Sofie; Lunn, Susanne;

    2016-01-01

    of cognitive behavior therapy (CBT). Client attachment was assessed using the Adult Attachment Interview. Early, middle and late sessions (N = 175) were evaluated with the Vanderbilt Therapeutic Alliance Scales, and quality of in-session silences was coded with the Pausing Inventory Categorization System (PICS...... further validates the PICS. Findings indicate that therapists may be able to use in-session silences as an indicator of client attachment insecurity and as a prognostic sign of eventual treatment outcome....

  11. Semantic Session Analysis for Web Usage Mining

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hui; SONG Hantao; XU Xiaomei

    2007-01-01

    A semantic session analysis method partitioning Web usage logs is presented. Semantic Web usage log preparation model enhances usage logs with semantic. The Markov chain model based on ontology semantic measurement is used to identifying which active session a request should belong to. The competitive method is applied to determine the end of the sessions.Compared with other algorithms, more successful sessions are additionally detected by semantic outlier analysis.

  12. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  13. Endicott College at 2014 TREC Session Track

    Science.gov (United States)

    2014-11-01

    the currentquery. For RL2 and RL3, we used real clicks in sessions with at least one click , and simulated clicks as the top retrieved baseline result...baseline), post spam removal. For the ECxSRMxOS RL2, we used real clicks in sessions with at least one click , and the baseline in clickless sessions. RL3

  14. A Video Recall Study of In-session Changes in Sentiment Override.

    Science.gov (United States)

    Johnson, Lee N; Tambling, Rachel B; Anderson, Shayne R

    2015-09-01

    This study examines in-session changes in sentiment override over the first three sessions of couple therapy. Couples viewed a video recording of therapy sessions immediately after each of the first three sessions and continuously rated their level of sentiment override. Ninety-eight changes were randomly chosen for analysis. Three talk turns prior to each change was coded using the Family Relational Communication Control Coding System. Results show that changes in sentiment override occur frequently. Repeated incidents of communication control were related to negative change in sentiment override for females. Repeated incidents of being left out of the conversation were related to negative changes in sentiment override for females and positive changes for males.

  15. Working session 3: Tubing integrity

    Energy Technology Data Exchange (ETDEWEB)

    Cueto-Felgueroso, C. [Tecnatom, S.A., San Sebastian de los Reyes, Madrid (Spain); Strosnider, J. [NRC, Washington, DC (United States)

    1997-02-01

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group`s discussions on these subjects, including conclusions and recommendations, are summarized in this article.

  16. Session: Long Valley Exploratory Well

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Finger, John T.; Eichelberger, John C.; Hickox, Charles E.

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of four presentations: ''Long Valley Exploratory Well - Summary'' by George P. Tennyson, Jr.; ''The Long Valley Well - Phase II Operations'' by John T. Finger; ''Geologic results from the Long Valley Exploratory Well'' by John C. Eichelberger; and ''A Model for Large-Scale Thermal Convection in the Long Valley Geothermal Region'' by Charles E. Hickox.

  17. Institutional computing (IC) information session

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Kenneth R [Los Alamos National Laboratory; Lally, Bryan R [Los Alamos National Laboratory

    2011-01-19

    The LANL Institutional Computing Program (IC) will host an information session about the current state of unclassified Institutional Computing at Los Alamos, exciting plans for the future, and the current call for proposals for science and engineering projects requiring computing. Program representatives will give short presentations and field questions about the call for proposals and future planned machines, and discuss technical support available to existing and future projects. Los Alamos has started making a serious institutional investment in open computing available to our science projects, and that investment is expected to increase even more.

  18. Session Two Outcome of the Formula First Session Task in Problem- and Solution-Focused Approaches.

    Science.gov (United States)

    Jordan, Karin; Quinn, William H.

    1994-01-01

    Evaluated treatment effects in single session process using problem-focused approach and solution-focused approach. Findings indicated significant difference between two approaches when dealing with client's perceived problem improvement, outcome expectancy, session depth, session smoothness, and session positivity. Found no significant…

  19. Working session 1: Tubing degradation

    Energy Technology Data Exchange (ETDEWEB)

    Kharshafdjian, G. [Atomic Energy of Canada, Mississauga, Ontario (Canada); Turluer, G. [IPSN, Fontenay-aux-Roses (France)

    1997-02-01

    A general introductory overview of the purpose of the group and the general subject area of SG tubing degradation was given by the facilitator. The purpose of the session was described as to {open_quotes}develop conclusions and proposals on regulatory and technical needs required to deal with the issues of SG tubing degradation.{close_quotes} Types, locations and characteristics of tubing degradation in steam generators were briefly reviewed. The well-known synergistic effects of materials, environment, and stress and strain/strain rate, subsequently referred to by the acronym {open_quotes}MESS{close_quotes} by some of the group members, were noted. The element of time (i.e., evolution of these variables with time) was emphasized. It was also suggested that the group might want to consider the related topics of inspection capabilities, operational variables, degradation remedies, and validity of test data, and some background information in these areas was provided. The presentation given by Peter Millet during the Plenary Session was reviewed; Specifically, the chemical aspects and the degradation from the secondary side of the steam generator were noted. The main issues discussed during the October 1995 EPRI meeting on secondary side corrosion were reported, and a listing of the potential SG tube degradations was provided and discussed.

  20. Secure Execution of Distributed Session Programs

    CERN Document Server

    Alves, Nuno; Yoshida, Nobuko; Deniélou, Pierre-Malo; 10.4204/EPTCS.69.1

    2011-01-01

    The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols) are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP) protocol. The key technical point is the delicate treatment of secure session de...

  1. Working session 2: Tubing inspection

    Energy Technology Data Exchange (ETDEWEB)

    Guerra, J. [Tecnatom, S.A. San Sebastian de los Reyes, Madrid (Spain); Tapping, R.L. [AECL, Chalk River, Ontario (Canada)

    1997-02-01

    This session was attended by delegates from 10 countries, and four papers were presented. A wide range of issues was tabled for discussion. Realizing that there was limited time available for more detailed discussion, three topics were chosen for the more detailed discussion: circumferential cracking, performance demonstration (to focus on POD and sizing), and limits of methods. Two other subsessions were organized: one dealt with some challenges related to the robustness of current inspection methods, especially with respect to leaving cracked tubes in service, and the other with developing a chart of current NDE technology with recommendations for future development. These three areas are summarized in turn, along with conclusions and/or recommendations. During the discussions there were four presentations. There were two (Canada, Japan) on eddy current probe developments, both of which addressed multiarray probes that would detect a range of flaws, one (Spain) on circumferential crack detection, and one (JRC, Petten) on the recent PISC III results.

  2. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  3. Flexible Session Management in a Distributed Environment

    CERN Document Server

    Miller, Zach; Tannenbaum, Todd; Sfiligoi, Igor

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of syst...

  4. Control DHT maintenance costs with session heterogeneity

    Institute of Scientific and Technical Information of China (English)

    ZOU Fu-tai; WU Zeng-de; ZHANG Liang; MA Fan-yuan

    2005-01-01

    The maintaining overheads of Distributed Hash Table (DHT) topology have recently received considerable attention.This paper presents a novel SHT (Session Heterogeneity Topology) model, in which DHT is reconstructed with session heterogeneity. SHT clusters nodes by means of session heterogeneity among nodes and selects the stable nodes as the participants of DHT. With an evolving process, this model gradually makes DHT stable and reliable. Therefore the high maintaining overheads for DHT are effectively controlled. Simulation with real traces of session distribution showed that the maintaining overheads are reduced dramatically and that the data availability is greatly improved.

  5. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  6. Synchrony in Dyadic Psychotherapy Sessions

    Science.gov (United States)

    Ramseyer, Fabian; Tschacher, Wolfgang

    Synchrony is a multi-faceted concept used in diverse domains such as physics, biology, and the social sciences. This chapter reviews some of the evidence of nonverbal synchrony in human communication, with a main focus on the role of synchrony in the psychotherapeutic setting. Nonverbal synchrony describes coordinated behavior of patient and therapist. Its association with empathy, rapport and the therapeutic relationship has been pointed out repeatedly, yet close evaluation of empirical studies suggests that the evidence remains inconclusive. Particularly in naturalistic studies, research with quantitative measures of synchrony is still lacking. We introduce a new empirical approach for the study of synchrony in psychotherapies under field conditions: Motion Energy Analysis (MEA). This is a video-based algorithm that quantifies the amount of movement in freely definable regions of interest. Our statistical analysis detects synchrony on a global level, irrespective of the specific body parts moving. Synchrony thus defined can be considered as a general measure of movement coordination between interacting individuals. Data from a sequence of N = 21 therapy sessions taken from one psychotherapy dyad shows a high positive relationship between synchrony and the therapeutic bond. Nonverbal synchrony can thus be considered a promising concept for research on the therapeutic alliance. Further areas of application are discussed.

  7. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten;

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...

  8. The International Mathematical Olympiad Training Session.

    Science.gov (United States)

    Rousseau, Cecil; Patruno, Gregg

    1985-01-01

    The Mathematical Olympiad Training Session is designed to give United States students a problem-oriented exposure to subject areas (algebra, geometry, number theory, combinatorics, and inequalities) through an intensive three-week course. Techniques used during the session, with three sample problems and their solutions, are presented. (JN)

  9. Spanning a multimedia session across multiple devices

    NARCIS (Netherlands)

    Aartse Tuijn, Jasper; Bijwaard, Dennis

    2008-01-01

    This paper describes an innovative solution that allows a multimedia session to be distributed over multiple devices that are in close proximity to a user. This would typically be useful when a user engaged in an audio/video conference enters a meeting room. Upon entering, all media session componen

  10. VSS BASED SESSION SETUP MECHANISM IN IMS

    Institute of Scientific and Technical Information of China (English)

    Cao Yufei; Liao Jianxin; Qi Qi; Zhu Xiaomin

    2009-01-01

    This paper proposes a novel session setup mechanism in IMS (IP Multimedia Subsystem) by introducing the functional entity termed VSS (Visitor Subscriber Server) which is used to provide registration and location management.The new mechanism aims at improving session setup procedure by a betterment of location management in IMS.Through the use of two-tier subscriber information database constituted by the HSS (Home Subscriber Server) and the VSS,the new mechanism seperates the registration procedure and location management from the S-CSCF (Serving-Call'Session Control Function),and makes them be handled by the VSS.At the same time,the new mechanism updates the signaling procedure of registration and session setup.With VSS based location management.the cost of registeration and session setup procedure as well as the delay of session setup procedure become lower.he cost and delay functious of the new session setup mechanism as well aus the cost function of new registeration are deduced.Then,simulations and analysis verify that the performance of this new mechanism gets the benefit in cost and time.

  11. Flexible session management in a distributed environment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Zach; /Wisconsin U., Madison; Bradley, Dan; /Wisconsin U., Madison; Tannenbaum, Todd; /Wisconsin U., Madison; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  12. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  13. Session Types = Intersection Types + Union Types

    CERN Document Server

    Padovani, Luca

    2011-01-01

    We propose a semantically grounded theory of session types which relies on intersection and union types. We argue that intersection and union types are natural candidates for modeling branching points in session types and we show that the resulting theory overcomes some important defects of related behavioral theories. In particular, intersections and unions provide a native solution to the problem of computing joins and meets of session types. Also, the subtyping relation turns out to be a pre-congruence, while this is not always the case in related behavioral theories.

  14. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  15. Session on computation in biological pathways

    Energy Technology Data Exchange (ETDEWEB)

    Karp, P.D. [SRI International, Menlo Park, CA (United States); Riley, M. [Marine Biological Lab., Woods Hole, MA (United States)

    1996-12-31

    The papers in this session focus on the development of pathway databases and computational tools for pathway analysis. The discussion involves existing databases of sequenced genomes, as well as techniques for studying regulatory pathways.

  16. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  17. ICTNET at Session Track TREC2014

    Science.gov (United States)

    2014-11-01

    expansion score of the document. SVD The score of the session visual document model. UAT The score of user attention time model. BM25QC The BM25...QE, SVD , UAT, BM25QC, CosSimQT, Clicked BM25QC, CosSimQT, SVD , QE CosSimQT, SVD , QE, UAT RL3 The same as above except that it use all the sessions

  18. 不用Cookies实现的session

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    第一.不能有多个sessionID.那样URL会变得很长。关掉浏览器,或丢了sessionID参数session也就没用了.除非每次都在URL后面冒着sessionID参数。暂时不考虑这个问题.把存活期屏蔽。

  19. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  20. 76 FR 42112 - Specialty Crop Committee Stakeholder Listening Sessions

    Science.gov (United States)

    2011-07-18

    ...; ] DEPARTMENT OF AGRICULTURE Office of the Secretary Specialty Crop Committee Stakeholder Listening Sessions AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening sessions... Department of Agriculture announces two stakeholder listening sessions of the Specialty Crop Committee,...

  1. Network Coding in the Bidirectional Cross

    DEFF Research Database (Denmark)

    Ertli, Gergö; Paramanathan, Achuthan; Rein, Stephan Alexander;

    2013-01-01

    This paper presents a detailed performance evaluation of inter-session network coding in wireless meshed networks in terms of throughput and energy consumption. A full analytical model is given for three different communication approaches for the bidirectional cross topology using an IEEE 802.......11 medium access. One of the three approaches is pure relaying, while the other two approaches are using network coding with and without overhearing of other flows. The main outcome of the paper is that network coding without and with overhearing can increase the throughput by the factor of two and four......, respectively, for high load scenarios. Furthermore we show that the energy/bit ratio is decreased by the use of network coding approaches, underlining that the added complexity of network coding pays off when considering the overall system....

  2. Instruments for documentation of music therapy sessions

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner

    It is an important part of the clinical music therapy work to document the daily sessions. For the clinician it is necessary to have a brief overview of each session in order to assess the methods and the process, and not least to be able to give clear reports of these issues to other health care...... professionals at staff meetings, conferences, etc. For music therapists with many clients there is not time enough during a working day to provide comprehensive process descriptions in the music therapy log. Therefore instruments that help the clinician in reducing and structuring this information are needed....... Danish and Norwegian music therapist have collaborated on developing a one page sheet with a structured form where they after each music therapy session document their use of methods and techniques in individual music therapy with persons with dementia. With this instrument therapists have easy access...

  3. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  4. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  5. Student-Teachers’ Perception of Feedback Sessions

    OpenAIRE

    González Ramírez, Ana Carolina

    2013-01-01

    In the implementation of an ESP course, post-graduate students receive their supervisors’ opinions in post-observation sessions which tend to be considered troublesome and a “necessary evil.” This study provided tips to 4 participants to improve their experience and thus change their perceptions of feedback sessions into a more enriching and positive experience because student-teachers who hold this view are more effective both as learners and teachers-in-training. Three data-collection instr...

  6. Poster Sessions in Marketing Education: An Empirical Examination

    Science.gov (United States)

    Stegemann, Nicole; Sutton-Brady, Catherine

    2009-01-01

    Poster sessions provide a creative and stimulating alternative to traditional assessment methods in marketing. Poster sessions, as a means of assessment, have long been used in science fields. This article presents the successful implementation of poster sessions as a means of assessment in a postgraduate unit of study. Poster sessions in…

  7. Posters. [Poster Session at AHRD Conference, 2001].

    Science.gov (United States)

    2001

    The first of the papers in this poster session, "Developing the Employment Brand: Targeting MBA Campus Hires" (Diane M. Bergeron), posits that employment branding benefits both individuals and organizations. It functions as a campus recruiting tool in a competitive labor market and communicates the organization's values and work…

  8. Interpretation of buzzword renxing at Two Sessions

    Institute of Scientific and Technical Information of China (English)

    Ding Xin

    2015-01-01

    A buzzword renxing from Two Sessions has made headlines in domestic and overseas media. Now the word has an authority interpretation--capricious. The interpreter Zhang Lei has become a celebrity overnight. However,according to interpretive theory,thefirst interpretation theory initiated by French translator Danica Seleskovitch,there seems much more room for improving the interpretation of renxing.

  9. My Session With André.

    Science.gov (United States)

    Eigen, Michael

    2015-10-01

    The author shares personal reminiscences of a therapy session with André Green, as well as impressions of professional meetings, readings, and clinical work. He describes personal help he received and aspects of Green's writings on dynamics of madness, as well as the latter's end-of-life discussion of therapeutic limits.

  10. Declarative interpretations of session-based concurrency

    DEFF Research Database (Denmark)

    Cano, Mauricio; Rueda, Camilo; López-Acosta, Hugo-Andrés;

    2015-01-01

    Session-based concurrency is a type-based approach to the analysis of communication-intensive systems. Correct behavior in these systems may be specified in an operational or declarative style: the former defines how interactions are structured; the latter defines governing conditions. In this pa...

  11. An Erlang Implementation of Multiparty Session Actors

    Directory of Open Access Journals (Sweden)

    Simon Fowler

    2016-08-01

    Full Text Available By requiring co-ordination to take place using explicit message passing instead of relying on shared memory, actor-based programming languages have been shown to be effective tools for building reliable and fault-tolerant distributed systems. Although naturally communication-centric, communication patterns in actor-based applications remain informally specified, meaning that errors in communication are detected late, if at all. Multiparty session types are a formalism to describe, at a global level, the interactions between multiple communicating entities. This article describes the implementation of a prototype framework for monitoring Erlang/OTP gen_server applications against multiparty session types, showing how previous work on multiparty session actors can be adapted to a purely actor-based language, and how monitor violations and termination of session participants can be reported in line with the Erlang mantra of "let it fail". Finally, the framework is used to implement two case studies: an adaptation of a freely-available DNS server, and a chat server.

  12. Working session 4: Preventative and corrective measures

    Energy Technology Data Exchange (ETDEWEB)

    Clark, R. [Golder Federal Services Inc., Redmond, WA (United States); Slama, G. [Framatome, Paris (France)

    1997-02-01

    The Preventive and Corrective Measures working session included 13 members from France, Germany, Japan, Spain, Slovenia, and the United States. Attendee experience included regulators, utilities, three steam generator vendors, consultants and researchers. Discussions centered on four principal topics: (1) alternate materials, (2) mechanical mitigation, (3) maintenance, and (4) water chemistry. New or replacement steam generators and original equipment steam generators were separately addressed. Four papers were presented to the session, to provide information and stimulate various discussion topics. Topics discussed and issues raised during the several meeting sessions are provided below, followed by summary conclusions and recommendations on which the group was able to reach a majority consensus. The working session was composed of individuals with diverse experience and varied areas of specialized expertise. The somewhat broad range of topics addressed by the group at times saw discussion participation by only a few individuals. As in any technical meeting where all are allowed the opportunity to speak their mind, straying from an Individual topic was not unusual. Where useful, these stray topics are also presented below within the context In which they occurred. The main categories of discussion were: minimize sludge; new steam generators; maintenance; mechanical mitigation; water chemistry.

  13. ASCO Plenary Sessions: impact, legacy, future.

    Science.gov (United States)

    Vandross, Andrae; Prasad, Vinay; Mailankody, Sham

    2016-06-01

    The ASCO annual meeting draws a large crowd of physicians, cancer researchers, policy makers, and industry representatives. The crown jewel of the annual events is the Plenary session where impactful, influential and visible abstracts are selected for the largest audience. Plenary topics are frequently paired with concurrent New England Journal or Lancet publications.  Here, we review 9 years of ASCO plenary sessions.  Several themes emerge.  First, many of the topics selected have indeed been practice changing, such as the use of ALK inhibitors for ALK rearranged NSCLC, or checkpoint inhibitors in metastatic melanoma.  Second, although some plenary topics seemed destined to change practice, they ultimately falter, such as the use of Cetuximab in NSCLC, vaccine therapy for follicular lymphoma, and even Bevacizumab in metastatic renal cell cancer. Who could have forseen bevacizumab displaced by several VEGF TKIs?  Third, negative trials are rare among Plenary sessions, but when they are presented they are immensely important.  Examples include a seminal study using CA-125 levels to guide treatment of relapsed ovarian cancer, the use of lapatinib combined with traztuzumab in the adjuvant treatment of HER2 + disease, and studies showing no survival benefit to upfront bevacizumab in glioblastoma multiforme.   Fourth, we note a large industry presence among Plenary sessions, as the Industry in part sponsored 62% of Plenary abstracts.  Ultimately a review of 9 years of ASCO plenary reveals the plenary for what it is: a conservative selection of abstracts that, at the time, are thought to change the face of oncology.  Time, however, is the true arbiter, and some succeed in this quest, while others falter.  ASCO plenary sessions reveal the influence, legacy and future of cancer care.

  14. Overview of CODE V development

    Science.gov (United States)

    Harris, Thomas I.

    1991-01-01

    This paper is part of a session that is aimed at briefly describing some of today''s optical design software packages with emphasis on the program''s philosophy and technology. CODE V is the ongoing result of a development process that began in the 1960''s it is now the result of many people''s efforts. This paper summarizes the roots of the program some of its history dominant philosophies and technologies that have contributed to its usefulness and some that drive its continued development. ROOTS OF CODE V Conceived in the early 60''s This was at a time when there was skepticism that " automatic design" could design lenses equal or better than " hand" methods. The concepts underlying CODE V and its predecessors were based on ten years of experience and exposure to the problems of a group of lens designers in a design-for-manufacture environment. The basic challenge was to show that lens design could be done better easier and faster by high quality computer-assisted design tools. The earliest development was for our own use as an engineering services organization -an in-house tool for custom design. As a tool it had to make us efficient in providing lens design and engineering services as a self-sustaining business. PHILOSOPHY OF OVTIM!ZATION IN CODE V Error function formation Based on experience as a designer we felt very strongly that there should be a clear separation of

  15. Modeling Rich Interactions in Session Search - Georgetown University at TREC 2014 Session Track

    Science.gov (United States)

    2014-11-01

    iterations triggered by query reformulations to accomplish a complex search task. In our groups’ 2013 work [1], we model this interactive process of session...algorithm is set as Language Modeling with Dirichlet smoothing. The smoothing parameter mu is set as 5000. In RL2, we adopt QCM algorithm [1] where we...hoc Retrieval Model (Ad-hoc) Our RL1 approach directly uses the current query of each session as search terms. The retrieval algorithm is Language

  16. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  17. Optimal Grouping and Matching for Network-Coded Cooperative Communications

    Energy Technology Data Exchange (ETDEWEB)

    Sharma, S; Shi, Y; Hou, Y T; Kompella, S; Midkiff, S F

    2011-11-01

    Network-coded cooperative communications (NC-CC) is a new advance in wireless networking that exploits network coding (NC) to improve the performance of cooperative communications (CC). However, there remains very limited understanding of this new hybrid technology, particularly at the link layer and above. This paper fills in this gap by studying a network optimization problem that requires joint optimization of session grouping, relay node grouping, and matching of session/relay groups. After showing that this problem is NP-hard, we present a polynomial time heuristic algorithm to this problem. Using simulation results, we show that our algorithm is highly competitive and can produce near-optimal results.

  18. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  19. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately.

  20. Buffered Communication Analysis in Distributed Multiparty Sessions

    Science.gov (United States)

    Deniélou, Pierre-Malo; Yoshida, Nobuko

    Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchrony, the communication buffers can happen to grow inconsiderately over time. This paper proposes a static verification methodology based on multiparty session types which can efficiently compute the upper bounds on buffer sizes. Our analysis relies on a uniform causality audit of the entire collaboration pattern - an examination that is not always possible from each end-point type. We extend this method to design algorithms that allocate communication channels in order to optimise the memory requirements of session executions. From these analyses, we propose two refinements methods which respect buffer bounds: a global protocol refinement that automatically inserts confirmation messages to guarantee stipulated buffer sizes and a local protocol refinement to optimise asynchronous messaging without buffer overflow. Finally our work is applied to overcome a buffer overflow problem of the multi-buffering algorithm.

  1. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    CERN Document Server

    Allen, Alice; Brunner, Robert; Burger, Dan; DuPrie, Kimberly; Hanisch, Robert J; Mann, Robert; Mink, Jessica; Sandin, Christer; Shortridge, Keith; Teuben, Peter

    2012-01-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published ...

  2. Pragmalinguistic analysis of a psychotherapeutic session

    Directory of Open Access Journals (Sweden)

    Ricardo Alberto Andrade Rodríguez

    2010-07-01

    Full Text Available The present article is the preliminary result of the research titled: pragmalinguistic analysys of psychotherapeutic verbal interaction, realized in the context of the M.D. in linguistics in the Universitiy of Antioquia. It presents the pragmatic analysis of one psychotherapy session using the speech acts theory. As result, beside the contrast between that theory and the analyzed case, it can be found some consideration about the verbal interaction that happens in the individual psychotherapy.

  3. Overview of the TREC 2014 Session Track

    Science.gov (United States)

    2014-11-01

    present evaluation results and analysis. 2 Evaluation Tasks We use the word “session” to mean a sequence of reformulations along with any user interaction...query reformulations ). A single topic can have more than one session associated with it, since two different users could go about satisfying the same...collection consists of roughly 730 million English- language web pages, comprising approximately 5TB of compressed data. The dataset was crawled from the Web

  4. Opening of the 123rd Council session

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The CERN Council held its 123rd session on 13 December 2002 under the chairmanship of Professor Maurice Bourquin. The election of the next Director General, the Baseline Plan for 2003-2010 and a new status for non-European states were among the items agreed. Photo 01: (left to right) Director-General Prof. Luciano Maiani, President of Council Prof. Maurice Bourquin, and Director of administration Jan van der Boon.

  5. Physical Review X Q&A Session

    Science.gov (United States)

    2014-03-01

    Physical Review X (PRX) is already being recognized as a top-quality journal in physics. What are its current standards and strengths? How will it grow and evolve in the coming years? Why is PRX a journal for you? PRX editors and the Editorial Board invite you to a Q & A session, where we will answer these questions and others you have about the journal. Bring your questions and learn more about PRX. Light refreshments will be provided.

  6. Safety Training: scheduled sessions in April

    CERN Document Server

    DGS Unit

    2011-01-01

    The following training courses are scheduled in April. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 26-APR-11 (08.30 – 10.00) in French 26-APR-11 (10.30 – 12.00) in French Conduite de plates-formes élévatrices mobiles de personnel (PEMP) 28-APR-11 to 29-APR-11 (08.00 – 17.30) in French* Sécurité chimique – Introduction 29-APR-11 (09.00 – 11.30) in French (*) session in French with the possibility of receiving the documentation in English   By Isabelle Cusato (H...

  7. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  8. Ideas for Advancing Code Sharing: A Different Kind of Hack Day

    Science.gov (United States)

    Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.

    2014-05-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  9. Ideas for Advancing Code Sharing (A Different Kind of Hack Day)

    CERN Document Server

    Teuben, Peter; Berriman, Bruce; DuPrie, Kimberly; Hanisch, Robert J; Mink, Jessica; Nemiroff, Robert; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Wallin, John

    2013-01-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and calibration? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  10. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  11. 78 FR 53497 - Commercial Space Transportation Advisory Committee; Closed Session

    Science.gov (United States)

    2013-08-29

    ... Federal Aviation Administration Commercial Space Transportation Advisory Committee; Closed Session AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Commercial Space Transportation Advisory... closed session of the Commercial Space Transportation Advisory Committee (COMSTAC). The special...

  12. Music Education and Music Therapy. Introduction to Plenary Session 3

    DEFF Research Database (Denmark)

    Bonde, Lars Ole

    2002-01-01

    Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics......Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics...

  13. Session Types for Access and Information Flow Control

    OpenAIRE

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    2010-01-01

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents leaks due to the specific control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the ...

  14. 78 FR 45494 - Plant Breeding Listening Session meeting

    Science.gov (United States)

    2013-07-29

    ...; ] DEPARTMENT OF AGRICULTURE Plant Breeding Listening Session meeting ACTION: Notice of a Plant Breeding... Agriculture (USDA) announces a Plant Breeding Listening Session stakeholder meeting for all interested plant breeding and cultivar development stakeholders. DATES: The Plant Breeding Listening Session will be...

  15. Graph Transformation for Consolidation of Creativity Sessions Results

    DEFF Research Database (Denmark)

    Dolog, Peter

    2010-01-01

    Graph transformation approach for consolidation of creativity sessions results is part of the FP7 EU/IST project idSpace: Tooling of and training for collaborative, distributed product innovation. The goal of graph transformation approach is to provide a tool for merging results of various sessio...... (such as brainstorming sessions), which are represented as graphs, when the session participants- are physically distributed....

  16. Parallel Monitors for Self-adaptive Sessions

    Directory of Open Access Journals (Sweden)

    Mario Coppo

    2016-06-01

    Full Text Available The paper presents a data-driven model of self-adaptivity for multiparty sessions. System choreography is prescribed by a global type. Participants are incarnated by processes associated with monitors, which control their behaviour. Each participant can access and modify a set of global data, which are able to trigger adaptations in the presence of critical changes of values. The use of the parallel composition for building global types, monitors and processes enables a significant degree of flexibility: an adaptation step can dynamically reconfigure a set of participants only, without altering the remaining participants, even if the two groups communicate.

  17. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...... including an outer BCH code correcting a few bit errors....

  18. Significant Others in Substance Abusers' Change Talk During Motivational Interviewing Sessions in the Finnish Probation Service

    Directory of Open Access Journals (Sweden)

    Sarpavaara Harri

    2015-03-01

    Full Text Available AIMS - This article explores the meanings substance-abusing clients attach to family and friendships during motivational interviewing (MI sessions in Probation Service. DATA - The analyses are based on videotaped and transcribed data consisting of 82 MI sessions. This database involves the first two counseling sessions of 41 client-counselor pairs. Sessions were videotaped in 12 Probation Service offices in Finland between 2007 and 2009. METHODS - The analysis relies on coding of client's change talk utterances and qualitative semiotic framework. RESULTS - The meanings of the significant others were diverse from the point of view of the client's motivation: family appeared as a support for change, an aspiration, a sufferer, or an obstacle to change; and friendship appeared as an obstacle to change, a surmounted obstacle, a cause to change, or a support to change. CONCLUSIONS - Significant others and their quality are important and diverse factors that promote or hinder change in substance abuser' change talk. Thus, it is suggested that the meaning of significant others should not be overlooked in MI and other substance abuse treatment.

  19. Aspen Global Change Institute Summer Science Sessions

    Energy Technology Data Exchange (ETDEWEB)

    Katzenberger, John; Kaye, Jack A

    2006-10-01

    The Aspen Global Change Institute (AGCI) successfully organized and convened six interdisciplinary meetings over the course of award NNG04GA21G. The topics of the meetings were consistent with a range of issues, goals and objectives as described within the NASA Earth Science Enterprise Strategic Plan and more broadly by the US Global Change Research Program/Our Changing Planet, the more recent Climate Change Program Strategic Plan and the NSF Pathways report. The meetings were chaired by two or more leaders from within the disciplinary focus of each session. 222 scholars for a total of 1097 participants-days were convened under the auspices of this award. The overall goal of each AGCI session is to further the understanding of Earth system science and global environmental change through interdisciplinary dialog. The format and structure of the meetings allows for presentation by each participant, in-depth discussion by the whole group, and smaller working group and synthesis activities. The size of the group is important in terms of the group dynamics and interaction, and the ability for each participant's work to be adequately presented and discussed within the duration of the meeting, while still allowing time for synthesis

  20. Safety Training: scheduled sessions in May

    CERN Multimedia

    Isabelle Cusato (HSE Unit)

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year.   Biocell Training 10-MAY-11 (08.30 – 10.00) in French 10-MAY-11 (10.30 – 12.00) in French 12-MAY-11 (08.30 – 10.00) in English 12-MAY-11 (10.30 – 12.00) in English 19-MAY-11 (08.30 – 10.00) in French 19-MAY-11 (10.30 – 12.00) in French 24-MAY-11 (08.30 – 10.00) in English 24-MAY-11 (10.30 – 12.00) in English   Champs Magnétiques 13-MAY-11 (09.30 – 11.30) in French...

  1. Safety Training: scheduled sessions in March

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 08-MAR-11 (08.30 – 10.00) in English 08-MAR-11 (10.30 – 12.00) in French 15-MAR-11 (08.30 – 10.00) in French 15-MAR-11 (10.30 – 12.00) in French 17-MAR-11 (08.30 – 10.00) in English 17-MAR-11 (10.30 – 12.00) in English 22-MAR-11 (08.30 – 10.00) in French 22-MAR-11 (10.30 – 12.00) in French 24-MAR-11 (08.30 – 10.00) in French 24-MAR-11 (10.30 – 12.00) in French 29-MAR...

  2. Summary of panel discussion: New generation of codes

    NARCIS (Netherlands)

    Ellingwood, B.; Nowak, A.; Melchers, R.E.; Thoft-Christensen, P.; Furuta, H.; Vrouwenvelder, A.C.W.M.

    1998-01-01

    In the past decade, there have been numerous advances in probability-based structural codes and codified design in countries in Europe, North America, and the Pacific Rim. The professional engineering community is gradually accepting these concepts. This Panel Session provides a forum to present and

  3. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  4. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  5. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  6. Working through: In-Session Processes that Promote Between-Session Thoughts and Activities

    Science.gov (United States)

    Owen, Jesse; Quirk, Kelley; Hilsenroth, Mark J.; Rodolfa, Emil

    2012-01-01

    This study examined whether clients' ratings of the working alliance as well as their perception of cognitive-behavioral (CB) and psychodynamic-interpersonal (PI) techniques (delivered by therapists who used both) were associated with clients' intersession processes (i.e., their thoughts about therapy and therapeutic activity between sessions).…

  7. On the Feasibility of Precoding-Based Network Alignment for Three Unicast Sessions

    CERN Document Server

    Meng, Chun; Markopoulou, Athina; Jafar, Syed Ali

    2012-01-01

    We consider the problem of network coding across three unicast sessions over a directed acyclic graph, when each session has min-cut one. Previous work by Das et al. adapted a precoding-based interference alignment technique, originally developed for the wireless interference channel, specifically to this problem. We refer to this approach as precoding-based network alignment (PBNA). Similar to the wireless setting, PBNA asymptotically achieves half the minimum cut; different from the wireless setting, its feasibility depends on the graph structure. Das et al. provided a set of feasibility conditions for PBNA with respect to a particular precoding matrix. However, the set consisted of an infinite number of conditions, which is impossible to check in practice. Furthermore, the conditions were purely algebraic, without interpretation with regards to the graph structure. In this paper, we first prove that the set of conditions provided by Das. et al are also necessary for the feasibility of PBNA with respect to ...

  8. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    Science.gov (United States)

    Allen, A.; Berriman, B.; Brunner, R.; Burger, D.; DuPrie, K.; Hanisch, R. J.; Mann, R.; Mink, J.; Sandin, C.; Shortridge, K.; Teuben, P.

    2013-10-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published scientific results should be made available, and there should be discovery mechanisms to allow these to be found easily. With increased use of resources such as GitHub (for code availability), ASCL (for code discovery), and a stated strong preference from the new journal Astronomy & Computing for code release, we expect to see additional progress over the next few years.

  9. Precise subtyping for synchronous multiparty sessions

    Directory of Open Access Journals (Sweden)

    Mariangiola Dezani-Ciancaglini

    2016-02-01

    Full Text Available The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with respect to type safety, i.e. the safe replacement of a term of a smaller type when a term of a bigger type is expected. The latter preciseness is based on the denotation of a type which is a mathematical object that describes the meaning of the type in accordance with the denotations of other expressions from the language. The result of this paper is the operational and denotational preciseness of the subtyping for a synchronous multiparty session calculus. The novelty of this paper is the introduction of characteristic global types to prove the operational completeness.

  10. Ecole de Physique des Houches: session 96

    CERN Document Server

    Huard, Benjamin; Schoelkopf, Robert; Cugliandolo, Leticia F; Quantum Machines : Measurement and Control of Engineered Quantum Systems

    2014-01-01

    This book gathers the lecture notes of courses given at the 2011 summer school in theoretical physics in Les Houches, France, Session XCVI. What is a quantum machine? Can we say that lasers and transistors are quantum machines? After all, physicists advertise these devices as the two main spin-offs of the understanding of quantum mechanical phenomena. However, while quantum mechanics must be used to predict the wavelength of a laser and the operation voltage of a transistor, it does not intervene at the level of the signals processed by these systems. Signals involve macroscopic collective variables like voltages and currents in a circuit or the amplitude of the oscillating electric field in an electromagnetic cavity resonator. In a true quantum machine, the signal collective variables, which both inform the outside on the state of the machine and receive controlling instructions, must themselves be treated as quantum operators, just as the position of the electron in a hydrogen atom. Quantum superconducting...

  11. Session: Program Review X Wrap-Up

    Energy Technology Data Exchange (ETDEWEB)

    None

    1992-01-01

    This wrap-up session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of Closing Remarks by Roland R. Kessler and six NGA Industry Critique Panel presentations: ''Summary of Comments on DOE-Industry Cooperation by Geothermal Industry Panel'' by James B. Koenig, GeothermEx, Inc.; ''NGA Industry Critique of the Exploration Component'' by Joe L. Iovenitti, Weiss Associates; ''Critique of Drilling Research'' by Jerry Hamblin, UNOCAL Geothermal; ''Critique Panel Comments on Reservoir Engineering, DOE Geothermal Technology Development'' by Dennis Kaspereit, California Energy Company, Inc.; ''DOE Geothermal Program Review - Critique on Production'' by Douglas B. Jung, Two-Phase Engineering and Research; ''Comments on the DOE Hydrothermal Energy Conversion R&D Program'' by David L. Mendive, Geothermal Development Associates.

  12. Seamless Video Session Handoff between WLANs

    Directory of Open Access Journals (Sweden)

    Claudio de Castro Monteiro

    2010-01-01

    Full Text Available Handoff in a distributed IEEE 802.11 Wireless LAN network is a source of significant amount of problems on the video transmission environment. The visual quality of video streaming applications is lowered when stations are in handoff status. In this paper, we introduce an architecture of a session proxy (SP, which tries to preserve the quality of the streaming video upon each handoff between access points. We have evaluated thresholds of RSSI and Loss Frame Rate (LFR for deciding the moment when the handoff process shall begin. Our solution performance was evaluated in a testbed implementation for MPEG-4 video on demand with one video server (VLS and two FreeBSD-based access points supporting Mobile IP, DHCP Server and IAPP approach.

  13. AAS Special Session: Policy Making in Astronomy

    Science.gov (United States)

    Cardelli, J. A.; Massa, D.

    1995-12-01

    The professional astronomical community today is more diverse than at any time in its history. Individuals participating in creative research programs can be found in a wide range of positions. This type of diversity, which mixes research, education, and service (e.g. contract) work, represents the strength of contemporary astronomy. While recognizing the unavoidable reductions in funding and restructuring of organizations like NASA, it is imperative that the significance of the current diversity be considered during these processes. Creative ideas are one of the cornerstones of quality research, and they can originate anywhere. Consequently, it is essential that adequate research resources remain available for free and open competition by all astronomers. Our goal in this session is to bring together officials from the AAS, NASA, and the NSF to discuss how the policy and decision making process operates and whether it should be changed to better serve the general needs of the professional astronomical community. Examples of the issues we believe are important include: In establishing new policy, how can the needs of the average research astronomer be better addressed? How could input from such astronomers be provided to those who craft NASA/NSF policy? How can/should the AAS serve as an interface between policy/decision making bodies and its membership? Should the AAS membership become more actively/effectively involved in the decision making process and, if so, how? More information on this session and related issues can be found at the Association of Research Astronomers Home Page: http://www.phy.vill.edu/astro/faculty/ara/ara_home.htm

  14. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  15. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  16. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  17. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  18. Effect of a yoga practice session and a yoga theory session on state anxiety.

    Science.gov (United States)

    Telles, Shirley; Gaur, Vaishali; Balkrishna, Acharya

    2009-12-01

    Yoga techniques practiced for varying durations have been shown to reduce state anxiety. In this study, there were 300 naive-to-yoga persons of both sexes who were attending a yoga therapy center in north India for stress relief as day visitors and were not residing at the center. They were assigned to two groups, yoga practice and yoga theory, and their state anxiety was assessed before and after a 2-hr. yoga session. A significant reduction in scores on state anxiety was found in the yoga practice group (14.7% decrease), as well as in the yoga theory group (3.4% decrease). The difference in scores following the sessions was statistically significant. Hence, yoga practice as well as learning about theoretical aspects of yoga appear to reduce state anxiety, with a greater reduction following yoga practice.

  19. Three statistical approaches to sessionizing network flow data

    OpenAIRE

    Rubin-Delanchy, Patrick T G; Lawson, Daniel John; Turcotte, Melissa J.; Heard, Nicholas A.; Adams, Niall M.

    2014-01-01

    The network traffic generated by a computer, or a pair of computers, is often well modelled as a series of sessions. These are, roughly speaking, intervals of time during which a computer is engaging in the same, continued, activity. This article explores a variety of statistical approaches to re-discovering sessions from network flow data using timing alone. Solutions to this problem are essential for network monitoring and cyber-security. For example overlapping sessions on a computer netwo...

  20. Examining Web Application by Clumping and Orienting User Session Data

    OpenAIRE

    Deenadayalan, T.; V. Kavitha; S. Rajarajeswari

    2010-01-01

    The increasing demand for reliable Web applications gives a central role to Web testing. Most of the existing works are focused on the definition of novel testing techniques, specifically tailored to the Web. However, no attempt was carried out so far to understand the specific nature of Web faults. This paper presents a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster and tailored...

  1. Summary Of Session 5: How Should We Handle Safety?

    Energy Technology Data Exchange (ETDEWEB)

    Albert, M.; Roy, G

    2001-07-01

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  2. [Interests of advanced systematic evaluation of dialysis session].

    Science.gov (United States)

    Galland, Roula; Hallonet, Patrick; Pachot, Monique; Combe, Corinne; Schoenfelder, Isabelle; Caillette Beaudoin, Agnès

    2013-07-01

    In order to rationalize the cost of care for dialysis patients in Centre, regulatory authorities urge establishments to favor the orientation of the patients in Medical Dialysis Unit where the medical presence is not permanent. This involves clinical skills for nurses in the conduct of the dialysis session. Faced with this changing work patterns, we present two security tools of the dialysis session. The first is a "check-list", simple, quick and easy to use, it enables secure connection phase of the patient. It was quickly integrated practice of all professionals. The second tool developed is a combination of indicators "DEAUP" for Pain, Purification, Blood access, Ultrafiltration and other Problems for assessing the quality of the course of the dialysis session. The aim is to reduce the occurrence of adverse events, the DEAUP rating certain criteria depending on the occurrence of incidents, from 0 to 2, 2 corresponding to the appearance of an incident having required the call of the doctor and constitute a precious tool of evaluation of the session for all the professionals. All nurses have joined the practice of evaluation, 98% of the realized sessions are informed and quoted; 8.4% of sessions required call nephrologists before or at the connection. The evaluation at the end of dialysis session found 15% of the sessions listed 2. Calls have resulted in an adjustment to the prescription of the sessions.

  3. A Comparison of Natural Language Processing Methods for Automated Coding of Motivational Interviewing.

    Science.gov (United States)

    Tanana, Michael; Hallgren, Kevin A; Imel, Zac E; Atkins, David C; Srikumar, Vivek

    2016-06-01

    Motivational interviewing (MI) is an efficacious treatment for substance use disorders and other problem behaviors. Studies on MI fidelity and mechanisms of change typically use human raters to code therapy sessions, which requires considerable time, training, and financial costs. Natural language processing techniques have recently been utilized for coding MI sessions using machine learning techniques, rather than human coders, and preliminary results have suggested these methods hold promise. The current study extends this previous work by introducing two natural language processing models for automatically coding MI sessions via computer. The two models differ in the way they semantically represent session content, utilizing either 1) simple discrete sentence features (DSF model) and 2) more complex recursive neural networks (RNN model). Utterance- and session-level predictions from these models were compared to ratings provided by human coders using a large sample of MI sessions (N=341 sessions; 78,977 clinician and client talk turns) from 6 MI studies. Results show that the DSF model generally had slightly better performance compared to the RNN model. The DSF model had "good" or higher utterance-level agreement with human coders (Cohen's kappa>0.60) for open and closed questions, affirm, giving information, and follow/neutral (all therapist codes); considerably higher agreement was obtained for session-level indices, and many estimates were competitive with human-to-human agreement. However, there was poor agreement for client change talk, client sustain talk, and therapist MI-inconsistent behaviors. Natural language processing methods provide accurate representations of human derived behavioral codes and could offer substantial improvements to the efficiency and scale in which MI mechanisms of change research and fidelity monitoring are conducted.

  4. From Coding to Computational Thinking and Back

    OpenAIRE

    DePryck, K.

    2016-01-01

    Presentation of Dr. Koen DePryck in the Computational Thinking Session in TEEM 2016 Conference, held in the University of Salamanca (Spain), Nov 2-4, 2016.   Introducing coding in the curriculum at an early age is considered a long-term investment in bridging the skills gap between the technology demands of the labour market and the availability of people to fill them. The keys to success include moving from mere literacy to active control – not only at the level of learners but also ...

  5. APPLYING COLLABORATION SCRIPT IN KNOWLEDGE BASED SESSIONS

    Directory of Open Access Journals (Sweden)

    AIMAN TURANI

    2016-01-01

    Full Text Available Knowledge Based Processes, KBP, have been introduced to facilitate knowledge transfer among organizational and corporate employees. They stress on the key role of socialization and group meetings in promoting effective knowledge transfer. Meetings within virtual environment are becoming more and more used in today’s organizational settings. There are many conferencing tools that are used to facilitate such meetings. However, providing participants with a co nferencing or chatting tool and expecting them to transfer their knowledge to each other in a convenient way, could lead to many disappointments. CSCL, Computer Support for Collaborative Learning, is relatively a new discipline within teaching and learning field. Applying CSCL techniques and technologies in Knowledge Base Systems, KBS, would be a reasonable option since teaching and learning is essentially a process of knowledge transfer between instructors and students or collaboratively between students themselves. In this research we are focusing on the usage of Collaboration Script, CS, as a way to support knowledge transfer sessions in a structured and formal way. It facilitates sharing tacit knowledge via guided interpersonal interactions and turning them to explicit knowledge by capturing and retrieving these interactions. In this paper we are presenting the scripting structure of three common collaboration techniques used in Knowledge Base processes. As a proof of concept, two of these techniques are described using the collaboration scripting language, ColScript, that was introduced by us in an earlier research.

  6. Teaching statistics to medical undergraduates using interactive and participatory sessions

    Directory of Open Access Journals (Sweden)

    THULASINGAM MAHALAKSHMY

    2013-10-01

    Full Text Available Introduction: In India, medical undergraduates think that statistics is difficult to understand. Often, it is taught just before final assessment examination using didactic lectures, with little use of medical examples and less focus on application. Hence, we prepared interactive, participatory sessions for teaching biostatistics to medical undergraduate. Methods: The sessions were delivered by a facilitator. It had clearly specified objectives and teaching learning strategies. A needs assessment was done by interviewing the students who had undergone traditional biostatistics teaching methodology. Specific learning objectives for the sessions were finalized using the Delphi technique and review of University syllabus. Two trained Community Medicine faculties designed the lesson plans ‘backwards’ from desired outcome to content, teaching/learning strategies, assessment and evaluation process (Outcomes-based lesson planning. Forty, third-semester (Para-clinical phase of the second year medical undergraduates undertook these seven teaching sessions. The session followed adult learning principles and included group discussions, games and reflections. We evaluated the impact of the sessions using in-depth interviews, retrospective post-then-preself- assessment and a pre-announced written test. Results: With traditional statistics teaching methodology, students perceived it as a standalone subject and were not interested in statistics. Students who underwent the sessions commented that the sessions were enjoyable, interesting, and participatory and more than %90 of them felt they were engaged throughout the session. They also narrated various instances where they could apply the biostatistics learning. In the post-then-pre-assessment median post-session scores for all the objectives were significantly higher (p <0.050. Conclusion: Use of interactive, participatory sessions for teaching biostatistics to medical undergraduates resulted in a

  7. Session-based Choreography with Exceptions

    DEFF Research Database (Denmark)

    Carbone, Marco

    2009-01-01

    Choreography has recently emerged as a pragmatic and concise way of describing communication-based systems such as web services and financial protocols. Recent studies have investigated the transition from the design stage of a system to its implementation providing an automatic way of mapping...... a choreograhy into executable code. In this work, we focus on an extension of choreography with a communication-based (interactional) exception mechanism by giving its formal semantics. In particular, we discuss through some examples how interactional exceptions at choreography level can be implemented into end...

  8. SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways

    Directory of Open Access Journals (Sweden)

    Akbar AliHammad

    2010-01-01

    Full Text Available 6LoWPAN (IPv6 based Low-Power Personal Area Network is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inter-connected. This interconnection is especially required in commercial and enterprise applications of sensor networks where reliable and timely data transfers such as multiple code updates are needed from Internet nodes to sensor nodes. For this type of inbound traffic which is mostly bulk, TCP as transport layer protocol is essential, resulting in end-to-end TCP session through a default gateway. In this scenario, a single gateway tends to become the bottleneck because of non-uniform connectivity to all the sensor nodes besides being vulnerable to buffer overflow. We propose SET; a management architecture for multiple split-TCP sessions across a number of serving gateways. SET implements striping and multiple TCP session management through a shim at session layer. Through analytical modeling and ns2 simulations, we show that our proposed architecture optimizes communication for ingress bulk data transfer while providing associated load balancing services. We conclude that multiple split-TCP sessions managed in parallel across a number of gateways result in reduced latency for bulk data transfer and provide robustness against gateway failures.

  9. Proceedings of the 21st DOE/NRC nuclear air cleaning conference; Volume 2, Sessions 9--16

    Energy Technology Data Exchange (ETDEWEB)

    First, M.W. [ed.] [Harvard Univ., Boston, MA (United States). Harvard Air Cleaning Lab.

    1991-02-01

    The 21st meeting of the Department of Energy/Nuclear Regulatory Commission (DOE/NRC) Nuclear Air Cleaning Conference was held in San Diego, CA on August 13--16, 1990. The proceedings have been published as a two volume set. Volume 2 contains sessions covering adsorbents, nuclear codes and standards, modelling, filters, safety, containment venting and a review of nuclear air cleaning programs around the world. Also included is the list of attendees and an index of authors and speakers. (MHB)

  10. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  11. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-01-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  12. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-05-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  13. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  14. Type Inference for Session Types in the Pi-Calculus

    DEFF Research Database (Denmark)

    Graversen, Eva Fajstrup; Harbo, Jacob Buchreitz; Huttel, Hans

    2014-01-01

    In this paper we present a direct algorithm for session type inference for the π-calculus. Type inference for session types has previously been achieved by either imposing limitations and restriction on the π-calculus, or by reducing the type inference problem to that for linear types. Our approach...

  15. Quality Assurance of Assessment and Moderation Discourses Involving Sessional Staff

    Science.gov (United States)

    Grainger, Peter; Adie, Lenore; Weir, Katie

    2016-01-01

    Quality assurance is a major agenda in tertiary education. The casualisation of academic work, especially in teaching, is also a quality assurance issue. Casual or sessional staff members teach and assess more than 50% of all university courses in Australia, and yet the research in relation to the role sessional staff play in quality assurance of…

  16. Physical modelling in Geotechnical Earthquake Engineering – 2: Session Report

    OpenAIRE

    Madabhushi, Gopal

    2015-01-01

    This is the accepted manuscript. The final version is available at http://www.icevirtuallibrary.com/content/article/10.1680/ijpmg.14.00033. Geotechncial earthquake engineering continues to be an important area of research for physical modellers. There were 13 papers presented in this session. These papers and the direction of future research in this area are discussed in this session report.

  17. Energy and the public: public awareness workshop and plenary session

    Energy Technology Data Exchange (ETDEWEB)

    1979-07-01

    This publication of these two sessions of the conference on February 22 and 23, 1979 was prepared from a verbatim record made by a reporting firm. A separate abstract was prepared for each of the seventeen papers of the public awareness workshops and of the six papers of the plenary session.

  18. Asynchronous Session Types – Exceptions and Multiparty Interactions

    DEFF Research Database (Denmark)

    Carbone, Marco; Yoshida, Nobuko; Honda, Kohei

    2009-01-01

    to capture many real scenarios, there are cases where they are not powerful enough for describing and validating interactions involving more complex scenarios. In this note, we shall explore two extensions of session types to interactional exceptions and multiparty session in presence of asynchronous...

  19. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  20. Similarity Measurement of Web Sessions Based on Sequence Alignment

    Institute of Scientific and Technical Information of China (English)

    LI Chaofeng; LU Yansheng

    2007-01-01

    The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra-group similarity while minimizing the inter-group similarity.The first and foremost question needed to be considered in clustering Web sessions is how to measure the similarity between Web sessions. However, there are many shortcomings in traditional measurements. This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited Web page. Then we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of Web page access in detail.Experiments have proved that our method is valid and efficient.

  1. Examining Web Application by Clumping and Orienting User Session Data

    CERN Document Server

    Deenadayalan, T; Rajarajeswari, S

    2010-01-01

    The increasing demand for reliable Web applications gives a central role to Web testing. Most of the existing works are focused on the definition of novel testing techniques, specifically tailored to the Web. However, no attempt was carried out so far to understand the specific nature of Web faults. This paper presents a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster and tailored by augmentation with additional requests to cover the dependence relationships between web pages. The created suite not only can significantly reduce the size of the collected user sessions, also viable to exercise fault sensitive paths. The results demonstrate that our approach consistently detected the majority of known faults using a relatively small number of test cases and will be a powerful system when more and more user sessions are being clustered.

  2. Reactivity to nicotine cues over repeated cue reactivity sessions.

    Science.gov (United States)

    LaRowe, Steven D; Saladin, Michael E; Carpenter, Matthew J; Upadhyaya, Himanshu P

    2007-12-01

    The present study investigated whether reactivity to nicotine-related cues would attenuate across four experimental sessions held 1 week apart. Participants were nineteen non-treatment seeking, nicotine-dependent males. Cue reactivity sessions were performed in an outpatient research center using in vivo cues consisting of standardized smoking-related paraphernalia (e.g., cigarettes) and neutral comparison paraphernalia (e.g., pencils). Craving ratings were collected before and after both cue presentations while physiological measures (heart rate, skin conductance) were collected before and during the cue presentations. Although craving levels decreased across sessions, smoking-related cues consistently evoked significantly greater increases in craving relative to neutral cues over all four experimental sessions. Skin conductance was higher in response to smoking cues, though this effect was not as robust as that observed for craving. Results suggest that, under the described experimental parameters, craving can be reliably elicited over repeated cue reactivity sessions.

  3. CodeSlinger: a case study in domain-driven interactive tool design for biomedical coding scheme exploration and use.

    Science.gov (United States)

    Flowers, Natalie L

    2010-01-01

    CodeSlinger is a desktop application that was developed to aid medical professionals in the intertranslation, exploration, and use of biomedical coding schemes. The application was designed to provide a highly intuitive, easy-to-use interface that simplifies a complex business problem: a set of time-consuming, laborious tasks that were regularly performed by a group of medical professionals involving manually searching coding books, searching the Internet, and checking documentation references. A workplace observation session with a target user revealed the details of the current process and a clear understanding of the business goals of the target user group. These goals drove the design of the application's interface, which centers on searches for medical conditions and displays the codes found in the application's database that represent those conditions. The interface also allows the exploration of complex conceptual relationships across multiple coding schemes.

  4. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  5. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  6. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  7. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  8. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  9. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  10. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  11. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  12. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  13. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  14. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  15. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  16. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  19. Semi-Automated Discovery of Application Session Structure

    Energy Technology Data Exchange (ETDEWEB)

    Kannan, J.; Jung, J.; Paxson, V.; Koksal, C.

    2006-09-07

    While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a higher level---the structure of user-initiated sessions comprised of groups of related connections---remains much less explored. Some types of session structure, such as the coupling between an FTP control connection and the data connections it spawns, have prespecified forms, though the specifications do not guarantee how the forms appear in practice. Other types of sessions, such as a user reading email with a browser, only manifest empirically. Still other sessions might exist without us even knowing of their presence, such as a botnet zombie receiving instructions from its master and proceeding in turn to carry them out. We present algorithms rooted in the statistics of Poisson processes that can mine a large corpus of network connection logs to extract the apparent structure of application sessions embedded in the connections. Our methods are semi-automated in that we aim to present an analyst with high-quality information (expressed as regular expressions) reflecting different possible abstractions of an application's session structure. We develop and test our methods using traces from a large Internet site, finding diversity in the number of applications that manifest, their different session structures, and the presence of abnormal behavior. Our work has applications to traffic characterization and monitoring, source models for synthesizing network traffic, and anomaly detection.

  20. [The paradoxical effect of persuasive communication in health education sessions].

    Science.gov (United States)

    Piperini, Marie-Christine

    2012-01-01

    The purpose of this study was to examine the communication dynamics leading to the adoption of new attitudes and cognitions in health education sessions. We examined the verbal interactions at work in persuasive communication in 16 health education sessions. The study found that the medical expertise of the educator and the initial level of commitment of the participants had a positive effect on adherence to recommendations. However, persuasive communication in health education sessions appears to involve a paradoxical process in which criticism of the message can go hand in hand with the expression of an intention to implement new risk-reducing behaviors.

  1. The Neuromuscular, Biochemical, and Endocrine Responses to a Single-Session Vs. Double-Session Training Day in Elite Athletes.

    Science.gov (United States)

    Johnston, Michael J; Cook, Christian J; Drake, David; Costley, Lisa; Johnston, Julie P; Kilduff, Liam P

    2016-11-01

    Johnston, MJ, Cook, CJ, Drake, D, Costley, L, Johnston, JP, and Kilduff, LP. The neuromuscular, biochemical, and endocrine responses to a single-session vs. double-session training day in elite athletes. J Strength Cond Res 30(11): 3098-3106, 2016-The aim of this study was to compare the acute neuromuscular, biochemical, and endocrine responses of a training day consisting of a speed session only with performing a speed-and-weights training session on the same day. Fifteen men who were academy-level rugby players completed 2 protocols in a randomized order. The speed-only protocol involved performing 6 maximal effort repetitions of 50-m running sprints with 5 minutes of recovery between each sprint, whereas the speed-and-weights protocol involved the same sprinting session but was followed 2 hours later by a lower-body weights session consisting of 4 sets of 5 backsquats and Romanian deadlift at 85% one repetition maximum. Testosterone, cortisol, creatine kinase, lactate, and perceived muscle soreness were determined immediately before, immediately after, 2 hours after, and 24 hours after both the protocols. Peak power, relative peak power, jump height, and average rate of force development were determined from a countermovement jump (CMJ) at the same time points. After 24-hours, muscle soreness was significantly higher after the speed-and-weights protocol compared with the speed-only protocol (effect size η = 0.253, F = 4.750, p ≤ 0.05). There was no significant difference between any of the CMJ variables at any of the posttraining time points. Likewise, creatine kinase, testosterone, and cortisol were unaffected by the addition of a weight-training session. These data indicate that the addition of a weight-training session 2 hours after a speed session, whereas increasing the perception of fatigue the next day does not result in a difference in endocrine response or in neuromuscular capability.

  2. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  3. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  4. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  5. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  6. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  7. Spring Meeting Preview: Joint Assembly Sessions Focus on Urbanization

    Science.gov (United States)

    Zielinski, Sarah

    2006-04-01

    The urban environment has grown to encompass not just the downtown area of a city but also the suburbs and rapidly growing exurban areas. This growth can affect a wide range of geological, physical, and biological processes. Several sessions at the 23-26 May 2006 Joint Assembly in Baltimore, Md., will explore this topic. Two union sessions on the ``Impact of Urbanization on Environmental Systems'' (U31A and U32A) will take place on Wednesday morning, 24 May, at 8:30 A.M. and 10:45 A.M. The sessions are designed to be a wide-ranging exploration of the different, multiple roles that urbanization, and the changes in the environment that accompany urbanization, have on biological and geophysical processes, said session co-convener Larry Band. Brand is Voit Gilmore distinguished professor and chair of the department of geography at the University of North Carolina, Chapel Hill.

  8. Recording and reenactment of collaborative diagnosis sessions using DICOM.

    Science.gov (United States)

    von Wangenheim, Aldo; Prüsse, Martin; Maia, Rafael Simon; Abdala, Daniel Duarte; Regert, André Germano; Nobre, Luiz Felipe de Souza; Comunello, Eros

    2009-12-01

    This paper presents a radiological collaborative tool capable of direct manipulation of Digital Imaging and Communications in Medicine (DICOM) images on both sides, and also recording and reenacting of a recorded session. A special collaborative application protocol formerly developed was extended and used as basis for the development of collaborative session recording and playback processes. The protocol is used today for real-time radiological meetings through the Internet. This new standard for collaborative sessions makes possible other uses for the protocol, such as asynchronous collaborative sessions, decision regulation, auditing, and educational applications. Experimental results are given which compare this protocol with other popular collaborative approaches. Comparison of these results shows that the proposed protocol performs much better than other approaches when run under controlled conditions.

  9. Centième session du Conseil du CERN

    CERN Multimedia

    CERN Press Office. Geneva

    1994-01-01

    The CERN* Council, where the representatives of the 19 Member States of the Organization decide on scientific programmes and financial resources, held its 101st session on 16 December under the chairmanship of Prof. Hubert Curien (F).

  10. Theory Summary of the Electroweak Session for Moriond 2005

    CERN Document Server

    Peccei, Roberto D

    2005-01-01

    I broadly summarize the theoretical contributions in the Electroweak session of the 2005 Moriond meeting under four rubrics: i) neutrinos; ii) cosmology; iii) electroweak interactions; and iv) flavor physics.

  11. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  12. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  13. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  14. Summary of papers presented in the Theory and Modelling session

    OpenAIRE

    Lin-Liu Y.R.; Westerhof E.

    2012-01-01

    A total of 14 contributions were presented in the Theory and Modelling sessions at EC-17. One Theory and Modelling paper was included in the ITER ECRH and ECE sessions each. Three papers were in the area of nonlinear physics discussing parametric processes accompanying ECRH. Eight papers were based on the quasi-linear theory of wave heating and current drive. Three of these addressed the application of ECCD for NTM stabilization. Two papers considered scattering of EC waves by edge density fl...

  15. Assessing play-based activities, child talk, and single session outcome in family therapy with young children.

    Science.gov (United States)

    Willis, Amber B; Walters, Lynda H; Crane, D Russell

    2014-07-01

    This exploratory, observational study was designed to reveal descriptive information regarding therapists' actual practices with preschool- and school-aged children in a single session of family therapy and to investigate change mechanisms in family play therapy that have been proposed to make this approach effective. A purposive sample of 30 families receiving family therapy was recruited and video-taped during a family session where at least one child between the ages of 4 and 12 was present. Following the session, the therapist and parent(s) completed questionnaires while one of the children (aged 4-12) was interviewed. Session recordings were coded, minute-by-minute, for participant talk time, visual aids or props used, and therapy technique type (e.g., play-based/activity vs. talk-only techniques). Hierarchical regression and canonical correlational analyses revealed evidence supporting the theory that play-based techniques promote young children's participation, enhance the quality of the child-therapist relationship, and build positive emotional experiences in family therapy.

  16. 75 FR 34418 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-06-17

    ...; ] DEPARTMENT OF AGRICULTURE Office of the Secretary Notice of the Specialty Crop Committee's Stakeholder Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: The notice announces the Specialty Crop Committee's Stakeholder Listening Session....

  17. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  18. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  19. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  20. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  1. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  2. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  3. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  4. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  5. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  6. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  7. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  8. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  9. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  10. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  11. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  12. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  13. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  14. What's in a Session: Tracking Individual Behavior on the Web

    CERN Document Server

    Meiss, Mark; Gonçalves, Bruno; Ramasco, José J; Menczer, Filippo; 10.1145/1557914.1557946

    2010-01-01

    We examine the properties of all HTTP requests generated by a thousand undergraduates over a span of two months. Preserving user identity in the data set allows us to discover novel properties of Web traffic that directly affect models of hypertext navigation. We find that the popularity of Web sites -- the number of users who contribute to their traffic -- lacks any intrinsic mean and may be unbounded. Further, many aspects of the browsing behavior of individual users can be approximated by log-normal distributions even though their aggregate behavior is scale-free. Finally, we show that users' click streams cannot be cleanly segmented into sessions using timeouts, affecting any attempt to model hypertext navigation using statistics of individual sessions. We propose a strictly logical definition of sessions based on browsing activity as revealed by referrer URLs; a user may have several active sessions in their click stream at any one time. We demonstrate that applying a timeout to these logical sessions af...

  15. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  16. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  17. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  18. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  19. Theory, practice, and history in critical GIS: Reports on an AAG panel session

    Science.gov (United States)

    Wilson, M.W.; Poore, B.S.

    2009-01-01

    Extending a special session held at the 2008 annual meeting of the Association of American Geographers in Boston, this commentary collection highlights elements of the critical GIS research agenda that are particularly pressing. Responding to a Progress report on critical GIS written by David O'Sullivan in 2006, these six commentaries discuss how different interpretations of 'critical' are traced through critical GIS research. Participants in the panel session discussed the need for a continued discussion of a code of ethics in GIS use in the context of ongoing efforts to alter or remake the software and its associated practices, of neo-geographies and volunteered geographies. There were continued calls for hope and practical ways to actualize this hope, and a recognition that critical GIS needs to remain relevant to the technology. This 'relevance' can be variously defined, and in doing so, researchers should consider their positioning vis-??-vis the technology. Throughout the commentaries collected here, a question remains as to what kind of work disciplinary sub-fields such as critical GIS and GIScience perform. This is a question about language, specifically the distance that language can create among practitioners and theoreticians, both in the case of critical GIS and more broadly throughout GIScience.

  20. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  1. Look at the Gato! Code-Switching in Speech to Toddlers

    Science.gov (United States)

    Bail, Amelie; Morini, Giovanna; Newman, Rochelle S.

    2015-01-01

    We examined code-switching (CS) in the speech of twenty-four bilingual caregivers when speaking with their 18- to 24-month-old children. All parents CS at least once in a short play session, and some code-switched quite often (over 1/3 of utterances). This CS included both inter-sentential and intra-sentential switches, suggesting that at least…

  2. Vienna SAC-SOS: Analysis of the European VLBI Sessions

    Science.gov (United States)

    Ros, C. T.; Pavetich, P.; Nilsson, T.; Böhm, J.; Schuh, H.

    2012-12-01

    The Institute of Geodesy and Geophysics (IGG) of the Vienna University of Technology as an IVS Special Analysis Center for Specific Observing Sessions (SAC-SOS) has analyzed the European VLBI sessions using the software VieVS. Between 1990 and 2011, 115 sessions have been carried out. The analyzed baselines have lengths ranging from approximately 445 to 4580 km, and they show good repeatabilities, apart from the ones containing station Simeiz. The station velocities have also been investigated. The stations situated in the stable part of Europe have not shown significant relative movements w.r.t. Wettzell, whereas the stations located in the northern areas have the largest vertical motions as a result of the post glacial isostatic rebound of the zone. The stations placed in Italy, around the Black Sea, in Siberia, and near the Arctic Circle show the largest relative horizontal motions because they belong to different geodynamical units.

  3. ENABLING NETWORK CONVERGENCE THROUGH CONTEXTUAL SESSION MOBILITY WITH IMS

    Directory of Open Access Journals (Sweden)

    A. Dragoi

    2011-05-01

    Full Text Available To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This article investigates the problem space of supporting Session Mobility (SM with IMS and the associated issues such as when and how to support dynamic changes in the set of devices through which the user accesses a session. It also investigates how the SM arrival calls should be handled at the network level where they are not considered as ongoing sessions. Hence, we discuss the design options and identify functional blocks needed to support SM. We propose applying priority-based resource allocation approach to guarantee lower blocking probability for ongoing SM arrival calls compared to new arrival calls. Numerical results show that this approach allows achieving such performance for different call arrival rates.

  4. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist. Leadership Training           Training Course Title Next Session Language Duration Available places Needed to maintain the session Driving for Impact and Influence 13-Sep-2016 to 14-Sep-2016 French 2 days 4 0 Essentials of People Management for CERN Supervisors (Adapted from CDP for CERN Supervisors) 22-Sep-2016 to 23-Sep-2016, 18-Nov-2016, 17-Jan-2017 to 18-Jan-2017 English 5 days 5 0 Eléments essentiels de la gestion du personnel pour les superviseurs (adapt&a...

  5. Summary of papers presented in the Theory and Modelling session

    Directory of Open Access Journals (Sweden)

    Lin-Liu Y.R.

    2012-09-01

    Full Text Available A total of 14 contributions were presented in the Theory and Modelling sessions at EC-17. One Theory and Modelling paper was included in the ITER ECRH and ECE sessions each. Three papers were in the area of nonlinear physics discussing parametric processes accompanying ECRH. Eight papers were based on the quasi-linear theory of wave heating and current drive. Three of these addressed the application of ECCD for NTM stabilization. Two papers considered scattering of EC waves by edge density fluctuations and related phenomena. In this summary, we briefly describe the highlights of these contributions. Finally, the three papers concerning modelling of various aspects of ECE are reported in the ECE session.

  6. Unconference session at the IAU General Assembly 2015

    Science.gov (United States)

    Nava, Tibisay Sankatsing; Venugopal, Ramasamy; Verdolini, Silvia

    2016-10-01

    The Astronomy For Development Focus Meeting 20 at the IAU General Assembly encompassed an `Unconference' session as part of the proceedings. Unstructured conferences, with their potential to unleash innovative ideas, are gaining traction in various conferences and symposia. Astronomy For Development is a field that is applicable to the entire Astronomy community (and even beyond) and hence an unconference inviting ideas and fostering frank dialogue is very pertinent. Officially one of the final sessions of the the 2015 General Assembly, the unconference session was intended to provide a balanced platform for a diverse set of participants and act as an informal setting to promote open discussion on topics of relevance to Astronomy for Development.

  7. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  8. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  9. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  10. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  11. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  12. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  13. Multipath Routing of Multiple Description Coded Images in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    徐缓缓; 朱策; 虞露

    2014-01-01

    Multiple description coding (MDC) generates multiple decodable bitstreams for a source to combat informa-tion loss. In this paper, multipath routing problem for two-description coded images is investigated for traditional and coded wireless networks without and with coding capability at intermediate nodes, respectively. Firstly, we formulate an interference-aware MDC multipath routing for traditional networks by employing a time-division link scheduling method to eliminate wireless interference, and ultimately obtain an optimal path selection corresponding to the minimum achievable distortion. Secondly, for coded networks, we evaluate practical wireless network coding (NC) in delivering descriptions of multiple unicast sessions. While NC increases maximum supporting flow rate of MDC descriptions in wireless networks, possible undecodability of NC mixed information is alleviated by MDC. To minimize achievable distortion, a proposed interference-and-coding-aware MDC multipath routing strikes a good balance between minimizing side effect of wireless interference avoidance and maximizing NC opportunity. Simulation results validate the effectiveness of the two proposed schemes.

  14. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  15. An Interactive Session on Nutritional Pathologies for Health Professional Students

    Directory of Open Access Journals (Sweden)

    Joshua DeSipio

    2015-07-01

    Full Text Available Various studies have emphasized the need to improve the nutrition training of health professionals, which will help them to provide optimal patient care. Nutrition-based interactive sessions may serve as an efficient approach to instigate an interest in nutrition among the students. Here we report the reception and effectiveness of a nutrition-pathology based interactive activity that we designed and implemented in the gastroenterology course given to the second year students at our medical school. The activity involved team work, individual accountability and peer-teaching. Nutrition pathology case stems (Kwashiorkor, vitamin B-12 deficiency, zinc deficiency and zinc-induced copper deficiency were posted on the course website for the students to read before the session. At the start of the session, all the groups (each made up of four members took a pre-quiz. Each student was then given an information sheet describing one case. Each group discussed the four cases with students acting as the “teacher” for the case assigned to them. A post-quiz was administered to the groups to assess acquisition of knowledge as well as in-depth thinking about the nutrition aspects discussed. The efficacy of the session measured by pre (39% questions correctly answered in total and post-quizzes (96% questions correctly answered in total and the overwhelmingly positive student feedback indicated that the session was highly effective. Ninety-five percent of students thought that the session demonstrated the clinical relevance of nutrition, while 98% students found the peer teaching to be engaging.

  16. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  17. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  18. Sea Surface Sound: discussion session on future research and applications

    Science.gov (United States)

    Buckingham, M. J.; Potter, J. R.

    On one evening during the week of the workshop, a brain-storming session was held with a view to identifying important areas of research into sea surface sound that should be addressed in the future. Potential applications of sea surface sound were included in the discussion. Acting as chairman, Michael Buckingham (MB) introduced the session, which was attended by most of the participants at the workshop. The intention was to encourage the participants to explore, in an informal setting, the future of sea surface sound. A summary of comments and conclusions, compiled from MB's notes of the discussion, is presented below…

  19. Mini-conference and Related Sessions on Laboratory Plasma Astrophysics

    Energy Technology Data Exchange (ETDEWEB)

    Hantao Ji

    2004-02-27

    This paper provides a summary of some major physics issues and future perspectives discussed in the Mini-Conference on Laboratory Plasma Astrophysics. This Mini-conference, sponsored by the Topical Group on Plasma Astrophysics, was held as part of the American Physical Society's Division of Plasma Physics 2003 Annual Meeting (October 27-31, 2003). Also included are brief summaries of selected talks on the same topic presented at two invited paper sessions (including a tutorial) and two contributed focus oral sessions, which were organized in coordination with the Mini-Conference by the same organizers.

  20. A Critique of Private Sessions in Family Mediation

    Directory of Open Access Journals (Sweden)

    Don Bowen

    2013-02-01

    Full Text Available This study represents a critical examination of private sessions (caucuses, seen as a sub-process within the core family mediation process and defined as involving separate and confidential conversations between mediator(s and each disputant during the main session. In the study, the views of family mediators were explored revealing that considerable support for the use of the tool was juxtaposed with a range of fundamental ethical concerns. Emerging from the study is strong evidence of coercive practice as an inherent component of caucusing thus posing a challenge to the positive benefits.

  1. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  2. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  3. EthoLog 2.2: a tool for the transcription and timing of behavior observation sessions.

    Science.gov (United States)

    Ottoni, E B

    2000-08-01

    EthoLog is a tool that aids in the transcription and timing of behavior observation sessions--experimental or naturalistic, from video/audio tapes or registering real time. It was created with Visual Basic and runs on Windows (3.x/9x). The user types the key codes for the predefined behavioral categories, and EthoLog registers their sequence and timing and saves the resulting data in ASCII output files. A sequential analysis matrix can be generated from the sequential data. The output files may be edited, converted to plain text files for printing, or exported to a spreadsheet program, such as MS Excel, for further analyses.

  4. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  5. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  6. Differences between a single session and repeated sessions of 1 Hz TMS by double-cone coil prefrontal stimulation for the improvement of tinnitus.

    Science.gov (United States)

    Vanneste, Sven; De Ridder, Dirk

    2013-03-01

    Tinnitus related distress is associated with increased activity in the anterior cingulate cortex (ACC). In a recent study, it was demonstrated that a single session of low frequency prefrontal TMS using a double-cone coil (DCC) modulating the ACC (AC/DC TMS, anterior cingulate cortex targeted modulation by Double-Cone coil) yields a transient improvement in subjects with chronic tinnitus. An increasing number of studies demonstrated that repeated sessions of low frequency TMS to the temporoparietal area can significantly improve tinnitus complaints. Our aim is to determine the extent to which repeated sessions of AC/DC TMS can modulate tinnitus in comparison to a single session. Seventy-three tinnitus patients received a single (N = 46) or repetitive (N = 27) session(s) of TMS using a DCC placed over the prefrontal cortex. Our results indicate that both single sessions as well as multiple sessions (i.e. 8 sessions) of AC/DC TMS suppress both tinnitus distress (respectively 7.60% vs. 26.19%) and tinnitus intensity (respectively 7.12% vs. 19.60%) transiently. It was further shown that multiple sessions of AC/DC TMS generate a higher suppression effect in comparison to a single session of AC/DC TMS and that more patients responded to repeated sessions of 1 Hz stimulation in comparison to a single session. Our findings give further support to the fact that non-auditory areas are involved in tinnitus intensity and tinnitus distress and that more patients respond to repeated sessions with a higher suppression effect in comparison to patients who received a single session, suggesting that the approach of daily TMS sessions is relevant.

  7. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  8. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  9. Effects of Psychotherapy Training and Intervention Use on Session Outcome

    Science.gov (United States)

    Boswell, James F.; Castonguay, Louis G.; Wasserman, Rachel H.

    2010-01-01

    Objective: This study was an investigation of the relationships among therapist training variables, psychotherapy process, and session outcome in a psychotherapy training clinic. The aims were to assess the relationship between "training as usual" and intervention use in individual psychotherapy, to investigate the relationship between therapist…

  10. "Where Are We Going? Mini Sessions on Maxi Concerns."

    Science.gov (United States)

    Eastern Association for Physical Education of College Women, Albany, NY.

    The proceedings of the fall conference of the Eastern Association for Physical Education of College Women includes articles and overviews of mini-sessions. In "Journey Proud," Celeste Ulrich provides observations about human interaction, teaching/learning environments, techniques and methods, and administrative patterns and scholarship. In…

  11. Coherence Generalises Duality: A Logical Explanation of Multiparty Session Types

    DEFF Research Database (Denmark)

    Carbone, Marco; Lindley, Sam; Montesi, Fabrizio;

    2016-01-01

    these three calculi, giving semantics-preserving translations from GCP to CP and from MCP to GCP. The translation from GCP to CP interprets a coherence proof as an arbiter process that mediates communications in a session, while MCP adds annotations that permit processes to communicate directly without...

  12. Using Simulated Sessions to Enhance Clinical Social Work Education

    Science.gov (United States)

    Mooradian, John K.

    2008-01-01

    This article evaluates a learning method that used theatre students as family clients in an advanced social work practice course. Data from 47 advanced graduate students showed that observing peers conduct simulated sessions can be an effective and valued learning experience. Quantitative findings indicated that simulations are perceived to be…

  13. CWI at TREC 2012, KBA track and Session Track

    NARCIS (Netherlands)

    Araújo, S.; Boscarino, C.; Gebremeskel, G.G.; He, J.; Vries, A.P. de; Voorhees, E.M.; Buckland, L. P.

    2013-01-01

    We participated in two tracks: Knowledge Base Acceleration (KBA) Track and Session Track. In the KBA track, we focused on experi- menting with different approaches as it is the first time the track is launched. We experimented with supervised and unsupervised re- trieval models. Our supervised appro

  14. Hypnosis and Smoking: A Five-Session Approach.

    Science.gov (United States)

    Watkins, Helen H.

    An active five-session, individualized treatment approach to the stopping of smoking is described. This approach emphasized the following: (a) the feedback, in and out of hypnosis, of the client's own reasons for quitting, (b) the visualization of both positive and negative smoking experiences meaningful to the client, (c) maintaining contact with…

  15. 3rd Session of the Sant Cugat Forum on Astrophysics

    CERN Document Server

    Gravitational wave astrophysics

    2015-01-01

    This book offers review chapters written by invited speakers of the 3rd Session of the Sant Cugat Forum on Astrophysics — Gravitational Waves Astrophysics. All chapters have been peer reviewed. The book goes beyond normal conference proceedings in that it provides a wide panorama of the astrophysics of gravitational waves and serves as a reference work for researchers in the field.

  16. Aggregated Search Interface Preferences in Multi-Session Search Tasks

    NARCIS (Netherlands)

    Bron, M.; van Gorp, J.; Nack, F.; Baltussen, L.B.; de Rijke, M.

    2013-01-01

    Aggregated search interfaces provide users with an overview of results from various sources. Two general types of display exist: tabbed, with access to each source in a separate tab, and blended, which combines multiple sources into a single result page. Multi-session search tasks, e.g., a research

  17. Setting the Standards for Sessional Staff: Quality Learning and Teaching

    Science.gov (United States)

    Harvey, Marina

    2013-01-01

    Across the Australian Higher Education sector a focus on quality is driving a new paradigm for learning and teaching: quality standards. One challenge is to engage all academics with this progress towards systematic quality enhancement and assurance. Sessional staff, who provide most of the face-to-face teaching in Australian universities, remain…

  18. Our Place in the Universe. Session 1; History of Astronomy

    Science.gov (United States)

    Adams, Mitzi

    2016-01-01

    This session includes a very broad overview of a couple of the major ideas of astronomy, along with demonstrations of Earth's motions that, give rise to the seasons, show us the "faces" of Venus (and the Moon), and result in retrograde motion of the outer planets.

  19. Critical Thinking in Reflective Sessions and in Online Interactions

    Science.gov (United States)

    Celani, Maria Antonieta Alba; Collins, Heloisa

    2005-01-01

    This paper focuses on online educational sessions of a continuing teacher education programme. The aim of this programme is to give a contribution to the continuing education of teachers of English as critical professionals, aware of discursive classroom practices, able to analyze them in the light of objectives to be reached and knowledge to be…

  20. Attitudes of Healthcare Students on Gross Anatomy Laboratory Sessions

    Science.gov (United States)

    Kawashiro, Yukiko; Anahara, Reiko; Kohno, Toshihiko; Mori, Chisato; Matsuno, Yoshiharu

    2009-01-01

    At Chiba University, gross anatomy laboratory sessions ("laboratories") are required for physical therapy students. Though most physical therapy schools require their students to participate in laboratories so that they will better understand the structure of the human body, few data exist on the value of these laboratories specifically…

  1. Summary of the Open Session at the IMC 2016

    Science.gov (United States)

    Verbeeck, C.; Argo, M.; Brown, P.; Molau, S.; Rendtel, J.; Martínez Picar, A.

    2016-01-01

    The Open Session at the IMC 2016 took place on Friday, June 3rd 2016 evening (21:30-22:30) and was intended to accommodate beginners' questions about meteor astronomy. Megan Argo moderated a panel of experts, consisting of Peter Brown, Sirko Molau, Jürgen Rendtel, and Antonio Martínez Picar.

  2. Anger and Violence Prevention: Enhancing Treatment Effects through Booster Sessions

    Science.gov (United States)

    Bundy, Alysha; McWhirter, Paula T.; McWhirter, J. Jeffries

    2011-01-01

    This study was designed to evaluate the effectiveness of booster sessions on the maintenance of intervention gains following an anger management prevention program: "Student Created Aggression Replacement Education Program" ("SCARE"). Participants who had completed the "SCARE" program a year earlier were randomly assigned into either a booster…

  3. Evaluating Modeling Sessions Using the Analytic Hierarchy Process

    NARCIS (Netherlands)

    Ssebuggwawo, D.; Hoppenbrouwers, S.J.B.A.; Proper, H.A.

    2008-01-01

    In this paper, which is methodological in nature, we propose to use an established method from the field of Operations Research, the Analytic Hierarchy Process (AHP), in the integrated, stakeholder- oriented evaluation of enterprise modeling sessions: their language, pro- cess, tool (medium), and pr

  4. Factors Influencing Consent to Having Videotaped Mental Health Sessions

    Science.gov (United States)

    Ko, Kenton; Goebert, Deborah

    2011-01-01

    Objective: The authors critically reviewed the literature regarding factors influencing consent to having videotaped mental health sessions. Methods: The authors searched the literature in PubMed, PsycINFO, Google Scholar, and Web of Science from the mid-1950s through February 2009. Results: The authors identified 27 studies, of which 19 (73%)…

  5. 76 FR 41278 - Cargo Security Risk Reduction; Public Listening Sessions

    Science.gov (United States)

    2011-07-13

    ... SECURITY Coast Guard Cargo Security Risk Reduction; Public Listening Sessions AGENCY: Coast Guard, DHS..., transfer, and storage of Certain Dangerous Cargo (CDC) in bulk within the U.S. Marine Transportation System....Bergan@uscg.mil . SUPPLEMENTARY INFORMATION: Background In September 2009, the Coast Guard held a...

  6. Definitional Ceremonies: Integrating Community into Multicultural Counseling Sessions

    Science.gov (United States)

    Bitter, James Robert; Robertson, Patricia E.; Roig, Grace; Disqueact, J. Graham

    2004-01-01

    Definitional Ceremonies are used as a forum for integrating members of diverse cultures into multicultural counseling sessions. The authors provide a philosophical foundation, implementation process, and excerpts from a typescript of a recent definitional ceremony involving a women and her mother, both recently in the United States from Panama.

  7. Freshman Orientation Sessions Can Teach Incoming Students about Healthful Lifestyles

    Science.gov (United States)

    Freedman, Marjorie R.; Waldrop, Jennifer

    2011-01-01

    This GEM describes the "Freshman 15 Jeopardy" workshop, a 30-minute nutrition education session aimed to expose incoming college freshmen to the college food environment, to increase their awareness of factors that cause weight gain, and to instruct them on lifestyle choices they could employ to prevent weight gain. This short workshop has not…

  8. Secure bindings of SAML assertions to TLS sessions

    DEFF Research Database (Denmark)

    Kohlar, Florian; Schwenk, Jörg; Jensen, Meiko;

    2010-01-01

    is to strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. In this paper, we present a third approach which is of further interest beyond IDM protocols: we bind the SAML assertion to the TLS session that has been agreed upon between client and the service...

  9. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  10. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  11. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  12. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  13. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  14. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  15. Single-Session Radiofrequency Ablation of Bilateral Lung Metastases

    Energy Technology Data Exchange (ETDEWEB)

    Palussiere, Jean, E-mail: palussiere@bergonie.org; Gomez, Fernando; Cannella, Matthieu; Ferron, Stephane; Descat, Edouard [Institut Bergonie, Department of Radiology, Regional Cancer Centre (France); Fonck, Marianne [Institut Bergonie, Department of Digestive Oncology (France); Brouste, Veronique [Institut Bergonie, Clinical and Epidemiological Research Unit (France); Avril, Antoine [Institut Bergonie, Department of Surgery (France)

    2012-08-15

    Purpose: This retrospective study examined the feasibility and efficacy of bilateral lung radiofrequency ablation (RFA) performed in a single session. Methods: From 2002-2009, patients with bilateral lung metastases were treated by RFA, where possible in a single session under general anesthesia with CT guidance. The second lung was punctured only if no complications occurred after treatment of the first lung. Five lung metastases maximum per patient were treated by RFA and prospectively followed. The primary endpoint was the evaluation of acute and delayed complications. Secondary endpoints were calculation of hospitalization duration, local efficacy, median survival, and median time to tumor progression. Local efficacy was evaluated on CT or positron emission tomography (PET) CT. Results: Sixty-seven patients were treated for bilateral lung metastases with RFA (mean age, 62 years). Single-session treatment was not possible in 40 due to severe pneumothoraces (n = 24), bilateral pleural contact (n = 14), and operational exclusions (n = 2). Twenty-seven (41%) received single-session RFA of lesions in both lungs for 66 metastases overall. Fourteen unilateral and four bilateral pneumothoraces occurred (18 overall, 66.7%). Unilateral (n = 13) and bilateral (n = 2) chest tube drainage was required. Median hospitalization was 3 (range, 2-8) days. Median survival was 26 months (95% confidence interval (CI), 19-33). Four recurrences on RFA sites were observed (4 patients). Median time to tumor progression was 9.5 months (95% CI, 4.2-23.5). Conclusions: Although performing single-session bilateral lung RFA is not always possible due to pneumothoraces after RFA of first lung, when it is performed, this technique is safe and effective.

  16. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  17. New residential construction compliance: Evaluation of the Washington State Energy Code program

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, W.M.; Lee, A.D.; Sandahl, L.J.; Durfee, D.L.; Richman, E.E.

    1993-07-01

    This report describes the Pacific Northwest Laboratory`s (PNL`s) evaluation of the Washington State Energy Code Program (WSECP). In 1990, the Washington State Legislature passed a residential energy efficiency code to be effective July 1, 1992. Bonneville supported passage and implementation of the code to ensure that new residences in the State of Washington were as energy efficient as economically feasible. The Washington State Energy Office (WSEO) is conducting the WSECP for Bonneville to support code implementation. This support takes several forms, including providing training to code enforcement officials, technical support both in the field and through telephone ``hot lines,`` and computerized tools to review house plans for code compliance. WSEO began implementing the WSECP in 1992, prior to the effective date of the new code. This first phase of the WSECP was the subject of an earlier process evaluation conducted by PNL. From that evaluation PNL found that most new homes being built immediately after the code went into effect were ``grand-fathered`` under the old code. The training program for the new code was in place and sessions were being attended by the jurisdictions but it was too early to determine if the training was effective in improving code compliance and easing the transition to the new energy code. That is the subject of this evaluation.

  18. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  19. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  20. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  1. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  2. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  3. SUMMARY OF GENERAL WORKING GROUP A+B+D: CODES BENCHMARKING.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.; SHAPOSHNIKOVA, E.; ZIMMERMANN, F.; HOFMANN, I.

    2006-05-29

    Computer simulation is an indispensable tool in assisting the design, construction, and operation of accelerators. In particular, computer simulation complements analytical theories and experimental observations in understanding beam dynamics in accelerators. The ultimate function of computer simulation is to study mechanisms that limit the performance of frontier accelerators. There are four goals for the benchmarking of computer simulation codes, namely debugging, validation, comparison and verification: (1) Debugging--codes should calculate what they are supposed to calculate; (2) Validation--results generated by the codes should agree with established analytical results for specific cases; (3) Comparison--results from two sets of codes should agree with each other if the models used are the same; and (4) Verification--results from the codes should agree with experimental measurements. This is the summary of the joint session among working groups A, B, and D of the HI32006 Workshop on computer codes benchmarking.

  4. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  5. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  6. Exploring the Affective Inner Experiences of Therapists in Training: The Qualitative Interaction between Session Experience and Session Content

    Science.gov (United States)

    Melton, John L.; Nofzinger-Collins, Dawn; Wynne, Martha E.; Susman, Marilyn

    2005-01-01

    Thirty-four 1st-year counseling students recorded their inner experiences following a simulated counseling session. Using a qualitative collective case study approach to extract emotion from a large pool of inner experience, 6 judges identified samples of affect through a triangulation process using intensity, extreme, and critical case sampling…

  7. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  8. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  9. Group versus individual sessions delivered by a physiotherapist for female urinary incontinence: an interview study with women attending group sessions nested within a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Smith Jan

    2009-09-01

    Full Text Available Abstract Background The aim was to explore the concerns and expectations of women invited to attend group physiotherapy sessions for the management of female urinary incontinence and whether the experience changed their views; and to gather recommendations from women attending group sessions on the design and delivery of these sessions Methods An interview study nested within a randomised controlled trial in five British NHS physiotherapy departments, including 22 women who had expressed a preference for an individual physiotherapy session but were randomised to, and attended, group sessions. Results Embarrassment was woven throughout women's accounts of experiencing urinary incontinence and seeking health care. Uncertainty about the nature of group sessions was a source of concern. Attending the first session was seen as a big hurdle by many women. However, a sense of relief was common once the session started, with most women describing some benefit from attendance. Recommendations for design and delivery of the sessions from women focused on reducing embarrassment and uncertainty prior to attendance. Conclusion Taking account of women's embarrassment and providing detailed information about the content of group sessions will enable women to benefit from group physiotherapy sessions for the management of female urinary incontinence. Trial Registration Trial registration number: ISRCTN 16772662

  10. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    Laboratory (NRL #N0013-12-1-015), and the following companies: Denso, National Instruments, and Toyota ). Ptolemy Coding Style ∗ Christopher Brooks1, Edward A...Instruments, and Toyota ). 1As reported on September 3, 2014 by https://www.openhub.net/p/12005/factoids 1 In addition, OpenHub.net indicates that the

  11. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  12. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  13. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  14. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  15. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  16. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  17. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  18. Verbal expressions used by anaclitic and introjective patients with depressive symptomatology: Analysis of change and stuck episodes within therapeutic sessions

    Directory of Open Access Journals (Sweden)

    Nelson Valdés

    2015-01-01

    Full Text Available A person’s speech makes it possible to identify significant indicators which reflect certain characteristics of his/her personality organization, but also can vary depending on the relevance of specific moments of the session and the symptoms type. The present study analyzed 10 completed and successful therapeutic processes using a mixed methodology. The therapies were video–and audio-taped, as well as observed through a one-way mirror by trained observers. All the sessions of each therapy were considered (N = 230 in order to identify, delimit, transcribe, and analyze Change Episodes (CEs = 24 and Stuck Episodes (SEs = 26. Each episode was made up by patients’ speech segments (N = 1,282, which were considered as the sampling unit. The Therapeutic Activity Coding System (TACS-1.0 was used to manually code each patient’s verbalizations, nested within episodes and individuals, in order to analyze them using Hierarchical Linear Modelling (HLM. The findings suggest that anaclitic patients tend to use more verbalizations in order to ask for feedback or to be understood by their therapists (attune, whereas introjective patients tend to use more verbalizations in order to construct new meanings (resignify during therapeutic conversation, but especially during SEs. Clinical implications to enrich the therapeutic practice are discussed.

  19. Session: Avoiding, minimizing, and mitigating avian and bat impacts

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Kerlinger, Paul

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question answer period. The session addressed a variety of questions related to avoiding, minimizing, and mitigating the avian and bat impacts of wind power development including: what has been learned from operating turbines and mitigating impacts where they are unavoidable, such as at Altamont Pass WRA, and should there be mitigation measures such as habitat creation or land conservation where impacts occur. Other impact minimization and mitigation approaches discussed included: location and siting evaluations; options for construction and operation of wind facilities; turbine lighting; and the physical alignment/orientation. Titles and authors of the presentations were: 'Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part II' by Carl Thelander and 'Prevention and Mitigation of Avian Impacts at Wind Power Facilities' by Paul Kerlinger.

  20. Type systems for distributed programs components and sessions

    CERN Document Server

    Dardha, Ornela

    2016-01-01

    In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. In particular, static analysis techniques based on types and type systems are an adequate methodology considering their success in guaranteeing not only basic safety properties, but also more sophisticated ones like deadlock or lock freedom in concurrent settings. The main contributions of this book are twofold. i) We design a type system for a concurrent object-oriented calculus to statically ensure consistency of dynamic reconfigurations. ii) We define an encoding of the session pi-calculus, which models communication in distributed systems, into the standard typed pi-calculus. We use this encoding to derive properties like type safety and progress in the session pi-calculus by exploiting the corresponding properties in the standard typed pi-calculus.

  1. A Quantum Query Expansion Approach for Session Search

    Directory of Open Access Journals (Sweden)

    Peng Zhang

    2016-04-01

    Full Text Available Recently, Quantum Theory (QT has been employed to advance the theory of Information Retrieval (IR. Various analogies between QT and IR have been established. Among them, a typical one is applying the idea of photon polarization in IR tasks, e.g., for document ranking and query expansion. In this paper, we aim to further extend this work by constructing a new superposed state of each document in the information need space, based on which we can incorporate the quantum interference idea in query expansion. We then apply the new quantum query expansion model to session search, which is a typical Web search task. Empirical evaluation on the large-scale Clueweb12 dataset has shown that the proposed model is effective in the session search tasks, demonstrating the potential of developing novel and effective IR models based on intuitions and formalisms of QT.

  2. Regions of Star Formation Chemical Issues.(Discussion Session)

    CERN Document Server

    Díaz, A I; Terlevich, E; Diaz, Angeles I.; Edmunds, Mike G.; Terlevich, Elena

    2002-01-01

    Three are the main questions that were posed to the audience during this discussion session: a) Can galaxy abundances be believed?, b) What progress can we expect soon and from where? and c) Can we agree, as a community, on topics in which effort should be concentrated in the next five years? In what follows, the different contributions by people in the audience are reflected as they were said trying to convey the lively spirit that enlightened the discussion.

  3. CWI at TREC 2012, KBA Track and Session Track

    Science.gov (United States)

    2012-11-01

    the session infor- mation will then calculate. the documents in the stream corpora. Three out of the seven runs used a Hadoop cluster provide by...information will then calculate. the documents in the stream corpora. Three out of the seven runs used a Hadoop cluster provide by Sara.nl to process the...Environment We used JAVA and python as main programming languages. We used Hadoop architecture provided by SARA (the Natherlands SARA Computing and

  4. Resources for Education and Outreach Activities discussion session

    CERN Document Server

    Barney, David; The ATLAS collaboration; Bourdarios, Claire; Kobel, Michael; Kourkoumelis, Christine; Melo, Ivan; Rangel-Smith, Camila; Alexopoulos, Angelos

    2015-01-01

    Over the past few years a variety of resources have been developed, by individuals and groups, to support Education & Outreach activities in particle physics. Following short (five-minute) presentations by six speakers, a discussion session allowed the audience to go further in depth in activities they found particularly interesting. This paper presents brief overviews from each of the six speakers, followed by a summary of the ensuing discussion

  5. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist.  

  6. Synthesising Choreographies from Local Session Types (extended version)

    CERN Document Server

    Lange, Julien

    2012-01-01

    Designing and analysing multiparty distributed interactions can be achieved either by means of a global view (e.g. in choreography-based approaches) or by composing available computational entities (e.g. in service orchestration). This paper proposes a typing systems which allows, under some conditions, to synthesise a choreography (i.e. a multiparty global type) from a set of local session types which describe end-point behaviours (i.e. local types).

  7. Summary of the most significant results reported in this session

    CERN Document Server

    Van De Walle, R T

    1980-01-01

    In the following a summary is presented of five parallel sessions on light quark had- ron spectroscopy. In general all topics which were discussed in the plenary sessions, and for which the proceedings contain separate (invited) papers, will be left out; only occa- sionally (and for reasons of completeness) will we make a reference to these presentations. Several other restrictions can be made. Nearly all papers submitted to the (parallel) hadron spectroscopy sessions were experimenta1 1 ), the only exceptions being a series of four theoretical papers on the baryonium problem. Furthermore, there was virtually no new information concerning the 'classical' baryons. In particular, no new facts were submitted on the problem of the possible existence of baryon states outside the so-called minimal spectrum, i.e. outside {56,L+ } and {70,L-dd}, the existence of the {ZO}'s, and the exis- even o tence of (baryon) exotic states. There was one contribution on a 'possible' new:".* 2 ), and a report on the final measureme...

  8. New Session of introductory “E-Groups Training”

    CERN Multimedia

    2013-01-01

    The session provides a short introduction of E-Groups and how to use it to efficiently manage mailing lists at CERN. Alongside a general overview of the E-Groups application, E-Groups specific terminology, the management of dynamic and static groups and the specific settings for mails and archives are discussed in detail.   The course is intended to give newcomers a clear idea of what E-Groups are and how they can be used at CERN. It should enable users to be more efficient when being confronted in particular with: the creation of dynamic and static E-groups and the decision whether the one or the other type is more appropriate, the management of E-group memberships, and the setting of mailing/archiving related properties. The session will also focus on some best practices and give general advice on how to use E-Groups. This introductory training session is given jointly by members of the IT-OIS and GS-AIS groups and is intended for any member at CERN potentially being confronted with the ...

  9. Effects of an Intensive Resistant Training Sessions and Green Tea

    Directory of Open Access Journals (Sweden)

    Mohammad Esmaeil Afzalpour

    2014-03-01

    Full Text Available Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity women were randomly divided into 4 equal (n=10 groups including green tea supplementation, green tea supplementation plus resistance training, resistance training, and control groups. After supplementation period (600 mg/day, 14 days, resistance training and green tea supplementation plus resistance training groups performed an intensive resistance training session at 75-85 % of one repetition maximum. The malondialdehyde and total thiol were measured as oxidative stress indices. Data were analyzed by using of repeated measure ANOVA and LSD tests at p<0.056T. Results: Results showed that after 14 days of green tea consumption, malondialdehyde significantly decreased in green tea supplementation (p=0.03 and green tea supplementation plus resistance training (p=0.01 groups, while total thiol increased significantly (p=0.01 in two green tea supplementation groups. However, an intensive resistance training session increased malondialdehyde (p=0.01 without any significantly changes in total thiol (p=0.426T. Conclusion: It seems that green tea supplementation can inhibit exercise-induced protein and lipid oxidation in non-athletes women via enhancement of antioxidant defense system of the body6T.6T

  10. Analysis and comparison of intensity in specific soccer training sessions

    Directory of Open Access Journals (Sweden)

    Luciano Antonacci Condessa

    2015-03-01

    Full Text Available This study compared the exercise intensity of four specific soccer training sessions (friendly and training match, tactical and technical workouts. Ten professional soccer players (24.2 ± 3.7 years, 177.9 ± 7.3 cm, 63.2 ± 4.6 mLO2•kg-1•min-l were recruited. A treadmill progressive interval test was performed to determine the players' VO2max, maximal heart rate (HRmax, HR-VO2 curve, and the heart rate corresponding to blood lactate concentrations of 2 and 4 mmol/L. The heart rate during the training sessions was used to estimate the exercise intensity and to classify them into intensity zones (low-intensity: 4 mmol/L. Exercise intensities were different among training sessions (friendly match: 86.0 ± 5.1% HRmax; training match: 81.2 ± 4.1% HRmax; tactical workout: 70.4 ± 5.3% HRmax; technical workout: 62.1 ± 3.6% HRmax. The friendly match presented the highest percentage of time performed in the high-intensity zone.

  11. The Physics session at the ATLAS overview week

    CERN Multimedia

    Takai, H.

    The Physics session at the ATLAS overview week at Clermont-Ferrand will be certainly remembered by the presentation of Blaise Pascal's historical experiment repeat. And why not? He is the local hero and by the looks of his primitive measurements it does take a lot of guts to explain his results on the basis of air columns. He was also lucky that he did not have to simulate his results on modern day computers but used the Pascaline. Certainly a man ahead of his time. Of course that wasn't all. Surrounded by a chain of (luckily) extinct volcanoes, rolling hills, and superb views, Clermont-Ferrand provided the perfect backdrop for the physics discussions. It was once more seen that the physics of ATLAS is diverse and that it is healthy and doing well. Many people contributed to the success of the session. Fabiola started the session precisely at 14:00 with a summary of the most recent activities from the physics coordination. Somehow what got stuck in my mind was the very positive statistics on how many prese...

  12. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  13. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  14. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    .e., to be prepared to initiate improvement. The study shows how the effectiveness of the improvement system depends on the congruent fit between the five elements as well as the bridging coherence between the improvement system and the work system. The bridging coherence depends on how improvements are activated...... approach often ends up with demanding intense employee focus to sustain improvement and engagement. Likewise, a single-minded employee development approach often ends up demanding rationalization to achieve the desired financial results. These ineffective approaches make organizations react like pendulums...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  15. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  16. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  17. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  18. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  19. The Hunstad Code

    DEFF Research Database (Denmark)

    Abraham, Anders; Capetillo, Christina

    2016-01-01

    With modern technology and levels of prosperity making many of us increasingly self-sufficient, architects Anders Abraham and Christina Capetillo argue that a rural ‘town’ is defined by the level of interactivity within it rather than merely by population figures. In collaboration with curators A...... Annesofie Becker and Martin Christiansen, they have developed the Hunstad Code to offer guidelines for the construction of environments that can encourage the development of relationships between residents even while remaining low-density....

  20. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  1. The Phantom SPH code

    Science.gov (United States)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  2. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  3. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  4. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  5. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  6. ErythropoieSIS stimulating agent (ESA use is increased following missed dialysis sessions

    Directory of Open Access Journals (Sweden)

    T. Christopher Bond

    2012-06-01

    Missed session episodes result in significant increases in ESA utilization in the post-miss period, and also in total monthly ESA use. Such increases should be considered in any assessment of impact of missed sessions: both clinical and economic.

  7. CERN Technical Training 2006: Office Software Curriculum Scheduled Course Sessions (October-December 2006)

    CERN Multimedia

    2006-01-01

    The Office Software Curriculum of the CERN Technical Training Programme currently offers comprehensive training in Microsoft Office (Word, Excel, Powerpoint, Access, Outlook), MS Project, Frontpage, Dreamweaver, Indesign, LaTeX, and CERN EDMS. There are some places available on the following Microsoft Office 2003 course sessions, currently scheduled until December 2007: EXCEL 2003 - niveau 2 : ECDL - 16-17 October (2 days, session in French) WORD 2003 (Short Course II) - HowTo... Mail merge - 2 November (morning, bilingual session) WORD 2003 (Short Course IV) - HowTo... Work with master document - 2 November (afternoon, bilingual session) OUTLOOK 2003 (Short Course III) - Meetings and Delegation - 3 November (morning, bilingual session) EXCEL 2003 (Short Course IV) - HowTo... Link cells, worksheets and workbooks - 3 November (afternoon, bilingual session) EXCEL 2003 - Level 1: ECDL - 13-14 November (2 days, session in English) ACCESS 2003 - Level 2: ECDL - 5-6 December (2 days, session in English) The abo...

  8. 75 FR 32735 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-06-09

    ... the Le Rivage Hotel, 4800 Riverside Boulevard, Sacramento, California 95822. The public may file... programs affecting the specialty crop industry. The congressional legislation defines ``specialty crops... session. The listening session will elicit stakeholder input from industry and state...

  9. FISHERIES IN MOUNT HOPE BAY: NOTES ON A SPECIAL SYMPOSIUM FROM A SESSION MODERATOR

    Science.gov (United States)

    This contribution represents a summary of talks presented during the afternoon session the Mount Hope Bay Syposium, focused directly on the issues surrounding observed winter flounder populations, as prepared by the session moderator.

  10. 78 FR 70093 - Commercial Space Transportation Advisory Committee-Closed Session

    Science.gov (United States)

    2013-11-22

    ... Federal Aviation Administration Commercial Space Transportation Advisory Committee--Closed Session AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Commercial Space Transportation Advisory... closed session of the Commercial Space Transportation Advisory Committee (COMSTAC). The special...

  11. 76 FR 55732 - Public Listening Sessions Regarding the Maritime Administration's Panama Canal Expansion Study...

    Science.gov (United States)

    2011-09-08

    ... Maritime Administration Public Listening Sessions Regarding the Maritime Administration's Panama Canal Expansion Study and the America's Marine Highway Program AGENCY: Maritime Administration, DOT. ACTION: Notice. SUMMARY: The purpose of this notice is to announce a series of public listening sessions...

  12. Computer codes in nuclear safety, radiation transport and dosimetry; Les codes de calcul en radioprotection, radiophysique et dosimetrie

    Energy Technology Data Exchange (ETDEWEB)

    Bordy, J.M.; Kodeli, I.; Menard, St.; Bouchet, J.L.; Renard, F.; Martin, E.; Blazy, L.; Voros, S.; Bochud, F.; Laedermann, J.P.; Beaugelin, K.; Makovicka, L.; Quiot, A.; Vermeersch, F.; Roche, H.; Perrin, M.C.; Laye, F.; Bardies, M.; Struelens, L.; Vanhavere, F.; Gschwind, R.; Fernandez, F.; Quesne, B.; Fritsch, P.; Lamart, St.; Crovisier, Ph.; Leservot, A.; Antoni, R.; Huet, Ch.; Thiam, Ch.; Donadille, L.; Monfort, M.; Diop, Ch.; Ricard, M

    2006-07-01

    The purpose of this conference was to describe the present state of computer codes dedicated to radiation transport or radiation source assessment or dosimetry. The presentations have been parted into 2 sessions: 1) methodology and 2) uses in industrial or medical or research domains. It appears that 2 different calculation strategies are prevailing, both are based on preliminary Monte-Carlo calculations with data storage. First, quick simulations made from a database of particle histories built though a previous Monte-Carlo simulation and secondly, a neuronal approach involving a learning platform generated through a previous Monte-Carlo simulation. This document gathers the slides of the presentations.

  13. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  14. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  15. Proceedings of the conference on computer codes and the linear accelerator community

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R.K. (comp.)

    1990-07-01

    The conference whose proceedings you are reading was envisioned as the second in a series, the first having been held in San Diego in January 1988. The intended participants were those people who are actively involved in writing and applying computer codes for the solution of problems related to the design and construction of linear accelerators. The first conference reviewed many of the codes both extant and under development. This second conference provided an opportunity to update the status of those codes, and to provide a forum in which emerging new 3D codes could be described and discussed. The afternoon poster session on the second day of the conference provided an opportunity for extended discussion. All in all, this conference was felt to be quite a useful interchange of ideas and developments in the field of 3D calculations, parallel computation, higher-order optics calculations, and code documentation and maintenance for the linear accelerator community. A third conference is planned.

  16. 77 FR 19666 - Stakeholder Listening Session in Preparation for the 65th World Health Assembly

    Science.gov (United States)

    2012-04-02

    ... HUMAN SERVICES Stakeholder Listening Session in Preparation for the 65th World Health Assembly Time and... the 65th World Health Assembly-- will hold an informal Stakeholder Listening Session on Monday April...., Washington, DC, 20201. The Stakeholder Listening Session will help the HHS's Office of Global Affairs...

  17. 75 FR 27536 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-05-17

    ... Office of the Secretary Notice of the Specialty Crop Committee's Stakeholder Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: In... Agriculture announces a stakeholder listening session of the Specialty Crop Committee, under the auspices...

  18. A Comparison of Therapist-Facilitated and Self-Guided Dream Interpretation Sessions.

    Science.gov (United States)

    Heaton, Kristin J.; Hill, Clara E.; Petersen, David A.; Rochlen, Aaron B.; Zack, Jason S.

    1998-01-01

    Volunteer clients (N=25 undergraduate students) reported achieving greater depth, mastery, insight, and other results from therapist-facilitated sessions compared to self-guided sessions. Observer and therapist ratings indicated that therapists adhered to the Hill model of dream interpretation during therapist-facilitated sessions. Implications…

  19. Comparison of Dream Interpretation, Event Interpretation, and Unstructured Sessions in Brief Therapy.

    Science.gov (United States)

    Diemer, Roberta A.; And Others

    1996-01-01

    Twenty-five distressed adult clients received 2 sessions each of dream and event interpretation using the Hill model during 12 sessions of successful therapy. No differences were found in depth, insight, and working alliance among dream interpretation, event interpretation, and unstructured sessions, suggesting that dream interpretation is as…

  20. Do User (Browse and Click) Sessions Relate to Their Questions in a Domain-specific Collection?

    DEFF Research Database (Denmark)

    Steinhauer, Jeremy; Delcambre, Lois M.L.; Lykke, Marianne;

    2013-01-01

    We seek to improve information retrieval in a domain-specific col-lection by clustering user sessions as recorded in a click log and then classifying later user sessions in real-time. As a preliminary step, we explore, the main as-sumption of this approach: whether user sessions in such a site re...

  1. Communicating Scholarly Research via the Poster Session: The Experience at a National Convention.

    Science.gov (United States)

    Aust, Charles F.; Kinnick, Katherine N.

    As academic associations and their annual conventions have grown in size, the poster session has become a common format for presentation of scholarly work. Little is known, however, about how communication educators perceive poster sessions and their value to career advancement. Poster sessions have been criticized as poorly structured and…

  2. The path of code linting

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  3. IRIG Serial Time Code Formats

    Science.gov (United States)

    2016-08-01

    Standard This standard consists of a family of rate-scaled serial time codes with formats containing up to four coded expressions or words. All time...time code formats is designated A, B, D, E, G, and H. Various combinations of subwords and signal forms make up a time code word. To differentiate...ARE leap years. Additional information can be found at the following USNO web sites. • http://timeanddate.com/ date /leapyear.html • http

  4. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  5. An experiment to assess the cost-benefits of code inspections in large scale software development

    Science.gov (United States)

    Porter, A.; Siy, H.; Toman, C. A.; Votta, L. G.

    1994-01-01

    This experiment (currently in progress) is designed to measure costs and benefits of different code inspection methods. It is being performed with a real development team writing software for a commercial product. The dependent variables for each code unit's inspection are the elapsed time and the number of defects detected. We manipulate the method of inspection by randomly assigning reviewers, varying the number of reviewers and the number of teams, and, when using more than one team, randomly assigning author repair and non-repair of detected defects between code inspections. After collecting and analyzing the first 17 percent of the data, we have discovered several interesting facts about reviewers, about the defects recorded during reviewer preparation and during the inspection collection meeting, and about the repairs that are eventually made. (1) Only 17 percent of the defects that reviewers record in their preparations are true defects that are later repaired. (2) Defects recorded at the inspection meetings fall into three categories: 18 percent false positives requiring no author repair, 57 percent soft maintenance where the author makes changes only for readability or code standard enforcement, and 25 percent true defects requiring repair. (3) The median elapsed calendar time for code inspections is 10 working days - 8 working days before the collection meeting and 2 after. (4) In the collection meetings, 31 percent of the defects discovered by reviewers during preparation are suppressed. (5) Finally, 33 percent of the true defects recorded are discovered at the collection meetings and not during any reviewer's preparation. The results to date suggest that inspections with two sessions (two different teams) of two reviewers per session (2sX2p) are the most effective. These two-session inspections may be performed with author repair or with no author repair between the two sessions. We are finding that the two-session, two-person with repair (2sX2p

  6. Improved code-tracking loop

    Science.gov (United States)

    Laflame, D. T.

    1980-01-01

    Delay-locked loop tracks pseudonoise codes without introducing dc timing errors, because it is not sensitive to gain imbalance between signal processing arms. "Early" and "late" reference codes pass in combined form through both arms, and each arm acts on both codes. Circuit accomodates 1 dB weaker input signals with tracking ability equal to that of tau-dither loops.

  7. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  8. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  9. On Maximum Lee Distance Codes

    OpenAIRE

    Alderson, Tim L.; Svenja Huntemann

    2013-01-01

    Singleton-type upper bounds on the minimum Lee distance of general (not necessarily linear) Lee codes over ℤq are discussed. Two bounds known for linear codes are shown to also hold in the general case, and several new bounds are established. Codes meeting these bounds are investigated and in some cases characterised.

  10. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    2006-01-01

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the earlies

  11. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  12. Memory Code©

    OpenAIRE

    Gómez-Londoño, Ana María

    2013-01-01

    El proyecto Memory Code© pertenece al ámbito de las cosmopolíticas del arte contemporáneo porque se ocupa de una relación singular de lo humano (mujer) con lo no-humano (caballo y técnicas)5. Específicamente enmarca el estudio del Binomio Ecuestre: caballo-jinete en el marco de una relación afectiva y de adiestramiento (doma clásica). Dicha relación estuvo compuesta por los siguientes operadores : a) Elementos de con-tacto entre jinete-caballo: espuelas, estribus, fustas b) Sistemas rítmicos ...

  13. MHD Generation Code

    OpenAIRE

    Frutos-Alfaro, Francisco; Carboni-Mendez, Rodrigo

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a c...

  14. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  15. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  16. Code Optimization in FORM

    CERN Document Server

    Kuipers, J; Vermaseren, J A M

    2013-01-01

    We describe the implementation of output code optimization in the open source computer algebra system FORM. This implementation is based on recently discovered techniques of Monte Carlo tree search to find efficient multivariate Horner schemes, in combination with other optimization algorithms, such as common subexpression elimination. For systems for which no specific knowledge is provided it performs significantly better than other methods we could compare with. Because the method has a number of free parameters, we also show some methods by which to tune them to different types of problems.

  17. A class of constacyclic BCH codes and new quantum codes

    Science.gov (United States)

    liu, Yang; Li, Ruihu; Lv, Liangdong; Ma, Yuena

    2017-03-01

    Constacyclic BCH codes have been widely studied in the literature and have been used to construct quantum codes in latest years. However, for the class of quantum codes of length n=q^{2m}+1 over F_{q^2} with q an odd prime power, there are only the ones of distance δ ≤ 2q^2 are obtained in the literature. In this paper, by a detailed analysis of properties of q2-ary cyclotomic cosets, maximum designed distance δ _{max} of a class of Hermitian dual-containing constacyclic BCH codes with length n=q^{2m}+1 are determined, this class of constacyclic codes has some characteristic analog to that of primitive BCH codes over F_{q^2}. Then we can obtain a sequence of dual-containing constacyclic codes of designed distances 2q^2 2q^2 can be constructed from these dual-containing codes via Hermitian Construction. These newly obtained quantum codes have better code rate compared with those constructed from primitive BCH codes.

  18. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  19. Structured error recovery for code-word-stabilized quantum codes

    Science.gov (United States)

    Li, Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-01

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3t times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  20. On (Partial) Unit Memory Codes Based on Gabidulin Codes

    CERN Document Server

    Wachter, Antonia; Bossert, Martin; Zyablov, Victor

    2011-01-01

    (Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank distance and its slope are defined analogous to the extended row distance in Hamming metric. Upper bounds for the free rank distance and the slope of (P)UM codes in the sum rank metric are derived and an explicit construction of (P)UM codes based on Gabidulin codes is given, achieving the upper bound for the free rank distance.

  1. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  2. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  3. Touchstone Stars: Highlights from the Cool Stars 18 Splinter Session

    CERN Document Server

    Mann, Andrew W; Boyajian, Tabetha; Gaidos, Eric; von Braun, Kaspar; Feiden, Gregory A; Metcalfe, Travis; Swift, Jonathan J; Curtis, Jason L; Deacon, Niall R; Filippazzo, Joseph C; Gillen, Ed; Hejazi, Neda; Newton, Elisabeth R

    2014-01-01

    We present a summary of the splinter session on "touchstone stars" -- stars with directly measured parameters -- that was organized as part of the Cool Stars 18 conference. We discuss several methods to precisely determine cool star properties such as masses and radii from eclipsing binaries, and radii and effective temperatures from interferometry. We highlight recent results in identifying and measuring parameters for touchstone stars, and ongoing efforts to use touchstone stars to determine parameters for other stars. We conclude by comparing the results of touchstone stars with cool star models, noting some unusual patterns in the differences.

  4. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  5. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  6. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  7. Effects of health facilitator performance and attendance at training sessions on the acquisition of tobacco refusal skills among multi-ethnic, high-risk adolescents.

    Science.gov (United States)

    Elder, J P; Woodruff, S I; Sallis, J F; de Moor, C; Edwards, C; Wildey, M B

    1994-06-01

    The study examined the effectiveness of a psycho-social tobacco use prevention intervention with a refusal skills training component on the refusal skills of high-risk adolescents, and investigated skill acquisition as related to subject demographics, performance of health facilitators and attendance at skills training sessions. Tobacco refusal skills were assessed for a group (n = 389) of high-risk, seventh-grade students participating as intervention and control subjects in Project SHOUT, a large tobacco use prevention program in the San Diego area. In addition, subject demographics, ratings of health facilitator performance and information about subjects' attendance at skills training sessions were collected. Subjects' responses to audiotaped peer offers of cigarettes and smokeless tobacco were coded for content and quality. Greater tobacco refusal skills among intervention subjects was hypothesized. Further health facilitator performance, attendance at training sessions and subject demographics were thought to be related to skill acquisition. High-risk intervention subjects gave significantly higher quality tobacco-refusal responses than did controls, although the differences between means were small. Results suggested that Hispanic adolescents were particularly receptive to the refusal skills training. The association between health facilitator performance and skill acquisition varied by subject ethnicity, as did the relationship between attendance at training sessions and skill acquisition.

  8. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  9. Rotated and Scaled Alamouti Coding

    CERN Document Server

    Willems, Frans M J

    2008-01-01

    Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\\times 2$ space-time code. Decoding the Golden code requires an exhaustive search over all codewords, while our rotated and scaled Alamouti code can be decoded with an acceptable complexity however.

  10. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  11. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  12. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  13. Remarks on generalized toric codes

    CERN Document Server

    Little, John B

    2011-01-01

    This note presents some new information on how the minimum distance of the generalized toric code corresponding to a fixed set of integer lattice points S in R^2 varies with the base field. The main results show that in some cases, over sufficiently large fields, the minimum distance of the code corresponding to a set S will be the same as that of the code corresponding to the convex hull of S. In an example, we will also discuss a [49,12,28] generalized toric code over GF(8), better than any previously known code according to M. Grassl's online tables, as of July 2011.

  14. Materials & Engineering: Propelling Innovation MRS Bulletin Special Issue Session

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Gopal [Materials Research Society, Warrendale, PA (United States)

    2016-05-06

    Materials enable engineering; and, engineering in turn depends on materials to transform design concepts and equations into physical entities. This relationship continues to grow with expanding societal demand for new products and processes. MRS Bulletin, a publication of the Materials Research Society (MRS) and Cambridge University Press, planned a special issue for December 2015 on Materials and Engineering: Propelling Innovation. This special issue of MRS Bulletin captured the unique relationship between materials and engineering, which are closely intertwined. A special half day session at the 2015 MRS Fall Meeting in Boston captured this discussion through presentations by high level experts followed by a panel discussion on what it takes to translate materials discoveries into products to benefit society. The Special Session included presentations by experts who are practitioners in materials as well as engineering applications, followed by a panel discussion. Participants discussed state-of-the-art in materials applications in engineering, as well as how engineering needs have pushed materials developments, as also reflected in the 20 or so articles published in the special issue of MRS Bulletin. As expected, the discussions spanned the broad spectrum of materials and provided very strong interdisciplinary interactions and discussions by participants and presenters.

  15. Prospects for UT1 Measurements from VLBI Intensive Sessions

    Science.gov (United States)

    Boehm, Johannes; Nilsson, Tobias; Schuh, Harald

    2010-01-01

    Very Long Baseline Interferometry (VLBI) Intensives are one-hour single baseline sessions to provide Universal Time (UT1) in near real-time up to a delay of three days if a site is not e-transferring the observational data. Due to the importance of UT1 estimates for the prediction of Earth orientation parameters, as well as any kind of navigation on Earth or in space, there is not only the need to improve the timeliness of the results but also their accuracy. We identify the asymmetry of the tropospheric delays as the major error source, and we provide two strategies to improve the results, in particular of those Intensives which include the station Tsukuba in Japan with its large tropospheric variation. We find an improvement when (1) using ray-traced delays from a numerical weather model, and (2) when estimating tropospheric gradients within the analysis of Intensive sessions. The improvement is shown in terms of reduction of rms of length-of-day estimates w.r.t. those derived from Global Positioning System observations

  16. Takotsubo cardiomyopathy after a dancing session: a case report

    Directory of Open Access Journals (Sweden)

    Ibrahim Ammar A

    2011-10-01

    Full Text Available Abstract Introduction Stress-induced (Takotsubo cardiomyopathy is a rare form of cardiomyopathy which presents in a manner similar to that of acute coronary syndrome. This sometimes leads to unnecessary thrombolysis therapy. The pathogenesis of this disease is still poorly understood. We believe that reporting all cases of Takotsubo cardiomyopathy will contribute to a better understanding of this disease. Here, we report a patient who, in the absence of any recent stressful events in her life, developed the disease after a session of dancing. Case presentation A 69-year-old Caucasian woman presented with features suggestive of acute coronary syndrome shortly after a session of dancing. Echocardiography and a coronary angiogram showed typical features of Takotsubo cardiomyopathy and our patient was treated accordingly. Eight weeks later, her condition resolved completely and the results of echocardiography were totally normal. Conclusions Takotsubo cardiomyopathy, though transient, is a rare and serious condition. Although it is commonly precipitated by stressful life events, these are not necessarily present. Our patient was enjoying one of her hobbies (that is, dancing when she developed the disease. This case has particular interest in medicine, especially for the specialties of cardiology and emergency medicine. We hope that it will add more information to the literature about this rare condition.

  17. Discourse analytic study of counseling sessions in stroke physiotherapy.

    Science.gov (United States)

    Talvitie, Ulla; Pyöriä, Outi

    2006-01-01

    Studies on the interaction between physiotherapists and patients during treatment sessions have found low levels of communicative participation by patients and lack of direct influence by patients on the content of their treatment. This article reports the results of 7 counseling sessions in which physiotherapists and patients with stroke and their caregivers discussed the patients' postural control and balance, which had been tested and videotaped at different stages of the rehabilitation process. The physiotherapists' discourses relating to the videotaped test performances were either brief comments on the patient's performance or critical appraisals with references to difficulties encountered during performance. Performances of the easier tasks were treated by the physiotherapists with rhetorical questions. The second type of discourse consisted of the physiotherapists directing the patients' attention to their problems, and of the patients' and caregivers' initiatives leading to conversation about the patients' problems. The patients understood the significance of the test performance for their life at home in varying ways. The results of this study showed that successful counseling calls for physiotherapists to develop dialogic communication skills to help patients in coconstructing their home exercise together with their social network.

  18. Indoor air contamination during a waterpipe (narghile) smoking session.

    Science.gov (United States)

    Fromme, Hermann; Dietrich, Silvio; Heitmann, Dieter; Dressel, Holger; Diemer, Jürgen; Schulz, Thomas; Jörres, Rudolf A; Berlin, Knut; Völkel, Wolfgang

    2009-07-01

    The smoke of waterpipe contains numerous substances of health concern, but people mistakenly believe that this smoking method is less harmful and addictive than cigarettes. An experiment was performed in a 57 m3 room on two dates with no smoking on the first date and waterpipe smoking for 4h on the second date. We measured volatile organic compounds (VOC), polycyclic aromatic hydrocarbons (PAH), metals, carbon monoxide (CO), nitrogen oxides (e.g. NO), as well as particle mass (PM), particle number concentration (PNC) and particle surface area in indoor air. High concentrations were observed for the target analytes during the 4-h smoking event. The median (90th percentile) values of PM(2.5), PNC, CO and NO were 393 (737 microg/m(3)), 289,000 (550,000 particles/cm(3)), 51 (65 ppm) and 0.11 (0.13 ppm), respectively. The particle size distribution has a maximum of particles relating to a diameter of 17 nm. The seven carcinogenic PAH were found to be a factor 2.6 higher during the smoking session compared to the control day. In conclusion, the observed indoor air contamination of different harmful substances during a WP session is high, and exposure may pose a health risk for smokers but in particular for non-smokers who are exposed to ETS.

  19. Effectiveness of an Electronic Booster Session Delivered to Mandated Students.

    Science.gov (United States)

    Linowski, Sally A; DiFulvio, Gloria T; Fedorchak, Diane; Puleo, Elaine

    2016-01-01

    College student drinking continues to be a problem in the United States. Students who have violated campus alcohol policy are at particularly high risk for dangerous drinking. While Brief Alcohol Screening and Intervention for College Students (BASICS) has been found to be an effective strategy in reducing high-risk drinking and associated consequences, questions remain about ways to further reduce risk or sustain changes associated with a face-to face intervention. The purpose of this study was to assess the effectiveness of a computer-delivered personalized feedback (electronic booster) delivered to policy violators who completed a mandated BASICS program. At 3-month post-intervention, 346 participants (60.4% male and 39.6% female) were randomized to one of two conditions: assessment only (n = 171) or electronic booster feedback (n = 175). Follow-up assessments were given to all participants at 3, 6, and 12-month post-initial intervention. Both groups showed reductions in drinking after the in-person BASICS intervention, but no additional reductions were seen with the addition of an electronic booster session. Findings suggest that although brief motivational interventions delivered in person to mandated students have been shown to be effective with mandated students, there is no additional benefit from an electronic booster session delivered 3-month post-intervention for this population.

  20. Safety Training: scheduled sessions in September and October 2011

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Chemical Safety – Introduction 11-OCT-11, 9.00 – 11.30, in English Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personne...

  1. Safety Training: scheduled sessions in September and October 2011

    CERN Multimedia

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personnel électricien effectuant des opérations du domaine de tension BTA...

  2. Working session 5: Operational aspects and risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cizelj, L. [Jozef Stefan Institute, Ljubljana (Slovenia); Donoghue, J. [Nuclear Regulatory Commission, Washington, DC (United States)

    1997-02-01

    A general observation is that both operational aspects and risk analysis cannot be adequately discussed without information presented in other sessions. Some overlap of conclusions and recommendations is therefore to be expected. Further, it was assumed that recommendations concerning improvements in some related topics were generated by other sessions and are not repeated here. These include: (1) Knowledge on degradation mechanisms (initiation, progression, and failure). (2) Modeling of degradation (initiation, progression, and failure). (3) Capabilities of NDE methods. (4) Preventive maintenance and repair. One should note here, however, that all of these directly affect both operational and risk aspects of affected plants. A list of conclusions and recommendations is based on available presentations and discussions addressing risk and operational experience. The authors aimed at reaching as broad a consensus as possible. It should be noted here that there is no strict delineation between operational and safety aspects of degradation of steam generator tubes. This is caused by different risk perceptions in different countries/societies. The conclusions and recommendations were divided into four broad groups: human reliability; leakage monitoring; risk impact; and consequence assessment.

  3. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  4. New Codes for Spectral Amplitude Coding Optical CDMA Systems

    Directory of Open Access Journals (Sweden)

    Hassan Yousif Ahmed

    2011-03-01

    Full Text Available A new code structure with zero in-phase cross correlation for spectral amplitude coding optical code division multiple access (SAC-OCDMA system is proposed, and called zero vectors combinatorial (ZVC. This code is constructed in a simple algebraic way using Euclidean vectors and combinatorial theories based on the relationship between the number of users N and the weight W. One of the important properties of this code is that the maximum cross correlation (CC is always zero, which means that multi-user interference (MUI and phase induced intensity noise (PIIN are reduced. Bit error rate (BER performance is compared with previous reported codes. Therefore, theoretically, we demonstrate the performance of ZVC code with the related equations. In addition, the structure of the encoder/decoder based on fiber Bragg gratings (FBGs and the proposed system have been analyzed theoretically by taking into consideration the effects of some noises. The results characterizing BER with respect to the total number of active users show that ZVC code offers a significantly improved performance over previous reported codes by supporting large numbers of users at BER≥ 10-9. A comprehensive simulation study has been carried out using a commercial optical system simulator “VPI™”. Moreover, it was shown that the proposed code managed to reduce the hardware complexity and eventually the cost.

  5. Report of the American Heart Association (AHA) Scientific Sessions 2013, Dallas.

    Science.gov (United States)

    Ishimori, Naoki; Kinugawa, Shintaro; Yamada, Satoshi; Yokoshiki, Hisashi; Mitsuyama, Hirofumi; Tsutsui, Hiroyuki

    2014-01-01

    The American Heart Association (AHA) Scientific Sessions were held in Dallas on November 16-20, 2013. The meeting is one of the most leading conferences of cardiology in the world, with over 18,000 professional attendees from more than 105 countries. There were 315 invited sessions and 443 abstract sessions, comprising more than 5,000 presentations. The sessions were expanded to 26 program tracks, which included and integrated basic, translational, clinical, and population science. In the series of late-breaking sessions, updates of results from 20 clinical trials were disclosed. Japanese scientists submitted the second most abstracts to the Scientific Sessions in 2013. We appreciate the significant contribution to the sessions by Japanese cardiologists as well as the Japanese Circulation Society.

  6. Improved lossless intra coding for next generation video coding

    Science.gov (United States)

    Vanam, Rahul; He, Yuwen; Ye, Yan

    2016-09-01

    Recently, there have been efforts by the ITU-T VCEG and ISO/IEC MPEG to further improve the compression performance of the High Efficiency Video Coding (HEVC) standard for developing a potential next generation video coding standard. The exploratory codec software of this potential standard includes new coding tools for inter and intra coding. In this paper, we present a new intra prediction mode for lossless intra coding. Our new intra mode derives a prediction filter for each input pixel using its neighboring reconstructed pixels, and applies this filter to the nearest neighboring reconstructed pixels to generate a prediction pixel. The proposed intra mode is demonstrated to improve the performance of the exploratory software for lossless intra coding, yielding a maximum and average bitrate savings of 4.4% and 2.11%, respectively.

  7. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  8. Superimposed Code Theorectic Analysis of DNA Codes and DNA Computing

    Science.gov (United States)

    2010-03-01

    Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008 IEEE Proceedings of International Symposium on Information Theory, pp. 2292...5, June 2008, pp. 525-34. 32 28. A. Macula, et al., “Random Coding Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008...combinatorial method of bio-memory design and detection that encodes item or process information as numerical sequences represented in DNA. ComDMem is a

  9. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  10. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  11. Rotational Seismology: AGU Session, Working Group, and Website

    Science.gov (United States)

    Lee, William H.K.; Igel, Heiner; Todorovska, Maria I.; Evans, John R.

    2007-01-01

    Introduction Although effects of rotational motions due to earthquakes have long been observed (e. g., Mallet, 1862), nevertheless Richter (1958, p. 213) stated that: 'Perfectly general motion would also involve rotations about three perpendicular axes, and three more instruments for these. Theory indicates, and observation confirms, that such rotations are negligible.' However, Richter provided no references for this claim. Seismology is based primarily on the observation and modeling of three-component translational ground motions. Nevertheless, theoretical seismologists (e.g., Aki and Richards, 1980, 2002) have argued for decades that the rotational part of ground motions should also be recorded. It is well known that standard seismometers are quite sensitive to rotations and therefore subject to rotation-induced errors. The paucity of observations of rotational motions is mainly the result of a lack, until recently, of affordable rotational sensors of sufficient resolution. Nevertheless, in the past decade, a number of authors have reported direct observations of rotational motions and rotations inferred from rigid-body rotations in short baseline accelerometer arrays, creating a burgeoning library of rotational data. For example, ring laser gyros in Germany and New Zealand have led to the first significant and consistent observations of rotational motions from distant earthquakes (Igel et al., 2005, 2007). A monograph on Earthquake Source Asymmetry, Structural Media and Rotation Effects was published recently as well by Teisseyre et al. (2006). Measurement of rotational motions has implications for: (1) recovering the complete ground-displacement history from seismometer recordings; (2) further constraining earthquake rupture properties; (3) extracting information about subsurface properties; and (4) providing additional ground motion information to earthquake engineers for seismic design. A special session on Rotational Motions in Seismology was convened by H

  12. Introduction to the internal fluid mechanics research session

    Science.gov (United States)

    Miller, Brent A.; Povinelli, Louis A.

    1990-01-01

    Internal fluid mechanics research at LeRC is directed toward an improved understanding of the important flow physics affecting aerospace propulsion systems, and applying this improved understanding to formulate accurate predictive codes. To this end, research is conducted involving detailed experimentation and analysis. The following three papers summarize ongoing work and indicate future emphasis in three major research thrusts: inlets, ducts, and nozzles; turbomachinery; and chemical reacting flows. The underlying goal of the research in each of these areas is to bring internal computational fluid mechanic to a state of practical application for aerospace propulsion systems. Achievement of this goal requires that carefully planned and executed experiments be conducted in order to develop and validate useful codes. It is critical that numerical code development work and experimental work be closely coupled. The insights gained are represented by mathematical models that form the basis for code development. The resultant codes are then tested by comparing them with appropriate experiments in order to ensure their validity and determine their applicable range. The ultimate user community must be a part of this process to assure relevancy of the work and to hasten its practical application. Propulsion systems are characterized by highly complex and dynamic internal flows. Many complex, 3-D flow phenomena may be present, including unsteadiness, shocks, and chemical reactions. By focusing on specific portions of a propulsion system, it is often possible to identify the dominant phenomena that must be understood and modeled for obtaining accurate predictive capability. The three major research thrusts serve as a focus leading to greater understanding of the relevant physics and to an improvement in analytic tools. This in turn will hasten continued advancements in propulsion system performance and capability.

  13. Variation in Response to Evidence-Based Group Preventive Intervention for Disruptive Behavior Problems: A View from 938 Coping Power Sessions.

    Science.gov (United States)

    Lochman, John E; Dishion, Thomas J; Boxmeyer, Caroline L; Powell, Nicole P; Qu, Lixin

    2017-01-05

    Prior research suggests that under some conditions, interventions that aggregate high-risk youth may be less effective, or at worse, iatrogenic. However, group formats have considerable practical utility for delivery of preventive interventions, and thus it is crucial to understand child and therapist factors that predict which aggressive children can profit from group intervention and which do not. To address these questions we video-recorded group Coping Power intervention sessions (938 sessions), coded both leader and participant behavior, and analyzed both leader and children's behaviors in the sessions that predicted changes in teacher and parent, reports of problem behavior at 1-year follow up. The sample included 180 high-risk children (69% male) who received intervention in 30 separate Coping Power intervention groups (six children assigned per group). The evidence-based Coping Power prevention program consists of 32 sessions delivered during the 4th and 5th grade years; only the child component was used in this study. The behavioral coding system used in the analyses included two clusters of behaviors for children (positive; negative) and two for the primary group leaders (group management; clinical skills). Growth spline models suggest that high levels of children's negative behaviors predicted increases in teacher and parent rated aggressive and conduct problem behaviors during the follow-up period in the three of the four models. Therapist use of clinical skills (e.g., warmth, nonreactive) predicted less increase in children's teacher-rated conduct problems. These findings suggest the importance of clinical training in the effective delivery of evidence-based practices, particularly when working with high-risk youth in groups.

  14. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  15. First Doctoral student assembly and poster session at CERN

    CERN Multimedia

    2010-01-01

    Presently, 130 doctoral students at CERN do their research on “technical” subjects such as magnets and cryogenics, beam and detector physics, computing and vacuum, among others.   Student present  their scientific achievements at the first doctoral student assembly. To present their scientific achievements and to bring together the students with CERN supervisors and CERN’s management was the main objective of the first doctoral student assembly and poster session, held June 30. The photograph shows about half of those who presented posters, all in their second year of assignment, and ready to attach their work to the panels. Another aim of the assembly was to discuss the outcome of the anonymous questionnaire and to gain feedback for the improvement of the doctoral student program. While there is vast overall satisfaction, improvements should aim at strengthening the links between students, CERN supervisors, and university professors. With 24 posters prese...

  16. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Md. Sarwar Morshed

    2010-01-01

    Full Text Available The Session Initiation Protocol (SIP has become the most predominant protocol for Voice over Internet Protocol (VoIP signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF. Finally we analyze the security aspects of these approaches.

  17. Achieving intersubjective understanding: examples from an occupational therapy treatment session.

    Science.gov (United States)

    Crepeau, E B

    1991-11-01

    Occupational therapists, like other health care professionals, must balance their application of treatment techniques with an understanding of their patients' life experiences. This paper reviews the literature from interpretive and medical sociology regarding the interplay between professional power and the achievement of an understanding of another person. It analyzes how an occupational therapist, during a single treatment session, enters into her patient's life-world and simultaneously controls and manages the treatment process. The concepts of knowledge schemata (the expectations and beliefs people bring to a situation) and footings (the shifts in alignment, or focus, that occur during interaction) are central to this analysis. The process of achieving a balance between professional power and an understanding of the patient's experience may be fostered in education and in clinical supervision through increased emphasis on the importance of understanding the values and beliefs of patients and on the development and refinement of interactive skills.

  18. The Schrödinger Sessions: Science for Science Fiction

    Science.gov (United States)

    Orzel, Chad; Edwards, Emily; Rolston, Steven

    In July 2015, we held a workshop for 17 science fiction writers working in a variety of media at the Joint Quantum Institute at the University of Maryland, College Park. ''The Schrödinger Sessions,'' funded by an outreach grant from APS, provided a three-day ''crash course'' on quantum physics and technology, including lectures from JQI scientists and tours of JQI labs. The goal was to better inform and inspire stories making use of quantum physics, as a means of outreach to inspire a broad audience of future scientists. We will report on the contents of the workshop, reactions from the attendees and presenters, and future plans. Funded by an Outreach Mini-Grant from the APS.

  19. Session: What do we know about cumulative or population impacts

    Energy Technology Data Exchange (ETDEWEB)

    Kerlinger, Paul; Manville, Al; Kendall, Bill

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of a panel discussion followed by a discussion/question and answer period. The panelists were Paul Kerlinger, Curry and Kerlinger, LLC, Al Manville, U.S. Fish and Wildlife Service, and Bill Kendall, US Geological Service. The panel addressed the potential cumulative impacts of wind turbines on bird and bat populations over time. Panel members gave brief presentations that touched on what is currently known, what laws apply, and the usefulness of population modeling. Topics addressed included which sources of modeling should be included in cumulative impacts, comparison of impacts from different modes of energy generation, as well as what research is still needed regarding cumulative impacts of wind energy development on bird and bat populations.

  20. Proceedings of the Areva Technical Days. Session 5

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document presents the proceedings of the Areva technical days, presented during the session 5 the 9 and 10 december 2004, at Istanbul. It deals with the operations of the transmission and distribution division. With manufacturing facilities in over 40 countries and a sales network in over 100, Areva offers customers technological solutions for nuclear power generation and electricity transmission and distribution (the Group also provides interconnect systems to the telecommunications, computer and automotive markets). It provides five topics: a general presentation of Areva, the strategic stakes for transmission and distribution by world-zone, economic and strategic stakes of business unit products, business unit systems and business unit automation. (A.L.B.)

  1. Summary Of Session 3: How Should Accelerator Operations Be Organized?

    Energy Technology Data Exchange (ETDEWEB)

    Bloemhard, R.; Stanek, M

    2001-07-01

    The underlying structure and organization of a group strongly influences its effectiveness and efficiency. An operations group may develop a 'persistence of form' that prevents it from responding to changes in responsibilities and technology. Even if a group has been in existence for a long time, it is a good idea to re-evaluate its structure periodically. An organization can possess an aesthetic quality related to how simple and transparent its functions appear to users and other outsiders. Information and tasks should flow freely without undue impedance. In this session we examined the issue of group design from a variety of perspectives including both large and small labs, commercial operations and that of an 'expert' consultant. (author)

  2. Mathematics Intensive Summer Session (MISS). Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    This final technical report appears in two parts: the report for the 1995 summer MISS program and the report for the 1996 summer MISS program. Copies of the US Department of Energy Pre-Freshman Enrichment Program 1995 Entry Form and 1996 Entry Form completed by all participants were sent to the Oak Ridge Institute for Science and Education in the fall of 1995 and 1996 respectively. Those forms are on file should they be needed. Attached also is a copy of the Summary of ideas for panel discussions, problem-solving sessions, or small group discussions presented at the Department of Energy Oak Ridge Institute for Science and Education Pre-Freshman Enrichment Program Project Directors Meeting held in San Antonio, TX, November 12--14, 1995.

  3. Astronomy and Space Technologies, WILGA 2012; EuCARD Sessions

    CERN Document Server

    Romaniuk, R S

    2012-01-01

    Wilga Sessions on HEP experiments, astroparticle physics and accelerator technology were organized under the umbrella of the EU FP7 Project EuCARD – European Coordination for Accelerator Research and Development. This paper is the first part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with photonics and electronics applications in astronomy and space technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JE...

  4. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    CERN Document Server

    Hasib, Abdullah Al; Morshed, Md Sarwar

    2010-01-01

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.

  5. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  6. HIGH-VOLUME RESISTANCE TRAINING SESSION ACUTELY DIMINISHES RESPIRATORY MUSCLE STRENGTH

    Directory of Open Access Journals (Sweden)

    Daniel A. Hackett

    2012-03-01

    Full Text Available This study investigated the effect of a high-volume compared to a low-volume resistance training session on maximal inspiratory pressure (MIP and maximal expiratory pressure (MEP. Twenty male subjects with resistance training experience (6.2 ± 3.2 y, in a crossover trial, completed two resistance training protocols (high-volume: 5 sets per exercise; low-volume: 2 sets per exercise and a control session (no exercise on 3 separate occasions. MIP and MEP decreased by 13.6% (p < 0.01 and 14.7% (p < 0.01 respectively from pre-session MIP and MEP, following the high-volume session. MIP and MEP were unaffected following the low-volume or the control sessions. MIP returned to pre-session values after 40 minutes, whereas MEP remained significantly reduced after 60 minutes post-session by 9.2% compared to pre-session (p < 0.01. The findings suggest that the high-volume session significantly decreased MIP and MEP post-session, implicating a substantially increased demand on the respiratory muscles and that adequate recovery is mandatory following this mode of training.

  7. Code Speed Measuring for VC++

    Science.gov (United States)

    2015-10-01

    UNCLASSIFIED AD-E403 688 Technical Report ARWSE-TR-14025 CODE SPEED MEASURING FOR VC++ Tom Nealis...TYPE Final 3. DATES COVERED (From – To) 4. TITLE AND SUBTITLE CODE SPEED MEASURING FOR VC++ 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT It’s often important to know how fast a snippet of code executes. This information allows the coder to make important decisions

  8. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  9. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  10. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  11. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  12. What's on the therapist's mind? A grounded theory analysis of family therapist reflections during individual therapy sessions.

    Science.gov (United States)

    Rober, Peter; Elliott, Robert; Buysse, Ann; Loots, Gerrit; De Corte, Kim

    2008-01-01

    The authors used a videotape-assisted recall procedure to study the content of family therapists' inner conversations during individual sessions with a standardized client. Grounded theory was used to analyze therapists' reflections, resulting in a taxonomy of 282 different codes in a hierarchical tree structure of six levels, organized into four general domains: attending to client process; processing the client's story; focusing on therapists' own experience; and managing the therapeutic process. In addition to providing a descriptive model of therapists' inner conversation, this research led to an appreciation of the wealth of therapists' inner conversation. In particular, the authors found that therapists work hard to create an intersubjective space within which to talk by trying to be in tune with their clients and by using clients as a guide.

  13. Automatic code generation in practice

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Kuhrmann, Marco; Schultz, Ulrik Pagh

    2016-01-01

    -specific language to specify those requirements and to allow for generating a safety-enforcing layer of code, which is deployed to the robot. The paper at hand reports experiences in practically applying code generation to mobile robots. For two cases, we discuss how we addressed challenges, e.g., regarding weaving...... code generation into proprietary development environments and testing of manually written code. We find that a DSL based on the same conceptual model can be used across different kinds of hardware modules, but a significant adaptation effort is required in practical scenarios involving different kinds...

  14. Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2011-01-01

    In Singular Value Decomposition (SVD) beamforming, without channel coding, there is a trade-off between full diversity and full multiplexing. Adding channel coding, full diversity and full multiplexing can be both achieved, as long as the code rate Rc and the number of subchannels S satisfy RcS1. Recently discovered Perfect Space-Time Block Codes (PSTBCs) are full-rate full-diversity space-time codes, achieving maximum coding gain. In this paper, two novel techniques, Perfect Coded Multiple Beamforming (PCMB) and Bit-Interleaved Coded Multiple Beamforming with Perfect Coding (BICMB-PC), are proposed, employing PSTBCs. PCMB achieves full diversity, full multiplexing, and full rate simultaneously, and its performance is close to PSTBC and FPMB, while the decoding complexity is significantly less than PSTBC and much lower than FPMB of dimensions 2 and 4. On the other hand, BICMB-PC achieves both full diversity and full multiplexing, and its performance is similar to BICMB-FP, but provides much lower decoding com...

  15. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  16. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  17. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  18. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...... with a maximal number of -rational points for a given spanning dimension. We study the case and give a conjecture for general . We also define Schubert union codes in general, and study the parameters and support weights of these codes....

  19. The KIDTALK Behavior and Language Code: Manual and Coding Protocol.

    Science.gov (United States)

    Delaney, Elizabeth M.; Ezell, Sara S.; Solomon, Ned A.; Hancock, Terry B.; Kaiser, Ann P.

    Developed as part of the Milieu Language Teaching Project at the John F. Kennedy Center at Vanderbilt University in Nashville, Tennessee, this KIDTALK Behavior-Language Coding Protocol and manual measures behavior occurring during adult-child interactions. The manual is divided into 5 distinct sections: (1) the adult behavior codes describe…

  20. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  1. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  2. Polymatroids with Network Coding

    CERN Document Server

    Han, Te Sun

    2010-01-01

    The problem of network coding for multicasting a single source to multiple sinks has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they have established the celebrated max-flow mini-cut theorem on non-physical information flow over a network of independent channels. On the other hand, in 1980, Han has studied the case with correlated multiple sources and a single sink from the viewpoint of polymatroidal functions in which a necessary and sufficient condition has been demonstrated for reliable transmission over the network. This paper presents an attempt to unify both cases, which leads to establish a necessary and sufficient condition for reliable transmission over a noisy network for multicasting all the correlated multiple sources to all the multiple sinks. Furthermore, we address also the problem of transmitting "independent" sources over a multiple-access-type of network as well as over a broadcast-type of network, which reveals that the (co-) polymatroidal structures are intrinsical...

  3. Coded Path Protection: Efficient Conversion of Sharing to Coding

    CERN Document Server

    Avci, Serhat Nazim

    2011-01-01

    Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow and require complex signaling. Additionally, real-time reconfiguration of a cross-connect threatens their transmission integrity. On the other hand, coding-based protection schemes are proactive. Therefore, they have higher restoration speed, lower signaling complexity, and higher transmission integrity. This paper introduces a coding-based protection scheme, named Coded Path Protection (CPP). In CPP, a backup copy of the primary data is encoded with other data streams, resulting in capacity savings. This paper presents an optimal and simple capacity placement and coding group formation algorithm. The algorithm converts the sharing structure of any solution of a Shared Path Protection (SPP) technique into a coding structure with minimum extra capacity. We conducted quantitative and qualitative comparisons of our technique with the SPP and, another tec...

  4. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  5. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  6. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...

  7. Lymphocyte Redox Imbalance and Reduced Proliferation after a Single Session of High Intensity Interval Exercise

    OpenAIRE

    Tossige-Gomes, Rosalina; Costa, Karine Beatriz; Ottone, Vinícius de Oliveira; Magalhães, Flávio de Castro; Amorim, Fabiano Trigueiro; Rocha-Vieira, Etel

    2016-01-01

    This study investigated whether an acute session of high-intensity interval training (HIIT) is sufficient to alter lymphocyte function and redox status. Sixteen young healthy men underwent a HIIT session on a cycloergometer, consisting of eight bouts of 1 min at 90–100% of peak power, with 75 seconds of active recovery at 30 W between bouts. Venous blood was collected before, immediately after, and 30 minutes after the HIIT session. In response to Staphylococcus aureus superantigen B (SEB) st...

  8. Bounds on Generalized Huffman Codes

    CERN Document Server

    Baer, Michael B

    2007-01-01

    New lower and upper bounds are obtained for the compression of optimal binary prefix codes according to various nonlinear codeword length objectives. Like the coding bounds for Huffman coding - which concern the traditional linear code objective of minimizing average codeword length -- these are in terms of a form of entropy and the probability of the most probable input symbol. As in Huffman coding, some upper bounds can be found using sufficient conditions for the codeword corresponding to the most probable symbol being one bit long. Whereas having probability no less than 0.4 is a tight sufficient condition for this to be the case in Huffman coding, other penalties differ, some having a tighter condition, some a looser condition, and others having no such sufficient condition. The objectives explored here are ones for which optimal codes can be found using a generalized form of Huffman coding. These objectives include one related to queueing (an increasing exponential average), one related to single-shot c...

  9. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  10. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence tha

  11. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  12. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations of e...

  13. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Given a linear code $C$, one can define the $d$-th power of $C$ as the span of all componentwise products of $d$ elements of $C$. A power of $C$ may quickly fill the whole space. Our purpose is to answer the following question: does the square of a code ``typically'' fill the whole space? We give...

  14. Revised Safety Code A2

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  15. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  16. Coded continuous wave meteor radar

    OpenAIRE

    2015-01-01

    The concept of coded continuous wave meteor radar is introduced. The radar uses a continuously transmitted pseudo-random waveform, which has several advantages: coding avoids range aliased echoes, which are often seen with commonly used pulsed specular meteor radars (SMRs); continuous transmissions maximize pulse compression gain, allowing operation with significantly lower peak transmit power; the temporal resolution can be changed after ...

  17. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  18. P-adic arithmetic coding

    CERN Document Server

    Rodionov, Anatoly

    2007-01-01

    A new incremental algorithm for data compression is presented. For a sequence of input symbols algorithm incrementally constructs a p-adic integer number as an output. Decoding process starts with less significant part of a p-adic integer and incrementally reconstructs a sequence of input symbols. Algorithm is based on certain features of p-adic numbers and p-adic norm. p-adic coding algorithm may be considered as of generalization a popular compression technique - arithmetic coding algorithms. It is shown that for p = 2 the algorithm works as integer variant of arithmetic coding; for a special class of models it gives exactly the same codes as Huffman's algorithm, for another special model and a specific alphabet it gives Golomb-Rice codes.

  19. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  20. Binary Error Correcting Network Codes

    CERN Document Server

    Wang, Qiwen; Li, Shuo-Yen Robert

    2011-01-01

    We consider network coding for networks experiencing worst-case bit-flip errors, and argue that this is a reasonable model for highly dynamic wireless network transmissions. We demonstrate that in this setup prior network error-correcting schemes can be arbitrarily far from achieving the optimal network throughput. We propose a new metric for errors under this model. Using this metric, we prove a new Hamming-type upper bound on the network capacity. We also show a commensurate lower bound based on GV-type codes that can be used for error-correction. The codes used to attain the lower bound are non-coherent (do not require prior knowledge of network topology). The end-to-end nature of our design enables our codes to be overlaid on classical distributed random linear network codes. Further, we free internal nodes from having to implement potentially computationally intensive link-by-link error-correction.

  1. Quantum source-channel codes

    CERN Document Server

    Pastawski, Fernando; Wilming, Henrik

    2016-01-01

    Approximate quantum error-correcting codes are codes with "soft recovery guarantees" wherein information can be approximately recovered. In this article, we propose a complementary "soft code-spaces" wherein a weighted prior distribution is assumed over the possible logical input states. The performance for protecting information from noise is then evaluated in terms of entanglement fidelity. We apply a recent construction for approximate recovery maps, which come with a guaranteed lower-bounds on the decoding performance. These lower bound are straightforwardly obtained by evaluating entropies on marginals of the mixed state which represents the "soft code-space". As an example, we consider thermal states of the transverse field Ising model at criticality and provide numerical evidence that the entanglement fidelity admits non-trivial recoverability from local errors. This provides the first concrete interpretation of a bonafide conformal field theory as a quantum error-correcting code. We further suggest, t...

  2. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from......A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  3. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  4. Medical coding in clinical trials

    Directory of Open Access Journals (Sweden)

    Deven Babre

    2010-01-01

    Full Text Available Data generated in all clinical trial are recorded on the data collection instrument Case report Form / Electronic Case Report Form by investigators located at various sites in various countries. In multicentric clinical trials since different investigator or medically qualified experts are from different sites / centers recording the medical term(s uniformly is a big challenge. Medical coders from clinical data management team process these terms and perform medical coding. Medical coding is performed to categorize the medical terms reported appropriately so that they can be analyzed/reviewed. This article describes process which is used for medical coding in clinical data management and two most commonly used medical dictionaries MedDRA and WHO-DDE in brief. It is expected to help medical coders to understand the process of medical coding in clinical data management. Few common issues which the medical coder faces while performing medical coding, are also highlighted.

  5. Portable code development in C

    Energy Technology Data Exchange (ETDEWEB)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  6. Changes in Post-Stroke Gait Biomechanics Induced by One Session of Gait Training.

    Science.gov (United States)

    Kesar, T M; Reisman, D S; Higginson, J S; Awad, L N; Binder-Macleod, S A

    2015-01-01

    The objective of this study was to determine whether one session of targeted locomotor training can induce measurable improvements in the post-stroke gait impairments. Thirteen individuals with chronic post-stroke hemiparesis participated in one locomotor training session combining fast treadmill training and functional electrical stimulation (FES) of ankle dorsi- and plantar-flexor muscles. Three dimensional gait analysis was performed to assess within-session changes (after versus before training) in gait biomechanics at the subject's self-selected speed without FES. Our results showed that one session of locomotor training resulted in significant improvements in peak anterior ground reaction force (AGRF) and AGRF integral for the paretic leg. Additionally, individual subject data showed that a majority of study participants demonstrated improvements in the primary outcome variables following the training session. This study demonstrates, for the first time, that a single session of intense, targeted post-stroke locomotor retraining can induce significant improvements in post-stroke gait biomechanics. We posit that the within-session changes induced by a single exposure to gait training can be used to predict whether an individual is responsive to a particular gait intervention, and aid with the development of individualized gait retraining strategies. Future studies are needed to determine whether these single-session improvements in biomechanics are accompanied by short-term changes in corticospinal excitability, and whether single-session responses can serve as predictors for the longer-term effects of the intervention with other targeted gait interventions.

  7. Super Special Codes using Super Matrices

    CERN Document Server

    Kandasamy, W B Vasantha; Ilanthenral, K

    2010-01-01

    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

  8. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  9. Interactions of time of day and sleep with between-session habituation and extinction memory in young adult males

    OpenAIRE

    Pace-Schott, Edward F.; Tracy, Lauren E.; Rubin, Zoe; Mollica, Adrian G.; Jeffrey M Ellenbogen; Bianchi, Matt T.; Milad, Mohammed R.; Pitman, roger k; Orr, Scott P

    2014-01-01

    Within-session habituation and extinction learning co-occur as do subsequent consolidation of habituation (i.e., between-session habituation) and extinction memory. We sought to determine if, as we predicted: (1) between-session habituation is greater across a night of sleep vs. a day awake; (2) time-of-day accounts for differences; (3) between-session habituation predicts consolidation of extinction memory; (4) sleep predicts between-session habituation and/or extinction memory. Participants...

  10. CYCLIC CODES OVER FORMAL POWER SERIES RINGS

    Institute of Scientific and Technical Information of China (English)

    Dougherty Steven T.; Liu Hongwei

    2011-01-01

    In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.

  11. Non-Pauli observables for CWS codes

    Science.gov (United States)

    Santiago, Douglas F. G.; Portugal, Renato; Melo, Nolmar

    2013-05-01

    It is known that nonadditive quantum codes can have higher code dimensions than stabilizer codes for the same length and minimum distance. The class of codeword stabilized codes (CWS) provides tools to obtain new nonadditive quantum codes by reducing the problem to finding nonlinear classical codes. In this work, we establish some results on the kind of non-Pauli operators that can be used as observables in the decoding scheme of CWS codes and propose a procedure to obtain those observables.

  12. Spiritual Exploration in the Prenatal Genetic Counseling Session.

    Science.gov (United States)

    Sagaser, Katelynn G; Shahrukh Hashmi, S; Carter, Rebecca D; Lemons, Jennifer; Mendez-Figueroa, Hector; Nassef, Salma; Peery, Brent; Singletary, Claire N

    2016-10-01

    Religion and spirituality (R/S) are important components of many individuals' lives, and spirituality is often employed by women coping with pregnancy complications. To characterize how prenatal genetic counselors might address spiritual issues with patients, 283 English and Spanish speaking women receiving prenatal genetic counseling in Houston, Texas were surveyed post-counseling using both the Brief RCope and questions regarding interest in spiritual exploration. Genetic counselors were concurrently surveyed to identify religious/spiritual language used within sessions and perceived importance of R/S. Genetic counselors were significantly more likely to identify R/S as important to a patient when patients used religious/spiritual language (p spiritual terms were present, the counselor felt uncertain about the importance of R/S 63 % of the time. However, 67 % of patients reported that they felt comfortable sharing their faith as it relates to their pregnancy, and 93 % reported using positive religious coping. Less than 25 % reported a desire for overt religious actions such as prayer or scripture exploration. Therefore, most patients' desires for spiritual exploration center in the decision making and coping processes that are in line with the genetic counseling scope of practice. Thus, counselors should feel empowered to incorporate spiritual exploration into their patient conversations.

  13. OPENING COMMENTS TO THE SPECIAL SESSION ON DECISION SUPPORT TOOLS.

    Energy Technology Data Exchange (ETDEWEB)

    SULLIVAN,T.; BARDOS,P.

    2000-06-01

    The emphasis of the session was on the use of decision support tools for actual remediation decisions. It considered two perspectives: site-specific decision making for example choosing a particular remediation system; and remediation in terms of a risk management/risk reduction process as part of a wider process of site management. These were addressed both as general topics and as case studies. Case studies were included to provide information on decision support techniques for specific contamination problems such as remedy selection. In the case studies, the authors present the general process to provide decision support and then discuss the application to a specific problem. The intent of this approach is to provide the interested reader with enough knowledge to determine if the process could be used on their specific set of problems. The general topics included broader issues that are not directly tied to a specific problem. The general topics included papers on the role of stakeholders in the decision process and decision support approaches for sustainable development.

  14. ICE-DIP closing workshop - Public session | 14 September

    CERN Multimedia

    2016-01-01

    ICE-DIP, the Intel-CERN European Doctorate Industrial Program (see here), is a European Industrial Doctorate scheme (see here) led by CERN. The focus of the project, which launched in 2013, has been the development of techniques for acquiring and processing data that are relevant for the trigger and data-acquisition systems of the LHC experiments.   The results will be publicly presented in an open session on the afternoon of 14th September. Building on CERN’s long-standing relationship with Intel through CERN openlab, ICE-DIP brings together CERN, Intel and research universities to offer training to five PhD students in advanced information and communication technologies (ICT). These young researchers have been funded by the European Commission as fellows at CERN and enrolled in doctoral programmes at the National University of Ireland Maynooth and Dublin City University. They have each completed 18 month secondments at Intel locations around the world gaining in-depth experience of the v...

  15. Summary of the most significant results reported in this session

    CERN Document Server

    Sens, J C

    1980-01-01

    D1e most interesting although speculative result is the observation of a 4 standard deviation effect at 5. 3 GeV in the l)JK 0TI - and lj!K- 'ff+ mass plots (SPS Exp. WJ\\11) with a crosssection of 180 nb (assuming 1 % branching ratio). This is a cancliclatc bare b-state. + Tiw next most significant experimental result is the observation of Ac at the CERN Intersecting Storage Rings (ISR). TI1is state was discovered at BNL by Samios et al. and has since been seen in several neutrino experiments. It was seen at the ISR by Lockman ct al. about a year ago (reported at Budapest) but not in a convincing way. The analysis has now been improved, and the result shows a peak which is most clearly present in the stnnmed A(31T)+ and K-p1T+ mass spectra. 'TI1e signal has furthennore been seen in Exp. R606 (reported - + by F. Muller in this parallel session) in both A3TI and pK TI . 111e most convincing signal comes from the Spli t-Ficlcl Magnet (SFM) in K-pn + 'TI1e three observations together, all at the ISR, make this an...

  16. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  17. The Flutter Shutter Code Calculator

    Directory of Open Access Journals (Sweden)

    Yohann Tendero

    2015-08-01

    Full Text Available The goal of the flutter shutter is to make uniform motion blur invertible, by a"fluttering" shutter that opens and closes on a sequence of well chosen sub-intervals of the exposure time interval. In other words, the photon flux is modulated according to a well chosen sequence calledflutter shutter code. This article provides a numerical method that computes optimal flutter shutter codes in terms of mean square error (MSE. We assume that the observed objects follow a known (or learned random velocity distribution. In this paper, Gaussian and uniform velocity distributions are considered. Snapshots are also optimized taking the velocity distribution into account. For each velocity distribution, the gain of the optimal flutter shutter code with respectto the optimal snapshot in terms of MSE is computed. This symmetric optimization of theflutter shutter and of the snapshot allows to compare on an equal footing both solutions, i.e. camera designs. Optimal flutter shutter codes are demonstrated to improve substantially the MSE compared to classic (patented or not codes. A numerical method that permits to perform a reverse engineering of any existing (patented or not flutter shutter codes is also describedand an implementation is given. In this case we give the underlying velocity distribution fromwhich a given optimal flutter shutter code comes from. The combination of these two numerical methods furnishes a comprehensive study of the optimization of a flutter shutter that includes a forward and a backward numerical solution.

  18. Constructions of Rank Modulation Codes

    CERN Document Server

    Mazumdar, Arya; Zémor, Gilles

    2011-01-01

    Rank modulation is a way of encoding information to correct errors in flash memory devices as well as impulse noise in transmission lines. Modeling rank modulation involves construction of packings of the space of permutations equipped with the Kendall tau distance. We present several general constructions of codes in permutations that cover a broad range of code parameters. In particular, we show a number of ways in which conventional error-correcting codes can be modified to correct errors in the Kendall space. Codes that we construct afford simple encoding and decoding algorithms of essentially the same complexity as required to correct errors in the Hamming metric. For instance, from binary BCH codes we obtain codes correcting $t$ Kendall errors in $n$ memory cells that support the order of $n!/(\\log_2n!)^t$ messages, for any constant $t= 1,2,...$ We also construct families of codes that correct a number of errors that grows with $n$ at varying rates, from $\\Theta(n)$ to $\\Theta(n^{2})$. One of our constr...

  19. Trajectory Codes for Flash Memory

    CERN Document Server

    Anxiao,; Langberg, Michael; Schwartz, Moshe; Bruck, Jehoshua

    2010-01-01

    Flash memory is well-known for its inherent asymmetry: the flash-cell charge levels are easy to increase but are hard to decrease. In a general rewriting model, the stored data changes its value with certain patterns. The patterns of data updates are determined by the data structure and the application, and are independent of the constraints imposed by the storage medium. Thus, an appropriate coding scheme is needed so that the data changes can be updated and stored efficiently under the storage-medium's constraints. In this paper, we define the general rewriting problem using a graph model. It extends many known rewriting models such as floating codes, WOM codes, buffer codes, etc. We present a new rewriting scheme for flash memories, called the trajectory code, for rewriting the stored data as many times as possible without block erasures. We prove that the trajectory code is asymptotically optimal in a wide range of scenarios. We also present randomized rewriting codes optimized for expected performance (g...

  20. CodedStream: live media streaming with overlay coded multicast

    Science.gov (United States)

    Guo, Jiang; Zhu, Ying; Li, Baochun

    2003-12-01

    Multicasting is a natural paradigm for streaming live multimedia to multiple end receivers. Since IP multicast is not widely deployed, many application-layer multicast protocols have been proposed. However, all of these schemes focus on the construction of multicast trees, where a relatively small number of links carry the multicast streaming load, while the capacity of most of the other links in the overlay network remain unused. In this paper, we propose CodedStream, a high-bandwidth live media distribution system based on end-system overlay multicast. In CodedStream, we construct a k-redundant multicast graph (a directed acyclic graph) as the multicast topology, on which network coding is applied to work around bottlenecks. Simulation results have shown that the combination of k-redundant multicast graph and network coding may indeed bring significant benefits with respect to improving the quality of live media at the end receivers.

  1. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  2. i-Review: Sharing Code

    Directory of Open Access Journals (Sweden)

    Jonas Kubilius

    2014-02-01

    Full Text Available Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF. GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  3. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Cox, Geoff; Blackwell, Alan; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  4. State building energy codes status

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-01

    This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

  5. Nonlocally Centralized Simultaneous Sparse Coding

    Institute of Scientific and Technical Information of China (English)

    雷阳; 宋占杰

    2016-01-01

    The concept of structured sparse coding noise is introduced to exploit the spatial correlations and nonlo-cal constraint of the local structure. Then the model of nonlocally centralized simultaneous sparse coding(NC-SSC)is proposed for reconstructing the original image, and an algorithm is proposed to transform the simultaneous sparse coding into reweighted low-rank approximation. Experimental results on image denoisng, deblurring and super-resolution demonstrate the advantage of the proposed NC-SSC method over the state-of-the-art image resto-ration methods.

  6. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...

  7. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  8. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  9. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  10. PRACTICAL ALGORITHMS FOR TORNADO CODES

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Tornado codes have been used in the error control of data transmission in IP network. The efficiency of this erasure codes is critically affected by the short cycles in its bipartite graph. To remove this effect,two algorithms are introduced: (1) while generating the graph, the cycle eliminating algorithm is used to reduce the number of the short cycles in it; (2) in the decoding algorithm, cycles that are inevitably in the graph are used to remove decoding efficiency degradation. The simulation results show that they have a better performance than that of general tornado codes.

  11. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  12. Health technology usage in the course of physical training sessions of pedagogical universities female students

    Directory of Open Access Journals (Sweden)

    Елена Валериевна Фоменко

    2014-10-01

    Full Text Available We consider the methodological approaches to the unconventional gym study (fitness aerobics, Pilates, shaping at physical training sessions with female students of the first and second courses of higher educational institutions. Sessions are analyzed from the perspective of interest increasing of female students to sport activity, development of physical abilities, enhance of physical fitness and health promotion in general.

  13. 77 FR 26743 - The Manufacturing Council: Work Session of the Manufacturing Council

    Science.gov (United States)

    2012-05-07

    ... International Trade Administration The Manufacturing Council: Work Session of the Manufacturing Council AGENCY...: This notice sets forth the schedule and agenda for an open work session of the Manufacturing Council... Freescale Austin Technology and Manufacturing Center, 3501 Ed Bluestein Boulevard, Austin, Texas. All...

  14. Evaluating a Pre-Session Homework Exercise in a Standalone Information Literacy Class

    Science.gov (United States)

    Goetz, Joseph E.; Barber, Catherine R.

    2015-01-01

    In this study, researchers evaluate a homework exercise assigned before a standalone information literacy session. Students in a Master of Education program completed a worksheet using the ERIC database thesaurus. The researchers conducted pre- and posttests within a single library session to assess student learning, using a control group for…

  15. The Interactions between Breastfeeding Mothers and Their Babies during the Breastfeeding Session.

    Science.gov (United States)

    Epstein, Karen

    1993-01-01

    Videotaped 12 breastfeeding mothers and their babies during breastfeeding sessions to investigate maternal-infant interactions occurring during breastfeeding sessions. Presents four case studies to examine differences in breastfeeding interactions, as well as benefits and disadvantages that breastfeeding provided different mother-child pairs. (MM)

  16. Family lunch session: an introduction to family therapy in anorexia nervosa.

    Science.gov (United States)

    Rosman, B L; Minuchin, S; Liebman, R

    1975-10-01

    Family lunch sessions have proved a useful diagnostic and therapeutic technique in the treatment of anorexia nervosa. This paper describes the goals of these sessions and the strategies employed in the restructuring of family relationships. Data are presented illustrating changes in eating behavior of eight identified patients.

  17. 78 FR 21607 - Stakeholder Listening Session in Preparation for the 66th World Health Assembly

    Science.gov (United States)

    2013-04-11

    ... HUMAN SERVICES Stakeholder Listening Session in Preparation for the 66th World Health Assembly Time and... leading the U.S. delegation to the 66th World Health Assembly-- will hold an informal Stakeholder..., 200 Independence Avenue SW., Washington, DC 20201. The Stakeholder Listening Session will help the...

  18. A Comparison of Study Session Formats on Attendance and Quiz Performance in a College Course

    Science.gov (United States)

    Neef, Nancy A.; Cihon, Traci; Kettering, Tracy; Guld, Amanda; Axe, Judah B.; Itoi, Madoka; DeBar, Ruth

    2007-01-01

    We compared two formats for optional study sessions offered to students in a research methods course. Study sessions alternated between a game format (e.g., Behavioral Jeopardy) and a student-directed question and answer format, presented in counterbalanced order across different sections of the same course. The results of the alternating…

  19. Extended Evaluations in Cases of Child Sexual Abuse: How Many Sessions Are Sufficient?

    Science.gov (United States)

    Faller, Kathleen Coulborn; Nelson-Gardell, Debra

    2010-01-01

    This article provides new findings from a national study involving 18 forensic interview sites of 137 children who were randomly assigned to a four or eight session extended evaluation. Cases assigned to the eight session protocol were significantly more likely to be classified "credible disclosure" of sexual abuse (56.6%) than cases assigned to…

  20. On SIP Session setup delay for VoIP services over correlated fading channels

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam S.; Prasad, Ramjee

    2006-01-01

    link protocol (RLP). An adaptive retransmission timer is used to optimize SIP performances. Using numerical results, we find that SIP over user datagram protocol (UDP) instead of transport control protocol (TCP) can make the session setup up to 30% shorter. Also, RLP drastically reduces the session...

  1. Cumulative effects of consecutive running sessions on hemolysis, inflammation and hepcidin activity.

    NARCIS (Netherlands)

    Peeling, P.; Dawson, B.; Goodman, C.; Landers, G.; Wiegerinck, E.T.G.; Swinkels, D.W.; Trinder, D.

    2009-01-01

    The effect of two running sessions completed within a 12-h period on hemolysis, inflammation, and hepcidin activity in endurance athletes was investigated. Ten males completed two experimental trials in a randomized, counterbalanced order. The two trials included (a) a one-running-session trial (T1)

  2. Synthesis of chemicals and polymers: towards cleaner processes and atom economy, session 5

    Energy Technology Data Exchange (ETDEWEB)

    Razavi, A.; Thivolle-Cazat, J.; Hutchings, G.; Murata, K.; Leininger, S.; Sorokin, A.; Angelis, A. de; Apesteguia, C.I.; Mayoral, J.A.; Hardacre, C.; Jeon, J.; Tominaga, K.; Plasseraud, L.; Kervennal, J.; Souza, R.F. de; Ciardelli, F.; Dominguez, J.M.

    2004-07-01

    The abstracts of all the presentations (1 plenary session, 2 keynotes, 16 oral communications, 151 posters) of the thematic session 5 'synthesis of chemicals and polymers: towards cleaner processes and atom economy' are gathered in the CD-Rom of the conference. (O.M.)

  3. 77 FR 58526 - Pacific Fishery Management Council; Public Meeting; Work Session To Review Proposed Salmon...

    Science.gov (United States)

    2012-09-21

    ... proposed salmon methodology changes in a joint work session, which is open to the public. DATES: The work... National Oceanic and Atmospheric Administration RIN 0648-XC233 Pacific Fishery Management Council; Public Meeting; Work Session To Review Proposed Salmon Methodology Changes AGENCY: National Marine...

  4. One-Session Treatment of Specific Phobias: A Detailed Description and Review of Treatment Efficacy

    Science.gov (United States)

    Zlomke, Kimberly; Davis, Thompson E., III

    2008-01-01

    One-Session Treatment (OST) is a form of massed exposure therapy for the treatment of specific phobias. OST combines exposure, participant modeling, cognitive challenges, and reinforcement in a single session, maximized to three hours. Clients are gradually exposed to steps of their fear hierarchy using therapist-directed behavioral experiments.…

  5. Optimality aspects with assigning of Magistrates to Sessions and Teams of the Amsterdam Criminal Court

    NARCIS (Netherlands)

    Schreuder, Jan; Burke, E.K.; Rudova, H.

    2006-01-01

    In the criminal court (Arrondissements rechtbank, sector strafrecht) of Amsterdam the assignment of magistrates (judges, officers, etc) to sessions needed to handle the cases presented, has become a problem last years mainly caused by the increase of so called mega-sessions. One complicating factor

  6. Correspondence of Motivational Interviewing Adherence and Competence Ratings in Real and Role-Played Client Sessions

    Science.gov (United States)

    Decker, Suzanne E.; Carroll, Kathleen M.; Nich, Charla; Canning-Ball, Monica; Martino, Steve

    2013-01-01

    Treatment integrity ratings (adherence and competence) are frequently used as outcome measures in clinician training studies, drawn from recorded real client or role-played client sessions. However, it is unknown whether clinician adherence and competence are similar in real client and role-played sessions or whether real and role-play clients…

  7. Good Moments in Gestalt Therapy: A Descriptive Analysis of Two Perls Sessions.

    Science.gov (United States)

    Boulet, Donald; And Others

    1993-01-01

    Analyzed two Gestalt therapy sessions conducted by Fritz Perls using category system for identifying in-session client behaviors valued by Gestalt therapists. Four judges independently rated 210 client statements. Found common pattern of therapeutic movement: initial phase dominated by building block good moments and second phase characterized by…

  8. 76 FR 4412 - Commercial Space Transportation Advisory Committee-Closed Session

    Science.gov (United States)

    2011-01-25

    ... TRANSPORTATION Federal Aviation Administration Commercial Space Transportation Advisory Committee--Closed Session AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Commercial Space Transportation... 102-3.160, notice is hereby given of a special closed session of the Commercial Space...

  9. Rethinking Design Process: Using 3D Digital Models as an Interface in Collaborative Session

    Science.gov (United States)

    Ding, Suining

    2008-01-01

    This paper describes a pilot study for an alternative design process by integrating a designer-user collaborative session with digital models. The collaborative session took place in a 3D AutoCAD class for a real world project. The 3D models served as an interface for designer-user collaboration during the design process. Students not only learned…

  10. 78 FR 37553 - Maternal Health Town Hall Listening Session; Notice of Meeting

    Science.gov (United States)

    2013-06-21

    ... national strategy to reduce maternal morbidity and mortality, and improve the quality and safety of... HUMAN SERVICES Health Resources and Services Administration Maternal Health Town Hall Listening Session; Notice of Meeting Name: Maternal Health Town Hall Listening Session. Date and Time: August 27, 2013,...

  11. 75 FR 52760 - Medicare Program; Listening Session Regarding the Implementation of Section 10332 of the Patient...

    Science.gov (United States)

    2010-08-27

    ... HUMAN SERVICES Centers for Medicare & Medicaid Services Medicare Program; Listening Session Regarding... Services (CMS), HHS. ACTION: Notice of meeting. SUMMARY: This notice announces a listening session to... Act (the Affordable Care Act), which amended section 1874 of the Social Security Act: Availability...

  12. 75 FR 73090 - Medicare Program; Listening Session on Development of Additional Imaging Efficiency Measures for...

    Science.gov (United States)

    2010-11-29

    ... HUMAN SERVICES Centers for Medicare & Medicaid Services Medicare Program; Listening Session on.... SUMMARY: This notice announces a listening session to receive comments regarding the development of... QDRP), which is authorized under section 1833(t)(17) of the Social Security Act. The purpose of...

  13. The University of Amsterdam at TREC 2010: Session, Entity, and Relevance Feedback

    NARCIS (Netherlands)

    Bron, M.; He, J.; Hofmann, K.; Meij, E.; de Rijke, M.; Tsagkias, E.; Weerkamp, W.

    2010-01-01

    We describe the participation of the University of Amsterdam’s ILPS group in the session, entity, and relevance feedback track at TREC 2010. In the Session Track we explore the use of blind relevance feedback to bias a follow-up query towards or against the topics covered in documents returned to th

  14. A Comparative Evaluation of Minimal Therapist Contact and 15-Session Treatment for Female Orgasmic Dysfunction.

    Science.gov (United States)

    Morokoff, Patricia J.; LoPiccolo, Joseph

    1986-01-01

    Compared a four-session minimal therapist contact (MTC) program for treatment of lifelong global orgasmic dysfunction in women to a 15-session full therapist contact (FTC) program. Both programs were effective in producing female orgasm and in improving satisfaction with the sexual relationship and, for women in MTC treatment, happiness in…

  15. Anuric renal failure after same-session bilateral atraumatic flexible ureteroscopy

    Directory of Open Access Journals (Sweden)

    Gaurav Bandi

    2007-04-01

    Full Text Available We report the first known case of anuric renal failure after same-session bilateral atraumatic flexible ureteroscopy for renal calculi. Although, there is no consensus about stenting patients who undergo same-session bilateral ureteroscopy due to the lack of prospective randomized studies; strong consideration should be given to stenting the ureter at least one side to avoid this complication.

  16. Cognitive Changes, Critical Sessions, and Sudden Gains in Cognitive-Behavioral Therapy for Depression

    Science.gov (United States)

    Tang, Tony Z.; DeRubeis, Robert J.; Beberman, Rachel; Pham, Thu

    2005-01-01

    Using an independent cognitive-behavioral therapy (CBT) data set, the authors replicated T. Z. Tang and R. J. DeRubeis' (1999) discovery of sudden gains--sudden and large decreases in depression severity in a single between-session interval. By incorporating therapy session transcripts, the authors of this study improved the reliability of the…

  17. Individual neuropsychological support and group sessions for relatives to TBI patients

    DEFF Research Database (Denmark)

    Siert, Lars

    TITLE: Individual neuropsychological support and group sessions for relatives to TBI patients. OBJECTIVE: To describe how the neuropsychologist work with early and ongoing individual support and group sessions for relatives to adult TBI patients in the acute and sub acute phase and after discharge...

  18. Decoder for Nonbinary CWS Quantum Codes

    CERN Document Server

    Melo, Nolmar; Portugal, Renato

    2012-01-01

    We present a decoder for nonbinary CWS quantum codes using the structure of union codes. The decoder runs in two steps: first we use a union of stabilizer codes to detect a sequence of errors, and second we build a new code, called union code, that allows to correct the errors.

  19. Facilitating Internet-Scale Code Retrieval

    Science.gov (United States)

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  20. The Minimum Distance of Graph Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2011-01-01

    We study codes constructed from graphs where the code symbols are associated with the edges and the symbols connected to a given vertex are restricted to be codewords in a component code. In particular we treat such codes from bipartite expander graphs coming from Euclidean planes and other geome...... geometries. We give results on the minimum distances of the codes....

  1. The moving mesh code Shadowfax

    CERN Document Server

    Vandenbroucke, Bert

    2016-01-01

    We introduce the moving mesh code Shadowfax, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public License. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare Shadowfax with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  2. The moving mesh code SHADOWFAX

    Science.gov (United States)

    Vandenbroucke, B.; De Rijcke, S.

    2016-07-01

    We introduce the moving mesh code SHADOWFAX, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public Licence. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare SHADOWFAX with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  3. FLYCHK Collisional-Radiative Code

    Science.gov (United States)

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  4. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...... requirements between metadata and code should be checked but often are not, so current tools offer surprisingly poor development support. In this paper, we adapt classical data flow analyses to detect inconsistencies and provide better static guarantees. We provide a formalization of the consistency...... requirements and a set of adapted analyses for a concrete case study. Our work is implemented in a fast and efficient prototype in the form of an Eclipse plugin. We validate our work by testing this prototype on actual production code; preliminary results show that this approach is worthwhile. We found...

  5. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County. These are not clipped to the Allgeheny County boundary. If viewing this...

  6. Code properties from holographic geometries

    CERN Document Server

    Pastawski, Fernando

    2016-01-01

    Almheiri, Dong, and Harlow [hep-th/1411.7041] proposed a highly illuminating connection between the AdS/CFT holographic correspondence and operator algebra quantum error correction (OAQEC). Here we explore this connection further. We derive some general results about OAQEC, as well as results that apply specifically to quantum codes which admit a holographic interpretation. We introduce a new quantity called `price', which characterizes the support of a protected logical system, and find constraints on the price and the distance for logical subalgebras of quantum codes. We show that holographic codes defined on bulk manifolds with asymptotically negative curvature exhibit `uberholography', meaning that a bulk logical algebra can be supported on a boundary region with a fractal structure. We argue that, for holographic codes defined on bulk manifolds with asymptotically flat or positive curvature, the boundary physics must be highly nonlocal, an observation with potential implications for black holes and for q...

  7. On Reed-Solomon Codes

    Institute of Scientific and Technical Information of China (English)

    Qunying LIAO

    2011-01-01

    The complexity of decoding the standard Reed-Solomon code is a well-known open problem in coding theory. The main problem is to compute the error distance of a received word.Using the Weil bound for character sum estimate,Li and Wan showed that the error distance can be determined when the degree of the received word as a polynomial is small.In the first part,the result of Li and Wan is improved.On the other hand,one of the important parameters of an error-correcting code is the dimension.In most cases,one can only get bounds for the dinension.In the second part,a formula for the dimension of the generalized trace Reed-Solonon codes in some cases is obtained.

  8. The Serializability of Network Codes

    CERN Document Server

    Blasiak, Anna

    2010-01-01

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of entropic vectors subject to constraints imposed by the network structure. In the case of directed acyclic graphs, these constraints are completely understood, but for general graphs the problem of enumerating them remains open: it is not known how to classify the constraints implied by a property that we call serializability, which refers to the absence of paradoxical circular dependencies in a network code. In this work we initiate the first systematic study of the constraints imposed on a network code by serializability. We find that serializability cannot be detected solely by evaluating the Shannon entropy of edge sets in the graph, but nevertheless, we give a polynomial-time algorithm tha...

  9. Multimedia signal coding and transmission

    CERN Document Server

    Ohm, Jens-Rainer

    2015-01-01

    This textbook covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory with regard to the principles and design of image, video and audio compression systems. The theoretical concepts are augmented by practical examples of algorithms for multimedia signal coding technology, and related transmission aspects. On this basis, principles behind multimedia coding standards, including most recent developments like High Efficiency Video Coding, can be well understood. Furthermore, potential advances in future development are pointed out. Numerous figures and examples help to illustrate the concepts covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by exercises. The book is also a self-contained introduction both for researchers and developers of multimedia compression systems in industry.

  10. Zip Code Level Enrollment Data

    Data.gov (United States)

    U.S. Department of Health & Human Services — The dataset includes is the number of Qualified Health Plan selections by ZIP code for 36 states that are participating in the Federally-facilitated Marketplace or...

  11. Upper Air Observations - Synoptic Code

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Daily radiosonde and rawinsonde observations at standard and significant levels, recorded in synoptic code. Period of record 1950-1951.

  12. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  13. Forms and Linear Network Codes

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    spaces of Veronese varieties. Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possibly altered vector space. Ralf Koetter and Frank R. Kschischang introduced a metric on the set af vector spaces and showed that a minimal......We present a general theory to obtain linear network codes utilizing forms and obtain explicit families of equidimensional vector spaces, in which any pair of distinct vector spaces intersect in the same small dimension. The theory is inspired by the methods of the author utilizing the osculating...... them suitable for linear network coding. The parameters of the resulting linear network codes are determined....

  14. Efficient codes and balanced networks.

    Science.gov (United States)

    Denève, Sophie; Machens, Christian K

    2016-03-01

    Recent years have seen a growing interest in inhibitory interneurons and their circuits. A striking property of cortical inhibition is how tightly it balances excitation. Inhibitory currents not only match excitatory currents on average, but track them on a millisecond time scale, whether they are caused by external stimuli or spontaneous fluctuations. We review, together with experimental evidence, recent theoretical approaches that investigate the advantages of such tight balance for coding and computation. These studies suggest a possible revision of the dominant view that neurons represent information with firing rates corrupted by Poisson noise. Instead, tight excitatory/inhibitory balance may be a signature of a highly cooperative code, orders of magnitude more precise than a Poisson rate code. Moreover, tight balance may provide a template that allows cortical neurons to construct high-dimensional population codes and learn complex functions of their inputs.

  15. Summary of Code of Ethics.

    Science.gov (United States)

    Eklund, Kerri

    2016-01-01

    The Guide to the Code of Ethics for Nurses is an excellent guideline for all nurses regardless of their area of practice. I greatly enjoyed reading the revisions in place within the 2015 edition and refreshing my nursing conscience. I plan to always keep my Guide to the Code of Ethics for Nurses near in order to keep my moral compass from veering off the path of quality care.

  16. Parametric Coding of Stereo Audio

    Directory of Open Access Journals (Sweden)

    Erik Schuijers

    2005-06-01

    Full Text Available Parametric-stereo coding is a technique to efficiently code a stereo audio signal as a monaural signal plus a small amount of parametric overhead to describe the stereo image. The stereo properties are analyzed, encoded, and reinstated in a decoder according to spatial psychoacoustical principles. The monaural signal can be encoded using any (conventional audio coder. Experiments show that the parameterized description of spatial properties enables a highly efficient, high-quality stereo audio representation.

  17. Coded nanoscale self-assembly

    Indian Academy of Sciences (India)

    Prathyush Samineni; Debabrata Goswami

    2008-12-01

    We demonstrate coded self-assembly in nanostructures using the code seeded at the component level through computer simulations. Defects or cavities occur in all natural assembly processes including crystallization and our simulations capture this essential aspect under surface minimization constraints for self-assembly. Our bottom-up approach to nanostructures would provide a new dimension towards nanofabrication and better understanding of defects and crystallization process.

  18. Product Work Classification and Coding

    Science.gov (United States)

    1986-06-01

    detail is much more useful in planning steel welding processes. In this regard remember that mild steel , HSLA steel , and high-yield steel (e.g. HY80 ...manufacturing facility. In Figure 2.3-2, a classification and coding system for steel parts is shown. This classification and coding system sorts steel parts...system would provide a shop which produced steel parts with a means of organizing parts. Rather than attempting to manage all of its parts as a single

  19. An examination of within-session responding following access to reinforcing stimuli.

    Science.gov (United States)

    Rispoli, Mandy; O'Reilly, Mark; Lang, Russell; Machalicek, Wendy; Kang, Soyeon; Davis, Tonya; Neely, Leslie

    2016-01-01

    Previous research has shown tangibly maintained challenging behavior can be temporarily decreased by providing presession access to the relevant tangible. However, the duration of this beneficial effect is unknown. We measured the subsequent duration of behavior reduction effects following presession access during extended classroom observation sessions by analyzing within-session patterns of responding in three children with autism. An alternating treatments design was used to analyze within- and across-session responding following presession access and presession restriction conditions. The cumulative frequency of challenging behavior was higher following the presession restriction condition for all participants and lower following presession access. Within-session analysis revealed the same basic pattern of responding across participants. Specifically, the first half of the sessions contained very little, if any, challenging behavior; however, after 60 min, the rate of challenging behavior began to increase rapidly for two of the three participants. Results are discussed in terms of implications for practitioners, satiation, habituation, and behavioral contrast.

  20. Implementation of Motor Imagery during Specific Aerobic Training Session in Young Tennis Players.

    Science.gov (United States)

    Guillot, Aymeric; Di Rienzo, Franck; Pialoux, Vincent; Simon, Germain; Skinner, Sarah; Rogowski, Isabelle

    2015-01-01

    The aim of this study was to investigate the effects of implementing motor imagery (MI) during specific tennis high intensity intermittent training (HIIT) sessions on groundstroke performance in young elite tennis players. Stroke accuracy and ball velocity of forehand and backhand drives were evaluated in ten young tennis players, immediately before and after having randomly performed two HIIT sessions. One session included MI exercises during the recovery phases, while the other included verbal encouragements for physical efforts and served as control condition. Results revealed that similar cardiac demand was observed during both sessions, while implementing MI maintained groundstroke accuracy. Embedding MI during HIIT enabled the development of physical fitness and the preservation of stroke performance. These findings bring new insight to tennis and conditioning coaches in order to fulfil the benefits of specific playing HIIT sessions, and therefore to optimise the training time.