WorldWideScience

Sample records for asms2004 session code

  1. Feasibility and Reliability of a Coding System to Capture In-Session Group Behavior in Adolescents.

    Science.gov (United States)

    Ladd, Benjamin O; Tomlinson, Kristin; Myers, Mark G; Anderson, Kristen G

    2016-01-01

    Limited research has explored the role of in-session behavior during motivational enhancement (ME) in group formats. The current study presents initial feasibility of assessing behavior of high school students (N = 425) attending Project Options, a voluntary secondary drug and alcohol prevention program utilizing ME techniques. Building on previous research exploring client language supporting/opposing health behavior, student group behavior was coded live at the specific utterance and global level; group leader behavior was also coded globally. Interrater reliability of the coding system was assessed, and preliminary validity of the coding system was examined by exploring associations between characteristics of group members and in-session group behavior. Initial reliability estimates were excellent for the specific behavior codes. Reliability of the global codes was mixed, with raters demonstrating good reliability on support for unhealthy behavior, opposition to unhealthy behavior, and support for healthy behavior. Reliability of the group leader codes was fair to poor. Greater percent healthy talk was associated with a lower percentage of group members reporting lifetime alcohol use. The results of the current study suggest that some in-session behavior at the group level can be coded reliably via live observation and that in-session behavior at the group level is associated with alcohol use prior to attending the program. Future research is needed to explore the utility of in-session behavior in terms of predicting future behavior at the group and individual level. PMID:26271299

  2. Coding into the Great Unknown: Analyzing Instant Messaging Session Transcripts to Identify User Behaviors and Measure Quality of Service

    Science.gov (United States)

    Maximiek, Sarah; Rushton, Erin; Brown, Elizabeth

    2010-01-01

    After one year of providing virtual reference service through an instant messaging (IM) service, Binghamton University (BU) Libraries, under the purview of its Digital Reference Committee (DRC), undertook a study of collected session transcripts. The goals of this work were to determine who was using the IM service and why; if staffing for the…

  3. Coding into the Great Unknown: Analyzing Instant Messaging Session Transcripts to Identify User Behaviors and Measure Quality of Service

    OpenAIRE

    Maximiek, Sarah; Brown, Elizabeth; Rushton, Erin

    2010-01-01

    After one year of providing virtual reference service through an instant messaging (IM) service, Binghamton University (BU) Libraries, under the purview of its Digital Reference Committee (DRC), undertook a study of collected session transcripts. The goals of this work were to determine who was using the IM service and why; if staffing for the service was adequate and met our in-person reference standards; and if improvements to the Libraries' existing reference services were needed. The ...

  4. Twenty-fifth water reactor safety information meeting: Proceedings. Volume 1: Plenary sessions; Pressure vessel research; BWR strainer blockage and other generic safety issues; Environmentally assisted degradation of LWR components; Update on severe accident code improvements and applications

    International Nuclear Information System (INIS)

    This three-volume report contains papers presented at the conference. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Japan, Norway, and Russia. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume contains the following information: (1) plenary sessions; (2) pressure vessel research; (3) BWR strainer blockage and other generic safety issues; (4) environmentally assisted degradation of LWR components; and (5) update on severe accident code improvements and applications. Selected papers have been indexed separately for inclusion in the Energy Science and Technology Database

  5. Poster Session

    Science.gov (United States)

    1997-01-01

    In this session, Poster Session, the discussion focuses on the following topics: Development of correlative measures for the assessment of attention and memory; Biodynamical Responses of the Crewmember Head/Neck System During Emergence Ejection; Fecundation in the Sky, a Ten Years Old Experiment in Microgravity; A Modified Botex Incubator as a Transport System For Developing Crickets into Space; Chromosomal Aberrations in Peripheral Lymphocytes of Cosmonauts and Astronauts after Space Flights; Method for Establishing Long term Bone Marrow; Cultures Under Microgravity Conditions Reproduction Under Simulated Weightlessness --Mammalian in vivo Experiments Under Suspension; Towards Human Movement Analysis Without the Use of Markers; Habitability Requirements For a Cogent Mars Mission; The Saucer Concept for Space Habitats; New Way In Modeling the Growth of the Organism; The Fractionation of Hydrogen and Oxygen Stable Isotopes By Life Support Systems of Space Station "MIR"; and Effect of Space Flight on Neutrophil Function.

  6. Session Introduction

    Science.gov (United States)

    Eliane Lessner, Co-Chair:

    2009-03-01

    A panel discussion session providing a worldwide assessment of the status and experiences of women in physics, paying attention to the different cultures and environments they work in and to how the age of the physicist affects their perspective. We will hear about women physicists in Korea in particular and Asia in general, in Egypt in particular and Africa in general, and in the Caribbean. Six invited speakers will present analyses of the progress being made in promoting women in physics from their personal experiences and as assessed from their participation in the Third International Conference on Women In Physics (ICWIP2008) convened in Seoul, Korea in October 2008. From Albania to Zimbabwe, with representation of all the continents, ICWIP2008 congregated 283 women and men physicists from 57 countries to share the participants' scientific accomplishments and evaluate international progress in improving the status of women in physics. This three-hour session is organized jointly by the Committee on the Status of Women in Physics of the APS (CSWP) and the Forum on International Physics of the APS (FIP). Audience participation in the panel discussion will be strongly encouraged.

  7. Session summaries

    International Nuclear Information System (INIS)

    In the summary session, possible international activities in the field of basic studies on high-temperature engineering were discussed within the framework of the OECD/NEA Nuclear Science Committee (NSC). It was recommended to include topics relevant to fission-product behaviour and safety issues of HTGR in next meeting, in addition to the topics discussed in this meeting. The chairperson of the last session summarised the recommendations to be presented to the NSC into the following five topics as possible international activities: - Basic studies on behaviour of irradiated graphite/carbon and ceramic materials including their composites under both operation and storage conditions. - Development of in-core material characterisation and instrumentation methods. - Improvement in material properties through high-temperature irradiation. - Basic studies on HTGR fuel fabrication and performance including fission-product release. - Basic studies on safety issues of HTGR. It was also recommended that a further information exchange meeting focused on the organisation of the interactive collaboration activity with regard to the above topics be planned in 2003, tentatively in Oarai, Japan. (author)

  8. Session 3 - Summary

    International Nuclear Information System (INIS)

    The benefit of doing best estimate calculations with quantified uncertainties was acknowledged. The use of such information would be for licensing and probabilistic safety assessment. The objective is to quantify the uncertainty for a reactor calculation. Four key aspects of code uncertainties quantification were reviewed in this session: the validation matrix activity which is the first requirement when, as the first step in code uncertainties evaluation, a systematic code assessment is developed; the methods themselves which are being developed for code uncertainties quantification; the user effects and the role of counterpart testing, specially on the scaling issue. Validation matrix: It was recognized that a validation matrix agreed upon internationally for PWR and BWR thermal-hydraulics codes had been developed. A validation matrix for separate effects is under development. The first matrix was issued nearly 5 years ago, and it was proposed that this should be updated. In this update, data from new experimental programs and new requirements from new reactor concepts would be included. It was noted that only a few plant transients were included. Sufficient detail for code assessment from such experiment was judged to be difficult to obtain. The high cost of making an assessment against plant data could also be an obstacle to the use of such data. Methods for code uncertainties quantification: The two British and German methods and the CSAU methodology developed by the USNRC were reviewed. The quantification of uncertainties is a complex task and requires great efforts. A major development task is to make the methods less resource demanding. The two European methods are quite similar; one is based more on engineering judgment and might therefore require less effort at the expense of the quality and quantity of information obtained. This method requires changes in the code in order to be able to investigate model sensitivities. The methods will be completed in a

  9. Session 1 - Summary

    International Nuclear Information System (INIS)

    Session I covered outstanding issues in two-phase flow modelling: - modelling of the physical phenomena, - instrumentation, - numerical methods. Four specific areas were chosen to illustrate the present needs for modelling in two phase flow: instabilities in BWRs, the multiphase flow aspects of fuel coolant interactions, reflooding and condensation phenomena. The paper on BWR stability problems showed how the coupling of thermohydraulic instabilities with complex neutronic feedbacks via the density reactivity coefficient produces instabilities in BWRs. The paper on fuel coolant interactions (FCI) considered three areas of importance: fuel melt quenching in water pools, addition of coolant to degraded cores, and FCI energetics. The paper on reflooding attempted to draw consensus on the best way of modelling reflooding situations. New challenges presented by additional accident scenarios now under consideration and the analysis of novel and Eastern reactor types makes the lack of full description of certain aspects of the reflooding problem more apparent. Very important and useful information gathered from the coordinated international programme of large-scale system reflooding tests is now available and the codes should also be able to account properly for the observed multidimensional effects. Condensation plays an important role in LOCA analysis, in particular during ECC injection and refill. The presentation on two-phase flow instrumentation has shown that accurate and useful measurements of macroscopic behaviour can be performed. Such measurements are possible when the physical scale of the phenomena is not too small. Redundant instrumentation can be installed and the signals are analysed using a data reduction algorithm. Extensive in situ calibration of such instruments is still required. Good progress in two-phase instrumentation was made in the last 10-15 years, partly driven by oil industry needs. There are further development needs for very low flow rates

  10. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this...... paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication as...

  11. Team Exploratory Testing Sessions

    OpenAIRE

    Soili Saukkoriipi; Ilkka Tervonen

    2012-01-01

    Exploratory testing (ET) is popular, especially among agile development teams. In this paper, we study the team aspect in the ET context and explore how to use ET in team sessions to complement other testing activities. The goal was to define a team exploratory testing (TET) session approach and to provide evidence that the approach is worth using. A TET session approach is defined by means of parameters, roles, and process. Also, instructions for using the approach are given. The team is the...

  12. Summary of Technical Sessions - Summary and Recommendations

    International Nuclear Information System (INIS)

    Technical Session 1 - Development achievements of BEPU methods and State of the Art: The objective of this session was to present the different approaches dealing with Best Estimate codes and uncertainties evaluations. Existing methods were summarized and different papers were focused on specific methods stressing their bases, peculiarities, advantages and limitations. As a result of the session a picture of the current State of the Art was obtained. The session comprised six papers. Technical Session 2 - International comparative activities: This session had as a main objective to review the activities launched in the past and present from the NEA in connection with BEPU methods, with focus on the applicability of conclusions derived from former benchmarks like UMS, the main outcomes of the recently finished BEMUSE project, and the objectives and relevance of UAM and PREMIUM projects. The session comprised four papers. Technical Session 3 - Applications: Licensing, safety analysis support, regulatory body views and industry activities: This session focused on the application of current methods in safety analyses. Contributions from industry, technical safety organizations and regulatory bodies were provided. As a result, a view of the penetration of BEPU methods in current safety analyses was obtained, as well as an indication of the evolution in the near future. Elements such as licensing practices, assessment process, etc. were considered. The session comprised nine papers. Technical Session 4. BEPU methods extension to new fields The session addressed the extension of BEPU methods beyond their current use. By now such methods are mainly applied to classic deterministic environment but it is believed that their benefits could be extended to other fields. Seven papers were presented in the session dealing with subjects that fit in the objectives established in the workshop programme. The papers cover areas like: extension to CFD, quantification of global safety

  13. The Constitutional Law Sessions

    Science.gov (United States)

    White, Daniel O.

    1972-01-01

    Teachers, attorneys, and law educators met to evaluate 1971 workshops in law education and to plan improved learning experiences at future workshops. Coordination between substantive law sessions and teaching methodology sessions was cited as a major necessity. Teachers were encouraged to develop their own material. (JB)

  14. Session 4 - Summary

    International Nuclear Information System (INIS)

    The fourth session specifically addressed the status of code application to real plant simulation covering three main subjects: 1 - Application of codes to accident sequences beyond design, with particular reference to the TMI-2 accident. 2 - Code assessment and model qualification with real plant data. 3 - Application to the study of A.M. procedures. The analysis of the TMI-2 accident was performed within CSNI by an ad hoc group, in collaboration with the U.S. Department of Energy. It was a unique opportunity to benchmark severe accident analysis methods against full scale, integrated facility data. Some of the conclusions from the CSNI report on the TMI-2 analysis exercise were recalled to point out the progress made since then, as an overview in the first presentation. The participants' analyses reasonably simulated the accident until the start of core heat-up, but were unable to simulate system response to the 2B reactor coolant pump transient. Between the start of core heat-up and the pump transient the analysis diverged. Some codes (e.g. SCDAP/RELAP5) predicted pressurizer drainage for base case boundary conditions. This represents a potentially non-conservative analysis. Sensitivity analysis performed with RELAP showed that the presence of hydrogen, eliminating condensation, controls pressurizer drainage. This shows that the calculations are qualitatively correct (if not quantitatively correct), that sensitivity studies are essential in identifying the phenomena interactions that determined the progression of the TMI-2 accident. From the presentation, and the discussion which followed, it was not possible to conclude that any progress had been made in the simulation capability of accident progression after the start of core damage: a phase which implies geometric deformations, development of hydrogen and non condensable gases, phenomena for which models have been developed which require experimental confirmation, including validation on separate effect tests

  15. Summary of workshop session F on electron-cloud instabilities

    OpenAIRE

    Zimmermann, Frank; Wolski, Andrzej

    2004-01-01

    We summarize Session F of the ECLOUD 04 workshop. This session was dedicated to beam instabilities driven by electron cloud. Specifically, we discuss the principal observations of electron-cloud instabilities, analytical models, simulation codes and the next steps that need to be taken to arrive at a predictive theory.

  16. Session 7 - discussion

    International Nuclear Information System (INIS)

    This discussion session of the 1990 conference on Landfill Gas covered variations in landfill gas composition and atmospheric pressure; the influence of methane on the greenhouse effect; sampling landfill gas; and waste incineration as an alternative to landfilling. (author)

  17. Abstracts of SIG Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1997

    1997-01-01

    Presents abstracts of SIG Sessions. Highlights include digital collections; information retrieval methods; public interest/fair use; classification and indexing; electronic publication; funding; globalization; information technology projects; interface design; networking in developing countries; metadata; multilingual databases; networked…

  18. HETEROGENEOUS MULTIMEDIA SESSIONS

    OpenAIRE

    MANJUR S. KOLHAR; Anas F. Bayan; TAT-CHEE WAN; O. ABOUBDALLA; R. SURESWARAN

    2009-01-01

    This paper discusses technical issues related to delivery and control of IP multimedia services, such as multimedia conferencing, involving heterogeneous end terminals. In particular, it proposes the design of an experimental system for interworking between InterAsterisk exchange Protocol and RSW session and call control signaling protocols. This IP videoconferencing interworking system is composed of two core units for supporting delivery of sessions and streams. These units perform various ...

  19. Workshop: poster session

    International Nuclear Information System (INIS)

    The poster session consisted of a microcosm of projects encompassing the wide range of problems in the radioecology of natural and semi-natural ecosystems. The authors presented a brief resume of the poster at a plenary session during which highlights were pointed out. The range of studies covered microbial transfer, fungi, insects herbicides, lichens, solid speciation of cesium, soil properties, plant cover, transfer factors from soil to plants, uptake by sludge fertilizers, fertilizer remediation and compartmental models for soil-plant uptake. (author)

  20. Session 2: Machine studies

    International Nuclear Information System (INIS)

    This document summarizes the talks and discussion that took place in the second session of the Chamonix 2012 workshop concerning results from machine studies performed in 2011. The session consisted of the following presentations: -) LHC experience with different bunch spacings by G. Rumolo; -) Observations of beam-beam effects in MDs in 2011 by W. Herr; -) Beam-induced heating/ bunch length/RF and lessons for 2012 by E. Metral; -) Lessons in beam diagnostics by R. Jones; -) Quench margins by M. Sapinski; and -) First demonstration with beam of the Achromatic Telescopic Squeeze (ATS) by S. Fartoukh. (authors)

  1. Summary of Session III

    OpenAIRE

    Furman, M.A.

    2002-01-01

    This is a summary of the talks presented in Session III "Simulations of Electron-Cloud Build Up" of the Mini-Workshop on Electron-Cloud Simulations for Proton and Positron Beams ECLOUD-02, held at CERN, 15-18 April 2002.

  2. Session 1 - discussion

    International Nuclear Information System (INIS)

    This discussion session of the Landfill Gas-Energy and Environment 90 Conference covered the landfill gas potential, the setting up of the Non-Fossil Fuel Obligation; anticipated developments in the post 1998 period, the problem of smell for those who live near a landfill, and the length of time a landfill site is productive in terms of gas evolution. Relevant regulations in California are briefly discussed. (author)

  3. Modular Session Types for Objects

    CERN Document Server

    Gay, Simon J; Ravara, António; Vasconcelos, Vasco Thudichum

    2012-01-01

    Session types allow communication protocols to be specified type-theoretically so that protocol implementations can be verified by static type checking. We extend previous work on session types for distributed object-oriented languages in three ways. (1) We attach a session type to a class definition, to specify the possible sequences of method calls. (2) We allow a session type implementation to be modularized, i.e. partitioned into separately-callable methods. (3) We treat session-typed communication channels as objects, integrating their session types with the session types of classes. The result is an elegant unification of communication channels and their session types, distributed OO programming, and a form of typestate supporting non-uniform objects, i.e. objects that dynamically change the set of available methods. We define syntax, operational semantics, a sound type system, and a sound and complete type checking algorithm for a small distributed OO language with structural subtyping. Static typing g...

  4. Session: Hot Dry Rock

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Duchane, David V.; Ponden, Raymond F.; Brown, Donald W.

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of four presentations: ''Hot Dry Rock - Summary'' by George P. Tennyson, Jr.; ''HDR Opportunities and Challenges Beyond the Long Term Flow Test'' by David V. Duchane; ''Start-Up Operations at the Fenton Hill HDR Pilot Plant'' by Raymond F. Ponden; and ''Update on the Long-Term Flow Testing Program'' by Donald W. Brown.

  5. Session: Hard Rock Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Dunn, James C.; Drumheller, Douglas S.; Glowka, David A.; Lysne, Peter

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five presentations: ''Hard Rock Penetration - Summary'' by George P. Tennyson, Jr.; ''Overview - Hard Rock Penetration'' by James C. Dunn; ''An Overview of Acoustic Telemetry'' by Douglas S. Drumheller; ''Lost Circulation Technology Development Status'' by David A. Glowka; ''Downhole Memory-Logging Tools'' by Peter Lysne.

  6. ICALEPS 2005 : opening session

    CERN Multimedia

    Maximilien Brice

    2005-01-01

    ICALEPCS 2005, the tenth International Conference on Accelerator and Large Experimental Physics Control Systems, will be held in Geneva, Switzerland, 10-14 Oct. 2005 at the International Conference Center Geneva (CICG). ICALEPCS 2005 thus falls in the year that UNESCO has declared the "World Year of Physics". ICALEPCS covers all aspects of control and operation of Experimental Physics facilities such as particle accelerators, particle detectors, optical telescopes, radio telescopes, nuclear fusion facilities like Tokamaks, nuclear reactors, lasers, etc .... Opening session by . A. Daneels (CERN): Introducting ICALEPCS 2005 . C.Lamprecht (Republic & State of Geneva): Welcome speech . J. Lister (EPFL): Welcome speech . J. Engelen (CERN): The machine and experiment challenges of LHC

  7. Amendment works of the Korean civil code (Property Law)

    OpenAIRE

    Kim, Sang Yong

    2001-01-01

    "The Korean Civil Code is currently in the process of amendment. The government expects to submit a proposal for amending the Civil Code to this year's regular session of the National Assembly. However, considering the extent to which the works for amending the Civil Code being in process by the Civil Code amendment committee have thus far advanced, submission of the proposal for Civil Code amendment within this year’s regular session of the National Assembly can be considered ...

  8. Neurovestibular Session Summary

    Science.gov (United States)

    Oman, Charles; Cohen, Malcolm

    1999-01-01

    . Three examples were presented at this meeting: 1) Transgenic animal experiments suggest that in addition to the light illumination cycle, vestibular inputs may also serve as an important input to the circadian system. 2) Radiation can cause important CNS effects in animals, including loss of spatial memory. 3) As described in our session, otolith inputs may contribute to cardiovascular regulation of orthostatic tolerance. Over the past three days, we've all enjoyed catching up with old friends, and making many new ones. On behalf of my colleagues, I want to thank Al Coats and the USRA DSLS staff for the great job they did in running this meeting. And keeping the emphasis on fun. And also my Co- Chair, Mal Cohen, who had more stamina than many of us, despite major surgery only three weeks ago. Mal and I have written a few lines describing each of the seventeen papers in our session, to give you a quick over-view, and as a guide to the full abstracts, We have grouped them under five themes: preflight and inflight countermeasurements, postlanding posture and locomotion deficits: assessment and prediction, adaptive processes, relationships among physical simuli, perceptions, and eye movements, vestibular contribution to human autonomic responses, and implications and recommendations.

  9. Summary of spin session talks

    International Nuclear Information System (INIS)

    Measurements of spin observables in scattering experiments have been useful to explore a wide variety of medium and high energy phenomena. Important new results were presented in each of the spin, combined hadron/spin and combined electrons and muons/spin sessions at this conference. Talks concerning spin effects in other sessions and in one of the hadron/spin parallel sessions are summarized by other speakers. The spin talks summarized in this paper are divided into four topics: tests of symmetry principles, lepton scattering, hadron scattering experiments, and new developments in spin-related technologies. 5 figs

  10. Session 2 - Driving the LHC

    CERN Document Server

    Arduini, G

    2010-01-01

    The main aim of the session is the identification of improvements in procedures and software tools to enhance the efficiency in running the LHC with beam and favour the analysis and understanding of its performance and performance limitations.

  11. Twin Sessions Through African Eyes

    Institute of Scientific and Technical Information of China (English)

    Ni Yanshuo

    2012-01-01

    Every year journalists from around China and the world flock to Beijing in March to cover the sessions of the National People's Congress (NPC) and the Chinese People's Political Consultative Conference (CPPCC), known as the lianghui, or twin sessions. With the deepening of Sino-African relations in the past decades, an increasing number of African journalists are involved in reporting China's lianghui to their audiences in Africa.

  12. IMC9 Edinburgh Nomenclature Sessions

    OpenAIRE

    2010-01-01

    The proceedings of the 3–5 August 2010, IMC9 Edinburgh Nomenclature Sessions are briefly summarized. The final resolution approved by the General Assembly endorses the recommendations by the Nomenclature Sessions regarding transfer of the governance of fungal nomenclature from botanical to mycological congresses, mandatory pre-publication deposit of nomenclatural information for valid publication of new fungal names, and the acceptability of English as an alternative to Latin in the valid pub...

  13. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any......- work, and gives a general pattern for reasoning about independence....

  14. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant;

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity....... Coding density tuning can be performed by designing time-dependent coding matrices. In multicast networks, this tuning can be performed within the network by designing time-dependent pre- coding and network coding matrices with mild conditions on the network structure for specific densities. We present a...

  15. Synthesis of the workshop. Poster session. Conclusion

    International Nuclear Information System (INIS)

    The workshop was divided into four plenary sessions and a poster session. The first plenary session discussed the general framework to be followed when considering deep disposal in crystalline rocks. The subsequent sessions focused on more specific processes of importance to the stability of crystalline rocks, their response and resilience to natural perturbations and arguments to support confidence in their stability. (author)

  16. Scientific conference proceedings. Session 4

    International Nuclear Information System (INIS)

    Session 4 of the conference was held on 7 June 1985 at Rez near Prague. 17 papers were submitted dealing with radiation chemistry and radiation technologies, dosimetry, technology of producing labelled compounds and their uses in medicine, determination of elements by neutron activation analysis and infrared, mass and atomic absorption spectroscopy. All contributions were inputted to INIS. (M.D.)

  17. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2004-01-01

    WS-Security provides basic means to secure SOAP traffic, one envelope at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; besides, it is often important to secure the integrity of a whole session, as well as each message. To this end,

  18. Session summaries - Session 1: operator aids for control rooms; Session 2: operator aids for technical support centres; session 3: simulation tools for operator training

    International Nuclear Information System (INIS)

    (Kurchatov Institute - Russia) described the main features of a full-scope simulator devoted to operator training on RBMK type reactors. After outlining the most significant characteristics of this type of reactors, it is stressed that operator error was a non-negligible factor of risk and that the full-scope simulator had been designed to address this kind of problem. The third paper (University of Cantabria in Santander - Spain) described an Integrated Simulator and Real Time Information System. Based on the MAAP3 computer code, the simulator allows several operators to interact simultaneously on the process. It includes an anomaly-generating capability both before and during the accident, and operators can interact with the model at any time into the accident. The fourth paper (GRS - Germany) complemented the demonstration performed in session 1. GRS had developed a special training course on the Phenomenology and Progression of Severe Accidents in PWRs. The last paper (CSN - Spain) dealt with the Integration of Operator Actions in Accident Sequence Simulation Tools for a BWR Plant

  19. Aeropropulsion 1987. Session 3: Internal Fluid Mechanics Research

    Science.gov (United States)

    1987-01-01

    Internal fluid mechanics research at Lewis is directed toward an improved understanding of the important flow physics affecting aerospace propulsion systems, and applying this improved understanding to formulate accurate predictive codes. To this end, research is conducted involving detailed experimentation and analysis. The presentations in this session summarize ongoing work and indicated future emphasis in three major research thrusts: namely, inlets, ducts, and nozzles; turbomachinery; and chemical reacting flows.

  20. Poster Session B

    Science.gov (United States)

    2014-01-01

    Monitoring (SRM) Mass Spectrometry To Unmask Regulatory Feedback Loops Controlling Adipogenesis Robert Ahrends1,2, Asuka Ota2, Kyle M. Kovary2, Takamasa Kudo2, Byung Ouk Park2, Mary N. Teruel2 1ISAS, Dortmund, Germany; 2Clinical and Systems Biology, Stanford University, Stanford, CA, USA Background: Due to modern lifestyle changes, obesity has a worldwide impact on human health. The obesity epidemic is now recognized as one of the most important public health problems facing the world today. Understanding adipogenesis is crucial to understanding obesity; failure of adipogenesis was shown to be a key factor in the development of diabetes. In earlier work using single-cell imaging, we demonstrated that there is a distinct decision made during the time course of adipogenesis. Thereby positive feedback loops between PPARg and other transcription factors (TFs) in the differentiation network are regulating this decision. We identified a positive feedback loop between PPARg and C/EBPb that plays a critical role in regulating adipogenesis. Since multiple feedback loops with different timing and strengths can sharpen the decision process and control the number of cells which are differentiating, we wanted to gain a better understanding of how many other proteins could be involved in the decision process. Objective: The objective of this work is to search for feedback loops that could play a key role in the commitment decision. Methods: Using Selected Reaction Monitoring (SRM) mass spectrometry combined with perturbations, we analyzed OP9 cells to detect peptides of TFs which can serve as probes. We validated these probes with isotopically coded internal peptide standards and established a SRM library of transcriptional key regulators. These probes were subsequently used to quantitatively profile different stages of adipogenesis to obtain time courses of different TFs. To achieve our major goal to elucidate the TF control network in more detail, we furthermore searched for hidden

  1. MOVES Research and Education Summit 2011: Technical Sessions

    OpenAIRE

    2011-01-01

    Session 1: Human Social Culture Behavior (HSCB) Modeling, Session 2: Panel: Human, Social Culture Behavior (HSCB) Modeling, Session 3: Visual Perception, Session 4: NMSO projects, Session 5: Agents and Combat Modeling, Session 6: Human Factors and Training Systems, Session 7: Panel: Bridging DOD, DHS & Private Sector Modeling, Simulation & Virtual Environment Capabilities for Homeland Security, Session 8: Education & MOVES Curriculum, Session 9: Game Based Training Systems, Session 10: Stu...

  2. Clinical coding. Code breakers.

    Science.gov (United States)

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships. PMID:15768716

  3. Introduction to Session 1B

    Science.gov (United States)

    Sticklen, Mariam B.

    Topics presented in the "Plant Biotechnology and Genomics" session focused on technologies that highlight the important role of plant biotechnology and genomics in the development of future energy crops. Several excellent presentations demonstrated the latest advances in energy crop development through the use of plant cell wall regulation and by engineering new energy crops such as brown midrib sweet sorghum. Approaches included the control of cellulose production by increased expression of cellulase synthase genes and the selection of high-yield varieties of shrub willows. The potential of producing hydrolytic enzymes using transgenic plants as a cost-effective means for the large-scale production of these enzymes was also explored in the session, as was the role of posttranslational modifications on the activities of heterologous expressed cellulases in hosts such as Pichia pastoris.

  4. Beam instability Workshop - plenary sessions

    International Nuclear Information System (INIS)

    The purpose of this workshop was to provide a review of the mechanisms of limiting beam instabilities, their cures, including feedback, and beam measurement for synchrotron radiation light sources. 12 plenary sessions took place whose titles are: 1) challenging brilliance and lifetime issues with increasing currents; 2) limiting instabilities in multibunch; 3) experience from high currents in B factories; 4) longitudinal dynamics in high intensity/bunch; 5) Transverse instabilities for high intensity/bunch; 6) working group introduction from ESRF experience; 7) impedance modelling: simulations, minimization; 8) report on the broadband impedance measurements and modelling workshop; 9) feedback systems for synchrotron light sources; 10) beam instabilities diagnostics; 11) harmonic cavities: the pros and cons; and 12) experimental study of fast beam-ion instabilities at PLS. This document gathers the 12 articles that were presented during these sessions

  5. Scientific conference proceedings. Session 3

    International Nuclear Information System (INIS)

    The Radiochemical Technology session met at UJV Rez on June 7, 1985 to hear 13 papers of which 11 were incorporated in INIS. The papers inform of results attained in the field of processing liquid radioactive wastes from nuclear power plants, processing spent nuclear fuel using the fluoride process, of the separation of fission products by dicarbolide extraction, the chemistry of complex uranium compounds, etc. The cooperation of UJV with VUJE and VUCHZ is also dealt with. (E.S.)

  6. Permutation codes

    OpenAIRE

    Ericson, Thomas

    1993-01-01

    Slepians permutation codes are investigated in detail. In particular we optimize the initial vector and derive all dominating codes in dimension n 2 6. With the exception of the simplex and biorthogonal codes - which are always included as special cases of permutation codes - there are probably no further good codes in higher dimensions.

  7. Semantic Session Analysis for Web Usage Mining

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hui; SONG Hantao; XU Xiaomei

    2007-01-01

    A semantic session analysis method partitioning Web usage logs is presented. Semantic Web usage log preparation model enhances usage logs with semantic. The Markov chain model based on ontology semantic measurement is used to identifying which active session a request should belong to. The competitive method is applied to determine the end of the sessions.Compared with other algorithms, more successful sessions are additionally detected by semantic outlier analysis.

  8. Scientific conference proceedings. Session 2

    International Nuclear Information System (INIS)

    The Reactor Materials session met on June 7, 1985 and heard 5 papers all of which were incorporated in INIS. The results were dealt with obtained in the determination of mechanical properties of fuel element cladding materials (Zr1Nb, Zircaloy-4) at increased fuel burnup as well as post-irradiation evaluation of components of DK 1-2 diagnostic assemblies for WWER reactors, the effects of neutron radiation on the microstructure and mechanical properties of zirconium alloys, the applications of neutron radiography, and the development of Ge(Li) detectors and high-purity germanium detectors. (E.S.)

  9. Scientific conference proceedings. Session 1

    International Nuclear Information System (INIS)

    The scientific conference was held in Rez near Prague on June 6 - 7, 1985 on the occasion of the 30th anniversary of the establishment of the UJV. In session 1 - Nuclear Power Engineering - the participants heard 12 papers all of which were incorporated in INIS. They dealt with the thermohydraulic analysis of the PWR core, the reliability analysis of safety systems of WWER nuclear power plants, with in-core measurements, optimization calculations of fast reactors, thermohydraulic calculations of fast reactor fuel assemblies, emergency core cooling of fast reactors, etc. (E.S.)

  10. Working session 3: Tubing integrity

    International Nuclear Information System (INIS)

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group's discussions on these subjects, including conclusions and recommendations, are summarized in this article

  11. Institutional computing (IC) information session

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Kenneth R [Los Alamos National Laboratory; Lally, Bryan R [Los Alamos National Laboratory

    2011-01-19

    The LANL Institutional Computing Program (IC) will host an information session about the current state of unclassified Institutional Computing at Los Alamos, exciting plans for the future, and the current call for proposals for science and engineering projects requiring computing. Program representatives will give short presentations and field questions about the call for proposals and future planned machines, and discuss technical support available to existing and future projects. Los Alamos has started making a serious institutional investment in open computing available to our science projects, and that investment is expected to increase even more.

  12. Session: Long Valley Exploratory Well

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Finger, John T.; Eichelberger, John C.; Hickox, Charles E.

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of four presentations: ''Long Valley Exploratory Well - Summary'' by George P. Tennyson, Jr.; ''The Long Valley Well - Phase II Operations'' by John T. Finger; ''Geologic results from the Long Valley Exploratory Well'' by John C. Eichelberger; and ''A Model for Large-Scale Thermal Convection in the Long Valley Geothermal Region'' by Charles E. Hickox.

  13. Working session 3: Tubing integrity

    Energy Technology Data Exchange (ETDEWEB)

    Cueto-Felgueroso, C. [Tecnatom, S.A., San Sebastian de los Reyes, Madrid (Spain); Strosnider, J. [NRC, Washington, DC (United States)

    1997-02-01

    Twenty-three individuals representing nine countries (Belgium, Canada, the Czech Republic, France, Japan, the Slovak Republic, Spain, the UK, and the US) participated in the session on tube integrity. These individuals represented utilities, vendors, consultants and regulatory authorities. The major subjects discussed by the group included overall objectives of managing steam generator tube degradation, necessary elements of a steam generator degradation management program, the concept of degradation specific management, structural integrity evaluations, leakage evaluations, and specific degradation mechanisms. The group`s discussions on these subjects, including conclusions and recommendations, are summarized in this article.

  14. Secure Execution of Distributed Session Programs

    CERN Document Server

    Alves, Nuno; Yoshida, Nobuko; Deniélou, Pierre-Malo; 10.4204/EPTCS.69.1

    2011-01-01

    The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols) are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP) protocol. The key technical point is the delicate treatment of secure session de...

  15. Working session 1: Tubing degradation

    Energy Technology Data Exchange (ETDEWEB)

    Kharshafdjian, G. [Atomic Energy of Canada, Mississauga, Ontario (Canada); Turluer, G. [IPSN, Fontenay-aux-Roses (France)

    1997-02-01

    A general introductory overview of the purpose of the group and the general subject area of SG tubing degradation was given by the facilitator. The purpose of the session was described as to {open_quotes}develop conclusions and proposals on regulatory and technical needs required to deal with the issues of SG tubing degradation.{close_quotes} Types, locations and characteristics of tubing degradation in steam generators were briefly reviewed. The well-known synergistic effects of materials, environment, and stress and strain/strain rate, subsequently referred to by the acronym {open_quotes}MESS{close_quotes} by some of the group members, were noted. The element of time (i.e., evolution of these variables with time) was emphasized. It was also suggested that the group might want to consider the related topics of inspection capabilities, operational variables, degradation remedies, and validity of test data, and some background information in these areas was provided. The presentation given by Peter Millet during the Plenary Session was reviewed; Specifically, the chemical aspects and the degradation from the secondary side of the steam generator were noted. The main issues discussed during the October 1995 EPRI meeting on secondary side corrosion were reported, and a listing of the potential SG tube degradations was provided and discussed.

  16. Mind the gap: In-session silences are associated with client attachment insecurity, therapeutic alliance, and treatment outcome

    DEFF Research Database (Denmark)

    Daniel, Sarah Ingrid Franksdatter; Folke, Sofie; Lunn, Susanne; Gondan, Matthias; Poulsen, Stig Bernt

    2016-01-01

    cognitive behavior therapy (CBT). Client attachment was assessed using the Adult Attachment Interview. Early, middle and late sessions (N = 175) were evaluated with the Vanderbilt Therapeutic Alliance Scales, and quality of in-session silences was coded with the Pausing Inventory Categorization System (PICS......Objective: The association between in-session silences and client attachment, therapeutic alliance, and treatment outcome was investigated in two treatments for bulimia nervosa. Method: 69 women and one man were randomized to two years of psychoanalytic psychotherapy (PPT) or 20 sessions of...

  17. Review of contributed papers. Session IIIb: Near surface disposal facilities

    International Nuclear Information System (INIS)

    The paper presents an overview of the papers submitted to Session IIIb 'Near Surface Disposal Facilities'. In this session, 26 papers were contributed from 22 different countries. The papers covered a wide range of topical areas including: (a) generic design and safety assessment of low level radioactive waste (LLW) disposal facilities; (b) status of LLW programmes and specific performance assessment approaches and results; (c) safety and risk analysis for the disposal of naturally occurring radioactive materials (NORM); (d) migration and leaching of radionuclides; (e) use of computer codes and their verification; (f) uncertainty analysis; and (g) LLW repository engineered barrier design, performance and degradation. The paper summarizes the major technical issues for further discussion. (author)

  18. IAEA to hold special session on nuclear terrorism

    International Nuclear Information System (INIS)

    Experts from around the world are meeting at the IAEA this week for an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. The Special Session, which will bring together experts on nuclear terrorism from around the world, will deal with the following issues: The Psychology of terrorism; Intelligence, police and border protection; Guarding nuclear reactors and material from terrorists and thieves; The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices; The threat of nuclear terrorism: Intentional dispersal of radioactive material - Sabotage of fixed installations or transport systems; The Legal Framework: Treaties and Conventions, Laws; Regulations and Codes of Practice; IAEA Nuclear Security and Safety Programmes

  19. Working session 2: Tubing inspection

    Energy Technology Data Exchange (ETDEWEB)

    Guerra, J. [Tecnatom, S.A. San Sebastian de los Reyes, Madrid (Spain); Tapping, R.L. [AECL, Chalk River, Ontario (Canada)

    1997-02-01

    This session was attended by delegates from 10 countries, and four papers were presented. A wide range of issues was tabled for discussion. Realizing that there was limited time available for more detailed discussion, three topics were chosen for the more detailed discussion: circumferential cracking, performance demonstration (to focus on POD and sizing), and limits of methods. Two other subsessions were organized: one dealt with some challenges related to the robustness of current inspection methods, especially with respect to leaving cracked tubes in service, and the other with developing a chart of current NDE technology with recommendations for future development. These three areas are summarized in turn, along with conclusions and/or recommendations. During the discussions there were four presentations. There were two (Canada, Japan) on eddy current probe developments, both of which addressed multiarray probes that would detect a range of flaws, one (Spain) on circumferential crack detection, and one (JRC, Petten) on the recent PISC III results.

  20. DWPF recycle minimization: Brainstorming session

    International Nuclear Information System (INIS)

    The recycle stream from the DWPF constitutes a major source of water addition to the High Level Waste evaporator system. As now designed, the entire flow of 3.5 to 6.5 gal/min (at sign 25% and 75% attainment, respectively), or 2 gal/min during idling, flow to the 2H evaporator system (Tank 43). Substantial improvement in the HLW water balance and tank volume management is expected if the DWPF recycle to the HLW evaporator system can be significantly reduced. A task team has been appointed to study alternatives for reducing the flow to the HLW evaporator system and make recommendations for implementation and/or further study and evaluation. The brainstorming session detailed in this report was designed to produce the first cut options for the task team to further evaluate

  1. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  2. Speech coding

    Science.gov (United States)

    Gersho, Allen

    1990-05-01

    Recent advances in algorithms and techniques for speech coding now permit high quality voice reproduction at remarkably low bit rates. The advent of powerful single-ship signal processors has made it cost effective to implement these new and sophisticated speech coding algorithms for many important applications in voice communication and storage. Some of the main ideas underlying the algorithms of major interest today are reviewed. The concept of removing redundancy by linear prediction is reviewed, first in the context of predictive quantization or DPCM. Then linear predictive coding, adaptive predictive coding, and vector quantization are discussed. The concepts of excitation coding via analysis-by-synthesis, vector sum excitation codebooks, and adaptive postfiltering are explained. The main idea of vector excitation coding (VXC) or code excited linear prediction (CELP) are presented. Finally low-delay VXC coding and phonetic segmentation for VXC are described.

  3. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  4. Session Report - S. Voinis (Andra)

    International Nuclear Information System (INIS)

    The session addressed key issues related to the industrial feasibility of construction. It covered the implementer and regulator points of view. The conclusions derive from three presentations completed by the outcomes of six WG. At the Morsleben Repository, Germany, the licensing of the closure of the repository has been initiated by BfS. The closure concept is based on extensive backfilling with salt concrete complemented by seals. In order to demonstrate the feasibility of constructing such a seal structure an in-situ experiment is performed in a drift of the repository. In the UK, the framework for implementing geological disposal of the higher activity radioactive waste is described in the White Paper published by the UK Government in June 2008. The process to site a facility will be staged and based on voluntarism and partnership with local communities. This process is in its early stage. The paper outlines the work being undertaken by the NDA. In canada, Ontario Power Generation (OPG) has submitted information required for a CNSC licence to prepare the site and construct a DGR for the disposal of low and intermediate level waste from the operation of their nuclear power reactors. That submission includes an Environmental Impact Statement (EIS), as required for a Panel Review under the Canadian Environmental Assessment Act (CEAA), and the information required for a licence application under the NSCA Regulations. Discussions between the proponent and the regulator in the pre-licensing phase, clarified CNSC expectations for the characterization of the site and for the development of the EIS and application. They also helped to ensure that OPG understood these expectations. Outcomes WG session-1: - Start with construction but during operational phase: Simultaneous construction and operation activities. - Need for technical requirements/criteria: So that it can be judged whether 'products' meet the requirements; LT safety issues to be considered during

  5. Effects of Post-Session Wheel Running on Within-Session Changes in Operant Responding

    Science.gov (United States)

    Aoyama, Kenjiro

    2007-01-01

    This study tested the effects of post-session wheel running on within-session changes in operant responding. Lever-pressing by six rats was reinforced by a food pellet under a continuous reinforcement (CRF) schedule in 30-min sessions. Two different flavored food pellets were used as reinforcers. In the wheel conditions, 30-min operant-sessions…

  6. The International Mathematical Olympiad Training Session.

    Science.gov (United States)

    Rousseau, Cecil; Patruno, Gregg

    1985-01-01

    The Mathematical Olympiad Training Session is designed to give United States students a problem-oriented exposure to subject areas (algebra, geometry, number theory, combinatorics, and inequalities) through an intensive three-week course. Techniques used during the session, with three sample problems and their solutions, are presented. (JN)

  7. Theory Sessions Documents - 31710 General Linguistics I

    OpenAIRE

    Muñoz Baell, Irma María

    2012-01-01

    Please follow the link below to download all the course materials required for the theory sessions. You will find 1 Student Introductory Assignment, 1 Introductory Activity, 9 Reading Assignments, 11 Team Based Learning Activities, 1Student Peer Review Activity, and 1 Final Week Activity - Academic year 2011-2012 (ECTS credits: 6 (150 hours)). See the Planned Weekly Schedule (Theory sessions).

  8. Declarative interpretations of session-based concurrency

    DEFF Research Database (Denmark)

    Cano, Mauricio; Rueda, Camilo; López-Acosta, Hugo-Andrés;

    2015-01-01

    paper, we investigate the relationship between operational and declarative models of session-based concurrency. We propose two interpretations of session π-calculus processes as declarative processes in linear concurrent constraint programming (lcc). They offer a basis on which both operational and...

  9. Bandwidth Allocation and Session Scheduling using SIP

    Directory of Open Access Journals (Sweden)

    Jean-Marie Garcia

    2006-08-01

    Full Text Available

    Session Initiation Protocol (SIP is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SIP functionalities to coordinate QoS mechanisms deployed in IP networks, and especially in DiffServ domain. Indeed, the interaction between small and big TCP sessions may have dramatic consequences on small TCP sessions. Hence, we use SIP to achieve QoS management on a session basis, in which the over all activity of the user during the session is considered. The suggested mechanisms deal with two issues: first, session scheduling based on session duration and/or volume, and second bandwidth allocation on a per-flow basis using equivalent bandwidth estimation techniques. The proposed mechanisms are implemented in the SIP proxy server as QoS management algorithms, and they are validated by simulations.

  10. Summary of session W2

    International Nuclear Information System (INIS)

    This paper reports on the development and validation of the SASSYS-1 code which is being used to analyze the transient behavior of the U.S. innovative designs, SAFR and PRISM, as well as the future metal fueled core for FFTF. The description emphasized the high degree of flexibility of SASSYS-1 and its capability to do detailed core calculations needed to accurately model reactivity feedbacks. Validation work based on calculations of EBR-II SHRT (shutdown neat removal) tests and FFTF transient experiments was presented. The paper presents a discussion of the modifications to the SSC code required to model the ATWS events in SAFR and PRISM, along with results of calculations done with the modified SSC. The probability that passive shutdown could be defeated and severe core damage sustained has been investigated, and some results are presented in this paper. It was stated that simple design choices can keep risk almost arbitrarily low, and that the leading uncertainties will be reduced through future R ampersand D and demonstration testing. Uncertainties exist due to uncertainties in feedback coefficients and in the models and codes used to do the calculations. Large margin and relatively small uncertainties lead to low probabilities (less than 10-3) of defeat of passive shutdown by exceeding temperature limits. The given value is considered to be conservative to allow for uncertainties in knowledge of all relevant accident sequences at this stage in design and analysis. This paper also deals with experimental work on decay heat removal in PRISM and SAFR. Experiments on air-side heat transfer in the RVACS/RACS passive decay heat removal path, was reported. A data correlation for use in predicting heat transfer has been discussed for the RVACS conditions

  11. VSS BASED SESSION SETUP MECHANISM IN IMS

    Institute of Scientific and Technical Information of China (English)

    Cao Yufei; Liao Jianxin; Qi Qi; Zhu Xiaomin

    2009-01-01

    This paper proposes a novel session setup mechanism in IMS (IP Multimedia Subsystem) by introducing the functional entity termed VSS (Visitor Subscriber Server) which is used to provide registration and location management.The new mechanism aims at improving session setup procedure by a betterment of location management in IMS.Through the use of two-tier subscriber information database constituted by the HSS (Home Subscriber Server) and the VSS,the new mechanism seperates the registration procedure and location management from the S-CSCF (Serving-Call'Session Control Function),and makes them be handled by the VSS.At the same time,the new mechanism updates the signaling procedure of registration and session setup.With VSS based location management.the cost of registeration and session setup procedure as well as the delay of session setup procedure become lower.he cost and delay functious of the new session setup mechanism as well aus the cost function of new registeration are deduced.Then,simulations and analysis verify that the performance of this new mechanism gets the benefit in cost and time.

  12. Flexible session management in a distributed environment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Zach; /Wisconsin U., Madison; Bradley, Dan; /Wisconsin U., Madison; Tannenbaum, Todd; /Wisconsin U., Madison; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  13. Session Types = Intersection Types + Union Types

    CERN Document Server

    Padovani, Luca

    2011-01-01

    We propose a semantically grounded theory of session types which relies on intersection and union types. We argue that intersection and union types are natural candidates for modeling branching points in session types and we show that the resulting theory overcomes some important defects of related behavioral theories. In particular, intersections and unions provide a native solution to the problem of computing joins and meets of session types. Also, the subtyping relation turns out to be a pre-congruence, while this is not always the case in related behavioral theories.

  14. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  15. Code Cactus

    International Nuclear Information System (INIS)

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors)

  16. Work session on the SAR. Pt. 2

    International Nuclear Information System (INIS)

    The present paper contains the tables of the contribution of K. Burkart 'Work Session on the SAR' to the IAEA Interregional Training Course held in Sept/Oct. 1980 at the Kernforschungszentrum Karlsruhe. (RW)

  17. Summary session of the Gas Sampling Calorimetry Workshop

    International Nuclear Information System (INIS)

    The summary session of the Gas Sampling Calorimetry Workshop was a review and discussion session. A number of questions were raised and briefly discussed. More extensive discussions of energy resolution formed the heart of the final session

  18. Session Initiation Protocol Security: A Brief Review

    OpenAIRE

    Selvakumar Manickam; Chen-Wei Tan; Aws N. Jaber; Ali A. Khudher

    2012-01-01

    Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analysed. Some of the identified issues are: Social threats, eavesdropping, delaying, modification of media session, service abuse threats, physical access threats and denied services threats. Results...

  19. 不用Cookies实现的session

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    第一.不能有多个sessionID.那样URL会变得很长。关掉浏览器,或丢了sessionID参数session也就没用了.除非每次都在URL后面冒着sessionID参数。暂时不考虑这个问题.把存活期屏蔽。

  20. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  1. GNSS zenith delays and gradients in the analysis of VLBI Intensive sessions

    Science.gov (United States)

    Teke, Kamil; Böhm, Johannes; Madzak, Matthias; Kwak, Younghee; Steigenberger, Peter

    2015-10-01

    Very Long Baseline Interferometry (VLBI) is the only space geodetic technique which is capable of estimating Universal Time (UT1 = UTC + ΔUT1). So-called VLBI Intensive sessions of the International VLBI Service for Geodesy and Astrometry (IVS) are dedicated to the rapid production of ΔUT1. However, the accuracy achieved with those sessions is still below what could be expected from formal uncertainties of the estimates and one of the reasons is the inappropriate modeling of azimuthal asymmetries of the troposphere delays, because usually no gradients are modeled or estimated. To overcome that deficiency, we introduced troposphere zenith delays and horizontal total gradients estimated from the observations of Global Navigation Satellite Systems (GNSS) i.e. the solution of the Center for Orbit Determination in Europe (CODE) in the analysis of VLBI Intensive sessions carried out from the beginning of 2008 till the end of 2014. We compared our results with the GNSS-derived length-of-day (LOD) estimates of CODE and the International GNSS Service (IGS) and find slight improvements of agreement by up to 1 μs for both INT1 and INT2 sessions with gradients from CODE. We do not see any additional significant improvement of LOD agreement when GNSS zenith delays are introduced.

  2. Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history

    OpenAIRE

    Gresty, David; Gan, Diane; Loukas, George; Ierotheou, Constantinos

    2016-01-01

    This paper proposes a new approach to the forensic investigation of Internet history artefacts by aggregating the history from a recovered device into sessions and comparing those sessions to other sessions to determine whether they are one-time events or form a repetitive or habitual pattern. We describe two approaches for performing the session aggregation: fixed-length sessions and variable-length sessions. We also describe an approach for identifying repetitive pattern of life behaviour a...

  3. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  4. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  5. 47 CFR 97.513 - VE session manager requirements.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false VE session manager requirements. 97.513 Section... SERVICES AMATEUR RADIO SERVICE Qualifying Examination Systems § 97.513 VE session manager requirements. (a) A VE session manager may be selected by the VE team for each examination session. The VE...

  6. Poster Sessions in Marketing Education: An Empirical Examination

    Science.gov (United States)

    Stegemann, Nicole; Sutton-Brady, Catherine

    2009-01-01

    Poster sessions provide a creative and stimulating alternative to traditional assessment methods in marketing. Poster sessions, as a means of assessment, have long been used in science fields. This article presents the successful implementation of poster sessions as a means of assessment in a postgraduate unit of study. Poster sessions in…

  7. Instruments for documentation of music therapy sessions

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner

    It is an important part of the clinical music therapy work to document the daily sessions. For the clinician it is necessary to have a brief overview of each session in order to assess the methods and the process, and not least to be able to give clear reports of these issues to other health care...... professionals at staff meetings, conferences, etc. For music therapists with many clients there is not time enough during a working day to provide comprehensive process descriptions in the music therapy log. Therefore instruments that help the clinician in reducing and structuring this information are needed....... Danish and Norwegian music therapist have collaborated on developing a one page sheet with a structured form where they after each music therapy session document their use of methods and techniques in individual music therapy with persons with dementia. With this instrument therapists have easy access...

  8. IFESS 2005 Special Session 5 Artifical Vision

    Energy Technology Data Exchange (ETDEWEB)

    Weiland, J.D.; Greenbaum, E.; Delbeke, J.; Troyk, P.R.; Sawan, M.

    2005-07-01

    A special session on visual prostheses was held during the Annual Meeting of the International Functional Electrical Stimulation Society (IFESS), in Montreal, Canada, July 5-9, 2005. IFESS is a meeting that typically attracts researchers in implantable nerve stimulators, functional electrical stimulation, and rehabilitation. All of these areas have significant overlap with the retinal prosthesis, but these areas have decades of research behind them. The special session provided a forum for researchers with vast experience in nerve stimulation to interact with leading research in retinal and cortical visual prostheses. The grant paid for the travel and conference costs of the presenters in the session. The session was chaired by James Weiland (the PI on this grant). The session co-chair was Phil Troyk, Ph.D., from the Illinois Institute of Technology. The Department of Energy was acknowledged at the start of the session as the sponsor. The following talks were delivered: Clinical Trial of a Prototype Retinal Prosthesis James Weiland, Ph.D. Doheny Eye Institute, Los Angeles, California The U.S. Department of Energy's Artificial Sight Program Elias Greenbaum, Ph.D. Oak Ridge National Laboratory, Oak Ridge, Tennessee A 16-Channel stimulator ASIC for use in an intracortical visual prosthesis Phillip R. Troyk, Ph.D. Illinois Institute of Technology, Chicago, Illinois Two approaches to the Optic Nerve Visual Prosthesis Jean Delbeke, M.D. University Cath de Louvain, Louvain, Belgium Design and Implementation of High Power Efficiency Modules for a Cortical Visual Stimulator Mohammad Sawan, Ph.D. Ecole Polytechnique de Montreal, Montreal, Canada Remaining funds from the grant were used to support Dr. Weiland's travel to the Association for Research in Vision and Ophthalmology in May 2006, with DOE approval, where several projects, supported by the DOE artificial retina program, were presented.

  9. H.R. 2738: A bill to amend title 38, United States Code, with respect to benefits for individuals who may have been exposed to ionizing radiation during military service, and for other purposes, introduced in the US House of Representatives, One Hundred Second Congress, First Session, June 24, 1991

    International Nuclear Information System (INIS)

    This bill was introduced into the US House of Representatives on June 24, 1991 to amend title 38, United States Code with respect to benefits for individuals who may have been exposed to ionizing radiation during military service. Key features addressed in separate sections include the following: expansion of a list of diseases presumed to be service-connected for certain radiation-exposed veteran and elimination of latency-period limitations; and adjudication of claims based on exposure to ionizing radiation

  10. NSURE code

    International Nuclear Information System (INIS)

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  11. Efficient Session Type Guided Distributed Interaction

    Science.gov (United States)

    Sivaramakrishnan, K. C.; Nagaraj, Karthik; Ziarek, Lukasz; Eugster, Patrick

    Recently, there has been much interest in multi-party session types (MPSTs) as a means of rigorously specifying protocols for interaction among multiple distributed participants. By capturing distributed interaction as series of typed interactions, MPSTs allow for the static verification of compliance of corresponding distributed object programs. We observe that explicit control flow information manifested by MPST opens intriguing avenues also for performance enhancements. In this paper, we present a session type assisted performance enhancement framework for distributed object interaction in Java. Experimental evaluation within our distributed runtime infrastructure illustrates the costs and benefits of our composable enhancement strategies.

  12. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  13. Session Initiation Protocol Security: A Brief Review

    Directory of Open Access Journals (Sweden)

    Selvakumar Manickam

    2012-01-01

    Full Text Available Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analysed. Some of the identified issues are: Social threats, eavesdropping, delaying, modification of media session, service abuse threats, physical access threats and denied services threats. Results and Conclusion: A useful categorization of SIP security issues has been done. The vulnerabilities of existing SIP infrastructure and possible remedies are discussed. It is confirmed that, message attacks are the most dominant category of SIP attacks.

  14. Assessing Client Progress Session by Session in the Treatment of Social Anxiety Disorder: The Social Anxiety Session Change Index

    Science.gov (United States)

    Hayes, Sarah A.; Miller, Nathan A.; Hope, Debra A.; Heimberg, Richard G.; Juster, Harlan R.

    2008-01-01

    Frequent assessment during therapy can improve treatments and provide accountability. However, clinicians often do not monitor progress because of the time it takes to administer and score assessments. In response, the Social Anxiety Session Change Index (SASCI) was developed. The SASCI is a short, easily administered rating of subjective…

  15. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  16. Beyond Stabilizer Codes II: Clifford Codes

    OpenAIRE

    Klappenecker, Andreas; Roetteler, Martin

    2000-01-01

    Knill introduced a generalization of stabilizer codes, in this note called Clifford codes. It remained unclear whether or not Clifford codes can be superior to stabilizer codes. We show that Clifford codes are stabilizer codes provided that the abstract error group has an abelian index group. In particular, if the errors are modelled by tensor products of Pauli matrices, then the associated Clifford codes are necessarily stabilizer codes.

  17. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  18. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  19. 9. Biennial session of nuclear physics

    International Nuclear Information System (INIS)

    As every two years the 9th biennial session of nuclear physics shall try to make a survey of the recent experimental developments as well as the evolution of the theoretical ideas in Nuclear Physics. Communications are indexed and analysed separately

  20. Posters. [Poster Session at AHRD Conference, 2001].

    Science.gov (United States)

    2001

    The first of the papers in this poster session, "Developing the Employment Brand: Targeting MBA Campus Hires" (Diane M. Bergeron), posits that employment branding benefits both individuals and organizations. It functions as a campus recruiting tool in a competitive labor market and communicates the organization's values and work environment to…

  1. Working session 4: Preventative and corrective measures

    Energy Technology Data Exchange (ETDEWEB)

    Clark, R. [Golder Federal Services Inc., Redmond, WA (United States); Slama, G. [Framatome, Paris (France)

    1997-02-01

    The Preventive and Corrective Measures working session included 13 members from France, Germany, Japan, Spain, Slovenia, and the United States. Attendee experience included regulators, utilities, three steam generator vendors, consultants and researchers. Discussions centered on four principal topics: (1) alternate materials, (2) mechanical mitigation, (3) maintenance, and (4) water chemistry. New or replacement steam generators and original equipment steam generators were separately addressed. Four papers were presented to the session, to provide information and stimulate various discussion topics. Topics discussed and issues raised during the several meeting sessions are provided below, followed by summary conclusions and recommendations on which the group was able to reach a majority consensus. The working session was composed of individuals with diverse experience and varied areas of specialized expertise. The somewhat broad range of topics addressed by the group at times saw discussion participation by only a few individuals. As in any technical meeting where all are allowed the opportunity to speak their mind, straying from an Individual topic was not unusual. Where useful, these stray topics are also presented below within the context In which they occurred. The main categories of discussion were: minimize sludge; new steam generators; maintenance; mechanical mitigation; water chemistry.

  2. Splinter Session "Solar and Stellar Flares"

    OpenAIRE

    Fletcher, L.; Hudson, H. S.; Cauzzi, G.; Getman, K. V.; Giampapa, M.; Hawley, S. L.; Heinzel, P.; Johnstone, C.; Kowalski, A. F.; Osten, R. A.; Pye, J.

    2012-01-01

    This summary reports on papers presented at the Cool Stars-16 meeting in the splinter session "Solar and Stellar flares." Although many topics were discussed, the main themes were the commonality of interests, and of physics, between the solar and stellar flare communities, and the opportunities for important new observations in the near future.

  3. IAEA General Conference begins annual session

    International Nuclear Information System (INIS)

    The document gives general information about the programme of the 43rd regular session of the IAEA General Conference (27 September - 1 october 1999, Austria Center Vienna), attended by ministers and high-level governmental representatives from 111 Member States of the IAEA

  4. OJJDP Family Listening Sessions. Executive Summary

    Science.gov (United States)

    Office of Juvenile Justice and Delinquency Prevention, 2013

    2013-01-01

    From March through July 2011, the Office of Juvenile Justice and Delinquency Prevention (OJJDP), in collaboration with the Campaign for Youth Justice and the Education Development Center, convened four listening sessions with families and youth who had direct experiences with the juvenile justice system at the local and state levels. The…

  5. H.R. 804: A Bill to amend the Internal Revenue Code of 1986 to reduce emissions of carbon dioxide by imposing a tax on certain fuels based on their carbon content. Introduced in the House of Representatives, One Hundred Third Congress, First Session, February 3, 1993

    International Nuclear Information System (INIS)

    H.R. 804 proposes the imposition of a carbon tax on primary fossil fuels. In general, Chapter 38 of the Internal Revenue Code of 1986 is to be amended by adding at the end thereof the following new subchapter: open-quotes Subchapter E--Carbon Tax on Primary Fossil Fuels.close quotes Section 4691 will be concerned with the tax on coal; Section 4692 with the tax on petroleum; Section 4693 with the tax on natural gas; and Section 4694 will discuss inflation adjustments

  6. H.R. 1726: A bill to amend the Internal Revenue Code of 1986 to deny any deduction for certain oil and hazard substance cleanup costs, introduced in the US House of Representatives, One Hundred Second Congress, First Session, April 11, 1991

    International Nuclear Information System (INIS)

    This bill was introduced into the US House of Representatives on April 11, 1991 to amend the Internal Revenue Code of 1986 to deny any deduction for certain oil and hazardous substance cleanup costs. These discharge costs will apply if the taxpayer has a complete liability defense of if the taxpayer qualifies for a liability limitation with respect to the discharge and is not liable for any punitive damages.The amendments shall apply in the case of any applicable discharge costs paid on or after January 1, 1991

  7. H.R. 1972: A bill to amend title 38, United States Code, with respect to benefits for veterans who may have been exposed to ionizing radiation during military service, and for other purposes, introduced in the US House of Representatives, One Hundred Second Congress, First Session, April 22, 1991

    International Nuclear Information System (INIS)

    This bill was introduced into the US House of Representatives on April 22, 1991 to amend title 38, United States Code. This legislation involves benefits for veterans who may have been exposed to ionizing radiation during military service. Individual sections address the following: expansion of presumption of service connection for certain radiation-exposed reservists; expansion of list of diseases presumed to be service-connected for certain radiation-exposed veterans and elimination of latency-period limitations; and adjudication of claims based on exposure to ionizing radiation

  8. Economics and demand for non-electric applications. Technical session 3

    International Nuclear Information System (INIS)

    This session featured nine papers from six Member States and the IAEA. Most of the author's focus centered on the economic and financial aspects of seawater desalination. In many cases, the tool utilized in the economic analyses was the IAEA's Desalination Economic Evaluation Program (DEEP) software code, which provides an economic basis for comparing different fossil and nuclear energy sources coupled to various desalination systems. The salient feature of this code and the pertinent information from the corresponding Coordinated Research Programme on 'Economic Research on, and Assessment of, Selected Nuclear Desalination Projects and Case Studies' was the subject of a presentation by the IAEA

  9. CANAL code

    International Nuclear Information System (INIS)

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils

  10. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately.

  11. Proceedings of the Third NRC/ASME Symposium on Valve and Pump Testing. Session 1A--Session 2C: Volume 1

    International Nuclear Information System (INIS)

    The 1994 Symposium on Valve and Pump Testing, jointly sponsored by the Board of Nuclear Codes and Standards of the American Society of Mechanical Engineers and by the Nuclear Regulatory Commission, provides a forum for the discussion of current programs and methods for inservice testing and motor-operated valve testing at nuclear power plants. The symposium also provides an opportunity to discuss the need to improve that testing in order to help ensure the reliable performance of pumps and valves. The participation of industry representatives, regulators, and consultants results in the discussion of a broad spectrum of ideas and perspectives regarding the improvement of inservice testing of pumps and valves at nuclear power plants. This document, Volume 1, covers sessions 1A through session 2C. The individual papers have been cataloged separately

  12. Advancing methods for reliably assessing motivational interviewing fidelity using the motivational interviewing skills code.

    Science.gov (United States)

    Lord, Sarah Peregrine; Can, Doğan; Yi, Michael; Marin, Rebeca; Dunn, Christopher W; Imel, Zac E; Georgiou, Panayiotis; Narayanan, Shrikanth; Steyvers, Mark; Atkins, David C

    2015-02-01

    The current paper presents novel methods for collecting MISC data and accurately assessing reliability of behavior codes at the level of the utterance. The MISC 2.1 was used to rate MI interviews from five randomized trials targeting alcohol and drug use. Sessions were coded at the utterance-level. Utterance-based coding reliability was estimated using three methods and compared to traditional reliability estimates of session tallies. Session-level reliability was generally higher compared to reliability using utterance-based codes, suggesting that typical methods for MISC reliability may be biased. These novel methods in MI fidelity data collection and reliability assessment provided rich data for therapist feedback and further analyses. Beyond implications for fidelity coding, utterance-level coding schemes may elucidate important elements in the counselor-client interaction that could inform theories of change and the practice of MI. PMID:25242192

  13. Session summaries presented by session chairpersons. Panel discussion: conclusions and recommendations

    International Nuclear Information System (INIS)

    The points suggested for the discussion were: a) the sources of uncertainties in Level 2 PSA; b) the methods to quantify uncertainties; c) the international guidance on uncertainty treatment; d) the current practice in Level 2 PSA: qualitative vs. quantitative, how to present results; e) the practical issues confronting PSA analysts; f) the future development and challenges, e.g. SAM, new plant licensing, risk-informed applications etc. Some remarks have been put forward with respect to the role of uncertainty analysis, the severe accident code analysis, the expert judgement/opinion, and the Future development. The recommendations stress on: the updating of the OECD Report on 'Level 2 PSA Methodology and Severe Accident Management' [NEA/CSNI/R(97)11], the development of a guidance document or handbook to reflect good practices on treatment of Level 2 PSA uncertainties; the need for a guidance on expert judgment process - from expert consultation to formal elicitation, with emphasis on rationale documentation; and the need for conducting an international benchmarking exercise, for comparing outcome from different teams on Level 2 PSA for similar (existing) NPPs, with emphasis on uncertainty treatment From the discussion, there is good agreement that Level 2 PSA is now a commonly used key tool for many NPP applications and the uncertainty analysis forms an integral part of it. Uncertainty analysis is used to confirm robustness of results with respect to any acceptance criteria and therefore serves to underpin the quality of a Level 2 PSA. Increasing demand for in-depth treatment in current and future applications include for example: - SAM (e.g. IVR strategy for high power reactors); - Risk-informed decision making; - New reactor licensing. It is also clear that there are different views, emphasis and priorities on a number of issues reflected by the key points raised during the discussion. From the discussion, a number of recommendations were made, including the

  14. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  15. Scenario Crisis Cases in Distance Learning Sessions

    Science.gov (United States)

    Antunes, A.

    2013-04-01

    We discuss early results using student-lead role-play of crises and disaster scenarios to encourage engagement in distance learning sessions. The disadvantage of distance learning via web interface—the lack of face-to-face and the ease with which a student can remain quiet—is balanced by the wealth of Internet-accessible media reports of past mission disasters. Capitol College minimizes the lecture component to simply frame each session's open-ended crisis in our Mission Operations engineering course. The students are presented with a historical ‘disaster’ but not its resolution; they present their course of action, then the lecturer steps in to debrief. With a wealth of past cases available on the web, use of scenarios rather than lectures shows early signs of being viable model for encouraging discussion and interaction within distance learning for a variety of course topics.

  16. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing in...

  17. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  18. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  19. Opening of the 123rd Council session

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The CERN Council held its 123rd session on 13 December 2002 under the chairmanship of Professor Maurice Bourquin. The election of the next Director General, the Baseline Plan for 2003-2010 and a new status for non-European states were among the items agreed. Photo 01: (left to right) Director-General Prof. Luciano Maiani, President of Council Prof. Maurice Bourquin, and Director of administration Jan van der Boon.

  20. Summary of the hadronic weak interaction session

    International Nuclear Information System (INIS)

    The authors summarize and discuss present and future experiments on decays of light mesons and muons that were presented in the Hadronic Weak Interaction working group session of the open-quotes Workshop on Future Directions in Particle and Nuclear Physics at Multi-GeV Hadron Facilities.close quotes Precise measurements and rare-decay searches, which sense mass scales in the 1-1000 TeV region, are discussed in the context of the standard model and beyond

  1. Summary of the Hadronic Weak Interaction session

    International Nuclear Information System (INIS)

    We summarize and discuss present and future experiments on decays of light mesons and muons that were presented in the Hadronic Weak Interaction working group session of the ''Workshop on Future Directions in Particle and Nuclear Physics at Multi-GeV Hadron Facilities.'' Precise measurements and rare-decay searches, which sense mass scales in the 1--1000 TeV region, are discussed in the context of the standard model and beyond

  2. Web sessions anomaly detection in dynamic environments

    OpenAIRE

    García-Cervigon Gutiérrez, Manuel; Vázquez Pongilupi, Juan; Medina Llinàs, Manuel

    2010-01-01

    This paper presents a proposal for discovering anomalies in e-banking Web sessions by implementing different datamining techniques in a a graph-based environment. Online banking is a good example of how millions of costumers rely on virtual channels for business transactions. Nevertheless, due to multiple scandals regarding security flaws, it becomes complicated moving a business from a physical scenario to the digital world. Therefore, security applications become highly necessary. Monitorin...

  3. Session hijacking in WLAN based public networks

    OpenAIRE

    Bækkelund, Ørjan

    2009-01-01

    The background for this masters thesis is the threat of session hijacking in public wireless networks. A public wireless network in this context is a network such as Wireless Trondheim where users with WLAN enabled devices can connect for a small fee for a given period of time. These kind of networks relies on having a high degree of user friendliness to reach users with average knowledge in computers and wireless networks. There is always a struggle between user friendliness and security an...

  4. Safety Training: scheduled sessions in April

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in April. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 26-APR-11 (08.30 – 10.00) in French 26-APR-11 (10.30 – 12.00) in French Conduite de plates-formes élévatrices mobiles de personnel (PEMP) 28-APR-11 to 29-APR-11 (08.00 – 17.30) in French* Sécurité chimique – Introduction 29-APR-11 (09.00 – 11.30) in French (*) session in French with the possibility of receiving the documentation in English   By Isabelle Cusato (H...

  5. Innovative Software Algorithms and Tools parallel sessions summary

    International Nuclear Information System (INIS)

    A variety of results were presented in the poster and 5 parallel sessions of the Innovative Software, Algorithms and Tools (ISAT) sessions. I will briefly summarize these presentations and attempt to identify some unifying trends

  6. 78 FR 53497 - Commercial Space Transportation Advisory Committee; Closed Session

    Science.gov (United States)

    2013-08-29

    ... Federal Aviation Administration Commercial Space Transportation Advisory Committee; Closed Session AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of Commercial Space Transportation Advisory... closed session of the Commercial Space Transportation Advisory Committee (COMSTAC). The special...

  7. 78 FR 46312 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-07-31

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, August 6, 2013 8:30 a.m. to 1:00...

  8. 78 FR 61321 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-10-03

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, October 22, 2013 9:00 a.m. to 1:00...

  9. 77 FR 60373 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2012-10-03

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting. Time: Thursday, October 11, 2012, 5 p.m. to 6:30...

  10. 77 FR 62211 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2012-10-12

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting. Time: Tuesday, October 23, 2012, 8:30 a.m. to...

  11. 78 FR 5164 - Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-01-24

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, February 5, 2013, 9:00 a.m. to 1:00...

  12. Music Education and Music Therapy. Introduction to Plenary Session 3

    DEFF Research Database (Denmark)

    Bonde, Lars Ole

    2002-01-01

    Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics......Chairman's introduction to plenary session on the relationship between music therapy and music pedagogics...

  13. Provost's Summer Sessions Grants awarded to 14 Virginia Tech faculty

    OpenAIRE

    Miller, Allan

    2007-01-01

    Fourteen Virginia Tech faculty have been awarded $5,000 grants to deliver individual courses in the 2007 summer sessions. Grants totaling $75,000 were awarded through the Provost Office Summer Sessions Grant Program.

  14. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  15. Ideas for Advancing Code Sharing (A Different Kind of Hack Day)

    CERN Document Server

    Teuben, Peter; Berriman, Bruce; DuPrie, Kimberly; Hanisch, Robert J; Mink, Jessica; Nemiroff, Robert; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Wallin, John

    2013-01-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and calibration? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  16. Ideas for Advancing Code Sharing: A Different Kind of Hack Day

    Science.gov (United States)

    Teuben, P.; Allen, A.; Berriman, B.; DuPrie, K.; Hanisch, R. J.; Mink, J.; Nemiroff, R. J.; Shamir, L.; Shortridge, K.; Taylor, M. B.; Wallin, J. F.

    2014-05-01

    How do we as a community encourage the reuse of software for telescope operations, data processing, and ? How can we support making codes used in research available for others to examine? Continuing the discussion from last year Bring out your codes! BoF session, participants separated into groups to brainstorm ideas to mitigate factors which inhibit code sharing and nurture those which encourage code sharing. The BoF concluded with the sharing of ideas that arose from the brainstorming sessions and a brief summary by the moderator.

  17. Codes and standards for quality engineering. PVP-Volume 285

    International Nuclear Information System (INIS)

    Codes and Standards address the requirements for safety and reliability of pressure vessels and piping--materials, design, analysis, construction, fabrication, welding, nondestructive examination, acceptance testing, inservice inspection and testing, repair, replacement and modification. The role of Quality Engineering in all of these aspects of Codes and Standards is immense. In light of the experiences and lessons learned, the Codes and Standards Technical Committee of the ASME Pressure Vessels and Piping Division organized several technical and panel sessions. Papers presented at these sessions are contained in this volume. The following topics are discussed: flow-accelerated corrosion; corrosion in piping and vessels; changing priorities in codes and standards; piping system operability; and operating plant criteria. In addition to the above topics, brief summaries of the presentations at the panel sessions sponsored by the Codes and Standards Technical Committee are included in this volume. These pertain to the changing priorities in Codes and Standards and a discussion on the status of ASME Nuclear Codes and Standards. Thirty-eight papers have been processed separately for inclusion on the data base

  18. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    CERN Document Server

    Allen, Alice; Brunner, Robert; Burger, Dan; DuPrie, Kimberly; Hanisch, Robert J; Mann, Robert; Mink, Jessica; Sandin, Christer; Shortridge, Keith; Teuben, Peter

    2012-01-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published ...

  19. Significant Others in Substance Abusers' Change Talk During Motivational Interviewing Sessions in the Finnish Probation Service

    Directory of Open Access Journals (Sweden)

    Sarpavaara Harri

    2015-03-01

    Full Text Available AIMS - This article explores the meanings substance-abusing clients attach to family and friendships during motivational interviewing (MI sessions in Probation Service. DATA - The analyses are based on videotaped and transcribed data consisting of 82 MI sessions. This database involves the first two counseling sessions of 41 client-counselor pairs. Sessions were videotaped in 12 Probation Service offices in Finland between 2007 and 2009. METHODS - The analysis relies on coding of client's change talk utterances and qualitative semiotic framework. RESULTS - The meanings of the significant others were diverse from the point of view of the client's motivation: family appeared as a support for change, an aspiration, a sufferer, or an obstacle to change; and friendship appeared as an obstacle to change, a surmounted obstacle, a cause to change, or a support to change. CONCLUSIONS - Significant others and their quality are important and diverse factors that promote or hinder change in substance abuser' change talk. Thus, it is suggested that the meaning of significant others should not be overlooked in MI and other substance abuse treatment.

  20. Quantum Convolutional BCH Codes

    CERN Document Server

    Aly, S A; Klappenecker, A; Roetteler, M; Sarvepalli, P K; Aly, Salah A.; Grassl, Markus; Klappenecker, Andreas; Roetteler, Martin; Sarvepalli, Pradeep Kiran

    2007-01-01

    Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular convolutional BCH codes. These codes have the property that they contain their Euclidean, respectively Hermitian, dual codes. Hence, they can be used to define quantum convolutional codes by the stabilizer code construction. We compute BCH-like bounds on the free distances which can be controlled as in the case of block codes, and establish that the codes have non-catastrophic encoders.

  1. Concatenated Conjugate Codes

    CERN Document Server

    Hamada, M

    2006-01-01

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  2. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  3. SESSAMO: Session Mobility for Video Streaming Applications

    Directory of Open Access Journals (Sweden)

    Mohammed BOUTABIA

    2011-04-01

    Full Text Available Nowadays, telecom operators are making a remarkable progress in providing a wide offer of broadbandaccess to answer the high demand for high bit rate applications. Nevertheless, user requirements do notstop at providing high rate connection, but exceeds it to ensuring transparent service portability among hisequipments. The user would like to choose among his devices those which respond at best his needs andconstraints. From small smart phones to large screen devices, the customer enjoys its entertainments orbusiness meetings according to its current situation. Service continuity over different terminals known assession mobility is a challenging operation in terms of handover latency, context transfer and mediaadaptation. Moreover, this transfer requires synchronization between the involved terminals.In this paper we present “SESSAMO”, a new lightweight session mobility protocol for streamingapplications using RTSP. This solution is transparent to the network and does not require any changes inthe client or server streaming application. The solution is detailed and a set of measurement results arepresented. In addition, we present a new method to renegotiate session parameters following terminalcapacities in order to adapt the flow accordingly. Renegotiation proposal is based on the use of SDPng andMPEG-21.

  4. Aspen Global Change Institute Summer Science Sessions

    Energy Technology Data Exchange (ETDEWEB)

    Katzenberger, John; Kaye, Jack A

    2006-10-01

    The Aspen Global Change Institute (AGCI) successfully organized and convened six interdisciplinary meetings over the course of award NNG04GA21G. The topics of the meetings were consistent with a range of issues, goals and objectives as described within the NASA Earth Science Enterprise Strategic Plan and more broadly by the US Global Change Research Program/Our Changing Planet, the more recent Climate Change Program Strategic Plan and the NSF Pathways report. The meetings were chaired by two or more leaders from within the disciplinary focus of each session. 222 scholars for a total of 1097 participants-days were convened under the auspices of this award. The overall goal of each AGCI session is to further the understanding of Earth system science and global environmental change through interdisciplinary dialog. The format and structure of the meetings allows for presentation by each participant, in-depth discussion by the whole group, and smaller working group and synthesis activities. The size of the group is important in terms of the group dynamics and interaction, and the ability for each participant's work to be adequately presented and discussed within the duration of the meeting, while still allowing time for synthesis

  5. Safety Training: scheduled sessions in March

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 08-MAR-11 (08.30 – 10.00) in English 08-MAR-11 (10.30 – 12.00) in French 15-MAR-11 (08.30 – 10.00) in French 15-MAR-11 (10.30 – 12.00) in French 17-MAR-11 (08.30 – 10.00) in English 17-MAR-11 (10.30 – 12.00) in English 22-MAR-11 (08.30 – 10.00) in French 22-MAR-11 (10.30 – 12.00) in French 24-MAR-11 (08.30 – 10.00) in French 24-MAR-11 (10.30 – 12.00) in French 29-MAR...

  6. Safety Training: scheduled sessions in May

    CERN Multimedia

    Isabelle Cusato (HSE Unit)

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year.   Biocell Training 10-MAY-11 (08.30 – 10.00) in French 10-MAY-11 (10.30 – 12.00) in French 12-MAY-11 (08.30 – 10.00) in English 12-MAY-11 (10.30 – 12.00) in English 19-MAY-11 (08.30 – 10.00) in French 19-MAY-11 (10.30 – 12.00) in French 24-MAY-11 (08.30 – 10.00) in English 24-MAY-11 (10.30 – 12.00) in English   Champs Magnétiques 13-MAY-11 (09.30 – 11.30) in French...

  7. Developing assessment: involving the sessional clinical teacher.

    Science.gov (United States)

    Bateman, H; Thomason, J M; McCracken, G; Ellis, J

    2016-02-12

    Assessment development is a fundamental element of curriculum management and a requirement for providers of education to consistently demonstrate attainment of educational standards. Development of authentic, valid and reliable assessment is, however, both challenging and resource intensive. In the UK, dental education standards are regulated by the General Dental Council (GDC). The 'safe beginner' is the threshold determined by the GDC for the passing student - but how do we apply this? This article describes an approach the School of Dental Sciences at Newcastle University has adopted to address the challenges associated with developing assessments. Sessional clinical teachers contribute a significant proportion of the clinical supervision within the BDS programme and also have a good appreciation of both the standard and concept of the 'safe beginner'. By implementing a process of active timetable management, we have identified time where this group could contribute to assessment development. We believe that aspects, which could be enhanced by their involvement, include writing, validation, standard-setting and utilisation of assessment. To achieve this, we recognise a requirement for investment in careful manpower planning and training, but consider that it is realistic and beneficial to include sessional clinical teachers in this essential part of learning and teaching. PMID:26868802

  8. Working through: In-Session Processes that Promote Between-Session Thoughts and Activities

    Science.gov (United States)

    Owen, Jesse; Quirk, Kelley; Hilsenroth, Mark J.; Rodolfa, Emil

    2012-01-01

    This study examined whether clients' ratings of the working alliance as well as their perception of cognitive-behavioral (CB) and psychodynamic-interpersonal (PI) techniques (delivered by therapists who used both) were associated with clients' intersession processes (i.e., their thoughts about therapy and therapeutic activity between sessions).…

  9. Summary of panel discussion: New generation of codes

    NARCIS (Netherlands)

    Ellingwood, B.; Nowak, A.; Melchers, R.E.; Thoft-Christensen, P.; Furuta, H.; Vrouwenvelder, A.C.W.M.

    1998-01-01

    In the past decade, there have been numerous advances in probability-based structural codes and codified design in countries in Europe, North America, and the Pacific Rim. The professional engineering community is gradually accepting these concepts. This Panel Session provides a forum to present and

  10. 2004 scientific forum - Session 2 summary

    International Nuclear Information System (INIS)

    The growth of nuclear power, while providing many benefits, has also contributed to an increasing global challenge over safe and secure waste and spent fuel management. Over the past fifty years, the world has come to better understand the strong interplay between all elements of the nuclear fuel cycle, global economics, and global security. The nuclear fuel cycle can no longer be managed as a simple sequence of technological, economic and political challenges. Rather it must be managed as a system of strongly related issues - waste and spent fuel management cannot be relegated to the back-end of the fuel cycle as only a disposal or storage issue. There exists a wealth of success and experience with waste and spent fuel management that can be forged together with a global systems perspective to lay the framework for the future. The three keynote speakers and four panellists for session 2 (waste and spent fuel management issues) of the 2004 Scientific Forum reviewed related experience to date, including approaches from direct disposal to the closed cycle. Regarding the latter, reprocessing of irradiated power reactor fuel was noted to be a mature, commercially available technology. Experience to date has demonstrated that commercial reprocessing can be compatible with security and non-proliferation requirements. There has also been a continuing reduction in the volume of waste arising from reprocessing. This trend will continue with the implementation of improved technology and operating practices. R and D programmes to study the partitioning and transmutation of environmentally significant radionuclides are being pursued to further enhance the effectiveness of waste minimization programmes. Regarding direct disposal, session 2 participants described significant progress to date. As described in the Director General's statement to the 48th session of the General Conference, Finland, the USA, and Sweden have all moved forward with their geologic disposal programmes

  11. Twisted Permutation Codes

    OpenAIRE

    Gillespie, Neil I.; Praeger, Cheryl E.; Spiga, Pablo

    2014-01-01

    We introduce twisted permutation codes, which are frequency permutation arrays analogous to repetition permutation codes, namely, codes obtained from the repetition construction applied to a permutation code. In particular, we show that a lower bound for the minimum distance of a twisted permutation code is the minimum distance of a repetition permutation code. We give examples where this bound is tight, but more importantly, we give examples of twisted permutation codes with minimum distance...

  12. Transitive nonpropelinear perfect codes

    OpenAIRE

    Mogilnykh, I. Yu.; Solov'eva, F. I.

    2014-01-01

    A code is called transitive if its automorphism group (the isometry group) of the code acts transitively on its codewords. If there is a subgroup of the automorphism group acting regularly on the code, the code is called propelinear. Using Magma software package we establish that among 201 equivalence classes of transitive perfect codes of length 15 from \\cite{ost} there is a unique nonpropelinear code. We solve the existence problem for transitive nonpropelinear perfect codes for any admissi...

  13. Homological stabilizer codes

    International Nuclear Information System (INIS)

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev’s toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev’s toric code or to the topological color codes. - Highlights: ► We show that Kitaev’s toric codes are equivalent to homological stabilizer codes on 4-valent graphs. ► We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. ► We find and classify all 2D homological stabilizer codes. ► We find optimal codes among the homological stabilizer codes.

  14. Report on session 1984-1985

    International Nuclear Information System (INIS)

    During this session the centre changed ownership, so that as from 1st October 1985 it will be operated by Edinburgh, Glasgow and Strathclyde Universities. Aberdeen and St. Andrews are associate members for access to the isotope geology facilities. Other Universities will use the centre on a commercial basis. The research activities are summarized; these are divided into reactor related activities with brief outlines of the projects undertaken in radiochemistry and physics, health physics and nuclear medicine and engineering. The number of analyses undertaken in isotope Geology increased to over 4,000. Sulphur isotope techniques were introduced during the year. The work at the NERC radiocarbon laboratory is also described. The teaching aspects of the reactor and its operation during the year are recorded. There were no problems with the reactor operation and it achieved its highest energy output of 232.5MWH. (U.K.)

  15. Session Report - F. Boydon (UK-ONR)

    International Nuclear Information System (INIS)

    This report summarises presentations nationally (France, Switzerland, Canada) and identify specific areas of interest followed by general comments observations out of all the presentations in this session about the challenges to the Regulator and the Implementer preparing for construction and operation of geological repositories: stepwise phased approach, early engagement with regulators, the need for regulators to be clear about their expectations including any R and D requirements especially on how to deal with ageing effects, information management both in terms of volume and format, importance of the organisational structure of the license applicant (this structure is likely to evolve with time from that of a design organisation to one of a constructor/contractor to an operator (and constructor combined)), importance for regulators to consider in advance what the challenges of a DGR are and to implement suitable recruitment and training processes for its staff

  16. Seamless Video Session Handoff between WLANs

    Directory of Open Access Journals (Sweden)

    Claudio de Castro Monteiro

    2010-01-01

    Full Text Available Handoff in a distributed IEEE 802.11 Wireless LAN network is a source of significant amount of problems on the video transmission environment. The visual quality of video streaming applications is lowered when stations are in handoff status. In this paper, we introduce an architecture of a session proxy (SP, which tries to preserve the quality of the streaming video upon each handoff between access points. We have evaluated thresholds of RSSI and Loss Frame Rate (LFR for deciding the moment when the handoff process shall begin. Our solution performance was evaluated in a testbed implementation for MPEG-4 video on demand with one video server (VLS and two FreeBSD-based access points supporting Mobile IP, DHCP Server and IAPP approach.

  17. Ecole de Physique des Houches: session 96

    CERN Document Server

    Huard, Benjamin; Schoelkopf, Robert; Cugliandolo, Leticia F; Quantum Machines : Measurement and Control of Engineered Quantum Systems

    2014-01-01

    This book gathers the lecture notes of courses given at the 2011 summer school in theoretical physics in Les Houches, France, Session XCVI. What is a quantum machine? Can we say that lasers and transistors are quantum machines? After all, physicists advertise these devices as the two main spin-offs of the understanding of quantum mechanical phenomena. However, while quantum mechanics must be used to predict the wavelength of a laser and the operation voltage of a transistor, it does not intervene at the level of the signals processed by these systems. Signals involve macroscopic collective variables like voltages and currents in a circuit or the amplitude of the oscillating electric field in an electromagnetic cavity resonator. In a true quantum machine, the signal collective variables, which both inform the outside on the state of the machine and receive controlling instructions, must themselves be treated as quantum operators, just as the position of the electron in a hydrogen atom. Quantum superconducting...

  18. Meeting report VLPNPV: Session 3: Immune responses.

    Science.gov (United States)

    Morrison, Trudy G

    2014-01-01

    Virus-like particles (VLPs) and nano-particles (NP) are increasingly considered for both prophylactic and therapeutic vaccines for a wide variety of human and animal diseases. Indeed, 2 VLPs have already been licensed for use in humans, the human papilloma virus vaccine and the hepatitis B virus vaccine. (1) Reflecting this increased interest, a second international conference with a specific focus on VLPs and NP was held at the Salk Institute for Biological Studies in La Jolla, California, in June 2014. Approximately 100 attendees, hailing from many nations, came from academic institutions, research institutes, and biotech companies. A wide variety of topics were discussed, ranging from development and characterization of specific VLP and NP vaccine candidates to methods of production of these particles. Session three was focused on the general question of immune responses to VLPs. PMID:25529229

  19. Session: Program Review X Wrap-Up

    Energy Technology Data Exchange (ETDEWEB)

    None

    1992-01-01

    This wrap-up session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of Closing Remarks by Roland R. Kessler and six NGA Industry Critique Panel presentations: ''Summary of Comments on DOE-Industry Cooperation by Geothermal Industry Panel'' by James B. Koenig, GeothermEx, Inc.; ''NGA Industry Critique of the Exploration Component'' by Joe L. Iovenitti, Weiss Associates; ''Critique of Drilling Research'' by Jerry Hamblin, UNOCAL Geothermal; ''Critique Panel Comments on Reservoir Engineering, DOE Geothermal Technology Development'' by Dennis Kaspereit, California Energy Company, Inc.; ''DOE Geothermal Program Review - Critique on Production'' by Douglas B. Jung, Two-Phase Engineering and Research; ''Comments on the DOE Hydrothermal Energy Conversion R&D Program'' by David L. Mendive, Geothermal Development Associates.

  20. AAS Special Session: Policy Making in Astronomy

    Science.gov (United States)

    Cardelli, J. A.; Massa, D.

    1995-12-01

    The professional astronomical community today is more diverse than at any time in its history. Individuals participating in creative research programs can be found in a wide range of positions. This type of diversity, which mixes research, education, and service (e.g. contract) work, represents the strength of contemporary astronomy. While recognizing the unavoidable reductions in funding and restructuring of organizations like NASA, it is imperative that the significance of the current diversity be considered during these processes. Creative ideas are one of the cornerstones of quality research, and they can originate anywhere. Consequently, it is essential that adequate research resources remain available for free and open competition by all astronomers. Our goal in this session is to bring together officials from the AAS, NASA, and the NSF to discuss how the policy and decision making process operates and whether it should be changed to better serve the general needs of the professional astronomical community. Examples of the issues we believe are important include: In establishing new policy, how can the needs of the average research astronomer be better addressed? How could input from such astronomers be provided to those who craft NASA/NSF policy? How can/should the AAS serve as an interface between policy/decision making bodies and its membership? Should the AAS membership become more actively/effectively involved in the decision making process and, if so, how? More information on this session and related issues can be found at the Association of Research Astronomers Home Page: http://www.phy.vill.edu/astro/faculty/ara/ara_home.htm

  1. Summary Of Session 5: How Should We Handle Safety?

    Energy Technology Data Exchange (ETDEWEB)

    Albert, M.; Roy, G

    2001-07-01

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  2. Summary Of Session 5: How Should We Handle Safety?

    International Nuclear Information System (INIS)

    This session was originally titled 'Safety: Who cares?' in a fairly provocative way. A clear conclusion of this session and discussions that were held at the workshop is that there is a wide concern for safety among the people in charge of control room operations. This was shown as well by the quality of the seven talks presented in this session on subjects ranging from safety standards to a practical case of a safety incident. (author)

  3. Examining Web Application by Clumping and Orienting User Session Data

    OpenAIRE

    Deenadayalan, T.; Kavitha, V.; S.Rajarajeswari

    2010-01-01

    The increasing demand for reliable Web applications gives a central role to Web testing. Most of the existing works are focused on the definition of novel testing techniques, specifically tailored to the Web. However, no attempt was carried out so far to understand the specific nature of Web faults. This paper presents a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster and tailored...

  4. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  5. 78 FR 44922 - Notice of an Education Listening Session Meeting

    Science.gov (United States)

    2013-07-25

    ...; ] DEPARTMENT OF AGRICULTURE Notice of an Education Listening Session Meeting SUMMARY: The Education Coordinating Committee, a body of the United States Department of Agriculture (USDA) Science Council...

  6. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...... including an outer BCH code correcting a few bit errors....

  7. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    Science.gov (United States)

    Allen, A.; Berriman, B.; Brunner, R.; Burger, D.; DuPrie, K.; Hanisch, R. J.; Mann, R.; Mink, J.; Sandin, C.; Shortridge, K.; Teuben, P.

    2013-10-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published scientific results should be made available, and there should be discovery mechanisms to allow these to be found easily. With increased use of resources such as GitHub (for code availability), ASCL (for code discovery), and a stated strong preference from the new journal Astronomy & Computing for code release, we expect to see additional progress over the next few years.

  8. Linking Competency with Training Needs: Session Summary on Disaster Studies and Evaluation, Session BO-17.

    Science.gov (United States)

    Ling, Kelvin W K; Daily, Elaine K

    2016-02-01

    This section of Prehospital and Disaster Medicine (PDM) presents reports and summaries of the 19th World Congress on Disaster and Emergency Medicine (WCDEM) held in Cape Town, South Africa in April of 2015. Abstracts of Congress oral and poster presentations were published in April 2015 as a supplement to PDM (Volume 30, Supplement 1). Reports and session summaries of the 19th World Congress on Disaster and Emergency Medicine. PMID:26842014

  9. Increasing session-to-session transfer in a brain-computer interface with on-site background noise acquisition

    Science.gov (United States)

    Cho, Hohyun; Ahn, Minkyu; Kim, Kiwoong; Jun, Sung Chan

    2015-12-01

    Objective. A brain-computer interface (BCI) usually requires a time-consuming training phase during which data are collected and used to generate a classifier. Because brain signals vary dynamically over time (and even over sessions), this training phase may be necessary each time the BCI system is used, which is impractical. However, the variability in background noise, which is less dependent on a control signal, may dominate the dynamics of brain signals. Therefore, we hypothesized that an understanding of variations in background noise may allow existing data to be reused by incorporating the noise characteristics into the feature extraction framework; in this way, new session data are not required each time and this increases the feasibility of the BCI systems. Approach. In this work, we collected background noise during a single, brief on-site acquisition session (approximately 3 min) immediately before a new session, and we found that variations in background noise were predictable to some extent. Then we implemented this simple session-to-session transfer strategy with a regularized spatiotemporal filter (RSTF), and we tested it with a total of 20 cross-session datasets collected over multiple days from 12 subjects. We also proposed and tested a bias correction (BC) in the RSTF. Main results. We found that our proposed session-to-session strategies yielded a slightly less or comparable performance to the conventional paradigm (each session training phase is needed with an on-site training dataset). Furthermore, using an RSTF only and an RSTF with a BC outperformed existing approaches in session-to-session transfers. Significance. We inferred from our results that, with an on-site background noise suppression feature extractor and pre-existing training data, further training time may be unnecessary.

  10. SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways

    Directory of Open Access Journals (Sweden)

    Akbar AliHammad

    2010-01-01

    Full Text Available 6LoWPAN (IPv6 based Low-Power Personal Area Network is a protocol specification that facilitates communication of IPv6 packets on top of IEEE 802.15.4 so that Internet and wireless sensor networks can be inter-connected. This interconnection is especially required in commercial and enterprise applications of sensor networks where reliable and timely data transfers such as multiple code updates are needed from Internet nodes to sensor nodes. For this type of inbound traffic which is mostly bulk, TCP as transport layer protocol is essential, resulting in end-to-end TCP session through a default gateway. In this scenario, a single gateway tends to become the bottleneck because of non-uniform connectivity to all the sensor nodes besides being vulnerable to buffer overflow. We propose SET; a management architecture for multiple split-TCP sessions across a number of serving gateways. SET implements striping and multiple TCP session management through a shim at session layer. Through analytical modeling and ns2 simulations, we show that our proposed architecture optimizes communication for ingress bulk data transfer while providing associated load balancing services. We conclude that multiple split-TCP sessions managed in parallel across a number of gateways result in reduced latency for bulk data transfer and provide robustness against gateway failures.

  11. A session-to-session examination of homework engagement in cognitive therapy for depression: Do patients experience immediate benefits?

    Science.gov (United States)

    Conklin, Laren R; Strunk, Daniel R

    2015-09-01

    Homework is a key component of Cognitive Therapy (CT) for depression. Although previous research has found evidence for a positive relationship between homework compliance and treatment outcome, the methods used in previous studies have often not been optimal. In this study, we examine the relation of specific aspects of homework engagement and symptom change over successive session-to-session intervals. In a sample of 53 depressed adults participating in CT, we examined the relation of observer-rated homework engagement and session-to-session symptom change across the first five sessions. Within patient (and not between patient) variability in homework engagement was significantly related to greater session-to-session symptom improvements. These findings were similar when homework engagement was assessed through a measure of general engagement with homework assignments and a measure assessing engagement in specific assignments often used in CT. Secondary analyses suggested that observer ratings of the effort patients made on homework and the completion of cognitive homework were the numerically strongest predictors of depressive symptom improvements. Patient engagement with homework assignments appears to be an important predictor of early session-to-session symptom improvements. Future research is needed to identify what therapist behaviors promote homework engagement. PMID:26183022

  12. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  13. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both the...... coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  14. Teaching statistics to medical undergraduates using interactive and participatory sessions

    Directory of Open Access Journals (Sweden)

    THULASINGAM MAHALAKSHMY

    2013-10-01

    Full Text Available Introduction: In India, medical undergraduates think that statistics is difficult to understand. Often, it is taught just before final assessment examination using didactic lectures, with little use of medical examples and less focus on application. Hence, we prepared interactive, participatory sessions for teaching biostatistics to medical undergraduate. Methods: The sessions were delivered by a facilitator. It had clearly specified objectives and teaching learning strategies. A needs assessment was done by interviewing the students who had undergone traditional biostatistics teaching methodology. Specific learning objectives for the sessions were finalized using the Delphi technique and review of University syllabus. Two trained Community Medicine faculties designed the lesson plans ‘backwards’ from desired outcome to content, teaching/learning strategies, assessment and evaluation process (Outcomes-based lesson planning. Forty, third-semester (Para-clinical phase of the second year medical undergraduates undertook these seven teaching sessions. The session followed adult learning principles and included group discussions, games and reflections. We evaluated the impact of the sessions using in-depth interviews, retrospective post-then-preself- assessment and a pre-announced written test. Results: With traditional statistics teaching methodology, students perceived it as a standalone subject and were not interested in statistics. Students who underwent the sessions commented that the sessions were enjoyable, interesting, and participatory and more than %90 of them felt they were engaged throughout the session. They also narrated various instances where they could apply the biostatistics learning. In the post-then-pre-assessment median post-session scores for all the objectives were significantly higher (p <0.050. Conclusion: Use of interactive, participatory sessions for teaching biostatistics to medical undergraduates resulted in a

  15. A Comparison of Natural Language Processing Methods for Automated Coding of Motivational Interviewing.

    Science.gov (United States)

    Tanana, Michael; Hallgren, Kevin A; Imel, Zac E; Atkins, David C; Srikumar, Vivek

    2016-06-01

    Motivational interviewing (MI) is an efficacious treatment for substance use disorders and other problem behaviors. Studies on MI fidelity and mechanisms of change typically use human raters to code therapy sessions, which requires considerable time, training, and financial costs. Natural language processing techniques have recently been utilized for coding MI sessions using machine learning techniques, rather than human coders, and preliminary results have suggested these methods hold promise. The current study extends this previous work by introducing two natural language processing models for automatically coding MI sessions via computer. The two models differ in the way they semantically represent session content, utilizing either 1) simple discrete sentence features (DSF model) and 2) more complex recursive neural networks (RNN model). Utterance- and session-level predictions from these models were compared to ratings provided by human coders using a large sample of MI sessions (N=341 sessions; 78,977 clinician and client talk turns) from 6 MI studies. Results show that the DSF model generally had slightly better performance compared to the RNN model. The DSF model had "good" or higher utterance-level agreement with human coders (Cohen's kappa>0.60) for open and closed questions, affirm, giving information, and follow/neutral (all therapist codes); considerably higher agreement was obtained for session-level indices, and many estimates were competitive with human-to-human agreement. However, there was poor agreement for client change talk, client sustain talk, and therapist MI-inconsistent behaviors. Natural language processing methods provide accurate representations of human derived behavioral codes and could offer substantial improvements to the efficiency and scale in which MI mechanisms of change research and fidelity monitoring are conducted. PMID:26944234

  16. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  17. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  18. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  19. Proceedings of the 21st DOE/NRC nuclear air cleaning conference; Volume 2, Sessions 9--16

    Energy Technology Data Exchange (ETDEWEB)

    First, M.W. [ed.] [Harvard Univ., Boston, MA (United States). Harvard Air Cleaning Lab.

    1991-02-01

    The 21st meeting of the Department of Energy/Nuclear Regulatory Commission (DOE/NRC) Nuclear Air Cleaning Conference was held in San Diego, CA on August 13--16, 1990. The proceedings have been published as a two volume set. Volume 2 contains sessions covering adsorbents, nuclear codes and standards, modelling, filters, safety, containment venting and a review of nuclear air cleaning programs around the world. Also included is the list of attendees and an index of authors and speakers. (MHB)

  20. Coupling CFD code with system code and neutron kinetic code

    Energy Technology Data Exchange (ETDEWEB)

    Vyskocil, Ladislav, E-mail: Ladislav.Vyskocil@ujv.cz; Macek, Jiri

    2014-11-15

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent.

  1. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  2. Single session treatment for bleeding hemorrhoids

    Energy Technology Data Exchange (ETDEWEB)

    Weinstein, S.J.; Rypins, E.B.; Houck, J.; Thrower, S.

    1987-12-01

    Fifty consecutive outpatients with bleeding internal hemorrhoids were prospectively treated with a single application of rubber band ligation or infrared coagulation. Complete follow-up observation was obtained in 48 patients (23 underwent rubber band ligation and 25 underwent infrared coagulation). At one month after treatment, 22 patients who underwent rubber band ligation and 16 who underwent infrared coagulation, were symptomatically improved (p less than 0.05). At six months, 15 patients who had undergone rubber band ligation and ten who had infrared coagulation treatment, remained improved (p less than 0.05). There was no statistical difference in the discomfort experienced by either group during or after the procedure as determined by a self-assessment scale. Two patients who underwent rubber band ligation experienced complications--a thrombosed external hemorrhoid developed in one patient and another had delayed rectal bleeding. Although associated with occasional complications after treatment, rubber band ligation is more effective than in infrared coagulation for single session treatment of bleeding internal hemorrhoids.

  3. Proceedings of the fuel and materials sessions

    International Nuclear Information System (INIS)

    The Halden Project has the tradition of convening two Enlarged Halden Programme Group Meetings during a three year programme period. These meetings provide an extended forum for reporting and discussing the Halden Project's research results, complemented by presentations of related activities carried out at participating organisations. The 2004 Sandefjord meeting was the first Enlarged meeting in the 2003-2005 programme period and provides a broad presentation of the results from the research activities of this programme. At this time, the Project was also in the initial phase of formulating the first draft proposal of the research programme for the next programme period (2006-2008). Therefore, the Project was appreciating this occasion to exchange ideas in furtherance of its future research activities for which the Halden Reactor, the Halden Man-Machine Laboratory HAMMLAB and the Virtual Reality Laboratory provide an important basis. In the sessions on Fuel and Materials (F and M) more than fifty papers was presented, about half of them from participating organisations. (AG)

  4. General Report on the Technical Sessions

    International Nuclear Information System (INIS)

    General Remarks: • Research & Projects on Fast Neutron Reactors & related Fuel Cycles remain at sustained level worldwide; • Active participation in Technical Oral & Poster Sessions & Sustained exchanges; • Emphasis on Safety in the aftermath of Fukushima accident: → Gen-IV initiative on “Common design/safety criteria” in relation with the IAEA; • Diversity & Complementarity of National Projects of near term large power Fast Reactors & Technology Demonstrators of Next Generation Fast Reactors: – Ambitious SFR deployment scenarios of Russia, India, China…; – Near term Demonstrators of LFR technology in Russia; – Active research, promising innovations and plans for demonstrations in all major nuclear countries on SFRs but also LFR, GFR, MSFR… • Continuing improvements & Search for breakthroughs: two approaches with their own rationale & timeline that may complement each other in a global international roadmap. Key role of operating FRs for feedback & testing; • Increasing importance of numerical simulation and basic research; • Attractiveness of Gen-IV systems for Nuclear Education & Training

  5. Applying Metaphor in HRD Research and Practice: Innovative Session.

    Science.gov (United States)

    Short, Darren C.; Ardichvili, Alexander; Daley, Barbara J.; Kalata, Erica; Kraemer, Theresa J.; Kuchinke, K. Peter; Willis, Verna J.

    A group of human resource development (HRD) practitioners participated in an innovative session on applying metaphor in HRD research and practice. The session objectives were as follows: (1) facilitate a dialogue between those who wrote for and those who read the Advances in Developing Human Resources (ADHR)issue on metaphor in HRD; (2) extend the…

  6. Professional development session for early career scientists at SITC 2012

    OpenAIRE

    Capitini, Christian M.; Redmond, William L.; Shafer-Weaver, Kimberly A

    2013-01-01

    The Society for Immunotherapy of Cancer (SITC) 2012 Professional Development Session was held as part of the SITC 27th Annual Meeting, Washington, DC, on October 24, 2012. The session was designed as a new opportunity for early career investigators to learn about relevant career development topics in a didactic setting.

  7. Graph Transformation for Consolidation of Creativity Sessions Results

    DEFF Research Database (Denmark)

    Dolog, Peter

    Graph transformation approach for consolidation of creativity sessions results is part of the FP7 EU/IST project idSpace: Tooling of and training for collaborative, distributed product innovation. The goal of graph transformation approach is to provide a tool for merging results of various sessions...

  8. Quality Assurance of Assessment and Moderation Discourses Involving Sessional Staff

    Science.gov (United States)

    Grainger, Peter; Adie, Lenore; Weir, Katie

    2016-01-01

    Quality assurance is a major agenda in tertiary education. The casualisation of academic work, especially in teaching, is also a quality assurance issue. Casual or sessional staff members teach and assess more than 50% of all university courses in Australia, and yet the research in relation to the role sessional staff play in quality assurance of…

  9. First-Session Competency: The Brief Strategic Therapy Scale-1

    Science.gov (United States)

    Amini, Rachelle L.; Woolley, Scott R.

    2011-01-01

    The first session in brief strategic therapy is the most critical phase of treatment. More than a mere "assessment phase," the first session in a true intervention sets the stage for all subsequent therapeutic maneuvers. This article presents a supervisory observation tool, the Brief Strategic Therapy Scale-1 (BSTS-1), a fidelity measure proposed…

  10. Quality of Group Member Agendas and Group Session Climate.

    Science.gov (United States)

    Kivlighan, Dennis M., Jr.; Jauquet, Carol A.

    1990-01-01

    Examined relationship between group members' (N=36) approach to group sessions and group session climate and relationship between length of time in group and agenda quality. Found average ratings of interpersonal and here-and-now dimensions of agendas were significantly related to average perception of group climate as more engaged and less…

  11. Within-Session Delay-of-Reinforcement Gradients

    Science.gov (United States)

    Reilly, Mark P.; Lattal, Kennon A.

    2004-01-01

    Within-session delay-of-reinforcement gradients were generated with pigeons by progressively increasing delays to reinforcement within each session. In Experiment 1, the effects of imposing progressive delays on variable-interval and fixed-interval schedules were investigated while controlling for simultaneous decreases in reinforcer rate across…

  12. Energy and the public: public awareness workshop and plenary session

    Energy Technology Data Exchange (ETDEWEB)

    1979-07-01

    This publication of these two sessions of the conference on February 22 and 23, 1979 was prepared from a verbatim record made by a reporting firm. A separate abstract was prepared for each of the seventeen papers of the public awareness workshops and of the six papers of the plenary session.

  13. Teseo code validation

    International Nuclear Information System (INIS)

    In this report some validation tests for the TESEO code are described. The TESEO code was developed at ENEA - Clementel Center in the framework of the C2RV code sequence. This code sequence produces multigroup resonance cross sections for fast reactor analysis. It consists of the codes TESEO, MC2-II, GERES, ANISN, MEDIL. The TESEO code processes basic nuclear data in ENDF-B format and produces an ultrafine group (2082 groups) cross section library for the MC2-II code. To validate the TESEO algorithms, the data produced by TESEO code were compared with the data produced by other well-tested codes which use different algorithms. No substantial differences was found between these data and the data produced by TESEO code. TESEO algorithms showed high reliability. A detailed study of TESEO calculation options was carried out. Their use and functions are shown to inform the user of the code

  14. Anaphora in question-answer sessions in university ELF contexts.

    Directory of Open Access Journals (Sweden)

    Thomas Wulstan Christiansen

    2015-07-01

    Full Text Available Abstract - Identity chains (Hasan 1984 ˗ strings of co-referential noun phrases ˗ constitute a lesser researched area in the field of ELF, as has the more general area of cohesion (but see Hüttner 2009, Christiansen 2011. Following on the work on anaphora of such scholars as Reinhart (1983 and Cornish (1999, and on cohesion (e.g. Halliday and Hasan 1976, Halliday 2004, Christiansen (2009a/b, 2011 focuses on the link between text cohesion and discourse coherence. The interactive perspective of discourse (seen as the process of which text is the product: see Widdowson 1984: 100 is especially relevant to an ELF context of spontaneous spoken interaction. As Guido (2008 evidences, different inter-cultural concerns constitute a crucial dimension to the complex multi-code interaction. Consequently, the diverse ways in which speakers from different L1 backgrounds employ anaphors and construct identity chains are key elements in the co-construction of a dialogic text. In this case study, six extracts of transcripts taken from the VOICE corpus (2011 of conference question and answer sessions set in multicultural contexts are analysed qualitatively. The different ways that participants construct identity chains (e.g. whether they use full forms of various kinds or anaphoric pro-forms are classified. The analysis focuses on both how individual anaphors are resolved and how relations between anaphors and antecedent triggers are encoded, and how identity chains are constructed and organized individually. The objective is to identify which kinds of noun phrase (various subtypes of full and pro-forms are used by diverse groups of EFL speakers both in relation to their own contributions and to those of other speakers (with a threefold distinction made between the same turn of the same speaker, a different turn of the same speaker, and a different turn by a different speaker.

  15. Examining Web Application by Clumping and Orienting User Session Data

    CERN Document Server

    Deenadayalan, T; Rajarajeswari, S

    2010-01-01

    The increasing demand for reliable Web applications gives a central role to Web testing. Most of the existing works are focused on the definition of novel testing techniques, specifically tailored to the Web. However, no attempt was carried out so far to understand the specific nature of Web faults. This paper presents a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster and tailored by augmentation with additional requests to cover the dependence relationships between web pages. The created suite not only can significantly reduce the size of the collected user sessions, also viable to exercise fault sensitive paths. The results demonstrate that our approach consistently detected the majority of known faults using a relatively small number of test cases and will be a powerful system when more and more user sessions are being clustered.

  16. Similarity Measurement of Web Sessions Based on Sequence Alignment

    Institute of Scientific and Technical Information of China (English)

    LI Chaofeng; LU Yansheng

    2007-01-01

    The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra-group similarity while minimizing the inter-group similarity.The first and foremost question needed to be considered in clustering Web sessions is how to measure the similarity between Web sessions. However, there are many shortcomings in traditional measurements. This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited Web page. Then we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of Web page access in detail.Experiments have proved that our method is valid and efficient.

  17. Session-based Choreography with Exceptions

    DEFF Research Database (Denmark)

    Carbone, Marco

    2009-01-01

    Choreography has recently emerged as a pragmatic and concise way of describing communication-based systems such as web services and financial protocols. Recent studies have investigated the transition from the design stage of a system to its implementation providing an automatic way of mapping a...... choreograhy into executable code. In this work, we focus on an extension of choreography with a communication-based (interactional) exception mechanism by giving its formal semantics. In particular, we discuss through some examples how interactional exceptions at choreography level can be implemented into end...

  18. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  19. Decentralized Network Coding

    OpenAIRE

    Fragouli, C.; Soljanin, E.

    2004-01-01

    This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.

  20. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic: in the...

  1. Round table discussion during session 1

    International Nuclear Information System (INIS)

    The round table discussions of the first session of the Belgium Workshop addressed the following questions: - Accepting or refusing a person, an institution or a grouping as a legitimate Stakeholder who makes the decision and how? - How are the local partnerships built and organised? - How to obtain community support for the partnership's legitimate decisions/findings? - Experience teaches that no decision is reached solely by formal and legal processes. What role do informal processes play? - How can the informal procedures be accepted? Do they need to be made explicit? Discussion took place after the plenary presentations, at tables grouping Belgian stakeholders and FSC delegates. After the discussion, each table's findings were reported to the plenary. Most of the discussion concerned the local partnerships. Important findings were that the statutes for the partnerships were developed by the partnerships themselves and there were no legally binding rules handed down by the federal level. The partnerships are part of an informal process. A legally binding participation (i.e. within the EIA) will be initiated at a later stage. As the partnerships function outside of the formal legal procedure, they can function in a more flexible way. It was noted that the partnerships make recommendations, but it is not clear what the government will do with these recommendations. It was also argued that the process may cause conflicts between neighboring communities. As in other contexts visited by the FSC, the importance of the right of veto of the community was stressed, although this may cause a conflict between technical suitability and social acceptance. Access of the community to the local partnership is necessary. Finally it was accepted that time is needed to explain the recommendations to the broader community before any decisions are taken. (author)

  2. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  3. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  4. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  5. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-05-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  6. Modern Method for Detecting Web Phishing Using Visual Cryptography (VC and Quick Response Code (QR code

    Directory of Open Access Journals (Sweden)

    Ms. Ashvini Kute

    2015-01-01

    Full Text Available Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes authentication using Visual Cryptography (VC is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

  7. GR 20 Parallel Session A3: Modified Gravity

    CERN Document Server

    Horava, Petr; Melby-Thompson, Charles M; Shawhan, Peter

    2014-01-01

    This is the contribution representing Parallel Session A3, on Modified Gravity, in the Proceedings of the GR 20 Conference (July 2013, Warszawa, Poland). It consists of three invited chapters, selected by the Session Chair (P.H.) to represent the broad spectrum of topics discussed in the Session, which ranged from theoretical and phenomenological, to experimental, observational and numerical aspects of gravity. The three chapters are "Einstein-Aether Theory: Thermodynamics of Universal Horizons" by Arif Mohd, "The Curious Case of Conformal Anomalies in Horava-Lifshitz Gravity" by Charles M. Melby-Thompson, and "Detectability of Scalar Gravitational-Wave Bursts with LIGO and Virgo" by Peter Shawhan.

  8. Predicting E-commerce Consumer Behaviour Using Sparse Session Data

    OpenAIRE

    Thorrud, Thorstein Kaldahl; Myklatun, Øyvind

    2015-01-01

    This thesis research consumer behavior in an e-commerce domain by using a data set of sparse session data collected from an anonymous European e-commerce site. The goal is to predict whether a consumer session results in a purchase, and if so, which items are purchased. The data is supplied by the ACM Recommender System Challenge, which is a yearly challenge held by the ACM Recommender System Conference. Classification is used for predicting whether or not a session made a purchase, as w...

  9. Authentication Schemes for Session Passwords Using Color and Images

    Directory of Open Access Journals (Sweden)

    M Sreelatha

    2011-05-01

    Full Text Available Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.

  10. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  11. Summary of the parallel session on hadron dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Corcoran, M.D. [Rice Univ., Houston, TX (United States); Carroll, A.S. [Brookhaven National Lab., Upton, NY (United States)

    1994-12-31

    The hadron dynamics sessions focussed on A-dependent effects in hard interactions and heavy quark production, as well as color transparency effects. Other topics covered included exclusive processes and spin effects.

  12. The evaluation process of short training sessions in organizations

    NARCIS (Netherlands)

    Overschie, M.G.F.; Lukosch, H.K.; De Vries, P.

    This paper presents a critical reflection of the evaluation of learning processes in organizations. Based on learning and evaluation theories and concepts we discuss qualitative and quantitative evaluation processes, and its relationship to short training sessions to foster sustainable development.

  13. Reading Assignment 8 (theory sessions) - 31710 General Linguistics I

    OpenAIRE

    Muñoz Baell, Irma María

    2012-01-01

    Reading Assignment 8 - Driving questions: HOW IS LANGUAGE STUDIED? WHAT DOES IT MEAN THAT LANGUAGE IS STUDIED SCIENTIFICALLY? - Academic year 2011-2012 (ECTS credits: 6 (150 hours)). See the Planned Weekly Schedule (Theory sessions).

  14. An improved anti-leech mechanism based on session identifier

    Science.gov (United States)

    Zhang, Jianbiao; Zhu, Tong; Zhang, Han; Lin, Li

    2012-01-01

    With the rapid development of information technology and extensive requirement of network resource sharing, plenty of resource hotlinking phenomenons appear on the internet. The hotlinking problem not only harms the interests of legal websites but also leads to a great affection to fair internet environment. The anti-leech technique based on session identifier is highly secure, but the transmission of session identifier in plaintext form causes some security flaws. In this paper, a proxy hotlinking technique based on session identifier is introduced firstly to illustrate these security flaws; next, this paper proposes an improved anti-leech mechanism based on session identifier, the mechanism takes the random factor as the core and detects hotlinking request using a map table that contains random factor, user's information and time stamp; at last the paper analyzes the security of mechanism in theory. The result reveals that the improved mechanism has the merits of simple realization, high security and great flexibility.

  15. Session-Based Programming for Parallel Algorithms: Expressiveness and Performance

    CERN Document Server

    Bejleri, Andi; Yoshida, Nobuko; 10.4204/EPTCS.17.2

    2010-01-01

    This paper investigates session programming and typing of benchmark examples to compare productivity, safety and performance with other communications programming languages. Parallel algorithms are used to examine the above aspects due to their extensive use of message passing for interaction, and their increasing prominence in algorithmic research with the rising availability of hardware resources such as multicore machines and clusters. We contribute new benchmark results for SJ, an extension of Java for type-safe, binary session programming, against MPJ Express, a Java messaging system based on the MPI standard. In conclusion, we observe that (1) despite rich libraries and functionality, MPI remains a low-level API, and can suffer from commonly perceived disadvantages of explicit message passing such as deadlocks and unexpected message types, and (2) the benefits of high-level session abstraction, which has significant impact on program structure to improve readability and reliability, and session type-saf...

  16. Nuclear seawater desalination and other applications. Technical session 5

    International Nuclear Information System (INIS)

    The session covered in all fourteen papers from eight countries and three international organizations. Presentations included two regional and three national studies. Two specific studies were presented on applications other than desalination, namely oil shale sands and ethanol production

  17. Summary of the Absolute neutrino mass scale parallel branch session

    Energy Technology Data Exchange (ETDEWEB)

    Mangano, G. [Istituto Nazionale di Fisica Nucleare - Sezione di Napoli - Complesso Universitario di Monte S.Angelo, I-80126 Napoli (Italy); Zuber, K. [Institut fuer Kern - und Teilchenphysik Technische Universitaet, D-01069 Dresden (Germany)

    2011-08-15

    We summarize the talks presented to the Absolute neutrino mass scale parallel session of NOW2010, mainly focused on neutrinoless double beta decay in its theoretical and experimental aspects and the role of the neutrino mass scale in cosmology.

  18. Session Report - S. Smith (US NRC)

    International Nuclear Information System (INIS)

    - environment needed for safety functions; some degree of flexibility in regulatory review and assessment; education of workers: identify differences as compared to conventional rock engineering; applicability of mining regulations. In Sweden the site selection process for the final repository for spent nuclear fuel was initiated in 1992 and resulted, in June 2009, in the selection of Forsmark as the selected site for the final repository. Nuclear facilities require permits in accordance with the Swedish Environmental Code and the Nuclear Activities Act. SKB has submitted two applications to SSM (the Swedish Radiation Safety Authority) according to the Nuclear Activities Act and one to the Environmental Court according to the Environmental Code. The application according the Environmental Code includes the whole KBS-3-system - the final repository in Forsmark, the existing interim storage facility and the encapsulation plant in Oskarshamn. The challenges for the implementer and the regulator are the following: number of documents to elaborate and structure of these documents; right of veto of municipalities; management of a complex licensing process; change from R and D to industrial operations implying the creation of a sizeable construction department in SKB; strengthening of technical bases; application of regulatory framework in a different situation compared to conventional process type nuclear facilities; understanding and addressing constraints from post-closure safety related to the construction and operation of the repository; management of the time frames of repository operation requiring flexibility and continued development of disposal concept; flexible regulations: first use as basis for licensing a new nuclear facility; making adjustments for structural changes during construction and operation; ensuring excavation/construction/backfill activities do not jeopardize conditions for passive post-closure; application of general regulations for a KBS-3 type repository

  19. Summary of The 3 South China Cardiovascular Scientific Sessions

    Institute of Scientific and Technical Information of China (English)

    刘伊丽; 曾冲

    2001-01-01

    @@The 3rd South China Cardiovascular Scientific Sessions was held on August 4th ~ 6th, 2001 in Guangzhou.There were a total of 119 papers published, 13 lectures given by well- known cardiologists from inland and other parts of the world and 13 satellite conferences.These sessions were characterized by abundant updated information and advance in research on cardiovascular diseases in basic and clinical sciences. They are summarized as follows:

  20. 2011 annual meeting on nuclear technology. Topical sessions. Pt. 5

    International Nuclear Information System (INIS)

    Summary report on the Topical Session of the Annual Conference on Nuclear Technology held in Berlin, 17 to 19 May 2011: - Sodium Cooled Fast Reactors. The reports on the Topical Sessions: - CFD-Simulations for Safety Relevant Tasks, - Final Disposal: From Scientific Basis to Application, - Characteristics of a High Reliability Organization (HRO) Considering Experience Gained from Events at Nuclear Power Stations, and - Nuclear Competence in Germany and Europe have been covered in atw 7, 8/9, 10 and 11 (2011). (orig.)

  1. Diversity and End User Context in Smartphone Usage Sessions

    OpenAIRE

    Soikkeli, Tapio; Karikoski, Juuso; Hämmäinen, Heikki

    2011-01-01

    Julkaisun kokoteksti on luettavissa vain Aalto-tunnuksilla. Please note that access to the fulltext is limited to Aalto staff and students. Mobile end user context has gained increasingattention in the mobile services industry. Context information isseen as an important component in developing new, morepersonalized, mobile services and applications. This paper studiesthe effect of end user context on smartphone usage sessions.Smartphone usage sessions are used to depict user behavior an...

  2. Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning; Nahum, Erich

    2008-01-01

    A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload pro...

  3. Enabling Network Convergence Through Contextual Session Mobility With IMS

    OpenAIRE

    A.Dragoi; N. Kara; S. Aissa

    2011-01-01

    To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This article investigates the problem space of supporting Session Mobility (SM) with IMS and the associated issues such as when and how to support dynamic changes in the set of devices through which the user accesses a session. It also investigates how the S...

  4. Panel Session on the Future of Few-Body Physics

    International Nuclear Information System (INIS)

    During the 22nd European Few-Body Conference, a session was devoted to a panel discussion on the future of few-body physics. The panel members were Charlotte Elster, Jaume Carbonell, Evgeny Epelbaum, Nasser Kalantar-Nayestanaki, and Jean-Marc Richard. The session was chaired by Ben Bakker. After presentations by the panel members, several topics were discussed with the audience. The conclusions of this discussion are presented in this paper. (author)

  5. Recording and Reenactment of Collaborative Diagnosis Sessions using DICOM

    OpenAIRE

    von Wangenheim, Aldo; Prüsse, Martin; Maia, Rafael Simon; Abdala, Daniel Duarte; Regert, André Germano; de Souza Nobre, Luiz Felipe; Comunello, Eros

    2008-01-01

    This paper presents a radiological collaborative tool capable of direct manipulation of Digital Imaging and Communications in Medicine (DICOM) images on both sides, and also recording and reenacting of a recorded session. A special collaborative application protocol formerly developed was extended and used as basis for the development of collaborative session recording and playback processes. The protocol is used today for real-time radiological meetings through the Internet. This new standar...

  6. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  7. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  8. Balanced Permutation Codes

    OpenAIRE

    Gabrys, Ryan; Milenkovic, Olgica

    2016-01-01

    Motivated by charge balancing constraints for rank modulation schemes, we introduce the notion of balanced permutations and derive the capacity of balanced permutation codes. We also describe simple interleaving methods for permutation code constructions and show that they approach capacity

  9. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  10. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  11. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  12. Informal Control code logic

    OpenAIRE

    Bergstra, Jan A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  13. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  14. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  15. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  16. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  17. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  18. Session 70 - Panel: Consequence Management of a Radiological Dispersion Device

    International Nuclear Information System (INIS)

    This was an unusual panel session in that the panelists did not give presentations but responded to a tabletop exercise where they postulated decisions necessary after radiological dispersal device detonation event (dirty bomb). Articles in the daily WM'06 newsletter sought to prepare the participants for a simulated exercise involving the sighting of a known terrorist and the theft of radiological materials. During the slide presentation (in the form of a developing television news broadcast) the audience played decision makers and their 'votes' were tallied for multiple choice decisions and questions. After that was completed, the expert panel was asked to give their best responses for those decisions. The audience was allowed to ask questions and to give opinions as the panel responded. During the exercise the session co-chairs alternated announcing the events as they unfolded in the exercise and polled the audience using multiple-choice options for decisions to be made during the event. The answers to those questions were recorded and compared to the panelists' answers. The event chronology and decisions (audience questions) are shown in this report. - An explosion was reported at the Tucson International Airport (9:35 am). 1. Who is in charge? - Witnesses report 10-20 fatalities, 50 injured and massive damage to the airport, no cause determined yet (9:55 am). 2. IC's Next Action Should Be? - KRAD (local television station) Investigative News Reporters interviewed witnesses that observed a 25 foot U-Haul truck pull up onto the departure ramp just moments before the explosion (10:02 am). Terrorism has not been ruled out. 3. When is the incident declared a potential crime scene? - City of Tucson IC has ordered an evacuation of the airport to a holding area at a nearby long term parking area (10:10 am). No information has been given as to why the evacuation took place. The explosion is suspected to contain chemical, biological or radiological agents. County and

  19. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important to...... understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  20. Codes from difference sets

    CERN Document Server

    Ding, Cunsheng

    2014-01-01

    This is the first monograph on codebooks and linear codes from difference sets and almost difference sets. It aims at providing a survey of constructions of difference sets and almost difference sets as well as an in-depth treatment of codebooks and linear codes from difference sets and almost difference sets. To be self-contained, this monograph covers necessary mathematical foundations and the basics of coding theory. It also contains tables of best BCH codes and best cyclic codes over GF(2) and GF(3) up to length 125 and 79, respectively. This repository of tables can be used to benchmark

  1. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  2. Network Coding Designs Suited for the Real World

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

    2013-01-01

    Network coding (NC) has attracted tremendous attention from the research community due to its potential to significantly improve networks' throughput, delay, and energy performance as well as a means to simplify protocol design and naturally providing security support. The possibilities in code d...... practical pitfalls, this paper seeks to identify key ingredients to a successful design, critical and common limitations to most intra-session NC systems as well as promising techniques and ideas to guide future models and research problems grounded on practical concerns....

  3. XSOR codes users manual

    International Nuclear Information System (INIS)

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  4. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  5. Permutation codes for sources.

    Science.gov (United States)

    Berger, T.; Jelinek, F.; Wolf, J. K.

    1972-01-01

    Source encoding techniques based on permutation codes are investigated. For a broad class of distortion measures it is shown that optimum encoding of a source permutation code is easy to instrument even for very long block lengths. Also, the nonparametric nature of permutation encoding is well suited to situations involving unknown source statistics. For the squared-error distortion measure a procedure for generating good permutation codes of a given rate and block length is described. The performance of such codes for a memoryless Gaussian source is compared both with the rate-distortion function bound and with the performance of various quantization schemes. The comparison reveals that permutation codes are asymptotically ideal for small rates and perform as well as the best entropy-coded quantizers presently known for intermediate rates. They can be made to compare favorably at high rates, too, provided the coding delay associated with extremely long block lengths is tolerable.

  6. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  7. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  8. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  9. Communicating Earth Science Applications through Virtual Poster Sessions

    Science.gov (United States)

    Favors, J. E.; Childs-Gleason, L. M.; Ross, K. W.; Ruiz, M. L.; Rogers, L.

    2013-12-01

    The DEVELOP National Program addresses environmental and public policy issues through interdisciplinary research projects that apply the lens of NASA Earth observations to community concerns around the globe. Part of NASA's Applied Sciences' Capacity Building Program, DEVELOP bridges the gap between NASA Earth Science and society, building capacity in both participants and partner organizations to better prepare them to handle the challenges that face our society and future generations. Teams of DEVELOP participants partner with decision makers to conduct rapid feasibility projects that highlight fresh applications of NASA's suite of Earth observing sensors, cultivate advanced skills, and increase understanding of NASA Earth Science data and technology. Part of this process involves the creation of short introductory videos that demonstrate the environmental concerns, project methodologies and results, and an overview of how this work will impact decision makers. These videos are presented to the public three times a year in 'virtual poster sessions' (VPS) that provide an interactive way for individuals from around the globe to access the research, understand the capabilities and applications of NASA's Earth science datasets, and interact with the participants through blogging and dialogue sessions. Virtual poster sessions have allowed DEVELOP to introduce NASA's Earth science assets to thousands of viewers around the world. For instance, one fall VPS had over 5,000 visitors from 89 different countries during the two week session. This presentation will discuss lessons learned and statistics related to the series of nine virtual poster sessions that DEVELOP has conducted 2011-2013.

  10. What's in a Session: Tracking Individual Behavior on the Web

    CERN Document Server

    Meiss, Mark; Gonçalves, Bruno; Ramasco, José J; Menczer, Filippo; 10.1145/1557914.1557946

    2010-01-01

    We examine the properties of all HTTP requests generated by a thousand undergraduates over a span of two months. Preserving user identity in the data set allows us to discover novel properties of Web traffic that directly affect models of hypertext navigation. We find that the popularity of Web sites -- the number of users who contribute to their traffic -- lacks any intrinsic mean and may be unbounded. Further, many aspects of the browsing behavior of individual users can be approximated by log-normal distributions even though their aggregate behavior is scale-free. Finally, we show that users' click streams cannot be cleanly segmented into sessions using timeouts, affecting any attempt to model hypertext navigation using statistics of individual sessions. We propose a strictly logical definition of sessions based on browsing activity as revealed by referrer URLs; a user may have several active sessions in their click stream at any one time. We demonstrate that applying a timeout to these logical sessions af...

  11. Theory, practice, and history in critical GIS: Reports on an AAG panel session

    Science.gov (United States)

    Wilson, M.W.; Poore, B.S.

    2009-01-01

    Extending a special session held at the 2008 annual meeting of the Association of American Geographers in Boston, this commentary collection highlights elements of the critical GIS research agenda that are particularly pressing. Responding to a Progress report on critical GIS written by David O'Sullivan in 2006, these six commentaries discuss how different interpretations of 'critical' are traced through critical GIS research. Participants in the panel session discussed the need for a continued discussion of a code of ethics in GIS use in the context of ongoing efforts to alter or remake the software and its associated practices, of neo-geographies and volunteered geographies. There were continued calls for hope and practical ways to actualize this hope, and a recognition that critical GIS needs to remain relevant to the technology. This 'relevance' can be variously defined, and in doing so, researchers should consider their positioning vis-??-vis the technology. Throughout the commentaries collected here, a question remains as to what kind of work disciplinary sub-fields such as critical GIS and GIScience perform. This is a question about language, specifically the distance that language can create among practitioners and theoreticians, both in the case of critical GIS and more broadly throughout GIScience.

  12. ASIS '99 Knowledge: Creation, Organization and Use, Part III: Plenary Sessions.

    Science.gov (United States)

    Proceedings of the ASIS Annual Meeting, 1999

    1999-01-01

    Describes the following sessions: "Knowledge Management: A Celebration of Humans Connected with Quality Information Objects (Plenary Session 1); "Intellectual Property Rights and the Emerging Information Infrastructure (Plenary Session 2); and "Knowledge: Creation, Organization and Use (Conference Wrap-up Session). (AEF)

  13. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  14. Vienna SAC-SOS: Analysis of the European VLBI Sessions

    Science.gov (United States)

    Ros, C. T.; Pavetich, P.; Nilsson, T.; Böhm, J.; Schuh, H.

    2012-12-01

    The Institute of Geodesy and Geophysics (IGG) of the Vienna University of Technology as an IVS Special Analysis Center for Specific Observing Sessions (SAC-SOS) has analyzed the European VLBI sessions using the software VieVS. Between 1990 and 2011, 115 sessions have been carried out. The analyzed baselines have lengths ranging from approximately 445 to 4580 km, and they show good repeatabilities, apart from the ones containing station Simeiz. The station velocities have also been investigated. The stations situated in the stable part of Europe have not shown significant relative movements w.r.t. Wettzell, whereas the stations located in the northern areas have the largest vertical motions as a result of the post glacial isostatic rebound of the zone. The stations placed in Italy, around the Black Sea, in Siberia, and near the Arctic Circle show the largest relative horizontal motions because they belong to different geodynamical units.

  15. Topical Session on the Decommissioning and Dismantling Safety Case

    International Nuclear Information System (INIS)

    Set up by the Radioactive Waste Management Committee (RWMC), the WPDD brings together senior representatives of national organisations who have a broad overview of Decommissioning and Dismantling (D and D) issues through their work as regulators, implementers, R and D experts or policy makers. These include representatives from regulatory authorities, industrial decommissioners from the NEA Cooperative Programme on Exchange of Scientific and Technical Information on Nuclear Installation Decommissioning Projects (CPD), and cross-representation from the NEA Committee on Nuclear Regulatory Activities, the Committee on Radiation Protection and Public Health, and the RWMC. The EC is a member of the WPDD and the IAEA also participates. This ensures co-ordination amongst activities in these international programmes. Participation from civil society organisations is considered on a case by case basis, and has already taken place through the active involvement of the Group of Municipalities with Nuclear Installations at the first meeting of the WPDD At its second meeting, in Paris, 5-7 December 2001, the WPDD held two topical sessions on the D and D Safety Case and on the Management of Materials from D and D, respectively. This report documents the topical session on the safety case. The topical session was meant to provide an exchange of information and experience on the following issues: What topics should be included in a safety case? Of what should it consist? Is there sufficient and complete guidance nationally and internationally? How do practices differ internationally? Main boundary condition to this session was that it would deal with plants where spent fuel has been removed. Also the topical sessions was kept at a level that makes the most of the varied constituency of the WPDD. Namely, interface issues are important, and issue-identification and discussion was the immediate goal. There was less interest in examining areas where variability amongst national

  16. Enabling Network Convergence Through Contextual Session Mobility With IMS

    Directory of Open Access Journals (Sweden)

    A.Dragoi

    2011-05-01

    Full Text Available To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This article investigates the problem space of supporting Session Mobility (SM with IMS and the associated issues such as when and how to support dynamic changes in the set of devices through which the user accesses a session. It also investigates how the SM arrival calls should be handled at the network level where they are not considered as ongoing sessions. Hence, we discuss the design options and identify functional blocks needed to support SM. We propose applying priority-basedresource allocation approach to guarantee lower blocking probability for ongoing SM arrival calls compared to new arrival calls. Numerical results show that this approach allows achieving such performance for different call arrival rates.

  17. ENABLING NETWORK CONVERGENCE THROUGH CONTEXTUAL SESSION MOBILITY WITH IMS

    Directory of Open Access Journals (Sweden)

    A. Dragoi

    2011-05-01

    Full Text Available To fully benefit from the all IP convergence, it should be possible for a user not only to access services ubiquitously and at any time, but also to automatically and seamlessly transfer ongoing communication between different devices. This article investigates the problem space of supporting Session Mobility (SM with IMS and the associated issues such as when and how to support dynamic changes in the set of devices through which the user accesses a session. It also investigates how the SM arrival calls should be handled at the network level where they are not considered as ongoing sessions. Hence, we discuss the design options and identify functional blocks needed to support SM. We propose applying priority-based resource allocation approach to guarantee lower blocking probability for ongoing SM arrival calls compared to new arrival calls. Numerical results show that this approach allows achieving such performance for different call arrival rates.

  18. Summary of papers presented in the Theory and Modelling session

    Directory of Open Access Journals (Sweden)

    Lin-Liu Y.R.

    2012-09-01

    Full Text Available A total of 14 contributions were presented in the Theory and Modelling sessions at EC-17. One Theory and Modelling paper was included in the ITER ECRH and ECE sessions each. Three papers were in the area of nonlinear physics discussing parametric processes accompanying ECRH. Eight papers were based on the quasi-linear theory of wave heating and current drive. Three of these addressed the application of ECCD for NTM stabilization. Two papers considered scattering of EC waves by edge density fluctuations and related phenomena. In this summary, we briefly describe the highlights of these contributions. Finally, the three papers concerning modelling of various aspects of ECE are reported in the ECE session.

  19. Upcoming training sessions (up to end October) - Places available

    CERN Multimedia

    2016-01-01

    Please find below a list of training sessions scheduled to take place up to the end of October with places available.   Safety and Language courses are not included here, you will find an up-to-date list in the Training Catalogue. If you need a course which is not featured  in the catalogue, please contact one of the following: your supervisor, your Departmental Training Officer or the relevant learning specialist. Leadership Training           Training Course Title Next Session Language Duration Available places Needed to maintain the session Driving for Impact and Influence 13-Sep-2016 to 14-Sep-2016 French 2 days 4 0 Essentials of People Management for CERN Supervisors (Adapted from CDP for CERN Supervisors) 22-Sep-2016 to 23-Sep-2016, 18-Nov-2016, 17-Jan-2017 to 18-Jan-2017 English 5 days 5 0 Eléments essentiels de la gestion du personnel pour les superviseurs (adapt&a...

  20. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  1. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  2. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  3. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  4. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  5. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

  6. Locally Repairable Codes

    OpenAIRE

    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G.

    2012-01-01

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data reliability. A main limitation of off-the-shelf erasure codes is their high-repair cost during single node failure events. A major open problem in this area has been the design of codes that {\\it i)} are repair efficient and {\\it ii)} achieve arbitrarily high data rates. In this paper, we explore the r...

  7. An Interactive Session on Nutritional Pathologies for Health Professional Students

    Directory of Open Access Journals (Sweden)

    Joshua DeSipio

    2015-07-01

    Full Text Available Various studies have emphasized the need to improve the nutrition training of health professionals, which will help them to provide optimal patient care. Nutrition-based interactive sessions may serve as an efficient approach to instigate an interest in nutrition among the students. Here we report the reception and effectiveness of a nutrition-pathology based interactive activity that we designed and implemented in the gastroenterology course given to the second year students at our medical school. The activity involved team work, individual accountability and peer-teaching. Nutrition pathology case stems (Kwashiorkor, vitamin B-12 deficiency, zinc deficiency and zinc-induced copper deficiency were posted on the course website for the students to read before the session. At the start of the session, all the groups (each made up of four members took a pre-quiz. Each student was then given an information sheet describing one case. Each group discussed the four cases with students acting as the “teacher” for the case assigned to them. A post-quiz was administered to the groups to assess acquisition of knowledge as well as in-depth thinking about the nutrition aspects discussed. The efficacy of the session measured by pre (39% questions correctly answered in total and post-quizzes (96% questions correctly answered in total and the overwhelmingly positive student feedback indicated that the session was highly effective. Ninety-five percent of students thought that the session demonstrated the clinical relevance of nutrition, while 98% students found the peer teaching to be engaging.

  8. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  9. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  10. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  11. Highlights of session presentations. TSS / CST population IEC meeting.

    Science.gov (United States)

    1995-01-01

    The great deal of documentation which was prepared for the recent TSS/CST Population IEC (information, education, and communication) meeting from research, field experiments, and action projects will be useful to TSS/CST advisors and individual countries undertaking IEC and population education work. This article summarizes the 12 sessions held during the open forum. To illustrate some of the latest trends in population and health communication, the "enter-educate" approach and use of the interactive computer software called SCOPE (Strategic Communication Planning and Evaluation) were discussed. Next, ways in which to apply research effectively in IEC and population education were considered. Examples were provided of 1) a workshop methodology used to help a multidisciplinary group design a problem-solving communication strategy in Malaysia and Dominica; 2) the counseling training evaluation technique based on the GATHER (greet, ask, tell, help, explain, and return for follow-up) model; and 3) four types of evaluation of population education in schools. The third session was concerned with the program approach used in IEC and population education. Session 4 dealt with the implication of UNFPA support to family planning (FP) IEC. Counseling skills training and interpersonal communication were next on the agenda, followed by a consideration of how knowledge and policies are applied in the area of youth. The seventh session concentrated on ways to involve men in FP and reproductive health and included a discussion of a case study on the attitude and behavior of men with regard to FP which had IEC implications. The next session described the need to reconceptualize population education and what such a reconceptualization would entail. Session 9 was devoted to a consideration of gender issues and the education of girls. The tenth session covered the use of participatory approaches and community involvement in population communication programs. Innovative methodologies

  12. 2009 Annual meeting on nuclear technology. Pt. 2. Topical sessions

    International Nuclear Information System (INIS)

    Summary report on the Topical Sessions of the Annual Conference on Nuclear Technology held in Dresden, May 12 to 14, 2009: Flexible Concept for Sustainable Use of Nuclear Energy and Waste Minimization; Thermohydraulic Experiments for Reactors of the Second and Third Generation. The reports on the Topical Sessions: Advances in the Development of Integrated Management Systems for the Optimisation of Safety and Operational Availability of Nuclear Power Stations (Dr. Markus Nie and Dipl.-Ing. Karl Ramler), and; Fuel Elements: Zero Failure - Road to the Target (Dipl.-Ing. Andreas Huettmann) have been covered in atw 8/9 (2009). (orig.)

  13. Mini-conference and Related Sessions on Laboratory Plasma Astrophysics

    Energy Technology Data Exchange (ETDEWEB)

    Hantao Ji

    2004-02-27

    This paper provides a summary of some major physics issues and future perspectives discussed in the Mini-Conference on Laboratory Plasma Astrophysics. This Mini-conference, sponsored by the Topical Group on Plasma Astrophysics, was held as part of the American Physical Society's Division of Plasma Physics 2003 Annual Meeting (October 27-31, 2003). Also included are brief summaries of selected talks on the same topic presented at two invited paper sessions (including a tutorial) and two contributed focus oral sessions, which were organized in coordination with the Mini-Conference by the same organizers.

  14. USING SESSION RPE TO MONITOR DIFFERENT METHODS OF RESISTANCE EXERCISE

    Directory of Open Access Journals (Sweden)

    Alison D. Egan

    2006-06-01

    Full Text Available The purpose of this study was to compare session rating of perceived exertion for different resistance training techniques in the squat exercise. These techniques included traditional resistance training, super slow, and maximal power training. Fourteen college-age women (Mean ± SD; age = 22 ± 3 years; height = 1.68 ± 0. 07 m completed three experimental trials in a randomized crossover design. The traditional resistance training protocol consisted of 6 sets of 6 repetitions of squats using 80% of 1-RM. The super slow protocol consisted of 6 sets of 6 repetitions using 55% of 1-RM. The maximal power protocol consisted of 6 sets of 6 repetitions using 30% of 1-RM. Rating of perceived exertion (RPE measures were obtained following each set using Borg's CR-10 scale. In addition, a session RPE value was obtained 30 minutes following each exercise session. When comparing average RPE and session RPE, no significant difference was found. However, power training had significantly lower (p < 0.05 average and session RPE (4.50 ± 1.9 and 4.5 ± 2.1 compared to both super slow training (7.81 ± 1.75 and 7.43 ± 1.73 and traditional training (7.33 ± 1.52 and 7.13 ± 1.73. The results indicate that session RPE values are not significantly different from the more traditional methods of measuring RPE during exercise bouts. It does appear that the resistance training mode that is used results in differences in perceived exertion that does not relate directly to the loading that is used. Using session RPE provides practitioners with the same information about perceived exertion as the traditional RPE measures. Taking a single measure following a training session would appear to be much easier than using multiple measures of RPE throughout a resistance training workout. However, practitioners should also be aware that the RPE does not directly relate to the relative intensity used and appears to be dependent on the mode of resistance exercise that is used

  15. Session control using PHP and MySQL

    OpenAIRE

    Shi, Yang

    2011-01-01

    My project is to build an online shopping website. Recently, it has become a popular trend for an increasing amount of people to choose online shopping. It is very convenient and suitable for people’s fast-paced lifestyle nowadays. The main function I want to implement is shopping cart. Session control is the core technology to support me achieving shopping cart. The idea of it is to be able to track a user during a single session on a website. HTTP protocol has no built-in way of maintai...

  16. Round table session on '3D-city-modeling'

    DEFF Research Database (Denmark)

    Rüdiger, Bjarne; Tournay, Bruno

    According to eCAADe's mission, the exchange and collaboration within the area of computer aided architectural design education and research, while respecting the pedagogical and administrative approaches in the different schools and countries, can be regarded as a core activity. On the occasion of...... eCAADe 2001 in Helsinki a working session on the topic "3D-City-Modeling" was held, in which a varietybundle of papers was presented. The eCAADe 2002 round table session on "3D-City-Modeling" is opening up for an intensive discussion on a number of goals which were elaborated by a working group in...

  17. Round table session on '3D-city-modeling

    DEFF Research Database (Denmark)

    Rüdiger, Bjarne; Tournay, Bruno

    According to eCAADs's mission, the exchange and collaboration within the area of computer aided architectural design education and research, while respecting the pedagogical and administrative approaches in the different schools and countries, can be regarded as a core activity. On the occasion of...... eCAADe 2001 in Helsinki a working session on the topic "3D-City-Modeling" was held, in which a varietybundle of papers was presented. The eCAADe 2002 round table session on "3D-City-Modeling" is opening up for an intensive discussion on a number of goals which were elaborated by a working group in...

  18. Determination of a behavioral transfer function: White-noise analysis of session-to-session response-ratio dynamics on concurrent VI VI schedules

    OpenAIRE

    Hunter, Ian; Davison, Michael

    1985-01-01

    Six pigeons were exposed to concurrent variable-interval schedules in which the programmed reinforcer ratios changed from session to session according to a pseudorandom binary sequence. This procedure corresponded to the stochastic identification paradigm (“white-noise experiment”) of systems theory and enabled the relation between log response ratios in the current session and log reinforcer ratios in all previous sessions to be determined. Such dynamic relations are called linear transfer f...

  19. Remote effects of aversive contingencies: Disruption of appetitive behavior by adjacent avoidance sessions

    OpenAIRE

    Hackenberg, Timothy D; Hineline, Philip N.

    1987-01-01

    Disruption of ongoing appetitive behavior before and after daily avoidance sessions was examined. After baselines of appetitive responding were established under a fixed-interval 180-s schedule of food presentation, 4 rats were exposed to 40-min sessions of the appetitive schedule just prior to 100-min sessions of electric shock postponement, while another 4 rats received the 40-min appetitive sessions just following daily sessions of shock postponement. In all 8 subjects, fixed-interval resp...

  20. CACTI: Free, Open-Source Software for the Sequential Coding of Behavioral Interactions

    OpenAIRE

    Lisa H Glynn; Hallgren, Kevin A.; Houck, Jon M.; Moyers, Theresa B.

    2012-01-01

    The sequential analysis of client and clinician speech in psychotherapy sessions can help to identify and characterize potential mechanisms of treatment and behavior change. Previous studies required coding systems that were time-consuming, expensive, and error-prone. Existing software can be expensive and inflexible, and furthermore, no single package allows for pre-parsing, sequential coding, and assignment of global ratings. We developed a free, open-source, and adaptable program to meet t...

  1. IAEA Workshop (Training Course) on Codes and Standards for Sodium Cooled Fast Reactors. Working Material

    International Nuclear Information System (INIS)

    The training course consisted of lectures and Q&A sessions. The lectures dealt with the history of the development of Design Codes and Standards for Sodium Cooled Fast Reactors (SFRs) in the respective country, the detailed description of the current design Codes and Standards for SFRs and their application to ongoing Fast Reactor design projects, as well as the ongoing development work and plans for the future in this area. Annex 1 contains the detailed Workshop program

  2. Look at the Gato! Code-Switching in Speech to Toddlers

    Science.gov (United States)

    Bail, Amelie; Morini, Giovanna; Newman, Rochelle S.

    2015-01-01

    We examined code-switching (CS) in the speech of twenty-four bilingual caregivers when speaking with their 18- to 24-month-old children. All parents CS at least once in a short play session, and some code-switched quite often (over 1/3 of utterances). This CS included both inter-sentential and intra-sentential switches, suggesting that at least…

  3. Radiation transport phenomena and modeling. Part A: Codes; Part B: Applications with examples

    International Nuclear Information System (INIS)

    This report contains the notes from the second session of the 1997 IEEE Nuclear and Space Radiation Effects Conference Short Course on Applying Computer Simulation Tools to Radiation Effects Problems. Part A discusses the physical phenomena modeled in radiation transport codes and various types of algorithmic implementations. Part B gives examples of how these codes can be used to design experiments whose results can be easily analyzed and describes how to calculate quantities of interest for electronic devices

  4. On the definition of Transnational Corporations in a UN Code of Conduct

    OpenAIRE

    Schetting, Gerd

    1980-01-01

    The UN Commission on Transnational Corporations which was appointed by ECOSOC will have its next meeting in May. An Intergovernmental Working Group will have held ten sessions by then and present a draft Code of Conduct dealing with transnational corporations. (For a review of the state of preparations for this Code see the article by Hartmut Scheele in INTERECONOMICS No. 6/1979). The Commission itself and the Working Group have dealt more than once with the question to which enterprises the ...

  5. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  6. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  7. Parallel computing in the PRIZMA code

    International Nuclear Information System (INIS)

    PRIZMA code is a Monte-Carlo code dedicated to radiation transport. The paper describes parallelization and load balance algorithms implemented in the PRIZMA code. The parallelization algorithm described aims to maximally separate batch calculation and calculated results collection at minimal wastage. The algorithm implements a two-level procedure to collect calculated results. As often as specified, calculation results accumulated by processes of the same node are summed using shared memory. Current random numbers are also saved. Then we do inter-node summation of results on the process of rank 0 with the MPI-Reduce function. Random numbers are collected with the MPI-Gather function. All this is done using a separate thread on each node and hence does not require main computations to stop. After calculated results and random numbers have been collected, the threads inactively sleep till next saving session. So, calculated data collection and saving does not interfere with main computations and consumes almost no CPU time. Routine calculations demonstrate a rather high parallelization efficiency which is no lower than 99.99 per cent

  8. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  9. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven...

  10. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  11. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  12. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  13. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  14. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  15. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  16. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  17. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model. The...... model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  18. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. PMID:21546315

  19. Y-Notes; Introductory Sessions on Nuclear Technology

    International Nuclear Information System (INIS)

    This chapter is divided into next parts: What is 'Y-Notes; Young generation opening session; Nuclear education and transfer of know-how; Nuclear technology; Other applications of nuclear technology; Nuclear programs and technical cooperation; Political aspects; Environment and safety; Communication and public perception; Economics; Fuel cycle challenges; Video

  20. Society for melanoma research and american heart association scientific sessions.

    Science.gov (United States)

    Alexander, Walter

    2015-01-01

    Among the featured topics: oncolytic immunotherapy, BRAF/MEK inhibition, and a programmed death-1 inhibitor at the Society for Melanoma Research; and anticoagulation therapy, an alternative to statins, and endocarditis in the absence of dental antibiotic prophylaxis at the American Heart Association Scientific Sessions. PMID:25628510

  1. Factors Influencing Consent to Having Videotaped Mental Health Sessions

    Science.gov (United States)

    Ko, Kenton; Goebert, Deborah

    2011-01-01

    Objective: The authors critically reviewed the literature regarding factors influencing consent to having videotaped mental health sessions. Methods: The authors searched the literature in PubMed, PsycINFO, Google Scholar, and Web of Science from the mid-1950s through February 2009. Results: The authors identified 27 studies, of which 19 (73%)…

  2. Kinematics of ankle taping after a training session.

    Science.gov (United States)

    Meana, M; Alegre, L M; Elvira, J L L; Aguado, X

    2008-01-01

    This study aimed to test the effectiveness of ankle taping on the limitation of forced supination during a change of direction, as well as the losses of effectiveness after a 30-minute training session. Fifteen young men with no ankle injury volunteered for the study. The static and dynamic ranges of movement (ROM) were measured before and after a training session. The dynamic measurements were recorded using high-speed 3D photogrammetry. The differences between static and dynamic measures of ankle supination and plantar flexion were significant. The losses of effectiveness during supination and ankle plantar flexion restriction were 42.3 % and 47.6 %, respectively. Ankle taping was effective in restricting the maximal static ROMs before a training session, but the effectiveness decreased after 30 min of training. The present study shows the necessity of performing dynamic ROM analysis of sports techniques involved in the ankle sprain mechanism in order to determine the degree of tape restriction after a training session, because there were differences between static and dynamic ankle ROMs. The lack of effects on the restriction of the dynamic plantar flexion would bring into question the necessity of ankle taping in subjects without previous injuries. PMID:17614032

  3. 78 FR 45494 - Plant Breeding Listening Session meeting

    Science.gov (United States)

    2013-07-29

    ... breeding and cultivar development stakeholders. DATES: The Plant Breeding Listening Session will be held... discuss their plant breeding and cultivar development programs and/or their perception of needs and potential improvements in publicly-funded plant breeding and cultivar development research. Following...

  4. Video Traffic Flow Analysis in Distributed System during Interactive Session

    Directory of Open Access Journals (Sweden)

    Soumen Kanrar

    2016-01-01

    Full Text Available Cost effective, smooth multimedia streaming to the remote customer through the distributed “video on demand” architecture is the most challenging research issue over the decade. The hierarchical system design is used for distributed network to satisfy more requesting users. The distributed hierarchical network system contains all the local and remote storage multimedia servers. The hierarchical network system is used to provide continuous availability of the data stream to the requesting customer. In this work, we propose a novel data stream that handles the methodology for reducing the connection failure and smooth multimedia stream delivery to the remote customer. The proposed session based single-user bandwidth requirement model presents the bandwidth requirement for any interactive session like pause, move slowly, rewind, skip some of the frame, and move fast with some constant number of frames. The proposed session based optimum storage finding algorithm reduces the search hop count towards the remote storage-data server. The modeling and simulation result shows the better impact over the distributed system architecture. This work presents the novel bandwidth requirement model at the interactive session and gives the trade-off in communication and storage costs for different system resource configurations.

  5. Setting the Standards for Sessional Staff: Quality Learning and Teaching

    Science.gov (United States)

    Harvey, Marina

    2013-01-01

    Across the Australian Higher Education sector a focus on quality is driving a new paradigm for learning and teaching: quality standards. One challenge is to engage all academics with this progress towards systematic quality enhancement and assurance. Sessional staff, who provide most of the face-to-face teaching in Australian universities, remain…

  6. INC93: international nuclear congress. Technical sessions summaries

    International Nuclear Information System (INIS)

    The conference dealt mainly with safety, environmental and human aspects of nuclear energy, including waste management. This volume consists of summaries of the technical sessions contained in Volumes 2 and 3. The individual papers have also been abstracted separately for INIS, with the summaries abridged

  7. Our Place in the Universe. Session 1; History of Astronomy

    Science.gov (United States)

    Adams, Mitzi

    2016-01-01

    This session includes a very broad overview of a couple of the major ideas of astronomy, along with demonstrations of Earth's motions that, give rise to the seasons, show us the "faces" of Venus (and the Moon), and result in retrograde motion of the outer planets.

  8. Summary of session 3 on synchrotron radiation and beam dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Shiltsev, V.; /Fermilab; Metral, E.; /CERN

    2010-12-01

    We summarize presentations, discussions and general conclusions of the Workshop session on 'Beam Dynamics Issues'. Major subjects include effects due to synchrotron radiation (SR), cryogenic loads, electron cloud, impedances, intra-beam scattering (IBS) and beam-beam interactions.

  9. Implementing Problem-Based Learning in the Counseling Session.

    Science.gov (United States)

    Hall, Kimberly R.

    This study examined the use of problem-based learning (PBL) in an actual counseling session and the effects on student assertiveness skills. A group of seventh-grade students, who were all victims of bullies, participated in the study. The students, two boys and one girls, were 13 and 14 years old. Teachers rated the level of assertiveness skills…

  10. Commentary on session II: The politics of migration and trade

    OpenAIRE

    Freeman, Gary P.

    2006-01-01

    Summary and discussion of the two papers in this session: "U.S.-Mexican migration cooperation: obstacles and opportunities" by Marc R. Rosenblum; "Political implications of U.S. public attitudes toward immigration on the immigration policymaking process" by Valerie F. Hunt

  11. IOC session report, July 2001, Moscow: Salt Lake 2002

    OpenAIRE

    2014-01-01

    The Salt Lake Organizing Committee (SLOC) is pleased to present the July 2001 progress report of the XIX Olympic Winter Games. This report, presented to the 112th International O lympic Committee (IOC) Session meeting in Moscow, details the progress of SLOC since September 2000.

  12. 76 FR 41278 - Cargo Security Risk Reduction; Public Listening Sessions

    Science.gov (United States)

    2011-07-13

    .... These security risks can be reduced through sound risk management and shared responsibility between.... Please note that the session may adjourn early if all business, concerns, and questions are addressed... Activities (CG-544) Web site at http://www.uscg.mil/hq/cg5/cg544/cdc.asp or the Federal Docket...

  13. Measuring TPACK... Yes! But how? A working session

    NARCIS (Netherlands)

    P. Fisser; L. Ervin; J. Voogt; M. Koehler

    2014-01-01

    Many instruments are being developed within the international TPACK community. This roundtable session would serve as an opportunity to begin the dialogue necessary to the creation of an instrument that pulls together lessons learned from previous research and assessment design principles. We will f

  14. PBL. Linguistics Collage Rubric (practical sessions) - 31710 General Linguistics I

    OpenAIRE

    Muñoz Baell, Irma María

    2012-01-01

    Project Based Learning (PBL). Creating your own Linguistics Collage. Linguistics Collage Rubric (Four-point review) – Weeks 13-15 (In-class work) - Academic year 2011-2012 (ECTS credits: 6 (150 hours)). See the Planned Weekly Schedule (Practical sessions).

  15. Attitudes of Healthcare Students on Gross Anatomy Laboratory Sessions

    Science.gov (United States)

    Kawashiro, Yukiko; Anahara, Reiko; Kohno, Toshihiko; Mori, Chisato; Matsuno, Yoshiharu

    2009-01-01

    At Chiba University, gross anatomy laboratory sessions ("laboratories") are required for physical therapy students. Though most physical therapy schools require their students to participate in laboratories so that they will better understand the structure of the human body, few data exist on the value of these laboratories specifically for…

  16. Hypnosis and Smoking: A Five-Session Approach.

    Science.gov (United States)

    Watkins, Helen H.

    An active five-session, individualized treatment approach to the stopping of smoking is described. This approach emphasized the following: (a) the feedback, in and out of hypnosis, of the client's own reasons for quitting, (b) the visualization of both positive and negative smoking experiences meaningful to the client, (c) maintaining contact with…

  17. "Where Are We Going? Mini Sessions on Maxi Concerns."

    Science.gov (United States)

    Eastern Association for Physical Education of College Women, Albany, NY.

    The proceedings of the fall conference of the Eastern Association for Physical Education of College Women includes articles and overviews of mini-sessions. In "Journey Proud," Celeste Ulrich provides observations about human interaction, teaching/learning environments, techniques and methods, and administrative patterns and scholarship. In…

  18. Discussion summary of session 4: strategy for 2012 (part II)

    International Nuclear Information System (INIS)

    The fourth session of the 2012 LHC Performance Workshop included the following topics: -) beam Energy (it was decided to step back in energy from 4 TeV to 3.5 TeV in case of excessive number of quenches), -) optics options, -) collimation settings and performance, -) performance reach in the LHC for 2012, -) MD plans in 2012, and -) Ions in 2012

  19. Special Session 4: Astronomy Education between Past and Future

    Science.gov (United States)

    de Greve, Jean-Pierre

    2010-11-01

    The special session aims at discussing an integrated approach of the different efforts to increase and promote the teaching and learning of astronomy in the world, with emphasis on developing countries. To this end, attention will be given to research on education, specifically in the field of physics, to best practices of the use of astronomy in educational systems (specifically in developing countries), and to innovative learning initiatives other than formal education. The Special Session aims also at creating a universal perspective wherein modern (post-Copernican) astronomy will presented as an intellectual cumulus. The objective of the session is to disseminate best practices in teaching and learning activities of astronomy and to give an opportunity to learn about initiatives in different cultural and socio-economic settings. The special session also wants to give food-for-thought and proposals for reflection for an integrative approach, and for optimization processes, to enhance the interest in astronomy and its role as a trigger towards science education in the educational systems, with emphasis on the developing countries. The outcome should be a sensitization of teachers and students alike to the concept of a universal history of astronomy and creation of some reliable source material which can be used as a teaching aid in a culture-specific context. The outcome could be a set of recommendations for future integrated actions, and eventually recommendations on new initiatives, framed into the new decadal policy plan.

  20. Session-Based Programming for Parallel Algorithms: Expressiveness and Performance

    Directory of Open Access Journals (Sweden)

    Andi Bejleri

    2010-02-01

    Full Text Available This paper investigates session programming and typing of benchmark examples to compare productivity, safety and performance with other communications programming languages. Parallel algorithms are used to examine the above aspects due to their extensive use of message passing for interaction, and their increasing prominence in algorithmic research with the rising availability of hardware resources such as multicore machines and clusters. We contribute new benchmark results for SJ, an extension of Java for type-safe, binary session programming, against MPJ Express, a Java messaging system based on the MPI standard. In conclusion, we observe that (1 despite rich libraries and functionality, MPI remains a low-level API, and can suffer from commonly perceived disadvantages of explicit message passing such as deadlocks and unexpected message types, and (2 the benefits of high-level session abstraction, which has significant impact on program structure to improve readability and reliability, and session type-safety can greatly facilitate the task of communications programming whilst retaining competitive performance.

  1. Functions of Arabic-English Code-Switching: Sociolinguistic Insights from a Study Abroad Program

    Science.gov (United States)

    Al Masaeed, Khaled

    2013-01-01

    This sociolinguistic study examines the functions and motivations of code-switching, which is used here to mean the use of more than one language in the same conversation. The conversations studied here take place in a very particular context: one-on-one speaking sessions in a study abroad program in Morocco where English is the L1 and Arabic the…

  2. Multipath Routing of Multiple Description Coded Images in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    徐缓缓; 朱策; 虞露

    2014-01-01

    Multiple description coding (MDC) generates multiple decodable bitstreams for a source to combat informa-tion loss. In this paper, multipath routing problem for two-description coded images is investigated for traditional and coded wireless networks without and with coding capability at intermediate nodes, respectively. Firstly, we formulate an interference-aware MDC multipath routing for traditional networks by employing a time-division link scheduling method to eliminate wireless interference, and ultimately obtain an optimal path selection corresponding to the minimum achievable distortion. Secondly, for coded networks, we evaluate practical wireless network coding (NC) in delivering descriptions of multiple unicast sessions. While NC increases maximum supporting flow rate of MDC descriptions in wireless networks, possible undecodability of NC mixed information is alleviated by MDC. To minimize achievable distortion, a proposed interference-and-coding-aware MDC multipath routing strikes a good balance between minimizing side effect of wireless interference avoidance and maximizing NC opportunity. Simulation results validate the effectiveness of the two proposed schemes.

  3. Cue-responding behaviors during pharmacy counseling sessions with patients with asthma about inhaled corticosteroids: Potential relations with medication beliefs and self-reported adherence.

    OpenAIRE

    Driesenaar, J.A.; de Smet, P A G M; Van Hulten, R; Noordman, J.; van Dulmen, A M

    2016-01-01

    The aim of this study was to examine cue-responding behavior at the pharmacy while counseling about inhaled corticosteroids (ICS) in relation to medication adherence and medication beliefs. Patients with asthma aged ≥18 years using ICS were recruited from 12 pharmacies. Counseling sessions were video-recorded. Patients' emotional and informational cues and pharmacists' and pharmacy technicians' cue-responding behaviors were coded using an expanded version of the Medical Interview Aural Rating...

  4. Practical session assessments in human anatomy: Weightings and performance.

    Science.gov (United States)

    McDonald, Aaron C; Chan, Siew-Pang; Schuijers, Johannes A

    2016-07-01

    Assessment weighting within a given module can be a motivating factor for students when deciding on their commitment level and time given to study a specific topic. In this study, an analysis of assessment performances of second year anatomy students was performed over four years to determine if (1) students performed better when a higher weighting was given to a set of practical session assessments and (2) whether an improved performance in the practical session assessments had a carry-over effect on other assessment tasks within that anatomy module and/or other anatomy modules that follow. Results showed that increasing the weighting of practical session assessments improved the average mark in that assessment and also improved the percentage of students passing that assessment. Further, it significantly improved performance in the written end-semester examination within the same module and had a carry-over effect on the anatomy module taught in the next teaching period, as students performed better in subsequent practical session assessments as well as subsequent end-semester examinations. It was concluded that the weighting of assessments had significant influences on a student's performance in that, and subsequent, assessments. It is postulated that practical session assessments, designed to develop deep learning skills in anatomy, improved efficacy in student performance in assessments undertaken in that and subsequent anatomy modules when the weighting of these assessments was greater. These deep learning skills were also transferable to other methods of assessing anatomy. Anat Sci Educ 9: 330-336. © 2015 American Association of Anatomists. PMID:26580309

  5. Early in-session predictors of response to trauma-focused cognitive therapy for posttraumatic stress disorder.

    Science.gov (United States)

    Brady, Francesca; Warnock-Parkes, Emma; Barker, Chris; Ehlers, Anke

    2015-12-01

    Trauma-focused cognitive behaviour therapy is effective in treating posttraumatic stress disorder but non-response rates range between 25% and 50%. Results of previous research on patient characteristics predicting outcome are inconsistent and mainly focused on demographic and diagnostic variables. This study examined whether behavioural predictors of poor treatment response can be observed in early sessions. It was predicted that greater patient perseveration, lower expression of thoughts and feelings and weaker therapeutic alliance would be associated with poorer outcomes. We also explored the relationships of patient behaviours with therapeutic alliance and the efficiency and competence of treatment delivery. Audio or video recordings of the initial treatment sessions of 58 patients who had shown either good (n = 34) or poor response (n = 24) to cognitive therapy for PTSD (CT-PTSD, Ehlers & Clark, 2000) were blindly coded for patient perseveration, expression of thoughts and feelings, therapeutic alliance, efficiency and competency of treatment delivery and therapist competence. Poor responders showed more perseveration and less expression of thoughts and feelings in the initial session. Patient perseveration and low expression of thoughts and feelings were associated with poorer therapeutic alliance and compromised treatment delivery. Patients with these behavioural characteristics may benefit from additional treatment strategies. Limitations of the study and implications for clinical practice are discussed. PMID:26523887

  6. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  7. Breakout Session A: Safety Issues. Report from breakout session and discussion on safety issues

    International Nuclear Information System (INIS)

    The first issue discussed during the breakout session on safety aspects of accident-tolerant fuels was the objective that must be assigned to the development of such concepts. The first goal should be to avoid, or at least limit, the release of radioactive materials into the environment in case of an accident. This implies that severe accidents (core melt) situations must be avoided. To reach this goal, the core geometry must remain coolable, even for accident scenarios worse than what current fuel designs are able to sustain. There was a consensus that the station blackout (SBO) is a good reference transient to evaluate the potential benefits from new, more robust, fuel designs. With respect to the present situation, the merits of new designs can be analysed with respect to three figures: - the 'grace period', i.e. the additional amount of time before the onset of core melt, during which more recovery actions can be made; - the amount of combustible gases produced; - the amount of radioactive materials released. It is important to note that those three values are not independent from one another. They may be understood as three different ways to measure the improvements arising from accident tolerant fuels. The notion of 'grace period' was discussed and it was suggested that it should be compared to the amount of time needed to switch from normal operation to accident management type of procedures. The participants agreed that the 'grace period' should be counted in hours (or even days but the realism of this last goal was questioned). In other words, there was a consensus that a 'grace period' of some minutes is pointless and definitely not worth the effort of developing and characterising the behaviour of new concepts. Although the purpose of accident-tolerant fuel development is to improve the core robustness in design basis accidents (DBA) and situations somewhat beyond like SBO, it was recognised that new concepts must

  8. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  9. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  10. Organizing conceptual knowledge in humans with a gridlike code.

    Science.gov (United States)

    Constantinescu, Alexandra O; O'Reilly, Jill X; Behrens, Timothy E J

    2016-06-17

    It has been hypothesized that the brain organizes concepts into a mental map, allowing conceptual relationships to be navigated in a manner similar to that of space. Grid cells use a hexagonally symmetric code to organize spatial representations and are the likely source of a precise hexagonal symmetry in the functional magnetic resonance imaging signal. Humans navigating conceptual two-dimensional knowledge showed the same hexagonal signal in a set of brain regions markedly similar to those activated during spatial navigation. This gridlike signal is consistent across sessions acquired within an hour and more than a week apart. Our findings suggest that global relational codes may be used to organize nonspatial conceptual representations and that these codes may have a hexagonal gridlike pattern when conceptual knowledge is laid out in two continuous dimensions. PMID:27313047

  11. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  12. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  13. Speaking In Code

    OpenAIRE

    Croxall, Brian

    2014-01-01

    Brian Croxall Emory University Over the last five years, there have been countless articles written about the digital humanities. It’s been called both the savior and the death knell of scholarship in the twenty-first century. But what do we mean when we say “digital humanities”? How “digital” and how “humanities” need we be? Why is so much faith being placed in code and code words? In this presentation, Brian Croxall argues that digital humanists need to speak in code less frequently and tha...

  14. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  15. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  16. Enigma fuel performance code

    International Nuclear Information System (INIS)

    The Enigma fuel performance code has been developed jointly by BNFL and the CEGB's Berkeley Nuclear Laboratories. Its development arose from the need for a code capable of analysing all aspects of light water reactor (LWR) fuel behaviour which would also provide a suitable framework for future submodel development. The submodels incorporated into Enigma reflect the significant progress which has been made in recent years in modelling the important physical processes which determine fuel behaviour. The Enigma code has been subjected to an extensive programme of validation which has demonstrated its suitability for LWR performance analysis. (author)

  17. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  18. FORTRAN code-evaluation system

    Science.gov (United States)

    Capps, J. D.; Kleir, R.

    1977-01-01

    Automated code evaluation system can be used to detect coding errors and unsound coding practices in any ANSI FORTRAN IV source code before they can cause execution-time malfunctions. System concentrates on acceptable FORTRAN code features which are likely to produce undesirable results.

  19. Managing Widely Disparate Code Bases Through Automation of Continuous Integration and Deployment

    Science.gov (United States)

    McLaughlin, B. D.; Joshi, T.

    2013-12-01

    NASA EOSDIS tools, services, and service endpoints are widely dispersed across different sub-agencies and sub-organizations. Each of these entities has a different set of skills and widely varying codebases. Some produce sophisticated, well-tested, stable and deployable code, while others are struggling to meet stringent requirements with limited resources. This disparity makes the process of partnering with and deploying code onto the Earthdata platform (https://earthdata.nasa.gov) difficult, even at times impossible. The Earthdata Code Collaborative (ECC) is a project repository and code hosting facility that addresses this problem directly through a three-tiered approach: 1. Provide a standardized set of testing and automation tools for all hosted projects. 2. Regularly report on bugs and features as well as testing coverage and success through Web-based tools. 3. Directly pipeline projects from the ECC into the Earthdata production environment. This session will explain the architecture behind the ECC, including the custom software and 3rd party tools used. It will also detail the process by which decisions were and are being made to arrive at a fully-automated suite of tools and tests that allow any code base to quickly improve its quality and become a candidate for Earthdata inclusion. The session is oriented towards developers, managers, and team members involved in the process of developing, testing, deploying, and ensuring the quality of a code base, whether that code base be tens of millions of lines of code or simply hundreds.

  20. No More Perfect Codes: Classification of Perfect Quantum Codes

    OpenAIRE

    Li, Zhuo; Xing, Lijuan

    2009-01-01

    We solve the problem of the classification of perfect quantum codes. We prove that the only nontrivial perfect quantum codes are those with the parameters . There exist no other nontrivial perfect quantum codes.

  1. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  2. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  3. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  4. Induction technology optimization code

    International Nuclear Information System (INIS)

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  5. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  6. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  7. The moment code BEDLAM

    Energy Technology Data Exchange (ETDEWEB)

    Channell, P.J.; Healy, L.M.; Lysenko, W.P.

    1985-10-01

    This paper describes the status of BEDLAM and presents the results of some tests. We simulated a section of radio-frequency quadrupole (RFQ) linac, neglecting space charge, to test the new code. Agreement with a Particle-In-Cell (PIC) simulation was excellent. We also verified that the fourth-order solution is more accurate than the second-order solution, which indicates the convergence of the method. We believe these results justify the continued development of moment simulation codes.

  8. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  9. Towards advanced code simulators

    International Nuclear Information System (INIS)

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  10. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  11. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  12. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  13. Verbal expressions used by anaclitic and introjective patients with depressive symptomatology: Analysis of change and stuck episodes within therapeutic sessions

    Directory of Open Access Journals (Sweden)

    Nelson Valdés

    2015-01-01

    Full Text Available A person’s speech makes it possible to identify significant indicators which reflect certain characteristics of his/her personality organization, but also can vary depending on the relevance of specific moments of the session and the symptoms type. The present study analyzed 10 completed and successful therapeutic processes using a mixed methodology. The therapies were video–and audio-taped, as well as observed through a one-way mirror by trained observers. All the sessions of each therapy were considered (N = 230 in order to identify, delimit, transcribe, and analyze Change Episodes (CEs = 24 and Stuck Episodes (SEs = 26. Each episode was made up by patients’ speech segments (N = 1,282, which were considered as the sampling unit. The Therapeutic Activity Coding System (TACS-1.0 was used to manually code each patient’s verbalizations, nested within episodes and individuals, in order to analyze them using Hierarchical Linear Modelling (HLM. The findings suggest that anaclitic patients tend to use more verbalizations in order to ask for feedback or to be understood by their therapists (attune, whereas introjective patients tend to use more verbalizations in order to construct new meanings (resignify during therapeutic conversation, but especially during SEs. Clinical implications to enrich the therapeutic practice are discussed.

  14. SUMMARY OF GENERAL WORKING GROUP A+B+D: CODES BENCHMARKING.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.; SHAPOSHNIKOVA, E.; ZIMMERMANN, F.; HOFMANN, I.

    2006-05-29

    Computer simulation is an indispensable tool in assisting the design, construction, and operation of accelerators. In particular, computer simulation complements analytical theories and experimental observations in understanding beam dynamics in accelerators. The ultimate function of computer simulation is to study mechanisms that limit the performance of frontier accelerators. There are four goals for the benchmarking of computer simulation codes, namely debugging, validation, comparison and verification: (1) Debugging--codes should calculate what they are supposed to calculate; (2) Validation--results generated by the codes should agree with established analytical results for specific cases; (3) Comparison--results from two sets of codes should agree with each other if the models used are the same; and (4) Verification--results from the codes should agree with experimental measurements. This is the summary of the joint session among working groups A, B, and D of the HI32006 Workshop on computer codes benchmarking.

  15. The Live Coding of Slub - Art Oriented Programming as Media Critique

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    sessions is much more than mere mechanic performance. The paper will explain how code itself is staged as performative language (interchanging data and process) and further focus on the performance of code before an audience. Arguing that the performance excludes the audience (esoteric code), the paper......Computer art is often associated with computer-generated expressions (digital audio/images in music, video, stage design, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated code, etc.). This paper will......'s materiality/text. (Cramer 2003) The paper will then propose that object of art oriented programming – in an avant-garde perspective – must be to recuperate an interchangeability of data and processing. How? The particularity of Live Coding does not rely on the magical expression – but nor does it rely on the...

  16. PEAR code review

    International Nuclear Information System (INIS)

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  17. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  18. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  19. New residential construction compliance: Evaluation of the Washington State Energy Code program

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, W.M.; Lee, A.D.; Sandahl, L.J.; Durfee, D.L.; Richman, E.E.

    1993-07-01

    This report describes the Pacific Northwest Laboratory`s (PNL`s) evaluation of the Washington State Energy Code Program (WSECP). In 1990, the Washington State Legislature passed a residential energy efficiency code to be effective July 1, 1992. Bonneville supported passage and implementation of the code to ensure that new residences in the State of Washington were as energy efficient as economically feasible. The Washington State Energy Office (WSEO) is conducting the WSECP for Bonneville to support code implementation. This support takes several forms, including providing training to code enforcement officials, technical support both in the field and through telephone ``hot lines,`` and computerized tools to review house plans for code compliance. WSEO began implementing the WSECP in 1992, prior to the effective date of the new code. This first phase of the WSECP was the subject of an earlier process evaluation conducted by PNL. From that evaluation PNL found that most new homes being built immediately after the code went into effect were ``grand-fathered`` under the old code. The training program for the new code was in place and sessions were being attended by the jurisdictions but it was too early to determine if the training was effective in improving code compliance and easing the transition to the new energy code. That is the subject of this evaluation.

  20. Session: Avoiding, minimizing, and mitigating avian and bat impacts

    International Nuclear Information System (INIS)

    This session at the Wind Energy and Birds/Bats workshop consisted of two presentations followed by a discussion/question answer period. The session addressed a variety of questions related to avoiding, minimizing, and mitigating the avian and bat impacts of wind power development including: what has been learned from operating turbines and mitigating impacts where they are unavoidable, such as at Altamont Pass WRA, and should there be mitigation measures such as habitat creation or land conservation where impacts occur. Other impact minimization and mitigation approaches discussed included: location and siting evaluations; options for construction and operation of wind facilities; turbine lighting; and the physical alignment/orientation. Titles and authors of the presentations were: 'Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part II' by Carl Thelander and 'Prevention and Mitigation of Avian Impacts at Wind Power Facilities' by Paul Kerlinger

  1. Hilbert Matrix Based Cryptosystem using a Session Key

    CERN Document Server

    Raja, Penmetsa V Krishna; Avadhani, P S

    2011-01-01

    Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. The objectives of the proposed work are to propose a new cryptographic method based on the special matrix called the Hilbert matrix for authentication and confidentiality and to propose a model for confidentiality and authentication using shared key cryptosystems with the concept of digital enveloping using a session key. In the present work various algorithms are presented for encryption and authentication based on Hilbert matrix using a session key.

  2. 1979 New Mexico legislative session: energy issues and legislation

    International Nuclear Information System (INIS)

    This report is an account of the energy legislation and associated issues considered during the 1979 session of the 34th New Mexico Legislature. The session's major issue was the federal study of a proposed nuclear Waste Isolation Pilot Plant (WIPP) in New Mexico. A large proportion of time and effort was spent on resolving the state's formal position toward the federal project. However, other energy concerns were also significant even though they were neither as controversial nor as visible as the primary issue. The two most important laws enacted were the Radioactive Waste Consultation Act and the Radioactive Waste Transportation Act. The Legislature considered 47 other energy-related bills, of which 17 were enacted

  3. Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation

    CERN Document Server

    Shen, Charles; Nahum, Erich

    2008-01-01

    A Session Initiation Protocol (SIP) server may be overloaded by emergency-induced call volume, ``American Idol'' style flash crowd effects or denial of service attacks. The SIP server overload problem is interesting especially because the costs of serving or rejecting a SIP session can be similar. For this reason, the built-in SIP overload control mechanism based on generating rejection messages cannot prevent the server from entering congestion collapse under heavy load. The SIP overload problem calls for a pushback control solution in which the potentially overloaded receiving server may notify its upstream sending servers to have them send only the amount of load within the receiving server's processing capacity. The pushback framework can be achieved by either a rate-based feedback or a window-based feedback. The centerpiece of the feedback mechanism is the algorithm used to generate load regulation information. We propose three new window-based feedback algorithms and evaluate them together with two exis...

  4. Reporting session of UWTF operation. Compilation of documents

    Energy Technology Data Exchange (ETDEWEB)

    Shimizu, Kaoru; Togashi, Akio; Irinouchi, Shigenori [Japan Nuclear Cycle Development Inst., Tokai, Ibaraki (JP). Tokai Works] (and others)

    1999-07-01

    This is the compilation of the papers and OHP transparencies presented, as well as discussions and comments, on the occasion of UWTF reporting session. UWTF stands for The Second Uranium Waste Treatment Facility, which was constructed for compression of metallic wastes and used filters, which are parts of uranium bearing solid wastes generated from Tokai Works, Japan Nuclear Cycle Development Institute. UWTF has been processing wastes since June 4 1998. In the session, based on the one year experience of UWTF operation, the difficulties met and the suggestions to the waste sources are mainly discussed. A brief summary of the UWTF construction, description of waste treatment process, and operation report of fiscal year 1998 are attached. (A. Yamamoto)

  5. Type systems for distributed programs components and sessions

    CERN Document Server

    Dardha, Ornela

    2016-01-01

    In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. In particular, static analysis techniques based on types and type systems are an adequate methodology considering their success in guaranteeing not only basic safety properties, but also more sophisticated ones like deadlock or lock freedom in concurrent settings. The main contributions of this book are twofold. i) We design a type system for a concurrent object-oriented calculus to statically ensure consistency of dynamic reconfigurations. ii) We define an encoding of the session pi-calculus, which models communication in distributed systems, into the standard typed pi-calculus. We use this encoding to derive properties like type safety and progress in the session pi-calculus by exploiting the corresponding properties in the standard typed pi-calculus.

  6. 1979 New Mexico legislative session: energy issues and legislation. [WIPP

    Energy Technology Data Exchange (ETDEWEB)

    Barsumian, L.; Vandevender, S.G.

    1979-10-01

    This report is an account of the energy legislation and associated issues considered during the 1979 session of the 34th New Mexico Legislature. The session's major issue was the federal study of a proposed nuclear Waste Isolation Pilot Plant (WIPP) in New Mexico. A large proportion of time and effort was spent on resolving the state's formal position toward the federal project. However, other energy concerns were also significant even though they were neither as controversial nor as visible as the primary issue. The two most important laws enacted were the Radioactive Waste Consultation Act and the Radioactive Waste Transportation Act. The Legislature considered 47 other energy-related bills, of which 17 were enacted.

  7. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  8. Checking Session-Oriented Interactions between Web Services

    Czech Academy of Sciences Publication Activity Database

    Parízek, P.; Adámek, Jiří

    Los Alamitos: IEEE Computer Society, 2008, s. 3-10. ISBN 978-0-7695-3276-9. [SEAA 2008. EUROMICRO Conference on Software Engineering and Advanced Applications /34./. Parma (IT), 03.09.2008-05.09.2008] R&D Projects: GA AV ČR 1ET400300504 Institutional research plan: CEZ:AV0Z10300504 Keywords : web services * BPEL * session-oriented interactions * behavior protocols * model checking Subject RIV: JC - Computer Hardware ; Software

  9. Resources for Education and Outreach Activities discussion session

    CERN Document Server

    Barney, David; The ATLAS collaboration; Bourdarios, Claire; Kobel, Michael; Kourkoumelis, Christine; Melo, Ivan; Rangel-Smith, Camila; Alexopoulos, Angelos

    2015-01-01

    Over the past few years a variety of resources have been developed, by individuals and groups, to support Education & Outreach activities in particle physics. Following short (five-minute) presentations by six speakers, a discussion session allowed the audience to go further in depth in activities they found particularly interesting. This paper presents brief overviews from each of the six speakers, followed by a summary of the ensuing discussion

  10. Astronomy and Space Technologies, WILGA 2012; EuCARD Sessions

    OpenAIRE

    Romaniuk, R S

    2012-01-01

    Wilga Sessions on HEP experiments, astroparticle physics and accelerator technology were organized under the umbrella of the EU FP7 Project EuCARD – European Coordination for Accelerator Research and Development. This paper is the first part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with photonics and electronics applications in astronomy and space technologies. It presents a digest of chosen technical work results shown by young researchers fro...

  11. An Interactive Session on Nutritional Pathologies for Health Professional Students

    OpenAIRE

    Joshua DeSipio; Sangita Phadtare

    2015-01-01

    Various studies have emphasized the need to improve the nutrition training of health professionals, which will help them to provide optimal patient care. Nutrition-based interactive sessions may serve as an efficient approach to instigate an interest in nutrition among the students. Here we report the reception and effectiveness of a nutrition-pathology based interactive activity that we designed and implemented in the gastroenterology course given to the second year students at our medical s...

  12. An investigation of the differential-outcomes effect within sessions

    OpenAIRE

    Jones, B. Maxwell; White, K. Geoffrey

    1994-01-01

    The differential-outcomes effect is manifest as more accurate performance of a delayed conditional discrimination when alternative choice responses are followed by different reinforcers than when they are followed by the same reinforcer. In Experiment 1, a differential-outcomes effect was demonstrated within sessions by signaling the duration of food access for correct responses with stimuli appearing in conjunction with the sample stimuli. The delayed matching-to-sample performance of 5 pige...

  13. Effects of an Intensive Resistant Training Sessions and Green Tea

    OpenAIRE

    Mohammad Esmaeil Afzalpour; Elham Ghasemi; Asghar ZarbanP

    2014-01-01

    Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity) women were randomly divided into 4 equal (n=10) groups including green tea supplementation, green tea supp...

  14. Session-Based Programming for Parallel Algorithms: Expressiveness and Performance

    OpenAIRE

    Andi Bejleri; Raymond Hu; Nobuko Yoshida

    2010-01-01

    This paper investigates session programming and typing of benchmark examples to compare productivity, safety and performance with other communications programming languages. Parallel algorithms are used to examine the above aspects due to their extensive use of message passing for interaction, and their increasing prominence in algorithmic research with the rising availability of hardware resources such as multicore machines and clusters. We contribute new benchmark results for SJ, an extensi...

  15. Address at the opening session of the Niels Bohr Symposium

    International Nuclear Information System (INIS)

    In his address at the opening session of the Niels Bohr Symposium organized jointly by UNESCO and the Niels Bohr Institute in Copenhagen in May 1998 in order to examine the latest developments in key fields of physics, the Director General of UNESCO presented the scientific work and the spirit of Niels Bohr, emphasizing the impact of his discoveries for new openings in science and in society in general

  16. Analysis and comparison of intensity in specific soccer training sessions

    Directory of Open Access Journals (Sweden)

    Luciano Antonacci Condessa

    2015-03-01

    Full Text Available This study compared the exercise intensity of four specific soccer training sessions (friendly and training match, tactical and technical workouts. Ten professional soccer players (24.2 ± 3.7 years, 177.9 ± 7.3 cm, 63.2 ± 4.6 mLO2•kg-1•min-l were recruited. A treadmill progressive interval test was performed to determine the players' VO2max, maximal heart rate (HRmax, HR-VO2 curve, and the heart rate corresponding to blood lactate concentrations of 2 and 4 mmol/L. The heart rate during the training sessions was used to estimate the exercise intensity and to classify them into intensity zones (low-intensity: 4 mmol/L. Exercise intensities were different among training sessions (friendly match: 86.0 ± 5.1% HRmax; training match: 81.2 ± 4.1% HRmax; tactical workout: 70.4 ± 5.3% HRmax; technical workout: 62.1 ± 3.6% HRmax. The friendly match presented the highest percentage of time performed in the high-intensity zone.

  17. Summary of session 1: 'Advanced fuel cycles and reactor concepts'

    International Nuclear Information System (INIS)

    Full text: During the opening session of the Scientific Forum presentations were made by the IAEA Director General, Mohamed ElBaradei, Mr. Carlo Rubbia from Italy, and by the Chairman of the Scientific Forum, Mr. B. Bigot from France. Mr. A. Kakodkar from India was the moderator of the session The audience included some 180 participants. Four keynote speakers from the UK, Argentina, Japan and India as well as one panelist from the USA contributed to the first session. The highlights can be summarized as follows: Nuclear energy as an emission free energy source is indispensable for sustainable development. The importance of continuous R and D in support of innovative reactors and fuel cycles was stressed. The overall goal for these technologies includes better uranium resource utilization and improved waste management strategies. Moreover, the development of accelerator-driven systems for transmutation and energy production is regarded as an important long-term option. In this respect the closure of the fuel cycle with fast reactors is considered to be essential. In meeting these objectives, a focus on economics, proliferation resistance, and safety is paramount. The transition to innovative nuclear energy systems from current systems must be gradual via a combination of evolutionary and innovative technologies. (author)

  18. The Physics session at the ATLAS overview week

    CERN Multimedia

    Takai, H.

    The Physics session at the ATLAS overview week at Clermont-Ferrand will be certainly remembered by the presentation of Blaise Pascal's historical experiment repeat. And why not? He is the local hero and by the looks of his primitive measurements it does take a lot of guts to explain his results on the basis of air columns. He was also lucky that he did not have to simulate his results on modern day computers but used the Pascaline. Certainly a man ahead of his time. Of course that wasn't all. Surrounded by a chain of (luckily) extinct volcanoes, rolling hills, and superb views, Clermont-Ferrand provided the perfect backdrop for the physics discussions. It was once more seen that the physics of ATLAS is diverse and that it is healthy and doing well. Many people contributed to the success of the session. Fabiola started the session precisely at 14:00 with a summary of the most recent activities from the physics coordination. Somehow what got stuck in my mind was the very positive statistics on how many prese...

  19. Effects of an Intensive Resistant Training Sessions and Green Tea

    Directory of Open Access Journals (Sweden)

    Mohammad Esmaeil Afzalpour

    2014-03-01

    Full Text Available Background: Intensive and acute exercise trainings may induce oxidative stress, but antioxidant supplements may attenuate its degenerative consequences. The aim of this research was to examine the effect of green tea supplementation on the oxidative stress indices after an intensive resistance training session. Materials and Methods: 40 non-athletes (without regular physical activity women were randomly divided into 4 equal (n=10 groups including green tea supplementation, green tea supplementation plus resistance training, resistance training, and control groups. After supplementation period (600 mg/day, 14 days, resistance training and green tea supplementation plus resistance training groups performed an intensive resistance training session at 75-85 % of one repetition maximum. The malondialdehyde and total thiol were measured as oxidative stress indices. Data were analyzed by using of repeated measure ANOVA and LSD tests at p<0.056T. Results: Results showed that after 14 days of green tea consumption, malondialdehyde significantly decreased in green tea supplementation (p=0.03 and green tea supplementation plus resistance training (p=0.01 groups, while total thiol increased significantly (p=0.01 in two green tea supplementation groups. However, an intensive resistance training session increased malondialdehyde (p=0.01 without any significantly changes in total thiol (p=0.426T. Conclusion: It seems that green tea supplementation can inhibit exercise-induced protein and lipid oxidation in non-athletes women via enhancement of antioxidant defense system of the body6T.6T

  20. New Session of introductory “E-Groups Training”

    CERN Multimedia

    2013-01-01

    The session provides a short introduction of E-Groups and how to use it to efficiently manage mailing lists at CERN. Alongside a general overview of the E-Groups application, E-Groups specific terminology, the management of dynamic and static groups and the specific settings for mails and archives are discussed in detail.   The course is intended to give newcomers a clear idea of what E-Groups are and how they can be used at CERN. It should enable users to be more efficient when being confronted in particular with: the creation of dynamic and static E-groups and the decision whether the one or the other type is more appropriate, the management of E-group memberships, and the setting of mailing/archiving related properties. The session will also focus on some best practices and give general advice on how to use E-Groups. This introductory training session is given jointly by members of the IT-OIS and GS-AIS groups and is intended for any member at CERN potentially being confronted with the ...

  1. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  2. Mixed Burst Error Correcting Codes

    OpenAIRE

    Sethi, Amita

    2015-01-01

    In this paper, we construct codes which are an improvement on the previously known block wise burst error correcting codes in terms of their error correcting capabilities. Along with different bursts in different sub-blocks, the given codes also correct overlapping bursts of a given length in two consecutive sub-blocks of a code word. Such codes are called mixed burst correcting (mbc) codes.

  3. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  4. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  5. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  6. 76 FR 55732 - Public Listening Sessions Regarding the Maritime Administration's Panama Canal Expansion Study...

    Science.gov (United States)

    2011-09-08

    ... Maritime Administration Public Listening Sessions Regarding the Maritime Administration's Panama Canal Expansion Study and the America's Marine Highway Program AGENCY: Maritime Administration, DOT. ACTION: Notice. SUMMARY: The purpose of this notice is to announce a series of public listening sessions...

  7. 78 FR 22225 - Meeting: African Development Foundation, Board of Directors Executive Session Meeting

    Science.gov (United States)

    2013-04-15

    ...; ] AFRICAN DEVELOPMENT FOUNDATION Board of Directors Executive Session Meeting Meeting: African Development Foundation, Board of Directors Executive Session Meeting Time: Tuesday, April 23, 2013 11:15 a.m. to 2:15...

  8. CERN Technical Training 2006: Office Software Curriculum Scheduled Course Sessions (October-December 2006)

    CERN Multimedia

    2006-01-01

    The Office Software Curriculum of the CERN Technical Training Programme currently offers comprehensive training in Microsoft Office (Word, Excel, Powerpoint, Access, Outlook), MS Project, Frontpage, Dreamweaver, Indesign, LaTeX, and CERN EDMS. There are some places available on the following Microsoft Office 2003 course sessions, currently scheduled until December 2007: EXCEL 2003 - niveau 2 : ECDL - 16-17 October (2 days, session in French) WORD 2003 (Short Course II) - HowTo... Mail merge - 2 November (morning, bilingual session) WORD 2003 (Short Course IV) - HowTo... Work with master document - 2 November (afternoon, bilingual session) OUTLOOK 2003 (Short Course III) - Meetings and Delegation - 3 November (morning, bilingual session) EXCEL 2003 (Short Course IV) - HowTo... Link cells, worksheets and workbooks - 3 November (afternoon, bilingual session) EXCEL 2003 - Level 1: ECDL - 13-14 November (2 days, session in English) ACCESS 2003 - Level 2: ECDL - 5-6 December (2 days, session in English) The abo...

  9. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  10. Transparent consumption of Digital Items between terminals using MPEG-21 Session Mobility

    OpenAIRE

    Soma, Cecilie Warland

    2007-01-01

    There is an augmented use of multimedia applications for communication, information access and entertainment. Furthermore, a wide set of devices has become capable of consuming multimedia. This has created a need for Users to easily and transparently switch between these devices. Session mobility is a concept that aims at enabling seamless switching between terminals during a session. It involves capturing and transferring of session information, and finally reconstruction of the session at...

  11. Performance evaluation of WLAN for mutual interaction between unicast and multicast communication sessions

    OpenAIRE

    Mahmood, Aamir

    2008-01-01

    In this Thesis, performance evaluation of wireless local area networks (WLANs) is conducted to understand the effects of mutual interaction between real-time unicast and multicast communication sessions. The analysis extends the performance evaluation of WLAN from the isolated study of unicast or multicast sessions to their mutual interaction. The nature of multicast session is VoIP, whereas the unicast sessions are VoIP and a single video flow. The performance of unicast and multicast se...

  12. The Aster code

    International Nuclear Information System (INIS)

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  13. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  14. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  15. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  16. Development, psychometric properties and preliminary clinical validation of a brief, session-by-session measure of eating disorder cognitions and behaviors: The ED-15.

    OpenAIRE

    Tatham, M.; Turner, H.; Mountford, V.A.; Tritt, A.; Dyas, R.; Waller, G.

    2015-01-01

    OBJECTIVE:  In the treatment research literature on other psychological disorders, there is a move towards session-by-session symptom measurement. The necessary measures need to be brief, focused on core features since the last session, and readily available to clinicians. There is no measure in the eating disorders that meets those criteria. This research reports the development and validation of such a self-report questionnaire. METHOD:  The authors generated and refined a brief set of atti...

  17. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  18. A Comparison of Therapist-Facilitated and Self-Guided Dream Interpretation Sessions.

    Science.gov (United States)

    Heaton, Kristin J.; Hill, Clara E.; Petersen, David A.; Rochlen, Aaron B.; Zack, Jason S.

    1998-01-01

    Volunteer clients (N=25 undergraduate students) reported achieving greater depth, mastery, insight, and other results from therapist-facilitated sessions compared to self-guided sessions. Observer and therapist ratings indicated that therapists adhered to the Hill model of dream interpretation during therapist-facilitated sessions. Implications…

  19. Comparison of Dream Interpretation, Event Interpretation, and Unstructured Sessions in Brief Therapy.

    Science.gov (United States)

    Diemer, Roberta A.; And Others

    1996-01-01

    Twenty-five distressed adult clients received 2 sessions each of dream and event interpretation using the Hill model during 12 sessions of successful therapy. No differences were found in depth, insight, and working alliance among dream interpretation, event interpretation, and unstructured sessions, suggesting that dream interpretation is as…

  20. 77 FR 19666 - Stakeholder Listening Session in Preparation for the 65th World Health Assembly

    Science.gov (United States)

    2012-04-02

    ... HUMAN SERVICES Stakeholder Listening Session in Preparation for the 65th World Health Assembly Time and... the 65th World Health Assembly-- will hold an informal Stakeholder Listening Session on Monday April...., Washington, DC, 20201. The Stakeholder Listening Session will help the HHS's Office of Global Affairs...

  1. 75 FR 32735 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-06-09

    ... Office of the Secretary Notice of the Specialty Crop Committee's Stakeholder Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: In... Agriculture announces a stakeholder listening session of the Specialty Crop Committee, under the auspices...

  2. 75 FR 27536 - Notice of the Specialty Crop Committee's Stakeholder Listening Session

    Science.gov (United States)

    2010-05-17

    ... Office of the Secretary Notice of the Specialty Crop Committee's Stakeholder Listening Session AGENCY: Research, Education, and Economics, USDA. ACTION: Notice of stakeholder listening session. SUMMARY: In... Agriculture announces a stakeholder listening session of the Specialty Crop Committee, under the auspices...

  3. 77 FR 43106 - Tribal Consultation Sessions-Department of the Interior Information Technology Infrastructure...

    Science.gov (United States)

    2012-07-23

    ... Office of the Secretary Tribal Consultation Sessions--Department of the Interior Information Technology... sessions. The purpose of the sessions is to obtain tribal input on the 2012 Information Technology transformation realignment proposal as well as on how Information Technology transformation should be...

  4. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  5. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as...... waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of...

  6. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  7. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  8. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  9. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    , that is, the productivity code of the 21st century, is dissolved. Today, organizations are pressured for operational efficiency, often in terms of productivity, due to increased global competition, demographical changes, and use of natural resources. Taylor’s principles for rationalization founded...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period....... The improvement system consists of five elements: The improvement process, participants, management, organization, and technology. The improvement system is not an organizational structure but rather a capability and readiness to organize the right improvement activities for a given challenge, i...

  10. A modular code supervisor

    International Nuclear Information System (INIS)

    Large industrial computer CEA codes in the field of scientific computing, mechanics, thermohydraulics, and neutronics, are decomposed in sets of separate modules. Each module performs a well-defined task and all information exchanged by the modules are contained in data structures, taken as input or given as output. The advantage of this structure is the great flexibility offered to experienced user to solve a large number of different problems, but to choose, order, monitor large sequences of modules and understand what each module requires as input and output is out of the interest of the common user. The aim is to conserve entirely this flexibility in dealing with knowledge relevant from scientific or technical fields and not from the code itself. The first part of this paper describes the three main steps of the software: specification phase, generating algorithm, translation in code command language. The second part describes how the authors obtain explanations from the modelization of operators and from a particular representation of the internal structure of the generated particular representation of the internal structure of the generated plan (triangular table) that lead to a generalization allowing synthesis of sequences of operators or the transformations of the total order of the generated plan in a partial one. The software is the first part of the modular codes supervisor. It was applied to CRONOS, neutronic reactor core code, which has the command language GIBIANE. It will be extended to the reactor calculations supervisor, SAGA, using the ensemble of the codes developed by CEA/DMT/SERMA

  11. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  12. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  13. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well as...

  14. CONCEPT computer code

    International Nuclear Information System (INIS)

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  15. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  16. Extended quantum color coding

    International Nuclear Information System (INIS)

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only ∼2√(N) quantum colors to order N objects in large N limit, whereas ∼N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix

  17. CPM: Masking code pointers to prevent code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2013-01-01

    Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. This paper reports on two prototype implementations on very distinct processor architec...

  18. Computer codes in nuclear safety, radiation transport and dosimetry

    International Nuclear Information System (INIS)

    The purpose of this conference was to describe the present state of computer codes dedicated to radiation transport or radiation source assessment or dosimetry. The presentations have been parted into 2 sessions: 1) methodology and 2) uses in industrial or medical or research domains. It appears that 2 different calculation strategies are prevailing, both are based on preliminary Monte-Carlo calculations with data storage. First, quick simulations made from a database of particle histories built though a previous Monte-Carlo simulation and secondly, a neuronal approach involving a learning platform generated through a previous Monte-Carlo simulation. This document gathers the slides of the presentations

  19. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  20. Cue-Responding Behaviors During Pharmacy Counseling Sessions With Patients With Asthma About Inhaled Corticosteroids: Potential Relations With Medication Beliefs and Self-Reported Adherence.

    Science.gov (United States)

    Driesenaar, Jeanine A; De Smet, Peter A G M; van Hulten, Rolf; Noordman, Janneke; van Dulmen, Sandra

    2016-10-01

    The aim of this study was to examine cue-responding behavior at the pharmacy while counseling about inhaled corticosteroids (ICS) in relation to medication adherence and medication beliefs. Patients with asthma aged ≥18 years using ICS were recruited from 12 pharmacies. Counseling sessions were video-recorded. Patients' emotional and informational cues and pharmacists' and pharmacy technicians' cue-responding behaviors were coded using an expanded version of the Medical Interview Aural Rating Scale. The Beliefs about Medicines Questionnaire assessed patients' ICS concern and necessity beliefs. Self-reported ICS adherence was measured by four questions. During the 86 sessions, patients expressed on average 2.3, mostly informational, cues (70.8%). In 26.7% of the sessions, no cues were expressed. Pharmacists' and technicians' responses to emotional cues (59.3%) were mostly inadequate, and to informational cues mostly appropriate (63.6%). Providing inappropriate information (20.3%) was related to higher concerns post session (p < .05), and cue exploration to higher self-reported adherence at 3 months (p < .05). Apparently, providers' responses to patients' cues might have therapeutic value. In addition, patients might need to be encouraged to ask questions and express their concerns. PMID:26940701

  1. Higher-order CIS codes

    OpenAIRE

    Carlet, Claude; Freibert, Finley; Guilley, Sylvain; Kiermaier, Michael; Kim, Jon-Lark; Solé, Patrick

    2014-01-01

    We introduce {\\bf complementary information set codes} of higher-order. A binary linear code of length $tk$ and dimension $k$ is called a complementary information set code of order $t$ ($t$-CIS code for short) if it has $t$ pairwise disjoint information sets. The duals of such codes permit to reduce the cost of masking cryptographic algorithms against side-channel attacks. As in the case of codes for error correction, given the length and the dimension of a $t$-CIS code, we look for the high...

  2. 7 years of MacGyver sessions at EGU and AGU: what happened?

    Science.gov (United States)

    Hut, Rolf; Selker, John; Weijs, Steven; Luxemburg, Wim; Wickert, Andy; Blume, Theresa; Bamburger, Jan; Stoof, Cathelijne; Tauro, Flavia

    2016-04-01

    The session that this poster is in, the: "Self-made sensors and unintended use of measurement equipment", also known as the "MacGyver-session" has had 7 years of scientists contributing their self made devices, hacks and solutions with the hydrological community. In 2009, the first session was held at the AGU fall meeting and since 2011 a session is also organised at the EGU General Assembly. On this poster, and in the accompanying review paper, we will present an overview of the work presented in the last 7 years, cataloging the work of the inventive scientists who have contributed to these successful, and above all: fun, sessions.

  3. The experiences of ICU patients during follow-up sessions : A qualitative study

    OpenAIRE

    Haraldsson, Lena; Christensson, Lennart; Conlon, Lisa; Henricson, Maria

    2015-01-01

    Objective Evidence supports the recommendation for follow-up session(s) for patients after discharge from an intensive care unit (ICU). The aim of these follow-up sessions is to allow patients to express and discuss their experiences and problems following their time in an ICU. To optimise the knowledge gained from the follow-up session experience, it is necessary to describe how patients experience these sessions. The aim of this study was to describe how ICU-patients, experience a follow-up...

  4. Document collection of 2009 debriefing session for nuclear cycle backend operation

    International Nuclear Information System (INIS)

    The Debriefing Session for Backend Operation was held by Backend Technology Development Unit of Nuclear Cycle Backend Directorate. The objective is information exchange about current state of technological development in nuclear cycle backend field. In this debriefing session, 15 announcements were made in three sessions, that is, radioactive waste characterization technology, radioactive waste treatment and disposal technology, and decommissioning technology. After debriefing session, poster round-table discussion was held and significant discussion was generated. The debriefing session participants were 82 people in total, and poster round-table discussion participants were 35 people. The present report compiles abstracts and presentation materials submitted by the speakers. (author)

  5. Veronese subspace codes

    OpenAIRE

    Cossidente, Antonio; Pavese, Francesco

    2015-01-01

    Using the correspondence between quadrics of ${\\rm PG}(2,q)$ and points of ${\\rm PG}(5,q)$, a family of $(6,q^3(q^2-1)(q-1)/3+(q^2+1)(q^2+q+1),4;3)_q$ constant dimension subspace codes is constructed.

  6. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  7. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  8. Computer codes in nuclear safety, radiation transport and dosimetry; Les codes de calcul en radioprotection, radiophysique et dosimetrie

    Energy Technology Data Exchange (ETDEWEB)

    Bordy, J.M.; Kodeli, I.; Menard, St.; Bouchet, J.L.; Renard, F.; Martin, E.; Blazy, L.; Voros, S.; Bochud, F.; Laedermann, J.P.; Beaugelin, K.; Makovicka, L.; Quiot, A.; Vermeersch, F.; Roche, H.; Perrin, M.C.; Laye, F.; Bardies, M.; Struelens, L.; Vanhavere, F.; Gschwind, R.; Fernandez, F.; Quesne, B.; Fritsch, P.; Lamart, St.; Crovisier, Ph.; Leservot, A.; Antoni, R.; Huet, Ch.; Thiam, Ch.; Donadille, L.; Monfort, M.; Diop, Ch.; Ricard, M

    2006-07-01

    The purpose of this conference was to describe the present state of computer codes dedicated to radiation transport or radiation source assessment or dosimetry. The presentations have been parted into 2 sessions: 1) methodology and 2) uses in industrial or medical or research domains. It appears that 2 different calculation strategies are prevailing, both are based on preliminary Monte-Carlo calculations with data storage. First, quick simulations made from a database of particle histories built though a previous Monte-Carlo simulation and secondly, a neuronal approach involving a learning platform generated through a previous Monte-Carlo simulation. This document gathers the slides of the presentations.

  9. XSC plasma control: Tool development for the session leader

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosino, G. [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy)]. E-mail: ambrosin@unina.it; Albanese, R. [Associazione Euratom-ENEA-CREATE, University Mediterranea Reggio Calabria (Italy); Ariola, M. [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy); Cenedese, A. [Associazione Euratom-ENEA-Consorzio RFX (Italy); Crisanti, F. [Associazione Euratom-ENEA-Frascati (Italy); Tommasi, G. De [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy); Mattei, M. [Associazione Euratom-ENEA-CREATE, University Mediterranea Reggio Calabria (Italy); Piccolo, F. [EURATOM-UKAEA Fusion Association (United Kingdom); Pironti, A. [Associazione Euratom-ENEA-CREATE, University Napoli Federico II (Italy); Sartori, F. [EURATOM-UKAEA Fusion Association (United Kingdom); Villone, F. [Associazione Euratom-ENEA-CREATE, University Cassino (Italy)

    2005-11-15

    A new model-based shape controller (XSC, i.e., eXtreme Shape Controller) able to operate with high elongation and triangularity plasmas has been designed and implemented at JET in 2003. The use of the XSC needs a number of steps, which at present are not automated and therefore imply the involvement of several experts. To help the session leader in preparing an experiment, a number of software tools are needed. The paper describes the SW tools that are currently in the developing phase, and describes the new framework for the preparation of a JET experiment.

  10. XSC plasma control: Tool development for the session leader

    International Nuclear Information System (INIS)

    A new model-based shape controller (XSC, i.e., eXtreme Shape Controller) able to operate with high elongation and triangularity plasmas has been designed and implemented at JET in 2003. The use of the XSC needs a number of steps, which at present are not automated and therefore imply the involvement of several experts. To help the session leader in preparing an experiment, a number of software tools are needed. The paper describes the SW tools that are currently in the developing phase, and describes the new framework for the preparation of a JET experiment

  11. The initiative on Model Organism Proteomes (iMOP) Session

    DEFF Research Database (Denmark)

    Schrimpf, Sabine P; Mering, Christian von; Bendixen, Emøke;

    2012-01-01

    iMOP – the Initiative on Model Organism Proteomes – was accepted as a new HUPO initiative at the Ninth HUPO meeting in Sydney in 2010. A goal of iMOP is to integrate research groups working on a great diversity of species into a model organism community. At the Tenth HUPO meeting in Geneva this...... variety was reflected in the iMOP session on Tuesday September 6, 2011. The presentations covered the quantitative proteome database PaxDb, proteomics projects studying farm animals, Arabidopsis thaliana, as well as host–pathogen interactions....

  12. Secure bindings of SAML assertions to TLS sessions

    DEFF Research Database (Denmark)

    Kohlar, Florian; Schwenk, Jörg; Jensen, Meiko;

    2010-01-01

    strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. In this paper, we present a third approach which is of further interest beyond IDM protocols: we bind the SAML assertion to the TLS session that has been agreed upon between client and the service......In recent research work, two approaches to protect SAML based Federated Identity Management (FIM) against man-in-the-middle attacks have been proposed. One approach is to bind the SAML assertion and the SAML artifact to the public key contained in a TLS client certificate. Another approach is to...

  13. SMECY: Smarti Multi-core Embedded SYstems (Special Session)

    Czech Academy of Sciences Publication Activity Database

    Pacull, F.; Bertels, K.; Daněk, Martin; Urlini, G.

    Lausanne: ACM Press, 2011, s. 427-428. ISBN 978-1-4503-0667-6. [21st Great Lakes Symposium on VLSI Design - GLSVLSI 2011. Lausanne (CH), 02.05.2011-04.05.2011] R&D Projects: GA MŠk(CZ) 7H10001 Grant ostatní: Artemis JU(CZ) JU 100230 Institutional research plan: CEZ:AV0Z10750506 Keywords : embedded systems * multi-core systems Subject RIV: JC - Computer Hardware ; Software http://library.utia.cas.cz/separaty/2011/ZS/danek-smecy smarti multi-core embedded systems (special session).pdf

  14. Comment on bilateral same-session intravitreal injections

    Institute of Scientific and Technical Information of China (English)

    Levent; Karabas; Fehim; Esen; Ozlem; Sahin

    2015-01-01

    <正>Dear Editor,We have read the article by Abu-Yahgi et al[1]with great interest.The authors share their experience with bilateral same-session intravitreal injection of anti-vascular endothelial growth factors(anti-VEGF).They report a single case of endophthalmitis in a series of 342 injections of 74patients and compare their results with their 3634 cases of unilateral injections with 2 cases of endophthalmitis[1].There are some issues related with the article that may benefit from

  15. Assessing the Key to Effective Coaching in Parent-Child Interaction Therapy: The Therapist-Parent Interaction Coding System

    OpenAIRE

    Barnett, Miya L.; Niec, Larissa N.; Acevedo-Polakovich, I. David

    2013-01-01

    This paper describes the initial evaluation of the Therapist-Parent Interaction Coding System (TPICS), a measure of in vivo therapist coaching for the evidence-based behavioral parent training intervention, parent-child interaction therapy (PCIT). Sixty-one video-recorded treatment sessions were coded with the TPICS to investigate (1) the variety of coaching techniques PCIT therapists use in the early stage of treatment, (2) whether parent skill-level guides a therapist’s coaching style and f...

  16. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  17. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound for...

  18. Lossy Joint Source-Channel Coding Using Raptor Codes

    Directory of Open Access Journals (Sweden)

    H. V. Poor

    2008-09-01

    Full Text Available The straightforward application of Shannon's separation principle may entail a significant suboptimality in practical systems with limited coding delay and complexity. This is particularly evident when the lossy source code is based on entropy-coded quantization. In fact, it is well known that entropy coding is not robust to residual channel errors. In this paper, a joint source-channel coding scheme is advocated that combines the advantages and simplicity of entropy-coded quantization with the robustness of linear codes. The idea is to combine entropy coding and channel coding into a single linear encoding stage. If the channel is symmetric, the scheme can asymptotically achieve the optimal rate-distortion limit. However, its advantages are more clearly evident under finite coding delay and complexity. The sequence of quantization indices is decomposed into bitplanes, and each bitplane is independently mapped onto a sequence of channel coded symbols. The coding rate of each bitplane is chosen according to the bitplane conditional entropy rate. The use of systematic raptor encoders is proposed, in order to obtain a continuum of coding rates with a single basic encoding algorithm. Simulations show that the proposed scheme can outperform the separated baseline scheme for finite coding length and comparable complexity and, as expected, it is much more robust to channel errors in the case of channel capacity mismatch.

  19. Proceedings of the conference on computer codes and the linear accelerator community

    International Nuclear Information System (INIS)

    The conference whose proceedings you are reading was envisioned as the second in a series, the first having been held in San Diego in January 1988. The intended participants were those people who are actively involved in writing and applying computer codes for the solution of problems related to the design and construction of linear accelerators. The first conference reviewed many of the codes both extant and under development. This second conference provided an opportunity to update the status of those codes, and to provide a forum in which emerging new 3D codes could be described and discussed. The afternoon poster session on the second day of the conference provided an opportunity for extended discussion. All in all, this conference was felt to be quite a useful interchange of ideas and developments in the field of 3D calculations, parallel computation, higher-order optics calculations, and code documentation and maintenance for the linear accelerator community. A third conference is planned

  20. Proceedings of the conference on computer codes and the linear accelerator community

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R.K. (comp.)

    1990-07-01

    The conference whose proceedings you are reading was envisioned as the second in a series, the first having been held in San Diego in January 1988. The intended participants were those people who are actively involved in writing and applying computer codes for the solution of problems related to the design and construction of linear accelerators. The first conference reviewed many of the codes both extant and under development. This second conference provided an opportunity to update the status of those codes, and to provide a forum in which emerging new 3D codes could be described and discussed. The afternoon poster session on the second day of the conference provided an opportunity for extended discussion. All in all, this conference was felt to be quite a useful interchange of ideas and developments in the field of 3D calculations, parallel computation, higher-order optics calculations, and code documentation and maintenance for the linear accelerator community. A third conference is planned.

  1. Adaptations to short, frequent sessions of endurance and strength training are similar to longer, less frequent exercise sessions when the total volume is the same

    DEFF Research Database (Denmark)

    Kilen, Anders; Hjelvang, Line B; Dall, Niels;

    2015-01-01

    Kilen, A, Hjelvang, LB, Dall, N, Kruse, NL, and Nordsborg, NB. Adaptations to short, frequent sessions of endurance and strength training are similar to longer, less frequent exercise sessions when the total volume is the same. J Strength Cond Res 29(11S): S46-S51, 2015-The hypothesis that the di...

  2. Materials & Engineering: Propelling Innovation MRS Bulletin Special Issue Session

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Gopal [Materials Research Society, Warrendale, PA (United States)

    2016-05-06

    Materials enable engineering; and, engineering in turn depends on materials to transform design concepts and equations into physical entities. This relationship continues to grow with expanding societal demand for new products and processes. MRS Bulletin, a publication of the Materials Research Society (MRS) and Cambridge University Press, planned a special issue for December 2015 on Materials and Engineering: Propelling Innovation. This special issue of MRS Bulletin captured the unique relationship between materials and engineering, which are closely intertwined. A special half day session at the 2015 MRS Fall Meeting in Boston captured this discussion through presentations by high level experts followed by a panel discussion on what it takes to translate materials discoveries into products to benefit society. The Special Session included presentations by experts who are practitioners in materials as well as engineering applications, followed by a panel discussion. Participants discussed state-of-the-art in materials applications in engineering, as well as how engineering needs have pushed materials developments, as also reflected in the 20 or so articles published in the special issue of MRS Bulletin. As expected, the discussions spanned the broad spectrum of materials and provided very strong interdisciplinary interactions and discussions by participants and presenters.

  3. Effectiveness of an Electronic Booster Session Delivered to Mandated Students.

    Science.gov (United States)

    Linowski, Sally A; DiFulvio, Gloria T; Fedorchak, Diane; Puleo, Elaine

    2016-01-01

    College student drinking continues to be a problem in the United States. Students who have violated campus alcohol policy are at particularly high risk for dangerous drinking. While Brief Alcohol Screening and Intervention for College Students (BASICS) has been found to be an effective strategy in reducing high-risk drinking and associated consequences, questions remain about ways to further reduce risk or sustain changes associated with a face-to face intervention. The purpose of this study was to assess the effectiveness of a computer-delivered personalized feedback (electronic booster) delivered to policy violators who completed a mandated BASICS program. At 3-month post-intervention, 346 participants (60.4% male and 39.6% female) were randomized to one of two conditions: assessment only (n = 171) or electronic booster feedback (n = 175). Follow-up assessments were given to all participants at 3, 6, and 12-month post-initial intervention. Both groups showed reductions in drinking after the in-person BASICS intervention, but no additional reductions were seen with the addition of an electronic booster session. Findings suggest that although brief motivational interventions delivered in person to mandated students have been shown to be effective with mandated students, there is no additional benefit from an electronic booster session delivered 3-month post-intervention for this population. PMID:26857563

  4. Ontology Generation from Session Data for Web Personalization

    Directory of Open Access Journals (Sweden)

    P.Arun

    2010-01-01

    Full Text Available With an increasing continuous growth of information in WWW it is very difficult for the users to access the interested web pages from the website. Because day by day the information in the web is growing in an increasing manner so without any help system the user may spend more time to get the interested information from the website. To overcome the above problem, in this paper we propose a Model which create a User Interested Page Ontology (UIPO, it will be created by assigning weights and ranking the user interest by count the number of occurrence of each item which was collected from the web logs within a session for all users. The main feature of this model is, it generates UIPO dynamically from that it personalize the interested pages to the web users in their next access The proposed model is very useful for understanding the behavior of the users and also improving the web site design too. The performance of the new model in a session is also discussed in this paper.

  5. Prospects for UT1 Measurements from VLBI Intensive Sessions

    Science.gov (United States)

    Boehm, Johannes; Nilsson, Tobias; Schuh, Harald

    2010-01-01

    Very Long Baseline Interferometry (VLBI) Intensives are one-hour single baseline sessions to provide Universal Time (UT1) in near real-time up to a delay of three days if a site is not e-transferring the observational data. Due to the importance of UT1 estimates for the prediction of Earth orientation parameters, as well as any kind of navigation on Earth or in space, there is not only the need to improve the timeliness of the results but also their accuracy. We identify the asymmetry of the tropospheric delays as the major error source, and we provide two strategies to improve the results, in particular of those Intensives which include the station Tsukuba in Japan with its large tropospheric variation. We find an improvement when (1) using ray-traced delays from a numerical weather model, and (2) when estimating tropospheric gradients within the analysis of Intensive sessions. The improvement is shown in terms of reduction of rms of length-of-day estimates w.r.t. those derived from Global Positioning System observations

  6. Discourse analytic study of counseling sessions in stroke physiotherapy.

    Science.gov (United States)

    Talvitie, Ulla; Pyöriä, Outi

    2006-01-01

    Studies on the interaction between physiotherapists and patients during treatment sessions have found low levels of communicative participation by patients and lack of direct influence by patients on the content of their treatment. This article reports the results of 7 counseling sessions in which physiotherapists and patients with stroke and their caregivers discussed the patients' postural control and balance, which had been tested and videotaped at different stages of the rehabilitation process. The physiotherapists' discourses relating to the videotaped test performances were either brief comments on the patient's performance or critical appraisals with references to difficulties encountered during performance. Performances of the easier tasks were treated by the physiotherapists with rhetorical questions. The second type of discourse consisted of the physiotherapists directing the patients' attention to their problems, and of the patients' and caregivers' initiatives leading to conversation about the patients' problems. The patients understood the significance of the test performance for their life at home in varying ways. The results of this study showed that successful counseling calls for physiotherapists to develop dialogic communication skills to help patients in coconstructing their home exercise together with their social network. PMID:16965256

  7. Session: What can we learn from developed wind resource areas

    Energy Technology Data Exchange (ETDEWEB)

    Thelander, Carl; Erickson, Wally

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop was composed of two parts intended to examine what existing science tells us about wind turbine impacts at existing wind project sites. Part one dealt with the Altamont Wind Resource area, one of the older wind projects in the US, with a paper presented by Carl Thelander titled ''Bird Fatalities in the Altamont Pass Wind Resource Area: A Case Study, Part 1''. Questions addressed by the presenter included: how is avian habitat affected at Altamont and do birds avoid turbine sites; are birds being attracted to turbine strings; what factors contribute to direct impacts on birds by wind turbines at Altamont; how do use, behavior, avoidance and other factors affect risk to avian species, and particularly impacts those species listed as threatened, endangered, or of conservation concern, and other state listed species. The second part dealt with direct impacts to birds at new generation wind plants outside of California, examining such is sues as mortality, avoidance, direct habitat impacts from terrestrial wind projects, species and numbers killed per turbine rates/MW generated, impacts to listed threatened and endangered species, to USFWS Birds of Conservation Concern, and to state listed species. This session focused on newer wind project sites with a paper titled ''Bird Fatality and Risk at New Generation Wind Projects'' by Wally Erickson. Each paper was followed by a discussion/question and answer period.

  8. Safety Training: scheduled sessions in September and October 2011

    CERN Multimedia

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personnel électricien effectuant des opérations du domaine de tension BTA...

  9. Safety Training: scheduled sessions in September and October 2011

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in September – October. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Alphabetical order (original course titles are maintained) Chemical Safety – Introduction 11-OCT-11, 9.00 – 11.30, in English Conduite de chariots élévateurs 17-OCT-11 to 18-OCT-11, 8.00 – 17.30, in French * Ergonomics - Applying ergonomic principles in the workplace 15-SEP-11, 9.00 – 12.30, in French 15-SEP-11, 14.00 – 17.30, in English Habilitation électrique : Personne...

  10. Working session 5: Operational aspects and risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cizelj, L. [Jozef Stefan Institute, Ljubljana (Slovenia); Donoghue, J. [Nuclear Regulatory Commission, Washington, DC (United States)

    1997-02-01

    A general observation is that both operational aspects and risk analysis cannot be adequately discussed without information presented in other sessions. Some overlap of conclusions and recommendations is therefore to be expected. Further, it was assumed that recommendations concerning improvements in some related topics were generated by other sessions and are not repeated here. These include: (1) Knowledge on degradation mechanisms (initiation, progression, and failure). (2) Modeling of degradation (initiation, progression, and failure). (3) Capabilities of NDE methods. (4) Preventive maintenance and repair. One should note here, however, that all of these directly affect both operational and risk aspects of affected plants. A list of conclusions and recommendations is based on available presentations and discussions addressing risk and operational experience. The authors aimed at reaching as broad a consensus as possible. It should be noted here that there is no strict delineation between operational and safety aspects of degradation of steam generator tubes. This is caused by different risk perceptions in different countries/societies. The conclusions and recommendations were divided into four broad groups: human reliability; leakage monitoring; risk impact; and consequence assessment.

  11. The 24th National Session of Scientific Communications. Abstracts

    International Nuclear Information System (INIS)

    The 24th National Session of Scientific Communications was held on 7-9 October, 1998 in Caciulata-Valcea, Romania. The Session covered the following research fields: 1. organic and technological chemistry; 2. inorganic and technological chemistry; 3. polymer chemistry and technology; 4. chemical engineering; 5. environment protection. The section 2 contains two communications referring to 99m Tc-ROMTEC generator and the Romanian production of radioactive labelled products. The section 3 contains a study on polymer radiolysis investigated by computational methods. The following section referring to chemical engineering contains a study of surface science in heavy water facilities, an investigation of corrosion process in CANDU steam generator components and of oxidation in zircaloy-4 tubes, a report referring to o-xylene deuteration technology and a report on 15N separation by isotopic exchange. Finally, the environment protection section contains a paper reporting on retaining process of UO33+ from uranium in exhausted reactor waters. Proceedings of a poster section are also included. Abstracts of papers on the following items are given: radioluminescent composite materials, radiochemical compatibility of polymers, gamma irradiation effects on elution polymers used in the production of 99mTc generator, obtaining tritium and deuterium labelled polyacrylic acid and radioinduced grafting of acrylic acid

  12. Takotsubo cardiomyopathy after a dancing session: a case report

    Directory of Open Access Journals (Sweden)

    Ibrahim Ammar A

    2011-10-01

    Full Text Available Abstract Introduction Stress-induced (Takotsubo cardiomyopathy is a rare form of cardiomyopathy which presents in a manner similar to that of acute coronary syndrome. This sometimes leads to unnecessary thrombolysis therapy. The pathogenesis of this disease is still poorly understood. We believe that reporting all cases of Takotsubo cardiomyopathy will contribute to a better understanding of this disease. Here, we report a patient who, in the absence of any recent stressful events in her life, developed the disease after a session of dancing. Case presentation A 69-year-old Caucasian woman presented with features suggestive of acute coronary syndrome shortly after a session of dancing. Echocardiography and a coronary angiogram showed typical features of Takotsubo cardiomyopathy and our patient was treated accordingly. Eight weeks later, her condition resolved completely and the results of echocardiography were totally normal. Conclusions Takotsubo cardiomyopathy, though transient, is a rare and serious condition. Although it is commonly precipitated by stressful life events, these are not necessarily present. Our patient was enjoying one of her hobbies (that is, dancing when she developed the disease. This case has particular interest in medicine, especially for the specialties of cardiology and emergency medicine. We hope that it will add more information to the literature about this rare condition.

  13. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  14. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  15. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  16. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  17. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  18. Computer code FIT

    International Nuclear Information System (INIS)

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.)

  19. Dynamic Frameproof Codes

    OpenAIRE

    Paterson, Maura

    2006-01-01

    There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes, which prevent traitorous users from colluding to frame an innocent user, and traitor-tracing schemes, which enable the identification of users involved in piracy. The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, wh...

  20. Efficient Block Truncation Coding

    Directory of Open Access Journals (Sweden)

    K.Somasundaram,

    2010-09-01

    Full Text Available Block Truncation Coding (BTC is one of the lossy image compression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is exploited to further reduce the requirement of bits to store a block. The proposed method gives very good performance in terms of bit-rate and PSNR values when compared to the conventional BTC.

  1. Tokamak simulation code manual

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs.

  2. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  3. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. PMID:24461230

  4. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  5. OACoder: Postcode Coding Tool

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2013-10-01

    Full Text Available Geodemographic classifications are small area classifications of social, economic and demographic characteristics. The Output Area Classification (OAC is a free geodemographic classification. It is an Office of National Statistics validated measure that summarises neighbourhood conditions at the Output Area Level across the United Kingdom. Linkage of these valuable statistics has been problematic for users more used to address records that are georeferenced using unit postcodes. OACoder resolves this problem by allowing users to link corresponding OAC codes to each of the postcode addresses. OACoder is an open source software, and it is developed and tested to work on different versions of windows operating systems.  It is stored in Figshare. The source code of the OACoder is stored in SourceForge. As open source software, OACoder has reuse potential across a range of applications. The functionality of OACoder can be extended to work with the new version of OAC (2011 OAC. It is also possible to reuse the source code and extend the functionality to work on different operating systems other than Windows. Different components of the software can be reused for the purpose of reading/writing CSV files and handling large data sets.

  6. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  7. DIANE multiparticle transport code

    International Nuclear Information System (INIS)

    DIANE is a three-dimensional multigroup Monte Carlo code that performs coupled neutron-photon-electron and light charged particle Monte Carlo transport on a fixed geometry and/or an imploding material (for example an Inertial-Confinement- Fusion plasma target). DIANE's multigroup data are provided by the nuclear data code ZADIG. ZADIG groups cross sections from international data libraries in ENDF7 format. In order to better account for resonances, a specific multigroup treatment, called 'mini-group' has been implemented. For photons, photo-atomic interactions are considered as well as photonuclear reactions. Coherent scattering may include anomalous scattering factors. Incoherent scattering include scattering function from EPDL97. We also account for fluorescence X-rays and Auger electrons. For neutrons, all the reaction channels relevant are processed by ZADIG. The ZADIG code integrates the Secondary Source Bremsstrahlung (SSB) model that simulates electron-photon cascade from electron slowing down. For light ions, DIANE solves the Boltzmann-Fokker-Planck equation. The continuous effect of Coulomb interaction with the background plasma can be treated by three Fokker- Planck terms (slowing-down, energy straggling and angular deflection). The effect of electric and magnetic fields through the Lorentz force can also be taken into account

  8. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  9. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  10. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  11. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  12. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  13. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  14. HIGH-VOLUME RESISTANCE TRAINING SESSION ACUTELY DIMINISHES RESPIRATORY MUSCLE STRENGTH

    Directory of Open Access Journals (Sweden)

    Daniel A. Hackett

    2012-03-01

    Full Text Available This study investigated the effect of a high-volume compared to a low-volume resistance training session on maximal inspiratory pressure (MIP and maximal expiratory pressure (MEP. Twenty male subjects with resistance training experience (6.2 ± 3.2 y, in a crossover trial, completed two resistance training protocols (high-volume: 5 sets per exercise; low-volume: 2 sets per exercise and a control session (no exercise on 3 separate occasions. MIP and MEP decreased by 13.6% (p < 0.01 and 14.7% (p < 0.01 respectively from pre-session MIP and MEP, following the high-volume session. MIP and MEP were unaffected following the low-volume or the control sessions. MIP returned to pre-session values after 40 minutes, whereas MEP remained significantly reduced after 60 minutes post-session by 9.2% compared to pre-session (p < 0.01. The findings suggest that the high-volume session significantly decreased MIP and MEP post-session, implicating a substantially increased demand on the respiratory muscles and that adequate recovery is mandatory following this mode of training.

  15. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  16. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  17. Rotational Seismology: AGU Session, Working Group, and Website

    Science.gov (United States)

    Lee, William H.K.; Igel, Heiner; Todorovska, Maria I.; Evans, John R.

    2007-01-01

    Introduction Although effects of rotational motions due to earthquakes have long been observed (e. g., Mallet, 1862), nevertheless Richter (1958, p. 213) stated that: 'Perfectly general motion would also involve rotations about three perpendicular axes, and three more instruments for these. Theory indicates, and observation confirms, that such rotations are negligible.' However, Richter provided no references for this claim. Seismology is based primarily on the observation and modeling of three-component translational ground motions. Nevertheless, theoretical seismologists (e.g., Aki and Richards, 1980, 2002) have argued for decades that the rotational part of ground motions should also be recorded. It is well known that standard seismometers are quite sensitive to rotations and therefore subject to rotation-induced errors. The paucity of observations of rotational motions is mainly the result of a lack, until recently, of affordable rotational sensors of sufficient resolution. Nevertheless, in the past decade, a number of authors have reported direct observations of rotational motions and rotations inferred from rigid-body rotations in short baseline accelerometer arrays, creating a burgeoning library of rotational data. For example, ring laser gyros in Germany and New Zealand have led to the first significant and consistent observations of rotational motions from distant earthquakes (Igel et al., 2005, 2007). A monograph on Earthquake Source Asymmetry, Structural Media and Rotation Effects was published recently as well by Teisseyre et al. (2006). Measurement of rotational motions has implications for: (1) recovering the complete ground-displacement history from seismometer recordings; (2) further constraining earthquake rupture properties; (3) extracting information about subsurface properties; and (4) providing additional ground motion information to earthquake engineers for seismic design. A special session on Rotational Motions in Seismology was convened by H

  18. Summary of Session 2.B. Planning and implementation

    International Nuclear Information System (INIS)

    Session 2.B. can be summarized by a statement in one of the papers given in the session: 'Dismantling of nuclear facilities is basically not a technical problem but a challenge to project management and logistics once the legal and economical boundary conditions have been clarified'. The session balanced generic principles and concerns raised by decommissioning projects with practical examples of lessons learned from some specific projects and raised some key issues for all involved in decommissioning - whether regulator, operator or other stakeholder. Ideally, planning for decommissioning should start as early as possible, preferably when the facility is being designed. When a facility or activity is shut down it is very important that a formal decision to decommission is made so that the situation is clear to all stakeholders. The impact on the work force and the local community due to the cessation of operation of a facility must be recognized and addressed early in the transition from operation to decommissioning. Factors such as uncertainty, potential job losses and diminution of career paths as research careers are replaced by construction/deconstruction jobs all lead to poor morale and an exodus of qualified staff. Attention to safety culture during all phases of decommissioning will assist in ensuring that safety and environmental protection objectives are met, as well as promoting desired worker retention. Some issues for future consideration include the following: Consider the role of the State in the clearance process, should the State take responsibility for decommissioned sites that cannot be 'green fielded'?; Consider establishing expert missions focused on decommissioning similar to those of the IAEA's Operational Safety Assessment Review Team and WATRAP. Actions that could be taken include: Clarifying the status of all shutdown facilities that have not declared decommissioning; Ensuring that the focus of the decommissioning programme includes all

  19. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  20. Improvements in the BCG code

    International Nuclear Information System (INIS)

    Some improvements introduced in the BCG code with the objective of making the code faster in execution are reported. The impact of these improvements in terms of CPU time saving is discussed for a sample problem. (author)

  1. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  2. Continuous detection of the self-initiated walking pre-movement state from EEG correlates without session-to-session recalibration

    Science.gov (United States)

    Ioana Sburlea, Andreea; Montesano, Luis; Minguez, Javier

    2015-06-01

    Objective. Brain-computer interfaces (BCI) as a rehabilitation tool have been used to restore functions in patients with motor impairments by actively involving the central nervous system and triggering prosthetic devices according to the detected pre-movement state. However, since EEG signals are highly variable between subjects and recording sessions, typically a BCI is calibrated at the beginning of each session. This process is inconvenient especially for patients suffering locomotor disabilities in maintaining a bipedal position for a longer time. This paper presents a continuous EEG decoder of a pre-movement state in self-initiated walking and the usage of this decoder from session to session without recalibrating. Approach. Ten healthy subjects performed a self-initiated walking task during three sessions, with an intersession interval of one week. The implementation of our continuous decoder is based on the combination of movement-related cortical potential (MRCP) and event-related desynchronization (ERD) features with sparse classification models. Main results. During intrasession our technique detects the pre-movement state with 70% accuracy. Moreover this decoder can be applied from session to session without recalibration, with a decrease in performance of about 4% on a one- or two-week intersession interval. Significance. Our detection model operates in a continuous manner, which makes it a straightforward asset for rehabilitation scenarios. By using both temporal and spectral information we attained higher detection rates than the ones obtained with the MRCP and ERD detection models, both during the intrasession and intersession conditions.

  3. Proceedings of the Areva Technical Days. Session 5

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document presents the proceedings of the Areva technical days, presented during the session 5 the 9 and 10 december 2004, at Istanbul. It deals with the operations of the transmission and distribution division. With manufacturing facilities in over 40 countries and a sales network in over 100, Areva offers customers technological solutions for nuclear power generation and electricity transmission and distribution (the Group also provides interconnect systems to the telecommunications, computer and automotive markets). It provides five topics: a general presentation of Areva, the strategic stakes for transmission and distribution by world-zone, economic and strategic stakes of business unit products, business unit systems and business unit automation. (A.L.B.)

  4. Session 5: the different aspects of gas sales

    International Nuclear Information System (INIS)

    Here are given the summaries of the speeches of Mr Regis Halgand (Gaz de France): the different gas markets; of Mr Joel Pedessac (Comite Francais du Butane et du Propane (CFBP): the uses of LPG; of Mr Yves Tournie (Total): DME, market and demonstration pilot of the JFE process; of Mr Pierre Yves Burban (Doris Engineering): the export of gas under the form of CNG (compressed natural gas); and of Mr Eric Caprani (Axens): first balance of the ENI/IFP/AXENS GTL plan. All these speeches have been presented at the AFTP petroleum yearly days (12-13 October 2005) during the session 5 concerning the different aspects of gas sales. (O.M.)

  5. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    CERN Document Server

    Hasib, Abdullah Al; Morshed, Md Sarwar

    2010-01-01

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.

  6. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Md. Sarwar Morshed

    2010-01-01

    Full Text Available The Session Initiation Protocol (SIP has become the most predominant protocol for Voice over Internet Protocol (VoIP signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF. Finally we analyze the security aspects of these approaches.

  7. Proceedings of the Areva Technical Days. Session 5

    International Nuclear Information System (INIS)

    This document presents the proceedings of the Areva technical days, presented during the session 5 the 9 and 10 december 2004, at Istanbul. It deals with the operations of the transmission and distribution division. With manufacturing facilities in over 40 countries and a sales network in over 100, Areva offers customers technological solutions for nuclear power generation and electricity transmission and distribution (the Group also provides interconnect systems to the telecommunications, computer and automotive markets). It provides five topics: a general presentation of Areva, the strategic stakes for transmission and distribution by world-zone, economic and strategic stakes of business unit products, business unit systems and business unit automation. (A.L.B.)

  8. The kinematics of very low mass dwarfs: splinter session summary

    CERN Document Server

    Burgasser, Adam J; Schmidt, Sarah; West, Andrew A; Osorio, Maria Rosa Zapatero; Pineda, J Sebastian; Burningham, Ben; Nicholls, C; Sanderson, Robyn; Shkolnik, Evgenya; Rodriguez, David; Riedel, Adric; Joergens, Viki

    2013-01-01

    Kinematic investigations are being increasingly deployed in studies of the lowest mass stars and brown dwarfs to investigate their origins, characterize their atmospheres, and examine the evolution of their physical parameters. This article summarizes the contributions made at the Kinematics of Very Low Mass Dwarfs Splinter Session. Results discussed include analysis of kinematic distributions of M, L and T dwarfs; theoretical tools for interpreting these distributions; identifications of very low mass halo dwarfs and wide companions to nearby stars; radial velocity variability among young and very cool brown dwarfs; and the search and identification of M dwarfs in young moving groups. A summary of discussion points at the conclusion of the Splinter is also presented.

  9. Summary Of Session 3: How Should Accelerator Operations Be Organized?

    International Nuclear Information System (INIS)

    The underlying structure and organization of a group strongly influences its effectiveness and efficiency. An operations group may develop a 'persistence of form' that prevents it from responding to changes in responsibilities and technology. Even if a group has been in existence for a long time, it is a good idea to re-evaluate its structure periodically. An organization can possess an aesthetic quality related to how simple and transparent its functions appear to users and other outsiders. Information and tasks should flow freely without undue impedance. In this session we examined the issue of group design from a variety of perspectives including both large and small labs, commercial operations and that of an 'expert' consultant. (author)

  10. Astronomy and Space Technologies, WILGA 2012; EuCARD Sessions

    CERN Document Server

    Romaniuk, R S

    2012-01-01

    Wilga Sessions on HEP experiments, astroparticle physics and accelerator technology were organized under the umbrella of the EU FP7 Project EuCARD – European Coordination for Accelerator Research and Development. This paper is the first part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with photonics and electronics applications in astronomy and space technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JE...

  11. Neutrino mass and mixing: Summary of the neutrino sessions

    International Nuclear Information System (INIS)

    A great deal of experimental and theoretical effort is underway to use neutrinos as a probe for Physics Beyond the Standard Model. Most of these efforts center on the questions of the possible existence of non zero neutrino mass and mixing. Sessions at the Moriond conferences have dealt with these questions at most of the meetings during the last several years and this year was no exception. Presentations covering most of the current and planned research in this field were presented and discussed. Although there is, at present, no definitive evidence for a non zero neutrino mass and mixing, several unresolved problems (in particular solar neutrinos) do seem to be indicating the likely existence of new neutrino properties. It is likely that before the end of this decade, efforts now being initiated will be able to determine whether or not the hints we are now seeing are really due to new physics

  12. Summary Of Session 3: How Should Accelerator Operations Be Organized?

    Energy Technology Data Exchange (ETDEWEB)

    Bloemhard, R.; Stanek, M

    2001-07-01

    The underlying structure and organization of a group strongly influences its effectiveness and efficiency. An operations group may develop a 'persistence of form' that prevents it from responding to changes in responsibilities and technology. Even if a group has been in existence for a long time, it is a good idea to re-evaluate its structure periodically. An organization can possess an aesthetic quality related to how simple and transparent its functions appear to users and other outsiders. Information and tasks should flow freely without undue impedance. In this session we examined the issue of group design from a variety of perspectives including both large and small labs, commercial operations and that of an 'expert' consultant. (author)

  13. Session: What do we know about cumulative or population impacts

    Energy Technology Data Exchange (ETDEWEB)

    Kerlinger, Paul; Manville, Al; Kendall, Bill

    2004-09-01

    This session at the Wind Energy and Birds/Bats workshop consisted of a panel discussion followed by a discussion/question and answer period. The panelists were Paul Kerlinger, Curry and Kerlinger, LLC, Al Manville, U.S. Fish and Wildlife Service, and Bill Kendall, US Geological Service. The panel addressed the potential cumulative impacts of wind turbines on bird and bat populations over time. Panel members gave brief presentations that touched on what is currently known, what laws apply, and the usefulness of population modeling. Topics addressed included which sources of modeling should be included in cumulative impacts, comparison of impacts from different modes of energy generation, as well as what research is still needed regarding cumulative impacts of wind energy development on bird and bat populations.

  14. Mathematics Intensive Summer Session (MISS). Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    This final technical report appears in two parts: the report for the 1995 summer MISS program and the report for the 1996 summer MISS program. Copies of the US Department of Energy Pre-Freshman Enrichment Program 1995 Entry Form and 1996 Entry Form completed by all participants were sent to the Oak Ridge Institute for Science and Education in the fall of 1995 and 1996 respectively. Those forms are on file should they be needed. Attached also is a copy of the Summary of ideas for panel discussions, problem-solving sessions, or small group discussions presented at the Department of Energy Oak Ridge Institute for Science and Education Pre-Freshman Enrichment Program Project Directors Meeting held in San Antonio, TX, November 12--14, 1995.

  15. Dynamic Session Key Exchange Method using Two S-Boxes

    CERN Document Server

    Abid, Sohail

    2012-01-01

    This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encryption and key exchange are some of the most important and foundational Crypto-graphical tools. In most cases, they are all needed to provide different secure functions. On the other hand, there are also some proposals on the efficient combination of key exchange. In this paper, we present a dynamic, reliable and secure method for the exchange of session key. Moreover, the proposed modification method could achieve better performance efficiency.

  16. First Doctoral student assembly and poster session at CERN

    CERN Multimedia

    2010-01-01

    Presently, 130 doctoral students at CERN do their research on “technical” subjects such as magnets and cryogenics, beam and detector physics, computing and vacuum, among others.   Student present  their scientific achievements at the first doctoral student assembly. To present their scientific achievements and to bring together the students with CERN supervisors and CERN’s management was the main objective of the first doctoral student assembly and poster session, held June 30. The photograph shows about half of those who presented posters, all in their second year of assignment, and ready to attach their work to the panels. Another aim of the assembly was to discuss the outcome of the anonymous questionnaire and to gain feedback for the improvement of the doctoral student program. While there is vast overall satisfaction, improvements should aim at strengthening the links between students, CERN supervisors, and university professors. With 24 posters prese...

  17. The Source Term Code Package

    International Nuclear Information System (INIS)

    The Source Term Code Package (STCP) is a set of computer codes which allows analyses of nuclear reactor accidents to produce predictions of fission product release to the environment as a function of reactor design and specifications for the assumed accident. The codes are basically those used in the analyses performed for the BMI-2104 report but they have been combined, improved and streamlined for easier use. The objective in preparing this code package was to make the calculations more direct, traceable and user-independent, with documentation for release to the public. It is important to note that the STCP is not intended to be a research tool but a code for general use in making source term predictions that has a sound and definable basis and produces reasonably accurate results in comparison with more detailed codes. The STCP has four major elements. The overall thermal-hydraulics is provided by the MARCH-3 code which combines the previously separate codes MARCH2, CORCON Mod 2 and CORSORM. Release of fission products and aerosols during core/concrete interactions is predicted with the VANESA code. Detailed thermal-hydraulics and fission product transport in the reactor coolant system are provided by the TRAPMELT3 code formed by combining the previously separate TRAPMELT and MERGE codes. Finally, fission product transport in the containment is predicted by the NAUA-4 code as modified to include fission product removal by pressure suppression pools (SPARC code) and within ice compartments (ICEDF code). The fission product and aerosol groups being tracked in the code package are noble gases, iodine, caesium, tellurium, barium, strontium, ruthenium, lanthanum and cerium groups. Additionally, in-vessel-produced aerosols and ex-vessel-produced aerosols are tracked. The code package produces time-dependent locational distributions, physical forms and transport rates for these groups throughout the course of the accident. (author)

  18. Cross-Domain Sparse Coding

    OpenAIRE

    Wang, Jim Jing-Yan

    2013-01-01

    Sparse coding has shown its power as an effective data representation method. However, up to now, all the sparse coding approaches are limited within the single domain learning problem. In this paper, we extend the sparse coding to cross domain learning problem, which tries to learn from a source domain to a target domain with significant different distribution. We impose the Maximum Mean Discrepancy (MMD) criterion to reduce the cross-domain distribution difference of sparse codes, and also ...

  19. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  20. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...