WorldWideScience

Sample records for b codes

  1. Overview of RAMONA-3B code

    International Nuclear Information System (INIS)

    RAMONA-3B has been developed at Brookhaven National Laboratory under the sponsorship of the US Nuclear Regulatory Commission for analyzing BWR systems transients. RAMONA-3B is the only currently available best-estimate BWR system transient code designed to predict three-dimensional power in the core coupled with the fuel and cladding temperature and vessel thermal hydraulics phenomena. The code employs the 1-1/2 group method with either three-dimensional or one-dimensional diffusion neutron kinetics, coupled with a one-dimensional, non-equilibrium, non-homogeneous two-phase model for thermal hydraulics

  2. B2-B2.5 code benchmarking

    Energy Technology Data Exchange (ETDEWEB)

    Dekeyser, W.; Baelmans, M; Voskoboynikov, S.; Rozhansky, V.; Reiter, D.; Wiesen, S.; Kotov, V.; Boerner, P.

    2011-01-15

    ITER-IO currently (and since about 15 years) employs the SOLPS4.xxx code for its divertor design, currently version SOLPS4.3. SOLPS.xxx is a special variant of the B2-EIRENE code, which was originally developed by an European consortium (FZ Juelich, AEA Culham, ERM Belgium/KU Leuven) in the late eighties and early nineties of the last century under NET contracts. Until today even the very similar edge plasma codes within the SOLPS family, if run on a seemingly identical choice of physical parameters, still sometimes disagree significantly with each other. It is obvious that in computational engineering applications, as they are carried out for the various ITER divertor aspects with SOLPS4.3 for more than a decade now, any transition from one to another code must be fully backward compatible, or, at least, the origin of differences in the results must be identified and fully understood quantitatively. In this report we document efforts undertaken in 2010 to ultimately eliminate the third issue. For the kinetic EIRENE part within SOLPS this backward compatibility (back until 1996) was basically achieved (V. Kotov, 2004-2006) and SOLPS4.3 is now essentially up to date with the current EIRENE master maintained at FZ Juelich. In order to achieve a similar level of reproducibility for the plasma fluid (B2, B2.5) part, we follow a similar strategy, which is quite distinct from the previous SOLPS benchmark attempts: the codes are ''disintegrated'' and pieces of it are run on smallest (i.e. simplest) problems. Only after full quantitative understanding is achieved, the code model is enlarged, integrated, piece by piece again, until, hopefully, a fully backward compatible B2 / B2.5 ITER edge plasma simulation will be achieved. The status of this code dis-integration effort and its findings until now (Nov. 2010) are documented in the present technical note. This work was initiated in a small workshop by the three partner teams of KU Leuven, St. Petersburg

  3. On the structure of Lattice code WIMSD-5B

    International Nuclear Information System (INIS)

    The WIMS-D code is a freely available thermal reactor physics lattice code used widely for thermal research and power reactor calculation. Now the code WIMS-AECL, developed on the basis of WIMS-D, has been used as one of lattice codes for the cell calculation in Canada and also, in 1998, the latest version WIMSD-5B is released for OECD/NEA Data Bank. While WIMS-KAERI was developed and has been used, originated from WIMS-D, in Korea, it was adjusted for the cell calculation of research reactor HANARO and so it has no confirmaty to CANDU reactor. Therefore, the code development applicable to cell calculation of CANDU reactor is necessary not only for technological independence and but also for the establishment of CANDU safety analysis system. A lattice code WIMSD-5B was analyzed in order to set the system of reactor physics computer codes, to be used in the assessment of void reactivity effect. In order to improve and validate WIMSD-5B code, the analysis of the structure of WIMSD-5B lattice code was made and so its structure, algorithm and the subroutines of WIMSD-5B were presented for the cluster type and the pij method modelling the CANDU-6 fuel

  4. Summary of ENDF/B pre-processing codes

    International Nuclear Information System (INIS)

    This document contains the summary documentation for the ENDF/B pre-processing codes: LINEAR, RECENT, SIGMA1, GROUPIE, EVALPLOT, MERGER, DICTION, CONVERT. This summary documentation is merely a copy of the comment cards that appear at the beginning of each programme; these comment cards always reflect the latest status of input options, etc. For the latest published documentation on the methods used in these codes see UCRL-50400, Vol.17 parts A-E, Lawrence Livermore Laboratory (1979)

  5. A He I Case-B Recombination Code

    CERN Document Server

    Porter, R L

    2007-01-01

    Recent calculations of collisionless, Case-B, He I emissivities were performed by Bauman et al. (2005). The source code used in the calculation has been freely available online since that paper was published. A number of changes have been made to simplify the use of the code by third parties. Here I provide details on how to obtain, compile, and execute the program and interpret the results.

  6. LWR containment thermal hydraulic codes benchmark demona B3 exercise

    International Nuclear Information System (INIS)

    Recent discussion about the aerosol codes currently used for the analysis of containment retention capabilities have revealed a number of questions concerning the reliabilities and verifications of the thermal-hydraulic modules of these codes with respect to the validity of implemented physical models and the stability and effectiveness of numerical schemes. Since these codes are used for the calculation of the Source Term for the assessment of radiological consequences of severe accidents, they are an important part of reactor safety evaluation. For this reason the Commission of European Communities (CEC), following the recommendation mode by experts from Member Stades, is promoting research in this field with the aim also of establishing and increasing collaboration among Research Organisations of member countries. In view of the results of the studies, the CEC has decided to carry out a Benchmark exercise for severe accident containment thermal hydraulics codes. This exercise is based on experiment B3 in the DEMONA programme. The main objective of the benchmark exercise has been to assess the ability of the participating codes to predict atmosphere saturation levels and bulk condensation rates under conditions similar to those predicted to follow a severe accident in a PWR. This exercise follows logically on from the LA-4 exercise, which, is related to an experiment with a simpler internal geometry. We present here the results obtained so far and from them preliminary conclusions are drawn, concerning condensation temperature, pressure, flow rates, in the reactor containment

  7. 45 CFR Appendix B to Part 73 - Code of Ethics for Government Service

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Code of Ethics for Government Service B Appendix B to Part 73 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION STANDARDS OF CONDUCT Pt. 73, App. B Appendix B to Part 73—Code of Ethics for Government Service Any person...

  8. Isotopic modelling using the ENIGMA-B fuel performance code

    International Nuclear Information System (INIS)

    A number of experimental programmes by BNFL and other MOX fabricators have now shown that the in-pile performance of MOX fuel is generally similar to that of conventional UO2 fuel. Models based on UO2 fuel experience form a good basis for a description of MOX fuel behaviour. However, an area where the performance of MOX fuel is sufficiently different from that of UO2 to warrant model changes is in the radial power and burnup profile. The differences in radial power and burnup profile arise from the presence of significant concentrations of plutonium in MOX fuel, at beginning of life, and their subsequent evolution with burnup. Amongst other effects, plutonium has a greater neutron absorption cross-section than uranium. This paper focuses on the development of a new model for the radial power and burnup profile within a UO2 or MOX fuel rod, in which the underlying fissile isotope concentration distributions are tracked during irradiation. The new model has been incorporated into the ENIGMA-B fuel performance code and has been extended to track the isotopic concentrations of the fission gases, xenon and krypton. The calculated distributions have been validated against results from rod puncture measurements and electron probe micro-analysis (EPMA) linescans, performed during the M501 post irradiation examination (PIE) programme. The predicted gas inventory of the fuel/clad gap is compared with the isotopic composition measured during rod puncture and the measured radial distributions of burnup (from neodymium measurements) and plutonium in the fuel are compared with the calculated distributions. It is shown that there is good agreement between the code predictions and the measurements. (author)

  9. Code-B-1 for stress/strain calculation for TRISO fuel particle (Contract research)

    International Nuclear Information System (INIS)

    We have developed Code-B-1 for the prediction of the failure probabilities of the coated fuel particles for the high temperature gas-cooled reactors (HTGRs) under operation by modification of an existing code. A finite element method (FEM) is employed for the stress calculation part and Code-B-1 can treat the plastic deformation of the coating layer of the coated fuel particles which the existing code cannot treat. (author)

  10. AMZ, library of multigroup constants for EXPANDA computer codes, generated by NJOY computer code from ENDF/B-IV

    International Nuclear Information System (INIS)

    A 70-group, 37-isotope library of multigroup constants for fast reactor nuclear design calculations is described. Nuclear cross sections, transfer matrices, and self-shielding factors were generated with NJOY code and an auxiliary program RGENDF using evaluated data from ENDF/B-IV. The output is being issued in a format suitable for EXPANDA code. Comparisons with JFS-2 library, as well as, test resuls for 14 CSEWG benchmark critical assemblies are presented. (Author)

  11. BSR: B-spline atomic R-matrix codes

    Science.gov (United States)

    Zatsarinny, Oleg

    2006-02-01

    BSR is a general program to calculate atomic continuum processes using the B-spline R-matrix method, including electron-atom and electron-ion scattering, and radiative processes such as bound-bound transitions, photoionization and polarizabilities. The calculations can be performed in LS-coupling or in an intermediate-coupling scheme by including terms of the Breit-Pauli Hamiltonian. New version program summaryTitle of program: BSR Catalogue identifier: ADWY Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADWY Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Computers on which the program has been tested: Microway Beowulf cluster; Compaq Beowulf cluster; DEC Alpha workstation; DELL PC Operating systems under which the new version has been tested: UNIX, Windows XP Programming language used: FORTRAN 95 Memory required to execute with typical data: Typically 256-512 Mwords. Since all the principal dimensions are allocatable, the available memory defines the maximum complexity of the problem No. of bits in a word: 8 No. of processors used: 1 Has the code been vectorized or parallelized?: no No. of lines in distributed program, including test data, etc.: 69 943 No. of bytes in distributed program, including test data, etc.: 746 450 Peripherals used: scratch disk store; permanent disk store Distribution format: tar.gz Nature of physical problem: This program uses the R-matrix method to calculate electron-atom and electron-ion collision processes, with options to calculate radiative data, photoionization, etc. The calculations can be performed in LS-coupling or in an intermediate-coupling scheme, with options to include Breit-Pauli terms in the Hamiltonian. Method of solution: The R-matrix method is used [P.G. Burke, K.A. Berrington, Atomic and Molecular Processes: An R-Matrix Approach, IOP Publishing, Bristol, 1993; P.G. Burke, W.D. Robb, Adv. At. Mol. Phys. 11 (1975) 143; K.A. Berrington, W.B. Eissner, P.H. Norrington, Comput

  12. DgSMC-B code: A robust and autonomous direct simulation Monte Carlo code for arbitrary geometries

    Science.gov (United States)

    Kargaran, H.; Minuchehr, A.; Zolfaghari, A.

    2016-07-01

    In this paper, we describe the structure of a new Direct Simulation Monte Carlo (DSMC) code that takes advantage of combinatorial geometry (CG) to simulate any rarefied gas flows Medias. The developed code, called DgSMC-B, has been written in FORTRAN90 language with capability of parallel processing using OpenMP framework. The DgSMC-B is capable of handling 3-dimensional (3D) geometries, which is created with first-and second-order surfaces. It performs independent particle tracking for the complex geometry without the intervention of mesh. In addition, it resolves the computational domain boundary and volume computing in border grids using hexahedral mesh. The developed code is robust and self-governing code, which does not use any separate code such as mesh generators. The results of six test cases have been presented to indicate its ability to deal with wide range of benchmark problems with sophisticated geometries such as airfoil NACA 0012. The DgSMC-B code demonstrates its performance and accuracy in a variety of problems. The results are found to be in good agreement with references and experimental data.

  13. Computers cluster for parallel processing with the MCNP4B code: Linux + PVM + MCNP4B

    International Nuclear Information System (INIS)

    Procedures and results obtained in the implantation process of a microcomputers cluster (Linux and PVM) to reduce processing time in MCNP simulations are described. The necessities and specificity concerned to the hardware, the Linux operational system, the PVM software package and an adequate compiled version for MCNP4B are presented. The system was tested to verify the gain in the processing time in function of the number of computers in the cluster using the MCNP input developed to simulate the research reactor TRIGA IPR - R1 of the CDTN/CNEN. Advantages and disadvantages of MCNP code generated with several compilers are discussed, as well as the performance of the executable code generated by each compiler is compared. The results show the viability of the system. It is possible to reduce significantly the simulations processing time of the MCNP code by utilizing PVM computers cluster. It was found that the cost/performance of such a system is often better than the sequential machine (workstations or even mainframes). (author)

  14. MORET: Version 4.B. A multigroup Monte Carlo criticality code

    International Nuclear Information System (INIS)

    MORET 4 is a three dimensional multigroup Monte Carlo code which calculates the effective multiplication factor (keff) of any configurations more or less complex as well as reaction rates in the different volumes of the geometry and the leakage out of the system. MORET 4 is the Monte Carlo code of the APOLLO2-MORET 4 standard route of CRISTAL, the French criticality package. It is the most commonly used Monte Carlo code for French criticality calculations. During the last four years, the MORET 4 team has developed or improved the following major points: modernization of the geometry, implementation of perturbation algorithms, source distribution convergence, statistical detection of stationarity, unbiased variance estimation and creation of pre-processing and post-processing tools. The purpose of this paper is not only to present the new features of MORET but also to detail clearly the physical models and the mathematical methods used in the code. (author)

  15. Evaluation of ENDF/B-VI library with WIMS-AECL/RFSP Code system

    International Nuclear Information System (INIS)

    The object of this research is the evaluation of the cross-section charicteristics of ENDF/B-VI WIMS-AECL library against ENDF/B-V library previously used in the validation of WIMS-AECL code. validation of WIMS-AECL code had been carried out through the Phase-B post simulation of Wolsong Units 2, 3 and 4 before. Discrepancies between the calculated and measured values were thought to be mainly from observation errors and partly from the ENDF/B-V library. Till now, there had been various validation calculations for ENDF/B-VI library in the field of PWR but not in CANDU-PHWR. We herein, evaluated the ENDF/B-VI WIMS-AECL library for Wolsong Unit 4 by comparing the results with previous ones of ENDF/B-V for the same reactor unit with same WIMS/RFSP code system. It can be summarized that the Phase-B post simulation results of WIMS/RFSP with ENDF/B-VI are better than those of ENDF/B-V, because of less difference between calculated and measured values. There must be further study with different core conditions, however, for the exact evaluation of ENDF/B-VI WIMS-AECL library including calculations of many other physical parameters and the treatment of isotopes which is not in ENDF/B-VI but in ENDF/B-V

  16. Tourist Affiliate Program while Using Online Booking System with Possibility of Entering B2B Code

    Directory of Open Access Journals (Sweden)

    Slivar Iva

    2008-01-01

    Full Text Available Affiliate marketing programs are one of the most powerful tools for online marketing since the merchant presenting a product or a service decides on the commissioning model and the commission is granted only if the desired results have been reached. Affiliate marketing is based offline as much as tourism itself and it relies on the commission that tourist companies pay to their partners (affiliates who bring new guests. This paper will present the basics of how online affiliate programs work, benefits they bring and steps for their further implementation. It will explain in detail how to establish an affiliate program for dynamic web pages which use online booking system platforms that offer a possibility of entering a B2B code. Special attention will be paid to SEO (Search Engine Optimisation. It will also present results of a research on Croatian hotels web pages and the implementation of the online booking system and affiliate programs. Having in mind the insufficient deployment of online potentials, the aim of the paper is to stress the need for setting up an effective method of monitoring changes and updates in the online world as well as implementing new promotional possibilities, all aimed at increasing sales. The goal of the paper is to explore advantages and disadvantages of the affiliate program as a new sales channel and promote the possibility to implement it in one of the biggest Croatian hotel companies, Maistra d.d. Rovinj. Along with methods of data acquiring and different techniques of creative thinking, the following scientific research methods were also used: statistic, historic, descriptive, comparison, interview, analysis and synthesis, induction and deduction.

  17. SUMMARY OF GENERAL WORKING GROUP A+B+D: CODES BENCHMARKING.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.; SHAPOSHNIKOVA, E.; ZIMMERMANN, F.; HOFMANN, I.

    2006-05-29

    Computer simulation is an indispensable tool in assisting the design, construction, and operation of accelerators. In particular, computer simulation complements analytical theories and experimental observations in understanding beam dynamics in accelerators. The ultimate function of computer simulation is to study mechanisms that limit the performance of frontier accelerators. There are four goals for the benchmarking of computer simulation codes, namely debugging, validation, comparison and verification: (1) Debugging--codes should calculate what they are supposed to calculate; (2) Validation--results generated by the codes should agree with established analytical results for specific cases; (3) Comparison--results from two sets of codes should agree with each other if the models used are the same; and (4) Verification--results from the codes should agree with experimental measurements. This is the summary of the joint session among working groups A, B, and D of the HI32006 Workshop on computer codes benchmarking.

  18. HIGH QUALITY IMPLEMENTATION FOR AUTOMATIC GENERATION C# CODE BY EVENT-B PATTERN

    Directory of Open Access Journals (Sweden)

    Eman K Elsayed

    2014-01-01

    Full Text Available In this paper we proposed the logical correct path to implement automatically any algorithm or model in verified C# code. Our proposal depends on using the event-B as a formal method. It is suitable solution for un-experience in programming language and profession in mathematical modeling. Our proposal also integrates requirements, codes and verification in system development life cycle. We suggest also using event-B pattern. Our suggestion is classify into two cases, the algorithm case and the model case. The benefits of our proposal are reducing the prove effort, reusability, increasing the automation degree and generate high quality code. In this paper we applied and discussed the three phases of automatic code generation philosophy on two case studies the first is “minimum algorithm” and the second one is a model for ATM.

  19. Calculations of WWER cells and assemblies by WIMS-7B code

    International Nuclear Information System (INIS)

    A study of the nuclear data libraries of the WIMS-7B code have been performed in calculations of computational benchmark problems. The benchmarks cover pin cell, single fuel assembly with several different fuel types, moderator densities. Fuel depletion is performed to a burnup of 60 MWd/kgNM in the WWER-1000 pin cell. The results of the analysis of the benchmark with different code systems have been compared and indicated good agreement among the different methods and data. (Authors)

  20. Radiation transport phenomena and modeling. Part A: Codes; Part B: Applications with examples

    International Nuclear Information System (INIS)

    This report contains the notes from the second session of the 1997 IEEE Nuclear and Space Radiation Effects Conference Short Course on Applying Computer Simulation Tools to Radiation Effects Problems. Part A discusses the physical phenomena modeled in radiation transport codes and various types of algorithmic implementations. Part B gives examples of how these codes can be used to design experiments whose results can be easily analyzed and describes how to calculate quantities of interest for electronic devices

  1. Codes in $ A_n $ Lattices: Geometry of $ B_h $ Sets and Difference Sets

    OpenAIRE

    Kovačević, Mladen

    2014-01-01

    Motivated by several communication scenarios, such as the permutation channel, the $ 0 $-insertion/deletion channel, and $ q $-ary asymmetric channels, we investigate properties of (linear) codes in $ A_n $ lattices. In particular, we demonstrate a connection between such codes and notions of difference sets and $ B_h $ sets in Abelian groups. It is shown that the $ A_n $ lattice admits a linear perfect code of radius $ 1 $ if and only if there exists an Abelian planar difference set of cardi...

  2. Summary of ENDF/B Pre-Processing Codes June 1983

    International Nuclear Information System (INIS)

    This is the summary documentation for the 1983 version of the ENDF/B Pre-Processing Codes LINEAR, RECENT, SIGMA1, GROUPIE, EVALPLOT, MERGER, DICTION, COMPLOT, CONVERT. This summary documentation is merely a copy of the comment cards that appear at the beginning of each programme; these comment cards always reflect the latest status of input options, etc

  3. Some benchmark calculations for VVER-1000 assemblies by WIMS-7B code

    International Nuclear Information System (INIS)

    Our aim in this report is to compare of calculation results, obtained with the use of different libraries, which are in the variant of the WIMS7B code. We had the three libraries: the 1986 library is based on the UKNDL files, the two 1996 libraries are based on the JEF-2.2 files, the one having the 69 group approximation, the other having the 172 group approximation. We wanted also to have some acquaintance with the new option of WIMS-7B - CACTUS. The variant of WIMS-7B was placed at our disposal by the code authors for a temporal use for 9 months. It was natural to make at comparisons with analogous values of TVS-M, MCU, Apollo-2, Casmo-4, Conkemo, MCNP, HELIOS codes, where the other different libraries were used. In accordance with our aims the calculations of unprofiled and profiled assemblies of the VVER-1000 reactor have been carried out by the option CACTUS. This option provides calculations by the characteristics method. The calculation results have been compared with the K∞ values obtained by other codes in work. The conclusion from this analysis is such: the methodical parts of errors of these codes have nearly the same values. Spacing for Keff values can be explained of the library microsections differences mainly. Nevertheless, the more detailed analysis of the results obtained is required. In conclusion the calculation of a depletion of VVER-1000 cell has been carried out. The comparison of the dependency of the multiply factor from the depletion obtained by WIMS-7B with different libraries and by the TVS-M, MCU, HELIOS and WIMS-ABBN codes in work has been performed. (orig.)

  4. A methodology for the analysis of protection against overpressure using the Ramona-3 B code

    International Nuclear Information System (INIS)

    A methodology to carry out the most severe overpressure transient that could happen at Laguna Verde Nuclear power Plant is presented, this study is a requirement as a part of the licensing analysis in a fuel reload. The analysis is put into effect with the Ramona 3-B code. The results are compared against the safety analysis report of the Laguna Verde Nuclear Power Plant. The aim of the analysis is to determine the maximum pressure reached on the reactor vessel during operational events, in order to demonstrate agreement with the ASME code for Containers and Pressure Vessels. (Author)

  5. The ENIGMA fuel performance code and its application to the Pre-Operational Safety Report for Sizewell B

    International Nuclear Information System (INIS)

    This paper describes the circumstances leading to the development of the ENIGMA fuel performance code within the UK Nuclear Industry. A brief description of the code is given including the novel features addressed in some of the main sub-models. The code was designed specifically to address fuel performance for the Sizewell B Pre Operational Safety Report, and a number of areas are described where the code was employed. (Author)

  6. 77 FR 5265 - Eastern Band of Cherokee Indians-Cherokee Code Chapter 18B, Regulation of Alcoholic Beverages

    Science.gov (United States)

    2012-02-02

    ... Bureau of Indian Affairs Eastern Band of Cherokee Indians--Cherokee Code Chapter 18B, Regulation of... publishes the Amendment to the Eastern Band of Cherokee Indians--Cherokee Code Chapter 18B, Regulation of... within the Eastern Band of Cherokee Indians' Reservation. This Ordinance will increase the ability of...

  7. Permanent boiling in rod bundles: calculations with the FLICA II B code

    International Nuclear Information System (INIS)

    Some calculations have been made with the FLICA II B code using a model representing rod-bundles by means of few interconnected channels. The result obtained give some idea of the similarities and differences of behavior to be expected between single channels and rod bundles during permanent forced convection sodium boiling regimes. A new phenomenon, the so-called internal flow excursion is described

  8. An analysis of CSNI Standard Problem No.6 by ALARM-B1 computer code

    International Nuclear Information System (INIS)

    Presented in this report are the results of a computer simulation of the CSNI International Standard Problem No.6 (ISP6) by the ALARM-B1 code. The aim of this standard problem is particularly to examine the capability of analytical models relating to the two-phase mixture level and the discharge mass flow rate using the individual participants' computer codes. The theoretical predictions were performed to explore the separate effects during the initial three seconds attended with a non-equilibrium physical phenomenon. The ISP6, which is based on the Battelle Frankfurt experiment duplicating a BWR steam line break accident, might not be appropriate as a bench mark problem of the ALARM-B1 program (version 2), because it contains an unreasonable demand treating a thermal non-equilibrium process with an equilibrium model. Apart from the pressure history arising from the non-equilibrium feature, the transient steam-water interface in the vessel was tracked sufficiently by using the bubble-rise-model incorporated in the ALARM-B1 code. In addition, the calculated mass flow rate at the exit plane during the steam phase blowdown was correct within the 15% experimental error bands. (author)

  9. Expression in bacteria of gB-glycoprotein-coding sequences of Herpes simplex virus type 2.

    Science.gov (United States)

    Person, S; Warner, S C; Bzik, D J; Debroy, C; Fox, B A

    1985-01-01

    A plasmid with an insert that encodes the glycoprotein B(gB) gene of Herpes simplex virus type 2 (HSV-2) has been isolated. DNA sequences coding for a portion of the HSV-2 gB peptide were cloned into a bacterial lacZ alpha expression vector and used to transform Escherichia coli. Upon induction of lacZpo-promoted transcription, some of the bacteria became filamentous and produced inclusion bodies containing a large amount of a 65-kDal peptide that was shown to be precipitated by broad-spectrum antibodies to HSV-2 and HSV-1. The HSV-2 insert of one of these clones specifies amino acid residues corresponding to 135 through 629 of the gB of HSV-1 [Bzik et al., Virology 133 (1984) 301-314]. PMID:2412940

  10. OPT13B and OPTIM4 - computer codes for optical model calculations

    International Nuclear Information System (INIS)

    OPT13B is a computer code in FORTRAN for optical model calculations with automatic search. A summary of different formulae used for computation is given. Numerical methods are discussed. The 'search' technique followed to obtain the set of optical model parameters which produce best fit to experimental data in a least-square sense is also discussed. Different subroutines of the program are briefly described. Input-output specifications are given in detail. A modified version of OPT13B specifications are given in detail. A modified version of OPT13B is OPTIM4. It can be used for optical model calculations where the form factors of different parts of the optical potential are known point by point. A brief description of the modifications is given. (author)

  11. Analysis Of Criticality Experiments Of Bandung Triga 2000 Reactor By Using MCNP-4B Code

    International Nuclear Information System (INIS)

    During the first core loading of Bandung TRIGA 2000 reactor, two kinds of criticality experiment have been conducted, i.e, sub critical core loading and critical core loading experiments. The purpose of the experiments is to maximize the utilization of the reactor as well as to provide benchmark data for neutronic computer codes. In the sub critical core loading experiment, the core is loaded up to 42 fuel elements ring D, 13 fuel elements in ring, D, 6 fuel elements and 3 graphite dummies in ring E, 2 fuel elements in ring B, 2 fuel elements in ring B, 1 fuel element in ring B. In the other case, during the critical loading experiment, the core is loaded following the loading pattern planned by General Atomics, i.e: 20 fuel elements in ring B, C and D plus 5 control rods in ring D, 11 fuel elements in ring D, 6 fuel elements and 3 graphite dummies in ring E, and then the core is loaded with additional fuel elements, step by step, until the core reached its first criticality, i.e., 55 fuel elements. Prior to conduct of criticality experiments MCNP-4B code is used to plan the fuel loading pattern of the sub critical loading experiment, i.e. to assure that the core is still in sub critical state with 42 fuel elements in the core. In the calculation is assumed that the mass of U-235 in each fuel element depends on the documented burnup data, the mass of U-238 is assumed to be the same as the one in fresh fuels. Furthermore, all fission patricides as well as poisonous materials in each fuel element are ignored. The experiment results showed that the calculations of MCNP-4B also predicted that TRIGA 2000 reactor with the above assumptions, is appropriate for predicting for predicting the neutronic characteristics of Bandung TRIGA 2000 reactor

  12. The PSACOIN level 1B exercise: A probabilistic code intercomparison involving a four compartment biosphere model

    International Nuclear Information System (INIS)

    The probabilistic Systems Assessment Code (PSAC) User Group of the OECD Nuclear Energy Agency has organised a series of code intercomparison studies of relevance to the performance assessment of underground repositories for radioactive wastes - known collectively by the name PSACOIN. The latest of these to be undertaken is designated PSACOIN Level 1b, and the case specification provides a complete assessment model of the behaviour of radionuclides following release into the biosphere. PSACOIN Level 1b differs from other biosphere oriented intercomparison exercises in that individual dose is the end point of the calculations as opposed to any other intermediate quantity. The PSACOIN Level 1b case specification describes a simple source term which is used to simulate the release of activity to the biosphere from certain types of near surface waste repository, the transport of radionuclides through the biosphere and their eventual uptake by humankind. The biosphere sub model comprises 4 compartments representing top and deep soil layers, river water and river sediment. The transport of radionuclides between the physical compartments is described by ten transfer coefficients and doses to humankind arise from the simultaneous consumption of water, fish, meat, milk, and grain as well as from dust inhalation and external γ-irradiation. The parameters of the exposure pathway sub model are chosen to be representative of an individual living in a small agrarian community. (13 refs., 3 figs., 2 tabs.)

  13. Improved numerical grid generation techniques for the B2 edge plasma code

    International Nuclear Information System (INIS)

    Techniques used to generate grids for edge fluid codes such as B2 from numerically computed equilibria are discussed. Fully orthogonal, numerically derived grids closely resembling analytically prescribed meshes can be obtained. But, the details of the poloidal field can vary, yielding significantly different plasma parameters in the simulations. The magnitude of these differences is consistent with the predictions of an analytic model of the scrape-off layer. Both numerical and analytic grids are insensitive to changes in their defining parameters. Methods for implementing nonorthogonal boundaries in these meshes are also presented; they differ slightly from those required for fully orthogonal grids

  14. A Random Walk on WASP-12b with the Bayesian Atmospheric Radiative Transfer (BART) Code

    Science.gov (United States)

    Harrington, Joseph; Cubillos, Patricio; Blecic, Jasmina; Challener, Ryan; Rojo, Patricio; Lust, Nathaniel B.; Bowman, Oliver; Blumenthal, Sarah D.; Foster, Andrew S. D.; Foster, Austin James; Stemm, Madison; Bruce, Dylan

    2016-01-01

    We present the Bayesian Atmospheric Radiative Transfer (BART) code for atmospheric property retrievals from transit and eclipse spectra, and apply it to WASP-12b, a hot (~3000 K) exoplanet with a high eclipse signal-to-noise ratio. WASP-12b has been controversial. We (Madhusudhan et al. 2011, Nature) claimed it was the first planet with a high C/O abundance ratio. Line et al. (2014, ApJ) suggested a high CO2 abundance to explain the data. Stevenson et al. (2014, ApJ, atmospheric model by Madhusudhan) add additional data and reaffirm the original result, stating that C2H2 and HCN, not included in the Line et al. models, explain the data. We explore several modeling configurations and include Hubble, Spitzer, and ground-based eclipse data.BART consists of a differential-evolution Markov-Chain Monte Carlo sampler that drives a line-by-line radiative transfer code through the phase space of thermal- and abundance-profile parameters. BART is written in Python and C. Python modules generate atmospheric profiles from sets of MCMC parameters and integrate the resulting spectra over observational bandpasses, allowing high flexibility in modeling the planet without interacting with the fast, C portions that calculate the spectra. BART's shared memory and optimized opacity calculation allow it to run on a laptop, enabling classroom use. Runs can scale constant abundance profiles, profiles of thermochemical equilibrium abundances (TEA) calculated by the included TEA code, or arbitrary curves. Several thermal profile parameterizations are available. BART is an open-source, reproducible-research code. Users must release any code or data modifications if they publish results from it, and we encourage the community to use it and to participate in its development via http://github.com/ExOSPORTS/BART.This work was supported by NASA Planetary Atmospheres grant NNX12AI69G and NASA Astrophysics Data Analysis Program grant NNX13AF38G. J. Blecic holds a NASA Earth and Space Science

  15. WASP-12b According to the Bayesian Atmospheric Radiative Transfer (BART) Code

    Science.gov (United States)

    Harrington, Joseph; Cubillos, Patricio E.; Blecic, Jasmina; Challener, Ryan C.; Rojo, Patricio M.; Lust, Nate B.; Bowman, M. Oliver; Blumenthal, Sarah D.; Foster, Andrew SD; Foster, A. J.

    2015-11-01

    We present the Bayesian Atmospheric Radiative Transfer (BART) code for atmospheric property retrievals from transit and eclipse spectra, and apply it to WASP-12b, a hot (~3000 K) exoplanet with a high eclipse signal-to-noise ratio. WASP-12b has been controversial. We (Madhusudhan et al. 2011, Nature) claimed it was the first planet with a high C/O abundance ratio. Line et al. (2014, ApJ) suggested a high CO2 abundance to explain the data. Stevenson et al. (2014, ApJ, atmospheric model by Madhusudhan) add additional data and reaffirm the original result, stating that C2H2 and HCN, not included in the Line et al. models, explain the data. We explore several modeling configurations and include Hubble, Spitzer, and ground-based eclipse data.BART consists of a differential-evolution Markov-Chain Monte Carlo sampler that drives a line-by-line radiative transfer code through the phase space of thermal- and abundance-profile parameters. BART is written in Python and C. Python modules generate atmospheric profiles from sets of MCMC parameters and integrate the resulting spectra over observational bandpasses, allowing high flexibility in modeling the planet without interacting with the fast, C portions that calculate the spectra. BART's shared memory and optimized opacity calculation allow it to run on a laptop, enabling classroom use. Runs can scale constant abundance profiles, profiles of thermochemical equilibrium abundances (TEA) calculated by the included TEA code, or arbitrary curves. Several thermal profile parameterizations are available. BART is an open-source, reproducible-research code. Users must release any code or data modifications if they publish results from it, and we encourage the community to use it and to participate in its development via http://github.com/ExOSPORTS/BART.This work was supported by NASA Planetary Atmospheres grant NNX12AI69G and NASA Astrophysics Data Analysis Program grant NNX13AF38G. J. Blecic holds a NASA Earth and Space Science

  16. Models of multi-rod code FRETA-B for transient fuel behavior analysis

    International Nuclear Information System (INIS)

    This paper is a final report of the development of FRETA-B code, which analyzes the LWR fuel behavior during accidents, particularly the Loss-of-Coolant Accident (LOCA). The very high temperature induced by a LOCA causes oxidation of the cladding by steam and, as a combined effect with low external pressure, extensive swelling of the cladding. The latter may reach a level that the rods block the coolant channel. To analyze these phenomena, single-rod model is insufficient; FRETA-B has a capability to handle multiple fuel rods in a bundle simultaneously, including the interaction between them. In the development work, therefore, efforts were made for avoiding the excessive increase of calculation time and core memory requirement. Because of the strong dependency of the in-LOCA fuel behavior on the coolant state, FRETA-B has emphasis on heat transfer to the coolant as well as the cladding deformation. In the final version, a capability was added to analyze the fuel behavior under reflooding using empirical models. The present report describes the basic models of FRETA-B, and also gives its input manual in the appendix. (author)

  17. Missile target interaction analysis of B747 aircraft using hydro code LSDYNA

    International Nuclear Information System (INIS)

    After the 11 September 2011, we newly recognized the importance of intentional aircraft impact on national critical infrastructure such as tall buildings, military facilities, and nuclear power plants. A lot of research has been performed to measure the capability of current nuclear power plants to withstand unusual impact loadings. As a result, Nuclear Regulatory Commission (NRC) concluded that the impact of a large, commercial aircraft is a beyond design basis event (BDBE). In this paper, we demonstrate the assessment of the impact load of large, commercial B747 aircraft by using the so called missile target interaction analysis method. The results of impact force is compared with the reported impact force time histories of B747. To perform the missile target interaction analysis, an FE mesh model of B747 is developed. Rigid wall impact tests are performed numerically using commercial Hydro code LS DYNA with FE model of B747 to demonstrate the accuracy and applicability of the rigorous missile target interaction analysis

  18. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - user's manual

    International Nuclear Information System (INIS)

    This document is the User's Manual for the Boiling Water Reactor (BWR), and Simplified Boiling Water Reactor (SBWR) systems transient code RAMONA-4B. The code uses a three-dimensional neutron-kinetics model coupled with a multichannel, nonequilibrium, drift-flux, phase-flow model of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients. Chapter 1 gives an overview of the code's capabilities and limitations; Chapter 2 describes the code's structure, lists major subroutines, and discusses the computer requirements. Chapter 3 is on code, auxillary codes, and instructions for running RAMONA-4B on Sun SPARC and IBM Workstations. Chapter 4 contains component descriptions and detailed card-by-card input instructions. Chapter 5 provides samples of the tabulated output for the steady-state and transient calculations and discusses the plotting procedures for the steady-state and transient calculations. Three appendices contain important user and programmer information: lists of plot variables (Appendix A) listings of input deck for sample problem (Appendix B), and a description of the plotting program PAD (Appendix C). 24 refs., 18 figs., 11 tabs

  19. A code to process photonic production data under ENDF/B format

    International Nuclear Information System (INIS)

    The code EVGRP has been written to process the ENDF/B IV photonic production data. It may be used to: 1) generate, for a given set of materials and gamma producing reactions, the photo-production cross section for each reaction. 2) Calculate, for a material or a mixture of materials: the neutron-gamma group photo-production cross sections for a given reactions set; for each neutron group, the mean number of photons produced, in each gamma group, by a neutron interaction inducing the given photo-production reactions and the other possible reactions; for each neutron group, the photon mean number produced, in each gamma group, by any neutron interaction with the target; for each neutron group, the relative abundance, in the corresponding gamma group, of each produced gamma ray. This code, working on 7600 CDC, processes all the specified options of the 12 (multiplicities), 13 (photo production cross sections) and 15 (gamma continuous spectra) ENDF files and gives the results under an ENDF type format

  20. The reactor kinetics code tank: a validation against selected SPERT-1b experiments

    International Nuclear Information System (INIS)

    The two-dimensional space-time analysis code TANK is being developed for the simulation of transient behaviour in the MAPLE class of research reactors. MAPLE research reactor cores are compact, light-water-cooled and -moderated, with a high degree of forced subcooling. The SPERT-1B(24/32) reactor core had many similarities to MAPLE-X10, and the results of the SPERT transient experiments are well documented. As a validation of TANK, a series of simulations of certain SPERT reactor transients was undertaken. Special features were added to the TANK code to model reactors with plate-type fuel and to allow for the simulation of rapid void production. The results of a series of super-prompt-critical reactivity step-insertion transient simulations are presented. The selected SPERT transients were all initiated from low power, at ambient temperatures, and with negligible coolant flow. Th results of the TANK simulations are in good agreement with the trends in the experimental SPERT data

  1. Globus-M plasma edge modeling with B2SOLPS5.2 code

    Science.gov (United States)

    Vekshina, E.; Senichenkov, I.; Rozhansky, V.; Kaveeva, E.; Khromov, N.; Kurskiev, G.; Patrov, M.; Globus-M team

    2016-08-01

    The edge plasma of five Globus-M discharges was modeled by the B2SOLPS5.2 code. Plasma current varied in 114–198 kA range, and all discharges were in the H-mode. The modeled scrape-off layer (SOL) width appeared to be inversely proportional to the plasma current. Such a relation is observed in many other tokamaks. Heat flux to the outer divertor target and radiation power was examined for these discharges. Radiation was found to be responsible for 40% of the energy loss. Energy flux to the low outer divertor target was about 1/3 of the energy loss in the single-null low X-point discharges.

  2. ETOGM: epithermal cross section generation code using ENDF/B data

    International Nuclear Information System (INIS)

    ETOGM processes ENDF/B FORMAT data to produce a master epithermal library containing multigroup cross sections, resolved and unresolved resonance parameters, and a scattering matrix for up to 100 materials of interest in reactor design calculations. The epithermal energy range may be divided into as many as 127 groups, and a weighting function may either be input or calculated by the code for use in calculating average group coefficients. Resonance contributions from thermal and negative energy resolved resonances, as well as infinite-dilute corrections in the epithermal range, are added to the appropriate smooth cross sections. Resolved and unresolved resonance parameters are tabulated when applicable. A combined inelastic-(n,2n) scattering matrix is calculated from secondary neutron energy distribution data. A fission spectrum is computed for each fissionable material. The master epithermal library is generated, updated, and edited by the ETOGM program

  3. Development of a graphic interface for the Ramona-3B code

    International Nuclear Information System (INIS)

    In this work a graphic interface that interprets the data of the Ramona-3B code is presented. The Ramona-3B code it is a computer program, that it uses text files as input and its generate output also of this type. The quantity of generated information is so big that always it is necessary to process this information with graphic tools to be able to analyze the results of the simulations of nuclear centrals with boiling water reactors. When having a modern tool that it translates text in graphics in an automatic way and that it is of great versatility, one can obtain a graphic interface that facilitates the interpretation of how a BWR nuclear plant behaves. To achieve this tool the key it has been a program that it reads chains of previously indicated characters that keeps the data in a file for later to manipulate them in the creation of the graphic interface. It is used a software of easy access that resists the processing of a great one quantity of data and that later its have been able to graph. Another important function of this interface it is allowing the modification of the input file for Ramona using graphic unfolding and helps in it lines without necessarily to go to the file with input data. For the design of graphic interface it was decided first to show the more representative variables of a BWR type nuclear plant. It is used Mat lab as platform on several options, as PHP, Lab view or C'. The obtained graphs allow monitoring the plant and to have the control of selected variables. For the graphic interface only is necessary to indicate it the variable to simulate for to be able to interpret graphically the behavior of the BWR type nuclear plant. This tool is of great utility for the teaching of students that they are interested in this type of nuclear topics. (Author)

  4. Description and assessment of RAMONA-3B Mod.0 Cycle 4: a computer code with three-dimensional neutron kinetics for BWR system transients

    International Nuclear Information System (INIS)

    This report documents the physical models and the numerical methods employed in the BWR systems code RAMONA-3B. The RAMONA-3B code simulates three-dimensional neutron kinetics and multichannel core hydraulics of nonhomogeneous, nonequilibrium two-phase flows. RAMONA-3B is programmed to calculate the steady and transient conditions in the main steam supply system for normal and abnormal operational transients, including the performances of plant control and protection systems. Presented are code capabilities and limitations, models and solution techniques, the results of development code assessment and suggestions for improving the code in the future

  5. Numerical study of the ITER divertor plasma with the B2-EIRENE code package

    Energy Technology Data Exchange (ETDEWEB)

    Kotov, V.; Reiter, D. [Forschungszentrum Juelich (DE). Inst. fuer Energieforschung (IEF), Plasmaphysik (IEF-4); Kukushkin, A.S. [ITER International Team, Cadarache (France)

    2007-11-15

    The problem of plasma-wall interaction and impurity control is one of the remaining critical issues for development of an industrial energy source based on nuclear fusion of light isotopes. In this field sophisticated integrated numerical tools are widely used both for the analysis of current experiments and for predictions guiding future device design. The present work is dedicated to the numerical modelling of the edge plasma region in divertor configurations of large-scale tokamak fusion devices. A well established software tool for this kind of modelling is the B2-EIRENE code. It was originally developed for a relatively hot (>> 10 eV) ''high recycling divertor''. It did not take into account a number of physical effects which can be potentially important for ''detached conditions'' (cold, - several eV, - high density, - {approx} 10{sup 21} m{sup -3}, - plasma) typical for large tokamak devices. This is especially critical for the modelling of the divertor plasma of ITER: an international project of an experimental tokamak fusion reactor to be built in Cadarache, France by 2016. This present work is devoted to a major upgrade of the B2-EIRENE package, which is routinely used for ITER modelling, essentially with a significantly revised version of EIRENE: the Monte-Carlo neutral transport code. The main part of the thesis address three major groups of the new physical effects which have been added to the model in frame of this work: the neutral-neutral collisions, the up-to date hydrogen molecular reaction kinetics and the line radiation transport. The impact of the each stage of the upgrade on the self-consistent (between plasma, the neutral gas and the radiation field) solution for the reference ITER case is analysed. The strongest effect is found to be due to the revised molecular collision kinetics, in particular due to hitherto neglected elastic collisions of hydrogen molecules with ions. The newly added non

  6. Numerical study of the ITER divertor plasma with the B2-EIRENE code package

    International Nuclear Information System (INIS)

    The problem of plasma-wall interaction and impurity control is one of the remaining critical issues for development of an industrial energy source based on nuclear fusion of light isotopes. In this field sophisticated integrated numerical tools are widely used both for the analysis of current experiments and for predictions guiding future device design. The present work is dedicated to the numerical modelling of the edge plasma region in divertor configurations of large-scale tokamak fusion devices. A well established software tool for this kind of modelling is the B2-EIRENE code. It was originally developed for a relatively hot (>> 10 eV) ''high recycling divertor''. It did not take into account a number of physical effects which can be potentially important for ''detached conditions'' (cold, - several eV, - high density, - ∼ 1021 m-3, - plasma) typical for large tokamak devices. This is especially critical for the modelling of the divertor plasma of ITER: an international project of an experimental tokamak fusion reactor to be built in Cadarache, France by 2016. This present work is devoted to a major upgrade of the B2-EIRENE package, which is routinely used for ITER modelling, essentially with a significantly revised version of EIRENE: the Monte-Carlo neutral transport code. The main part of the thesis address three major groups of the new physical effects which have been added to the model in frame of this work: the neutral-neutral collisions, the up-to date hydrogen molecular reaction kinetics and the line radiation transport. The impact of the each stage of the upgrade on the self-consistent (between plasma, the neutral gas and the radiation field) solution for the reference ITER case is analysed. The strongest effect is found to be due to the revised molecular collision kinetics, in particular due to hitherto neglected elastic collisions of hydrogen molecules with ions. The newly added non-linear effects (neutral-neutral collisions, radiation opacity) are

  7. Analysis of bHLH coding genes using gene co-expression network approach.

    Science.gov (United States)

    Srivastava, Swati; Sanchita; Singh, Garima; Singh, Noopur; Srivastava, Gaurava; Sharma, Ashok

    2016-07-01

    Network analysis provides a powerful framework for the interpretation of data. It uses novel reference network-based metrices for module evolution. These could be used to identify module of highly connected genes showing variation in co-expression network. In this study, a co-expression network-based approach was used for analyzing the genes from microarray data. Our approach consists of a simple but robust rank-based network construction. The publicly available gene expression data of Solanum tuberosum under cold and heat stresses were considered to create and analyze a gene co-expression network. The analysis provide highly co-expressed module of bHLH coding genes based on correlation values. Our approach was to analyze the variation of genes expression, according to the time period of stress through co-expression network approach. As the result, the seed genes were identified showing multiple connections with other genes in the same cluster. Seed genes were found to be vary in different time periods of stress. These analyzed seed genes may be utilized further as marker genes for developing the stress tolerant plant species. PMID:27178572

  8. Radiation field characterization of a BNCT research facility using Monte Carlo method - code MCNP-4B

    International Nuclear Information System (INIS)

    Boron Neutron Capture Therapy - BNCT - is a selective cancer treatment and arises as an alternative therapy to treat cancer when usual techniques - surgery, chemotherapy or radiotherapy - show no satisfactory results. The main proposal of this work is to project a facility to BNCT studies. This facility relies on the use of an Am Be neutron source and on a set of moderators, filters and shielding which will provide the best neutron/gamma beam characteristic for these Becton studies, i.e., high intensity thermal and/or epithermal neutron fluxes and with the minimum feasible gamma rays and fast neutrons contaminants. A computational model of the experiment was used to obtain the radiation field in the sample irradiation position. The calculations have been performed with the MCNP 4B Monte Carlo Code and the results obtained can be regarded as satisfactory, i.e., a thermal neutron fluencyNT = 1,35x108 n/cm , a fast neutron dose of 5,86x10-10 Gy/NT and a gamma ray dose of 8,30x10-14 Gy/NT. (author)

  9. Radiation field characterization of a BNCT research facility using Monte Carlo Method - Code MCNP-4B

    International Nuclear Information System (INIS)

    Boron Neutron Capture Therapy - BNCT- is a selective cancer treatment and arises as an alternative therapy to treat cancer when usual techniques - surgery, chemotherapy or radiotherapy - show no satisfactory results. The main proposal of this work is to project a facility to BNCT studies. This facility relies on the use of an AmBe neutron source and on a set of moderators, filters and shielding which will provide the best neutron/gamma beam characteristic for these BNCT studies, i.e., high intensity thermal and/or epithermal neutron fluxes and with the minimum feasible gamma rays and fast neutrons contaminants. A computational model of the experiment was used to obtain the radiation field in the sample irradiation position. The calculations have been performed with the MCNP 4B Monte Carlo Code and the results obtained can be regarded as satisfactory, i.e., a thermal neutron fluency ΝΤ = 1,35x108 n/cm2, a fast neutron dose of 5,86x-10 Gy/ΝΤ and a gamma ray dose of 8,30x-14 Gy/ΝΤ. (author)

  10. 50 CFR Table 2b to Part 679 - Species Codes: FMP Prohibited Species and CR Crab

    Science.gov (United States)

    2010-10-01

    ... CR Crab Species Description Code CR Crab Groundfish PSC CRAB Box Lopholithodes mandtii 900... aequispinus 923 ✓ ✓ King, red Paralithodes camtshaticus 921 ✓ ✓ King, scarlet (deepsea) Lithodes couesi...

  11. Analysis of ZR-6 experiments using the KARATE-440 code system upgraded by ENDF/B-VI data

    International Nuclear Information System (INIS)

    Extensive validation of nuclear libraries was performed against lattice experiments with the help of the MULTICELL lattice calculation code and the COREMICRO 2D fine diffusion code. New cross-section library set was developed for these codes based on the ENDF/B-VI nuclear database. These codes belong to the KARATE-440 code package which is used for the calculation of VVER-440 reactor cores. The ZR-6 zero power critical facility was used as experimental database, where a wide range of hexagonal lattices were investigated. In the first step single-pin-cell calculations were performed for uniform critical ZR-6 lattices, where the axial and radial leakage were taken into account by the measured material buckling. In this step beside of criticality some spectral indices were investigated too. In the second step 2D calculations were applied for all the experimental configurations, including different temperatures. The ∂ρ/∂Η and ∂ρ/∂Τ coefficients were evaluated, too.(author)

  12. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - models and correlations

    Energy Technology Data Exchange (ETDEWEB)

    Rohatgi, U.S.; Cheng, H.S.; Khan, H.J.; Mallen, A.N.; Neymotin, L.Y.

    1998-03-01

    This document describes the major modifications and improvements made to the modeling of the RAMONA-3B/MOD0 code since 1981, when the code description and assessment report was completed. The new version of the code is RAMONA-4B. RAMONA-4B is a systems transient code for application to different versions of Boiling Water Reactors (BWR) such as the current BWR, the Advanced Boiling Water Reactor (ABWR), and the Simplified Boiling Water Reactor (SBWR). This code uses a three-dimensional neutron kinetics model coupled with a multichannel, non-equilibrium, drift-flux, two-phase flow formulation of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients and instability issues. Chapter 1 is an overview of the code`s capabilities and limitations; Chapter 2 discusses the neutron kinetics modeling and the implementation of reactivity edits. Chapter 3 is an overview of the heat conduction calculations. Chapter 4 presents modifications to the thermal-hydraulics model of the vessel, recirculation loop, steam separators, boron transport, and SBWR specific components. Chapter 5 describes modeling of the plant control and safety systems. Chapter 6 presents and modeling of Balance of Plant (BOP). Chapter 7 describes the mechanistic containment model in the code. The content of this report is complementary to the RAMONA-3B code description and assessment document. 53 refs., 81 figs., 13 tabs.

  13. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - models and correlations

    International Nuclear Information System (INIS)

    This document describes the major modifications and improvements made to the modeling of the RAMONA-3B/MOD0 code since 1981, when the code description and assessment report was completed. The new version of the code is RAMONA-4B. RAMONA-4B is a systems transient code for application to different versions of Boiling Water Reactors (BWR) such as the current BWR, the Advanced Boiling Water Reactor (ABWR), and the Simplified Boiling Water Reactor (SBWR). This code uses a three-dimensional neutron kinetics model coupled with a multichannel, non-equilibrium, drift-flux, two-phase flow formulation of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients and instability issues. Chapter 1 is an overview of the code's capabilities and limitations; Chapter 2 discusses the neutron kinetics modeling and the implementation of reactivity edits. Chapter 3 is an overview of the heat conduction calculations. Chapter 4 presents modifications to the thermal-hydraulics model of the vessel, recirculation loop, steam separators, boron transport, and SBWR specific components. Chapter 5 describes modeling of the plant control and safety systems. Chapter 6 presents and modeling of Balance of Plant (BOP). Chapter 7 describes the mechanistic containment model in the code. The content of this report is complementary to the RAMONA-3B code description and assessment document. 53 refs., 81 figs., 13 tabs

  14. Simulation of the fault transitory of the feedwater controller in a Boiling water reactor with the Ramona-3B code

    International Nuclear Information System (INIS)

    The obtained results when carrying out the simulation of the fault transitory of the feedwater controller (FCAA) with the Ramona-3B code, happened in the Unit 2 of the Laguna Verde power plant (CNLV), in September of the year 2000 are presented. The transitory originates as consequence of the controller's fault of speed of a turbo pump of feedwater. The work includes a short description of the event, the suppositions considered for the simulation and the obtained results. Also, a discussion of the impact of the transitory event is presented on aspects of reactor safety. Although the carried out simulation is limited by the capacities of the code and for the lack of available information, it was found that even in a conservative situation, the power was incremented only in 12% above the nominal value, while that the thermal limit determined by the minimum reason of the critical power, MCPR, always stayed above the limit values of operation and safety. (Author)

  15. A preliminary sensitivity study on LOCA fuel/coolant heat transfer analysis using the Theta1-B code

    International Nuclear Information System (INIS)

    A series of computer experiments has been performed, using the reactor thermal analysis code Theta1-B, to ascertain the significance and relative importance of the various heat transfer regimes in relation to the prediction of maximum fuel cladding temperature for the slowdown phase of a LOCA in a PWR system. Also considered were the significance of the choice of heat transfer correlation for a particular regime, the method of delineating between regimes, and core inlet coolant flow conditions. The most significant finding of this study was that, for a LOCA resulting from a double-ended rupture of a PWR inlet feeder, a nominal change in the coolant mass flow rate for the period 3 to 11 s, from essentially zero flow to a nominal 1.5% of the normal core flow, produced a marked decrease in maximum fuel cladding temperature (around 600 F). For this period the coolant was predicted to be superheated vapour at the position of maximum heat flux and the substantial change in performance is associated with the facts that (a) no correlation is included in the code to estimate heat transfer coefficients for single-phase stagnant coolant conditions, an arbitrary minimum value of the heat transfer coefficient being adopted; and (b) for low flow rates of single-phase coolant the code assumes that the Dittus Boelter heat transfer correlation is applicable. These place a significant limitation on use of the code for reliable prediction of maximum cladding temperature under such conditions, and highlights an area where further information is required

  16. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - user`s manual

    Energy Technology Data Exchange (ETDEWEB)

    Rohatgi, U.S.; Cheng, H.S.; Khan, H.J.; Mallen, A.N.; Neymotin, L.Y.

    1998-03-01

    This document is the User`s Manual for the Boiling Water Reactor (BWR), and Simplified Boiling Water Reactor (SBWR) systems transient code RAMONA-4B. The code uses a three-dimensional neutron-kinetics model coupled with a multichannel, nonequilibrium, drift-flux, phase-flow model of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients. Chapter 1 gives an overview of the code`s capabilities and limitations; Chapter 2 describes the code`s structure, lists major subroutines, and discusses the computer requirements. Chapter 3 is on code, auxillary codes, and instructions for running RAMONA-4B on Sun SPARC and IBM Workstations. Chapter 4 contains component descriptions and detailed card-by-card input instructions. Chapter 5 provides samples of the tabulated output for the steady-state and transient calculations and discusses the plotting procedures for the steady-state and transient calculations. Three appendices contain important user and programmer information: lists of plot variables (Appendix A) listings of input deck for sample problem (Appendix B), and a description of the plotting program PAD (Appendix C). 24 refs., 18 figs., 11 tabs.

  17. BRAF activated non-coding RNA (BANCR) promoting gastric cancer cells proliferation via regulation of NF-κB1

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhi-Xin; Liu, Zhi-Qiang; Jiang, Biao; Lu, Xin-Yang; Ning, Xiao-Fei [Department of Gastrointestinal Surgery, Affiliated Hospital of Jining Medical University, Jining 272029 (China); Yuan, Chuan-Tao [Department of Pathology, Affiliated Hospital of Jining Medical University, Jining 272029 (China); Wang, Ai-Liang, E-mail: wang_ailiang@126.com [Department of Gastrointestinal Surgery, Affiliated Hospital of Jining Medical University, Jining 272029 (China)

    2015-09-18

    Background and objective: Long non-coding RNA, BANCR, has been demonstrated to contribute to the proliferation and migration of tumors. However, its molecular mechanism underlying gastric cancer is still unknown. In present study, we investigated whether BANCR was involved in the development of gastric cancer cells via regulation of NF-κB1. Methods: Human gastric cancer tissues were isolated as well as human gastric cell lines MGC803 and BGC823 were cultured to investigate the role of BANCR in gastric cancer. Results: BANCR expression was significantly up-regulated in gastric tumor tissues and gastric cell lines. Down-regulation of BANCR inhibited gastric cancer cell growth and promoted cell apoptosis, and it also contributed to a significant decrease of NF-κB1 (P50/105) expression and 3′UTR of NF-κB1 activity. Overexpression of NF-κB1 reversed the effect of BANCR on cancer cell growth and apoptosis. MiroRNA-9 (miR-9) targeted NF-κB1, and miR-9 inhibitor also reversed the effects of BANCR on gastric cancer cell growth and apoptosis. Conclusion: BANCR was highly expressed both in gastric tumor tissues and in cancer cells. NF-κB1 and miR-9 were involved in the role of BANCR in gastric cancer cell growth and apoptosis. - Highlights: • BANCR up-regulated in gastric cancer (GC) tissues and cell lines MGC803 and BGC823. • Down-regulation of BANCR inhibited GC cell growth and promoted cell apoptosis. • Down-regulation of BANCR contributed to decreased 3′UTR of NF-κB1 and its expression. • Overexpressed NF-κB1 reversed the effect of BANCR on GC cell growth. • miR-9 inhibitor reversed the effect of BANCR on cancer GC cell growth.

  18. BRAF activated non-coding RNA (BANCR) promoting gastric cancer cells proliferation via regulation of NF-κB1

    International Nuclear Information System (INIS)

    Background and objective: Long non-coding RNA, BANCR, has been demonstrated to contribute to the proliferation and migration of tumors. However, its molecular mechanism underlying gastric cancer is still unknown. In present study, we investigated whether BANCR was involved in the development of gastric cancer cells via regulation of NF-κB1. Methods: Human gastric cancer tissues were isolated as well as human gastric cell lines MGC803 and BGC823 were cultured to investigate the role of BANCR in gastric cancer. Results: BANCR expression was significantly up-regulated in gastric tumor tissues and gastric cell lines. Down-regulation of BANCR inhibited gastric cancer cell growth and promoted cell apoptosis, and it also contributed to a significant decrease of NF-κB1 (P50/105) expression and 3′UTR of NF-κB1 activity. Overexpression of NF-κB1 reversed the effect of BANCR on cancer cell growth and apoptosis. MiroRNA-9 (miR-9) targeted NF-κB1, and miR-9 inhibitor also reversed the effects of BANCR on gastric cancer cell growth and apoptosis. Conclusion: BANCR was highly expressed both in gastric tumor tissues and in cancer cells. NF-κB1 and miR-9 were involved in the role of BANCR in gastric cancer cell growth and apoptosis. - Highlights: • BANCR up-regulated in gastric cancer (GC) tissues and cell lines MGC803 and BGC823. • Down-regulation of BANCR inhibited GC cell growth and promoted cell apoptosis. • Down-regulation of BANCR contributed to decreased 3′UTR of NF-κB1 and its expression. • Overexpressed NF-κB1 reversed the effect of BANCR on GC cell growth. • miR-9 inhibitor reversed the effect of BANCR on cancer GC cell growth

  19. Method to generate the first design of the reload pattern to be used with the Presto-B code in the simulation of the CNLV U-1 reactor

    International Nuclear Information System (INIS)

    This guide is applied for the reload pattern's formation for mirror symmetry of a core room and in accordance with the Control Cell core technique (of the english Control Cell Core - CCC) for the PRESTO-B code. (Author)

  20. ANGRA-1 neutron kinetics model at BOL using WIMSD-5B and PARCS V2.7 codes

    Energy Technology Data Exchange (ETDEWEB)

    Hamers, Adolfo R.; Reis, Patricia A.L.; Rodrigues, Thiago D.A.; Pereira, Claubia; Costa, Antonella L., E-mail: adolforomerohamers@hotmail.com, E-mail: patricialire@yahoo.com.br, E-mail: claubia@nuclear.ufmg.br, E-mail: antonella@nuclear.ufmg.br [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte (Brazil). Departamento de Engenheria Nuclear; Miro, R.; Verdu, G., E-mail: rmiro@iqn.upv.es, E-mail: gverdu@iqn.upv.es [Universitat Politecnica de Valencia (Spain)

    2015-07-01

    A steady-state neutron kinetics model of the Angra-1 NPP at BOL (Beginning Of Life) has been developed with the PARCS V2.7 neutron diffusion code. The information of the burnable poison rods, fuel enrichments and control rod banks distributions within the core have been taken from the Angra-1 FSAR (Final Safety Analysis Report) and implemented in the model. The macroscopic cross sections for the fast and thermal neutron groups have been calculated with the WIMSD-5B lattice cell code. The cross sections were obtained for the rodded and unrodded cases for each composition in the core. In order to establish the initial steady-state, an eigenvalue was made with the PARCS V2.7 code for three steady-state scenario cases reported at the FSAR; a K{sub eff} of 1.0733 was obtained for the unrodded case, K{sub eff} of 1.0718 for a 24% of bank D inserted case and K{sub eff} of 0.8512 for the full rodded case. The normalized core power density distributions were obtained and compared with the corresponding FSAR case. (author)

  1. Systematic procedures for core neutronics modelling in the 3-D BWR system transient code RAMONA-3B

    International Nuclear Information System (INIS)

    RAMONA-3B is a BWR System Transient Code with a full 3-D core neutronics model. The neutronics modelling is based on the PRESTO nodal method extended for kinetics. Established procedures exist for cross-section and kinetic parameter generation. The methods are fully compatible with state-of-the-art static methods for 3-D LWR core simulation and produces results with a high accuracy. The neutronics model and cross-section data generation methods are described. Results from the 3-D calculations are presented in comparison with experimental data, to illustrate the accuray under steady state as well as transient conditions. Procedures for generating consistent 1-D and point kinetics data, also applicable in RAMONA-3B, are being described. (orig.)

  2. Analysis of ROSA-III small-break LOCA experiment RUN 804 by THYDE-B1 computer code

    International Nuclear Information System (INIS)

    THYDE-B1 is a computer code for predicting the thermohydraulic response of the primary system of a BWR during a loss-of-coolant accident (LOCA) aiming at the evaluation of the performance of the emergency core cooling system (ECCS). This code is mainly applied to the analysis of small-break LOCA's with special emphasis on the behavior of the system pressure and the mixture level in the core. Post-test Analysis of a small-break experiment ROSA-III RUN 804 was done for the assessment of the code. ROSA-III facility is a 1/424 scale model of BWR/6 with electrically heated core. RUN 804 was an integral test which simulated a 5% split break at the recirculation pump suction line with ECCS actuation. Sensitivity analyses were also made on important input parameters and models of the code. The temperature rise of fuel rod surface in the experiment was caused by the uncovery of fuel rod to steam from the two-phase mixture. The calculated behavior showed the same trend and the calculated mixture level was in agreement with experimental results. The fuel rod surface temperature after core spray actuation was slightly higher than the experimental results, indicating the need for improvement of heat transfer model. The calculated history of the system pressure showed similar tendency to the experiment, however further examination of the effect of heat loss from the system and of the accuracy of ADS (automatic depressurization system) flow rate in the analysis and experiment is neccesary for better agreement with experimental results. (author)

  3. Bayesian Atmospheric Radiative Transfer (BART) Code and Application to WASP-43b

    Science.gov (United States)

    Blecic, Jasmina; Harrington, Joseph; Cubillos, Patricio; Bowman, Oliver; Rojo, Patricio; Stemm, Madison; Lust, Nathaniel B.; Challener, Ryan; Foster, Austin James; Foster, Andrew S.; Blumenthal, Sarah D.; Bruce, Dylan

    2016-01-01

    We present a new open-source Bayesian radiative-transfer framework, Bayesian Atmospheric Radiative Transfer (BART, https://github.com/exosports/BART), and its application to WASP-43b. BART initializes a model for the atmospheric retrieval calculation, generates thousands of theoretical model spectra using parametrized pressure and temperature profiles and line-by-line radiative-transfer calculation, and employs a statistical package to compare the models with the observations. It consists of three self-sufficient modules available to the community under the reproducible-research license, the Thermochemical Equilibrium Abundances module (TEA, https://github.com/dzesmin/TEA, Blecic et al. 2015}, the radiative-transfer module (Transit, https://github.com/exosports/transit), and the Multi-core Markov-chain Monte Carlo statistical module (MCcubed, https://github.com/pcubillos/MCcubed, Cubillos et al. 2015). We applied BART on all available WASP-43b secondary eclipse data from the space- and ground-based observations constraining the temperature-pressure profile and molecular abundances of the dayside atmosphere of WASP-43b. This work was supported by NASA Planetary Atmospheres grant NNX12AI69G and NASA Astrophysics Data Analysis Program grant NNX13AF38G. JB holds a NASA Earth and Space Science Fellowship.

  4. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  5. Transport simulations of linear plasma generators with the B2.5-Eirene and EMC3-Eirene codes

    Science.gov (United States)

    Rapp, J.; Owen, L. W.; Bonnin, X.; Caneses, J. F.; Canik, J. M.; Corr, C.; Lore, J. D.

    2015-08-01

    Linear plasma generators are cost effective facilities to simulate divertor plasma conditions of present and future fusion reactors. The codes B2.5-Eirene and EMC3-Eirene were extensively used for design studies of the planned Material Plasma Exposure eXperiment (MPEX). Effects on the target plasma of the gas fueling and pumping locations, heating power, device length, magnetic configuration and transport model were studied with B2.5-Eirene. Effects of tilted or vertical targets were calculated with EMC3-Eirene and showed that spreading the incident flux over a larger area leads to lower density, higher temperature and off-axis profile peaking in front of the target. The simulations indicate that with sufficient heating power MPEX can reach target plasma conditions that are similar to those expected in the ITER divertor. B2.5-Eirene simulations of the MAGPIE experiment have been carried out in order to establish an additional benchmark with experimental data from a linear device with helicon wave heating.

  6. Development of a graphic interface for the Ramona-3B code; Desarrollo de una interfaz grafica para el codigo Ramona-3B

    Energy Technology Data Exchange (ETDEWEB)

    Maldonado D, D.; Santos O, M.A. [Laboratorio de Analisis de Ingenieria de Reactores Nucleares, Paseo Cuauhnahuac 8532, Jiutepec, Morelos (Mexico)]. e-mail: chalismx@hotmail.com

    2003-07-01

    In this work a graphic interface that interprets the data of the Ramona-3B code is presented. The Ramona-3B code it is a computer program, that it uses text files as input and its generate output also of this type. The quantity of generated information is so big that always it is necessary to process this information with graphic tools to be able to analyze the results of the simulations of nuclear centrals with boiling water reactors. When having a modern tool that it translates text in graphics in an automatic way and that it is of great versatility, one can obtain a graphic interface that facilitates the interpretation of how a BWR nuclear plant behaves. To achieve this tool the key it has been a program that it reads chains of previously indicated characters that keeps the data in a file for later to manipulate them in the creation of the graphic interface. It is used a software of easy access that resists the processing of a great one quantity of data and that later its have been able to graph. Another important function of this interface it is allowing the modification of the input file for Ramona using graphic unfolding and helps in it lines without necessarily to go to the file with input data. For the design of graphic interface it was decided first to show the more representative variables of a BWR type nuclear plant. It is used Mat lab as platform on several options, as PHP, Lab view or C{sup '}. The obtained graphs allow monitoring the plant and to have the control of selected variables. For the graphic interface only is necessary to indicate it the variable to simulate for to be able to interpret graphically the behavior of the BWR type nuclear plant. This tool is of great utility for the teaching of students that they are interested in this type of nuclear topics. (Author)

  7. Positive predictive value of the diagnosis coding for vitamin B12 deficiency anemia in the Danish National Patient Register

    Directory of Open Access Journals (Sweden)

    Ben Ghezala I

    2012-12-01

    Full Text Available Inès Ben Ghezala, Johan Frederik Berg Arendt, Rune Erichsen, Jihen Zalfani, Henrik Gammelager, Trine Frøslev, Morten OlsenDepartment of Clinical Epidemiology, Aarhus University Hospital, Aarhus, DenmarkPurpose: The aim of this validation study was to assess the positive predictive value (PPV of the International Classification of Diseases, 10th revision (ICD-10 diagnosis of vitamin B12 (cobalamin [Cbl] deficiency anemia in the Danish National Patient Register (DNPR.Patients and methods: We identified all patients above 18 years of age recorded in the DNPR with a diagnosis of Cbl deficiency anemia (ICD-10 code: D51 admitted to two Danish university hospitals and one Danish regional hospital from 2000 through 2009. We assessed the PPV using biochemical parameters on Cbl deficiency with or without anemia as reference standards. These data were obtained from the Laboratory Information Systems Database. Data on prescriptions with Cbl supplementation drugs were obtained from the Aarhus University Prescription Database.Results: We identified 1089 patients coded with a Cbl deficiency anemia diagnosis in the DNPR. The PPV was 31.5% (95% confidence interval [CI]: 28.8%–34.3% and 36.8% (95% CI: 34.0%–39.7% depending on definitions of Cbl deficiency with anemia. When using Cbl deficiency without anemia as a reference standard, the PPV was 51.3% (95% CI: 48.4%–54.3%. The PPV for Cbl supplemented patients was 22.2% (95% CI: 18.0%–26.9% and for non-Cbl supplemented patients 63.9% (95% CI: 60.5%–67.3%.Conclusion: The PPVs of the ICD-10 diagnosis coding for Cbl deficiency anemia were generally low in the DNPR. Therefore, this register should be used with caution to study patients with Cbl deficiency anemia.Keywords: vitamin B12 deficiency anemia, Danish National Patient Register, Laboratory Information Systems Database, International Classification of Diseases, positive predictive value, validation study

  8. Effect on code predictions by changing the code version of Relap5 on SBLOCA for Test 9.1B in BETHSY test facility

    International Nuclear Information System (INIS)

    This paper deals with the use of the new version of Relap-5 code on Sbloca (small break loss of coolant accident) for test 9.1 in the Bethsy integral test facility. In this analysis an updated version of the best estimate code Relap5/mod.3.3 has been used. In this code options are available for critical flow at the junction, modified Henry Fauske model (with only one discharge coefficient and thermal non equilibrium constant), and original model (with sub-cooled, two-phase and superheated discharge coefficient). Post test analyses have been carried out. This analysis has been carried out with all the procedure lead by Uncertainty Methodology based on Accuracy Extrapolation (UMAE). In order to achieve a qualified test facility nodalization both 'steady state level' and 'on transient level' qualifications are demonstrated. It is concluded that overall qualitative and quantitative accuracy of code prediction (mod.3.3) are acceptable as per UMAE. However noticeable effect of change of version of code has been observed from mod.2 to mod.3.3. Discharge coefficient for the modified Henry Fauske model is very sensitive for the break modeling point of view. The thermal non equilibrium constant for break discharge modeling is not having much effect on the analysis results. Especially when the core is refilled, code under-predicts the break flow and integral break flow consequently code over-predicts primary mass inventory. It is found that with the same input deck all the significant events and phenomena for the mod.3.3 occurring about 600 s earlier with compare to mod.2 calculation. Up to refilling of core, time sequence of the entire significant events is after the experiments in mod.2 calculation whereas in mod.3.3 it is before the experimental value. With this new version of code a better prediction for clad temperature during dry out has been observed. In both version of code prediction of results are poor for the last 2500 s of transients this may be due to large

  9. Validation study of the reactor physics lattice transport code WIMSD-5B by TRX and BAPL critical experiments of light water reactors

    International Nuclear Information System (INIS)

    Highlights: • To validate the reactor physics lattice code WIMSD-5B by this analysis. • To model TRX and BAPL critical experiments using WIMSD-5B. • To compare the calculated results with experiment and MCNP results. • To rely on WIMSD-5B code for TRIGA calculations. - Abstract: The aim of this analysis is to validate the reactor physics lattice transport code WIMSD-5B by TRX (thermal reactor-one region lattice) and BAPL (Bettis Atomic Power Laboratory-one region lattice) critical experiments of light water reactors for neutronics analysis of 3 MW TRIGA Mark-II research reactor at AERE, Dhaka, Bangladesh. This analysis is achieved through the analysis of integral parameters of five light water reactor critical experiments TRX-1, TRX-2, BAPL-UO2-1, BAPL-UO2-2 and BAPL-UO2-3 based on evaluated nuclear data libraries JEFF-3.1 and ENDF/B-VII.1. In integral measurements, these experiments are considered as standard benchmark lattices for validating the reactor physics lattice transport code WIMSD-5B as well as evaluated nuclear data libraries. The integral parameters of the said critical experiments are calculated using the reactor physics lattice transport code WIMSD-5B. The calculated integral parameters are compared to the measured values as well as the earlier published MCNP results based on the Chinese evaluated nuclear data library CENDL-3.0 for assessment of deterministic calculation. It was found that the calculated integral parameters give mostly reasonable and globally consistent results with the experiment and the MCNP results. Besides, the group constants in WIMS format for the isotopes U-235 and U-238 between two data files have been compared using WIMS library utility code WILLIE and it was found that the group constants are well consistent with each other. Therefore, this analysis reveals the validation study of the reactor physics lattice transport code WIMSD-5B based on JEFF-3.1 and ENDF/B-VII.1 libraries and can also be essential to execute

  10. Mutation in the B chain coding region is associated with impaired proinsulin conversion in a family with hyperproinsulinemia

    International Nuclear Information System (INIS)

    A family has recently been described in which hyperproinsulinemia is inherited in an autosomal dominant pattern, suggesting a structural abnormality in the proinsulin molecule as the basis for this disorder. However, unlike two previous kindreds with a similar syndrome, the serum proinsulin-like material in this family did not appear to be an intermediate conversion product but instead behaved like normal human proinsulin by several criteria. To further characterize this disorder the authors isolated and sequenced the insulin gene of the propositus. Leukocyte DNA was cloned in λgt-WES and recombinants containing the two insulin alleles, λMD41 and λMD51, were isolated by plaque hybridization. DNA sequencing of λMD51 showed that it contained the normal coding sequence for human preproinsulin. Sequence analysis of λMD41, however, revealed a single nucleotide substitution in the codon for residue 10 of proinsulin (CAC → GAC) that predicts the exchange of aspartic acid for histidine in the insulin B chain region. This mutation was also found in an insulin allele cloned from a second affected family member (propositus's father). These results strongly implicate this mutation as the cause of the hyperproinsulinemia in this family. Inhibition of the conversion of proinsulin to insulin may be related to altered folding and/or self-association properties of the [Asp10]proinsulin

  11. Mutation in the B chain coding region is associated with impaired proinsulin conversion in a family with hyperproinsulinemia

    Energy Technology Data Exchange (ETDEWEB)

    Chan, S.J.; Seino, S.; Gruppuso, P.A.; Schwartz, R.; Steiner, D.F.

    1987-04-01

    A family has recently been described in which hyperproinsulinemia is inherited in an autosomal dominant pattern, suggesting a structural abnormality in the proinsulin molecule as the basis for this disorder. However, unlike two previous kindreds with a similar syndrome, the serum proinsulin-like material in this family did not appear to be an intermediate conversion product but instead behaved like normal human proinsulin by several criteria. To further characterize this disorder the authors isolated and sequenced the insulin gene of the propositus. Leukocyte DNA was cloned in lambdagt-WES and recombinants containing the two insulin alleles, lambdaMD41 and lambdaMD51, were isolated by plaque hybridization. DNA sequencing of lambdaMD51 showed that it contained the normal coding sequence for human preproinsulin. Sequence analysis of lambdaMD41, however, revealed a single nucleotide substitution in the codon for residue 10 of proinsulin (CAC ..-->.. GAC) that predicts the exchange of aspartic acid for histidine in the insulin B chain region. This mutation was also found in an insulin allele cloned from a second affected family member (propositus's father). These results strongly implicate this mutation as the cause of the hyperproinsulinemia in this family. Inhibition of the conversion of proinsulin to insulin may be related to altered folding and/or self-association properties of the (Asp/sup 10/)proinsulin.

  12. A methodology to a DB-MHR fuel recharge evaluation—A basic comparison between WIMSD-5B and MCNPX codes

    International Nuclear Information System (INIS)

    Highlights: ► Simplified methodology to evaluate qualitatively the shuffling scheme. ► The keff behavior during the burnup was performed by the WIMSD-5B and the MCNPX 2.6.0 ► It evaluated three types of core geometry. - Abstract: The deep burn modular helium reactor (DB-MHR) belongs to the new generation of nuclear power plants. Such reactor presents the possibility to use reprocessed fuels and a special refueled based on shuffling scheme that displaces the fuel pins after each cycle. This work presents a simplified methodology to evaluate qualitatively the shuffling scheme of these reactors using the WIMSD-5B code. The keff behavior during the burnup was verified by the WIMSD-5B and the MCNPX 2.6.0 codes using three types of core geometry. The WIMD-D5 and the MCNP presented very similar results.

  13. Post-test calculation of thermal-hydraulic behaviour in Demona experiment B3 with various computer codes used in EC Member States

    International Nuclear Information System (INIS)

    In 1986 the CEC sponsored a benchmark exercise on aerosol calculation based on the Demona B3 experiment. The results of this exercise were very sensitive to the calculation of energy and mass transfer between the phases. In view of the results of the study mentioned above, it had been decided to carry out a benchmark exercise for severe accident containment thermal-hydraulics codes. This exercise is based on experiment B3 in the Demona programme. The experiment B3 was a simulation of a late overpressure failure scenario in a PWR. The main objective of the benchmark exercise has been to assess the ability of the participating codes to predict atmosphere saturation levels and bulk condensation rates under conditions similar to those predicted to follow a severe accident in a PWR. Several research organizations of the Community member countries have participated at this benchmark exercise. The paper presents the comparison of the experimental results with the following calculated quantities: total system pressure, steam pressure, containment temperature, saturation ratio, steam condensation rate on walls and in the bulk volume, water mass in sump, sump temperature, heat transfer coefficient, steam mass flow rate and structural temperature for a real time period of up to 90 hours. The paper also presents the major conclusions from the exercise in order to identify the status of present codes versus the requirements needed as input and for coupling with aerosol analysis codes

  14. GARLIC-B. A digital code for real-time calculation of the transient behaviour of nodal and global core and plant parameters of BWR nuclear power plants

    International Nuclear Information System (INIS)

    A program description of the code GARLIC-B is given. The code is based on a nonlinear transient model for BWR nuclear power plants which consist of a 3D-core, a top plenum, steam removal and feed water systems and a downcomer with main coolant recirculation pumps. The core is subdivided into a number of superboxes and flow channels with different coolant mass flow rates. Subcooled boiling within these channels has an important reactivity feed back effect and has to be taken also into account. The code computes the local and global core and plant transient situation as dependent on both the inherent core dynamics and external control actions, i.e., disturbances such as motions of control rod banks, changes of mass flow rates of coolant, feed water and steam outlet. The case of a pressure-controlled reactor operation is also considered. (orig./GL)

  15. THYDE-B1/MOD1: a computer code for analysis of small-break loss-of-coolant accident of boiling water reactors

    International Nuclear Information System (INIS)

    THYDE-B1/MOD1 is a computer code to analyze thermo-hydraulic transients of the reactor cooling system of a BWR, mainly during a small-break loss-of-coolant accidnet (SB-LOCA) with a special emphasis on the behavior of pressure and mixture level in the pressure vessel. The coolant behavior is simulated with a volume-and-junction method based on assumptions of thermal equilibrium and homogeneous conditions for two-phase flow. A characteristic feature of this code is a three-region representation of the state of the coolant in a control volume, in which three regions, i.e., subcooled liquid, saturated mixture and saturated steam regions are allowed to exist. The regions are separated by moving boundaries, tracked by mass and energy balances for each region. The interior of the pressure vessel is represented by two volumes with three regions: one for inside of the shroud and the other for outside, while other portions of the system are treated with homogeneous model. This method, although it seems to be very simple, has been verified to be adequate for cases of BWR SB-LOCAs in which the hydraulic transient is relatively slow and the cooling of the core strongly depends on the mixture level behavior in the vessel. In order to simulate the system behavior, THYDE-B1 is provided with analytical models for reactor kinetics, heat generation and conduction in fuel rods and structures, heat transfer between coolant and solid surfaces, coolant injection systems, breaks and discharge systems, jet pumps, recirculation pumps, and so on. The verification of the code has been conducted. A good predictability of the code has been indicated through the comparison of calculated results with experimental data provided by ROSA-III small-break tests. This report presents the analytical models, solution method, and input data requirements of the THYDE-B1/MOD1 code. (author)

  16. Post-test analysis of the Bethsy experiment 9.1b with ASTEC V1.2 code for CESAR thermal-hydraulic module validation

    International Nuclear Information System (INIS)

    The CESAR thermal-hydraulic module of ASTEC V1.2 code has been validated by means of the analysis of one experiment carried out in the Bethsy facility which simulates a French 900 MWe PWR reactor. The test under investigation is the loss-of-coolant accident 9.1b test (OECD ISP No. 27) which consists in a 2 inch cold leg break, while the high pressure injection system is assumed to be unavailable. Starting from a Bethsy nodalisation similar to the one employed in PWR reactor applications with the ASTEC code, the Bethsy 9.1b test has been analyzed in detail with CESAR. In order to reduce the discrepancies found between code results and test measurements, some nodalisation improvements have been identified and implemented in the original model by means of sensitivity studies. In the present paper, the results of the code are presented in comparison with the experimental data. The occurrence of major events and the time evolution of main thermal-hydraulic parameters of both primary and secondary circuits are well predicted by CESAR. (author)

  17. Teseo code validation

    International Nuclear Information System (INIS)

    In this report some validation tests for the TESEO code are described. The TESEO code was developed at ENEA - Clementel Center in the framework of the C2RV code sequence. This code sequence produces multigroup resonance cross sections for fast reactor analysis. It consists of the codes TESEO, MC2-II, GERES, ANISN, MEDIL. The TESEO code processes basic nuclear data in ENDF-B format and produces an ultrafine group (2082 groups) cross section library for the MC2-II code. To validate the TESEO algorithms, the data produced by TESEO code were compared with the data produced by other well-tested codes which use different algorithms. No substantial differences was found between these data and the data produced by TESEO code. TESEO algorithms showed high reliability. A detailed study of TESEO calculation options was carried out. Their use and functions are shown to inform the user of the code

  18. AMPX-77: A modular code system for generating coupled multigroup neutron-gamma cross-section libraries from ENDF/B-IV and/or ENDF/B-V

    Energy Technology Data Exchange (ETDEWEB)

    Greene, N.M.; Ford, W.E. III; Petrie, L.M.; Arwood, J.W.

    1992-10-01

    AMPX-77 is a modular system of computer programs that pertain to nuclear analyses, with a primary emphasis on tasks associated with the production and use of multigroup cross sections. AH basic cross-section data are to be input in the formats used by the Evaluated Nuclear Data Files (ENDF/B), and output can be obtained in a variety of formats, including its own internal and very general formats, along with a variety of other useful formats used by major transport, diffusion theory, and Monte Carlo codes. Processing is provided for both neutron and gamma-my data. The present release contains codes all written in the FORTRAN-77 dialect of FORTRAN and wig process ENDF/B-V and earlier evaluations, though major modules are being upgraded in order to process ENDF/B-VI and will be released when a complete collection of usable routines is available.

  19. AMPX-77: A modular code system for generating coupled multigroup neutron-gamma cross-section libraries from ENDF/B-IV and/or ENDF/B-V

    International Nuclear Information System (INIS)

    AMPX-77 is a modular system of computer programs that pertain to nuclear analyses, with a primary emphasis on tasks associated with the production and use of multigroup cross sections. AH basic cross-section data are to be input in the formats used by the Evaluated Nuclear Data Files (ENDF/B), and output can be obtained in a variety of formats, including its own internal and very general formats, along with a variety of other useful formats used by major transport, diffusion theory, and Monte Carlo codes. Processing is provided for both neutron and gamma-my data. The present release contains codes all written in the FORTRAN-77 dialect of FORTRAN and wig process ENDF/B-V and earlier evaluations, though major modules are being upgraded in order to process ENDF/B-VI and will be released when a complete collection of usable routines is available

  20. Anderson's disease/chylomicron retention disease in a Japanese patient with uniparental disomy 7 and a normal SAR1B gene protein coding sequence

    Directory of Open Access Journals (Sweden)

    Okada Tomoo

    2011-11-01

    Full Text Available Abstract Background Anderson's Disease (AD/Chylomicron Retention Disease (CMRD is a rare hereditary hypocholesterolemic disorder characterized by a malabsorption syndrome with steatorrhea, failure to thrive and the absence of chylomicrons and apolipoprotein B48 post-prandially. All patients studied to date exhibit a mutation in the SAR1B gene, which codes for an essential component of the vesicular coat protein complex II (COPII necessary for endoplasmic reticulum to Golgi transport. We describe here a patient with AD/CMRD, a normal SAR1B gene protein coding sequence and maternal uniparental disomy of chromosome 7 (matUPD7. Methods and Results The patient, one of two siblings of a Japanese family, had diarrhea and steatorrhea beginning at five months of age. There was a white duodenal mucosa upon endoscopy. Light and electron microscopy showed that the intestinal villi were normal but that they had lipid laden enterocytes containing accumulations of lipid droplets in the cytoplasm and lipoprotein-size particles in membrane bound structures. Although there were decreased amounts in plasma of total- and low-density lipoprotein cholesterol, apolipoproteins AI and B and vitamin E levels, the triglycerides were normal, typical of AD/CMRD. The presence of low density lipoproteins and apolipoprotein B in the plasma, although in decreased amounts, ruled out abetalipoproteinemia. The parents were asymptomatic with normal plasma cholesterol levels suggesting a recessive disorder and ruling out familial hypobetalipoproteinemia. Sequencing of genomic DNA showed that the 8 exons of the SAR1B gene were normal. Whole genome SNP analysis and karyotyping revealed matUPD7 with a normal karyotype. In contrast to other cases of AD/CMRD which have shown catch-up growth following vitamin supplementation and a fat restricted diet, our patient exhibits continued growth delay and other aspects of the matUPD7 and Silver-Russell Syndrome phenotypes. Conclusions This

  1. Comparison of the Common Adhesin Coding Operons Distribution in Uropathogenic and Phylogenetic Group B2 and A Escherichia coli Isolates

    OpenAIRE

    Rahdar; Rashki; Miri

    2014-01-01

    Background Escherichia coli is one of the most causative pathogen of urinary tract infection. Urinary tract infections (UTIs) are the second most common cause of morbidity and remain a serious health concern among the clinicians. The severity of UTI caused by uropathogenic E. coli (UPEC) is due to the expression of a wide spectrum of virulent factors such as adhesin coding operons. Little is known about the relationship between the E. coli genetic background and the acquisition o...

  2. MCNP4B-GN, Monte Carlo Code System for (gamma,n) production and transport in high-Z materials

    International Nuclear Information System (INIS)

    1 - Description of program or function: MCNP4B-GN is used to treat (gamma,n) production and transport in medical accelerator heads, to study the undesired neutron dose to patients, employing a single code for both the electromagnetic and the neutron transport. 2 - Methods: The code simulates the production of giant dipole resonance (GDR) photoneutrons in thick layers of high-Z elements. Neutrons are generated through evaporation of the compound nucleus or through direct channel; the photoneutron origin coordinates, evaluated as the electromagnetic shower develops are taken into account as well as the energy spectrum of the generated photoneutron. Photoneutron production routines have been inserted into MCNP4B, thus allowing a handling of complicated geometries with a single input definition, a fundamental requirement for this kind of application. The modifications to the standard MCNP4B were made as a 'patch' (i.e. a series of instructions on how to modify the basic code) which is distributed together with a preprocessor. The preprocessor reads the patch, reads MCNP4B and writes MCNP4B-GN. A new subroutine 'GAMMN' has been written, analogous to the subroutine 'ACEGAM' for (n,gamma). GAMMN is called from subroutine 'COLIDP' at a photon collision with one of the 6 elements in question when the energy of the photon is such that there is a non-zero probability of producing a neutron. In analogy with the (n,gamma) capability, the production or not of a neutron is not correlated with the subsequent history of the photon and in particular the choice of the type of photon collision at that spatial point. 3 - Restrictions on the complexity of the problem: The upper energy limit, imposed by theoretical considerations, is 30 MeV for photons and 20 MeV for photoneutrons. The physical model breaks down at higher photon energies, whilst the neutron transport performed with MCNP cannot be simulated for neutron energies greater than 20 MeV (the neutron energy regime in MCNP is

  3. Modelling of impurity transport in the linear plasma devices PISCES-B and pilot-PSI using the Monte-Carlo code ERO

    International Nuclear Information System (INIS)

    The simulations for linear devices using the 3D Monte-Carlo code ERO have a number of particularities of both physical and technical nature. Many physical effects introduced and tested for these simulations (elastic collisions, population of metastable states, etc.) can be relevant for tokamaks as well. The current status of these activities is summarized. As an example some simulations reproducing the experimental observations at PISCES-B and Pilot-PSI are presented. Main deviations and ideas for their origins are discussed (copyright 2010 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  4. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements

    International Nuclear Information System (INIS)

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table

  5. Analysis of the three-dimensional VENUS-2 MOX core benchmark using the Monte Carlo code TRIPOLI-4 and the ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3.1 nuclear data sets

    International Nuclear Information System (INIS)

    Highlights: • Results of benchmarking TRIPOLI based on the VENUS-2 MOX benchmark are reported. • 3-D TRIPOLI calculations were performed using ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3. • Results are compared with measured data and results of other benchmark participants. • TRIPOLI results agree well with experimental data and results from other participants. - Abstract: The reliability and verification of numerical solutions derived from neutronic codes and the use of nuclear data libraries is a very important issue in nuclear technology. To this purpose, computational benchmarks based on well-defined problems with a complete set of input and a unique solution, are often used. The OECD/NEA VENUS-2 is a widely used MOX benchmark problem for the validation of numerical methods and nuclear data sets. In this paper, the results of benchmarking the TRIPOLI Monte Carlo code based on the VENUS-2 MOX benchmark problem, are reported. 3-D TRIPOLI calculations were performed using the ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3.1 nuclear data sets. The computational results are compared with measured data, as well as with the results of other benchmark participants. In general the TRIPOLI results agree well with both the experimental data as well as those of other participants

  6. Analysis of the three-dimensional VENUS-2 MOX core benchmark using the Monte Carlo code TRIPOLI-4 and the ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3.1 nuclear data sets

    Energy Technology Data Exchange (ETDEWEB)

    Savva, P., E-mail: savvapan@ipta.demokritos.gr; Varvayanni, M., E-mail: melina@ipta.demokritos.gr; Catsaros, N., E-mail: nicos@ipta.demokritos.gr

    2014-07-01

    Highlights: • Results of benchmarking TRIPOLI based on the VENUS-2 MOX benchmark are reported. • 3-D TRIPOLI calculations were performed using ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3. • Results are compared with measured data and results of other benchmark participants. • TRIPOLI results agree well with experimental data and results from other participants. - Abstract: The reliability and verification of numerical solutions derived from neutronic codes and the use of nuclear data libraries is a very important issue in nuclear technology. To this purpose, computational benchmarks based on well-defined problems with a complete set of input and a unique solution, are often used. The OECD/NEA VENUS-2 is a widely used MOX benchmark problem for the validation of numerical methods and nuclear data sets. In this paper, the results of benchmarking the TRIPOLI Monte Carlo code based on the VENUS-2 MOX benchmark problem, are reported. 3-D TRIPOLI calculations were performed using the ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3.1 nuclear data sets. The computational results are compared with measured data, as well as with the results of other benchmark participants. In general the TRIPOLI results agree well with both the experimental data as well as those of other participants.

  7. Features of a leader peptide coding region that regulate translation initiation for the anti-TRAP protein of B. subtilis.

    Science.gov (United States)

    Chen, Guangnan; Yanofsky, Charles

    2004-03-12

    The rtpA gene of Bacillus subtilis encodes the Anti-TRAP protein, AT. AT can bind and inhibit the TRAP regulatory protein, preventing TRAP from promoting transcription termination in the trpEDCFBA operon leader region. AT synthesis is upregulated transcriptionally and translationally in response to the accumulation of uncharged tRNA(Trp). Here we analyze AT's translational regulation by rtpLP, a 10 residue leader peptide coding region located immediately preceding the rtpA Shine-Dalgarno sequence. Our findings suggest that, whenever the charged tRNA(Trp) level is sufficient to allow the ribosome translating rtpLP to reach its stop codon, it blocks the adjacent rtpA Shine-Dalgarno sequence, inhibiting AT synthesis. However, when there is a charged tRNA(Trp) deficiency, the translating ribosome presumably stalls at one of three adjacent rtpLP Trp codons. This stalling exposes the rtpA Shine-Dalgarno sequence, permitting AT synthesis. RNA-RNA pairing may also influence AT synthesis. Production of AT would inactivate TRAP, thereby increasing trp operon expression. PMID:15023340

  8. Clinical coding. Code breakers.

    Science.gov (United States)

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships. PMID:15768716

  9. Permutation codes

    OpenAIRE

    Ericson, Thomas

    1993-01-01

    Slepians permutation codes are investigated in detail. In particular we optimize the initial vector and derive all dominating codes in dimension n 2 6. With the exception of the simplex and biorthogonal codes - which are always included as special cases of permutation codes - there are probably no further good codes in higher dimensions.

  10. Accident consequence calculations and risk assessments for pressurized light water reactors with the computer code UFOMOD/B3

    International Nuclear Information System (INIS)

    With respect to the application of the accident consequence model of the German Risk Study (GRS) for light water reactors to risk assessments of other reactor types (high temperature reactor HTR-1160, fast breeder reactor SNR-300), the improved version UFOMOD/B3 was developed. The modifications mainly concern the deposition parameters, the resuspension process, the ingestion model and the dose factors. To make results comparable, recalculations for pressurized light water reactors were performed with the release categories of the GRS. The results show in contrast to the findings of the GRS a significant reduction of the acute fatality risk by a factor of 3.6. This essentially results from the smaller deposition parameters. The latent fatality risk was calculated nearly unchanged. (orig.)

  11. Intégration à TRNSYS du noyau de CODYRUN, code de simulation thermo-aéraulique de bâtiments : le Type 59

    OpenAIRE

    Bastide, Alain; Boyer, Harry; Lauret, Philippe; Lucas, Franck; Garde, Francois; Garde, François

    2001-01-01

    National audience Ce papier traite de l'intégration à l'environnement TRNSYS du noyau de calcul d'un modèle développé depuis une dizaine d'années à l'Université de la Réunion, développement entrepris initialement en partenariat avec le CETHIL de l'INSA de Lyon. Il part du constat d'une segmentation des utilisateurs-développeurs en thermique des bâtiments, partagés entre un groupe sous environnement TRNSYS (type19 et 56 principalement) et l'autre mettant en œuvre des codes spécifiques (ESP,...

  12. Short-term calculations to supplement the RS 16 B PWR experiments with internals (PWR1 to PWR5), using the LECK 4 computer code

    International Nuclear Information System (INIS)

    Within the framework of research project RS 16 B sponsored by the German BMFT a series of a blowdown experiments, DWR1 to DWR5, were performed using a vessel with dummy internals under conditions similar to those in a PWR. The prime objective of these experiments was the investigation of the highly transient blowdown phenomena in the discharge nozzle and the determination of the induced loads on the internals. As a partner in the project, KWU carried out both pre-test predictions and post-test analyses of these experiments using, among others, the computer code LECK 4. For the most severe blowdown test DWR5, the influence of the most important model parameters on the blowdown analysis was investigated in detail. These investigations suggest that, similar to the long-term analyses, calculations using the homogeneous critical flow model would improve agreement between calculation and experiment. (orig./RW)

  13. Comparison of results of simulation of the CONTEMPT-LT/028 and lAP-3B codes for the analysis of the internal vacuum breaker valves of the CNLV

    International Nuclear Information System (INIS)

    In the primary container of a BWR type reactor, the humid and dry wells its are communicate by means of valves designed to equal the pressure in case of a significant pressure difference exists, produced by an operative event just as the performance of an emergency system. These valves are known as internal vacuum breakers and its analysis it is made by means of the use of a code with the capacity to analyze the primary contention of the reactor. Among the codes able to carry out this analysis type there is CONTEMPT-LT/028 and MAAP-3B; however, these codes possess characteristic different respect the modeling one of the different damage mitigation systems to the contention (dews, windy, emergency systems), of the transfer of heat among the different compartments of the primary container and in the details of the civil construction. In previous works carried out with the CONTEMPT-LT/028 code, they have been carried out different cases of simulation related with the operation of the internal breaker vacuum valves. These cases include small ruptures in the main steam lines and ruptures in the recirculation knots. It was selected the case more restrictive and it was generated an equivalent scenario file for the MAAP-3B code. In this work the performance of the internal breaker vacuum valves is analyzed by means of the CONTEMPT-LT/028 and MAAP-3B codes, when using the case more restrictive consistent in a small rupture in a main steam line. The analysis of the simulations indicates that both codes produce very similar results and the found differences are explained with base in the models used by each code to obtain the answer of the main thermohydraulic variables. In general terms, MAAP-3B possesses models that adapt in a form more convenient to the prospective phenomenology for this analysis, maintaining a conservative focus. (Author)

  14. Production of neutronic discrete equations for a cylindrical geometry in one group energy and benchmark the results with MCNP-4B code with one group energy library

    International Nuclear Information System (INIS)

    In reactor core neutronic calculations, we usually choose a control volume and investigate about the input, output, production and absorption inside it. Finally, we derive neutron transport equation. This equation is not easy to solve for simple and symmetrical geometry. The objective of this paper is to introduce a new direct method for neutronic calculations. This method is based on physics of problem and with meshing of the desired geometry, writing the balance equation for each mesh intervals and with notice to the conjunction between these mesh intervals, produce the final discrete equation series without production of neutron transport differential equation and mandatory passing form differential equation bridge. This method, which is named Direct Discrete Method, was applied in static state, for a cylindrical geometry in one group energy. The validity of the results from this new method are tested with MCNP-4B code with a one group energy library. One energy group direct discrete equation produces excellent results, which can be compared with the results of MCNP-4B

  15. CYP2B6 Non-Coding Variation Associated with Smoking Cessation Is Also Associated with Differences in Allelic Expression, Splicing, and Nicotine Metabolism Independent of Common Amino-Acid Changes

    OpenAIRE

    Bloom, A. Joseph; Martinez, Maribel; Chen, Li-Shiun; Bierut, Laura J; Murphy, Sharon E.; Goate, Alison

    2013-01-01

    The Cytochrome P450 2B6 (CYP2B6) enzyme makes a small contribution to hepatic nicotine metabolism relative to CYP2A6, but CYP2B6 is the primary enzyme responsible for metabolism of the smoking cessation drug bupropion. Using CYP2A6 genotype as a covariate, we find that a non-coding polymorphism in CYP2B6 previously associated with smoking cessation (rs8109525) is also significantly associated with nicotine metabolism. The association is independent of the well-studied non-synonymous variants ...

  16. Speech coding

    Science.gov (United States)

    Gersho, Allen

    1990-05-01

    Recent advances in algorithms and techniques for speech coding now permit high quality voice reproduction at remarkably low bit rates. The advent of powerful single-ship signal processors has made it cost effective to implement these new and sophisticated speech coding algorithms for many important applications in voice communication and storage. Some of the main ideas underlying the algorithms of major interest today are reviewed. The concept of removing redundancy by linear prediction is reviewed, first in the context of predictive quantization or DPCM. Then linear predictive coding, adaptive predictive coding, and vector quantization are discussed. The concepts of excitation coding via analysis-by-synthesis, vector sum excitation codebooks, and adaptive postfiltering are explained. The main idea of vector excitation coding (VXC) or code excited linear prediction (CELP) are presented. Finally low-delay VXC coding and phonetic segmentation for VXC are described.

  17. Elevated RNA expression of long non‑coding HOTAIR promotes cell proliferation and predicts a poor prognosis in patients with diffuse large B cell lymphoma.

    Science.gov (United States)

    Yan, Yuling; Han, Jingyin; Li, Zhenqing; Yang, Honglan; Sui, Yanmin; Wang, Minglin

    2016-06-01

    Diffuse large B cell lymphoma (DLBCL) is one of the most common types of malignancy worldwide. The lack of clear symptoms and early detection make it difficult to diagnose at an early stage, leading to poor prognosis of the patients. Long non‑coding RNAs (lncRNAs) have come into focus for their important regulatory roles in fundamental biological processes, particularly in cancer initiation, development and progression. The aim of the present study was to investigate the expression of lncRNA Hox transcript antisense intergenic RNA (HOTAIR) in a cohort of patients with DLBCL to assess its clinical value and biological function in DLBCL. The reverse transcription‑polymerase chain reaction was used to detect HOTAIR expression levels and cells were transfected with small interfering RNA to compare cell proliferation, cell cycle progression and apoptosis. Western blotting was also conducted to detect possible signaling pathways. It was first found that the expression levels of HOTAIR were upregulated in DLBCL tumor tissues and cell lines, compared with normal tissues and cells. In addition, HOTAIR was significantly correlated with tumor size, clinical stage, B symptoms and International Prognostic Index scores; and higher expression levels of HOTAIR were correlated with improved prognosis. Univariate and multivariate analyses verified that HOTAIR was a key independent predictive factor for DLBCL prognosis. Furthermore, it was revealed that the knockdown of the expression of HOTAIR led to growth inhibition, cell cycle arrest and apoptosis in vitro, possibly through the phosphoinositide 3‑kinase/AKT/nuclear factor‑κB pathway. These results suggested that HOTAIR may be regarded as a novel indicator of poor prognosis, and may serve as a potential target for gene therapy in the treatment of DLBCL. PMID:27122348

  18. Calculations of neutron flux for BNCT facility of typical working core Multipurpose Reactor (RSG-GAS) using MCNP4B Code

    International Nuclear Information System (INIS)

    Calculation of neutron flux distributions of RSG-GAS typical working core using MCNP 4b Code has been done. Prior to the calculations, modelling of fuel element of meat as well as surfaces of cladding cell and geometry should be made. The model was then included water as a containment also developed. To achieve neutron flux behavior, it was simulated 200,000 to 2,000,000 neutrons. The calculation results indicated that the neutron flux in TWC core is in the order of 1014. Meanwhile, the best flux order for the BNCT facility should be in the order of 1010. With the use of any method, such as constructing of shielding and collimator, the order of neutron flux will decrease. In the previous research in 2001, the results showed the neutron flux in the order of 1010 by installing the collimator with 45 cm thick, made of Pb and 380 cm from the core centre. The results of this research completed with the research done in 2001, 2000 and 1999 certainly support the possibility to construct the BNCT facility in RSG-GAS reactor core

  19. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  20. Go8 Guiding Principles for Implementing Part B of the "Australian Code for the Responsible Conduct of Research". Go8 Consultation Paper

    Science.gov (United States)

    Group of Eight (NJ1), 2008

    2008-01-01

    The release of the "Australian Code for the Responsible Conduct of Research 2007" by the Australian Government in 2007 was welcomed by Go8 (Group of Eight) institutions, particularly in relation to the improvements and broader scope of the matters covered by Part A of that Code. However, as foreshadowed by the Go8 during the consultation phase of…

  1. Comparison of results of simulation of the CONTEMPT-LT/028 and lAP-3B codes for the analysis of the internal vacuum breaker valves of the CNLV; Comparacion de resultados de simulacion de los codigos CONTEMPT-LT/028 y MAAP-3B para el analisis de las valvulas rompedoras de vacio internas de la CNLV

    Energy Technology Data Exchange (ETDEWEB)

    Ovando C, R.; Cecenas F, M. [Instituto de Investigaciones Electricas, Gerencia de Energia Nuclear, Av. Reforma 113 Col. Palmira. 62490, Cuernavaca, Morelos (Mexico); Moya C, M.M. [Comision Federal de Electricidad. Gerencia de Centrales Nucleoelectricas Disciplina de Analisis de Ingenieria. Subgerencia de Ingenieria. Carretera Veracruz-Medellin Km 7.5, Dos Bocas, Veracruz (Mexico)]. e-mail: rovando@iie.org.mx

    2006-07-01

    In the primary container of a BWR type reactor, the humid and dry wells its are communicate by means of valves designed to equal the pressure in case of a significant pressure difference exists, produced by an operative event just as the performance of an emergency system. These valves are known as internal vacuum breakers and its analysis it is made by means of the use of a code with the capacity to analyze the primary contention of the reactor. Among the codes able to carry out this analysis type there is CONTEMPT-LT/028 and MAAP-3B; however, these codes possess characteristic different respect the modeling one of the different damage mitigation systems to the contention (dews, windy, emergency systems), of the transfer of heat among the different compartments of the primary container and in the details of the civil construction. In previous works carried out with the CONTEMPT-LT/028 code, they have been carried out different cases of simulation related with the operation of the internal breaker vacuum valves. These cases include small ruptures in the main steam lines and ruptures in the recirculation knots. It was selected the case more restrictive and it was generated an equivalent scenario file for the MAAP-3B code. In this work the performance of the internal breaker vacuum valves is analyzed by means of the CONTEMPT-LT/028 and MAAP-3B codes, when using the case more restrictive consistent in a small rupture in a main steam line. The analysis of the simulations indicates that both codes produce very similar results and the found differences are explained with base in the models used by each code to obtain the answer of the main thermohydraulic variables. In general terms, MAAP-3B possesses models that adapt in a form more convenient to the prospective phenomenology for this analysis, maintaining a conservative focus. (Author)

  2. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  3. Code Cactus

    International Nuclear Information System (INIS)

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors)

  4. PNA-mediated modulation and redirection of Her-2 pre-mRNA splicing: specific skipping of erbB-2 exon 19 coding for the ATP catalytic domain

    DEFF Research Database (Denmark)

    Pankratova, Stanislava; Nielsen, Birgit N; Shiraishi, Takehiko;

    2010-01-01

    The Her-2 receptor coded for by the proto-oncogenic erbB-2 gene is a clinically validated target for treatment of a significant genetic subclass of breast cancers, and Her-2 is also overexpressed or mutated in a range of other cancers. In an approach to exploit antisense mediated splicing...... oligomers that specifically induce skipping of exon 19 as this exon is coding for the ATP catalytic domain of Her-2, and if expressed such truncated version of the Her-2 protein should be functionally inactive in a dominant negative fashion. Therefore, antisense compounds having efficient erbB-2 exon 19...... skipping activity could be very interesting in terms of drug discovery. In the present study we identified PNA oligomers having such activity in SK-BR-3 and HeLa cancer cells in culture....

  5. Multigroup and few-group cross sections for ENDF/B-IV fission products; the TOAFEW collapsing code and data file of 154-group fission-product cross sections. [In FORTRAN

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W.B.; England, T.R.; LaBauve, R.J.

    1978-02-01

    The ENDF/B-IV fission-product data file includes data describing 824 nuclides. Cross sections, given for 181 of these nuclides, were processed into 154 neutron energy groups. The production of the data file is described. The TOAFEW code, useful in collapsing the multigroup values to few-group cross sections, is presented with instructions and examples of its use. The file of multigroup cross sections is available on request. 3 figures, 11 tables.

  6. On the existence of optimum cyclic burst-correcting codes

    OpenAIRE

    1986-01-01

    It is shown that for each integer b >= 1 infinitely many optimum cyclic b-burst-correcting codes exist, i.e., codes whose length n, redundancy r, and burst-correcting capability b, satisfy n = 2^{r-b+1} - 1. Some optimum codes for b = 3, 4, and 5 are also studied in detail.

  7. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  8. Post-test calculations of aerosol behavior in DEMONA experiment B3 with various computer codes used in CEC member states

    International Nuclear Information System (INIS)

    Extensive research has been carried out around the world to understand the behavior of radioactive materials in the containment building of an LWR under accident conditions. Most of this material is in the form of aerosols or is attached to non-radioactive aerosol particles in the containment atmosphere. Several computer codes have been written to describe fission product aerosol behavior under accident conditions, aimed at evaluating the time dependent airborne concentration inside the reactor building and the fraction that leaks out to the environment. The objective of this Study was to perform a comparison of computer codes used in the CEC member states with a DEMONA experiment. This is a follow up study to an earlier exercise comparing codes to each other in which rigid benchmark cases of more or less artificially detailed nature had been used. In the present Study the comparison to the DEMONA experiment was to be oriented only at the experimental results without additional help provided. It should thus provide a basis for judging the practical applicability of the codes to a situation which is real but, maybe, less well defined than a theoretical benchmark case

  9. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  10. Results of the GREST code comparison exercise: Benchmark problems: No. 1,2,3-A and 3-B: US PWR - Surry Unit 1: AB sequence and S2CD sequence: German PWR - BIBLIS: LOCA sequence

    International Nuclear Information System (INIS)

    The GREST code comparison exercise was performed to compare the performance of codes which analyze the behaviour of fission product aerosols in the containment atmosphere. Three major PWR accident sequences (SURRY AB, SURRY S2CD and BIBLIS LOCA) were selected as benchmark problems. The codes (RETAIN-S, RETAIN-2C, HAA-4, HAARM-S, REMOVAL, NAUA-4, SWNAUA, NAUA-5, AEROSIM-M, CONTAIN, and AEROSOLS/B1) were run by various organizations using the same pre-defined input data for each of the selected accident sequences. The containment leak rates were specified and the leaked mass was calculated for all three problems. The inter-code variation of the leaked mass was within a factor of 3.6 for the SURRY AB case, within a factor of 2.9 for the SURRY S2CD case, within a factor of 4.5 for the BIBLIS containment case, and within a factor of 9 for the BIBLIS annulus. The spreads of the other parameters (suspended mass, settled mass, and plated mass) tended to be larger

  11. NSURE code

    International Nuclear Information System (INIS)

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  12. Characterization of the expression of the thcB gene, coding for a pesticide-degrading cytochrome P-450 in Rhodococcus strains.

    OpenAIRE

    Shao, Z Q; Behki, R

    1996-01-01

    A cytochrome P-450 system in Rhodococcus strains, encoded by thcB, thcC, and thcD, participates in the degradation of thiocarbamates and several other pesticides. The regulation of the system was investigated by fusing a truncated lacZ in frame to thcB, the structural gene for the cytochrome P-450 monooxygenase. Analysis of the thcB-lacZ fusion showed that the expression of thcB was 10-fold higher in the presence of the herbicide EPTC (s-ethyl dipropylthiocarbamate). Similar enhancement of th...

  13. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  14. Beyond Stabilizer Codes II: Clifford Codes

    OpenAIRE

    Klappenecker, Andreas; Roetteler, Martin

    2000-01-01

    Knill introduced a generalization of stabilizer codes, in this note called Clifford codes. It remained unclear whether or not Clifford codes can be superior to stabilizer codes. We show that Clifford codes are stabilizer codes provided that the abstract error group has an abelian index group. In particular, if the errors are modelled by tensor products of Pauli matrices, then the associated Clifford codes are necessarily stabilizer codes.

  15. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  16. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  17. Calculation of the fuel composition and the thermo-neutronic parameters of the Bushehr’s VVER-1000 reactor during the initial startup and the first cycle using the WIMSD5-B, CITATION-LDI2 and WERL codes

    International Nuclear Information System (INIS)

    Highlights: ► In this paper, the changes of the thermo-neutronic parameters of a VVER 1000 reactor were studied during the first cycle. ► The coupling of neutronic and thermo-hydraulic codes was utilized. ► A computational program (WERL code) was designed to calculate the temperature distribution of the reactor core. ► To estimate the concentration of the released gaseous fission products, the Weisman model was used. ► The results of this study enjoyed the desirable accuracy. - Abstract: In this paper, the concentrations of fission products and fuel isotopes as well as the changes of the thermo-neutronic parameters of the Bushehr’s VVER-1000 reactor were studied during the initial startup and the first cycle. In order to perform the time-dependent cell calculations and obtain the concentration of fuel elements, the WIMSD5-B code was used. Besides, by utilizing the CITATION-LDI2 code, the effective multiplication factor and the thermal power distribution of the reactor were calculated. A computer program (WERL code) was designed in order to perform accurate calculation of the temperature distribution of the reactor core. For this purpose, the Ross–Stoute, Weisman, and Lee–Kesler models were used for calculating of the gap conductance coefficient, fission gas release and gap pressure, respectively. The results demonstrated that in designing the startup process, in addition to the role considered for overcoming the power defects and in preparing the required conditions for performing the safety-assurance tests, the flattening of the reactor’s power must be taken into account. Comparison between the results of this modeling and the final safety analysis report of this reactor showed that the results presented in this paper are satisfactorily accurate

  18. Microfocusing of the FERMI@Elettra FEL beam with a K–B active optics system: Spot size predictions by application of the WISE code

    International Nuclear Information System (INIS)

    FERMI@Elettra, the first seeded EUV-SXR free electron laser (FEL) facility located at Elettra Sincrotrone Trieste has been conceived to provide very short (10–100 fs) pulses with ultrahigh peak brightness and wavelengths from 100 nm to 4 nm. A section fully dedicated to the photon transport and analysis diagnostics, named PADReS, has already been installed and commissioned. Three of the beamlines, EIS-TIMEX, DiProI and LDM, installed after the PADReS section, are in advanced commissioning state and will accept the first users in December 2012. These beam lines employ active X-ray optics in order to focus the FEL beam as well as to perform a controlled beam-shaping at focus. Starting from mirror surface metrology characterization, it is difficult to predict the focal spot shape applying only methods based on geometrical optics such as the ray tracing. Within the geometrical optics approach one cannot take into account the diffraction effect from the optics edges, i.e. the aperture diffraction, and the impact of different surface spatial wavelengths to the spot size degradation. Both these effects are strongly dependent on the photon beam energy and mirror incident angles. We employed a method based on physical optics, which applies the Huygens–Fresnel principle to reflection (on which the WISE code is based). In this work we report the results of the first measurements of the focal spot in the DiProI beamline end-station and compare them to the predictions computed with Shadow code and WISE code, starting from the mirror surface profile characterization

  19. Genetic Immunization of BALB/c mice with a Plasmid Bearing the Gene Coding for a Hybrid Merozoite Surface Protein 1-Hepatitis B Virus Surface Protein Fusion Protects Mice against Lethal Plasmodium chabaudi chabaudi PC1 Infection

    OpenAIRE

    Wunderlich, Gerhard; Moura, Ivan C.; del Portillo, Hernando A

    2000-01-01

    The genetic immunization of rodents with a plasmid coding for a Plasmodium chabaudi merozoite surface protein 1 (C terminus)-hepatitis B virus surface fusion protein (pPcMSP119-HBs) provided protection of mice against subsequent lethal challenge with P. chabaudi chabaudi PC1-infected red blood cells. The percentage of survivor mice was higher in DNA-immunized mice than in animals immunized with a recombinant rPcMSP119– glutathione S-transferase fusion protein administered in Freund adjuvant. ...

  20. Evidence for linkage between the loci coding for the binding protein for the fourth component of human complement (C4BP) and for the C3b/C4b receptor.

    OpenAIRE

    Rodriguez de Cordoba, S; Dykman, T R; Ginsberg-Fellner, F; Ercilla, G; Aqua, M; Atkinson, J P; Rubinstein, P

    1984-01-01

    Three pedigrees informative for the segregation of genetic variants of the binding protein for the fourth component of complement (C4BP) and C3b/C4b receptor (C3bR) have been identified. There were 10 informative meioses with no recombinants, indicating a close linkage between the loci encoding C4BP and C3bR, C4BP and C3bR [maximum lod (logarithm of odds of linkage) score: 2.4 at recombinant fraction = 0.0]. In addition, in the four unrelated individuals who were doubly heterozygous (C4BP*1, ...

  1. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements. [In LRL TRAN for CDC > 600 computer

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, D.V.; Breazeal, J.; Finan, C.H.; Johnston, B.M.

    1976-09-14

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table.

  2. CANAL code

    International Nuclear Information System (INIS)

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils

  3. Identification and preliminary characterization of a SigB regulated small non-coding RNA in Listeria monocytogenes

    DEFF Research Database (Denmark)

    Nielsen, Jesper Sejrup; Olsen, Anders Steno; Bonde, Mette;

    ) particular signal(s) (low temperature, high osmolarity, amino acid stress etc.) the alternative sigma factor is de-repressed and is subsequently free to activate the expression of a specific regulon. L. monocytogenes encodes four alternative sigma factors, where only sigma B (SigB) has been extensively...... characterized. We thought it likely that L. monocytogenes might encode sRNAs that were specifically regulated by alternative sigma factors. To approach this issue, we are in the process of developing a bioinformatics tool that allows us to predict candidate sRNA genes that are likely to be regulated by an...... alternative sigma factor. Using this approach we have successfully identified a novel sRNA of ~75 nucleotides in L. monocytogenes that is specifically regulated by SigB. This sRNA, which we have termed SigB1 is expressed from the 3'-UTR of a large operon. SigB1 is expressed in a SigB dependant manner only in...

  4. 17 CFR 229.406 - (Item 406) Code of ethics.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 406) Code of ethics. 229... 406) Code of ethics. (a) Disclose whether the registrant has adopted a code of ethics that applies to... code of ethics, explain why it has not done so. (b) For purposes of this Item 406, the term code...

  5. Applications of ENDF/B-VI and JENDL-3.1 iron data to reactor pressure vessel fluence analysis using continuous energy Monte Carlo code MCNP

    International Nuclear Information System (INIS)

    A comparison is made of results obtained from neutron transmissions analysis of RPV performed by MCNP with ENDF/B-VI and JENDL-3.1 iron data. At first, a one-dimensional discrete ordinates transport calculation using VITAMIN-C fine-group library based on ENDF/B-IV was performed for a cylindrical model of a PWR to generate the source spectrum at the front of the RPV. And then, the transmission of neutrons through RPV was calculated by MCNP with the moderated fission spectrum incident on the vessel face. For these ENDF/B-IV, -VI and JENDL-3.1 iron data were processed into continuous energy point data form by NJOY91.91. The fast neutron fluxes and dosimeter reaction rates through RPV using each iron data were intercompared

  6. Calculation code of the fission products activity

    International Nuclear Information System (INIS)

    The document describes the two codes for the calculation of the fission products activity. The ''Pepin le bref'' code gives the exact value of the beta and gamma activities of completely known fission products. The code ''Plus Pepin'' introduces the beta and gamma activities whose properties are partially known. (A.L.B.)

  7. Genomic rearrangements and functional diversification of lecA and lecB lectin-coding regions impacting the efficacy of glycomimetics directed against Pseudomonas aeruginosa

    Directory of Open Access Journals (Sweden)

    Amine M Boukerb

    2016-05-01

    Full Text Available LecA and LecB tetrameric lectins take part in oligosaccharide-mediated adhesion-processes of Pseudomonas aeruginosa. Glycomimetics have been designed to block these interactions. The great versatility of P. aeruginosa suggests that the range of application of these glycomimetics could be restricted to genotypes with particular lectin types. The likelihood of having genomic and genetic changes impacting LecA and LecB interactions with glycomimetics such as galactosylated and fucosylated calix[4]arene was investigated over a collection of strains from the main clades of P. aeruginosa. Lectin types were defined, and their ligand specificities were inferred. These analyses showed a loss of lecA among the PA7 clade. Genomic changes impacting lec loci were thus assessed using strains of this clade, and by making comparisons with the PAO1 genome. The lecA regions were found challenged by phage attacks and PAGI-2 (genomic island integrations. A prophage was linked to the loss of lecA. The lecB regions were found less impacted by such rearrangements but greater lecB than lecA genetic divergences were recorded. Sixteen combinations of LecA and LecB types were observed. Amino acid variations were mapped on PAO1 crystal structures. Most significant changes were observed on LecBPA7, and found close to the fucose binding site. Glycan array analyses were performed with purified LecBPA7. LecBPA7 was found less specific for fucosylated oligosaccharides than LecBPAO1, with a preference for H type 2 rather than type 1, and Lewisa rather than Lewisx. Comparison of the crystal structures of LecBPA7 and LecBPAO1 in complex with Lewisa showed these changes in specificity to have resulted from a modification of the water network between the lectin, galactose and GlcNAc residues. Incidence of these modifications on the interactions with calix[4]arene glycomimetics at the cell level was investigated. An aggregation test was used to establish the efficacy of these ligands

  8. Genomic Rearrangements and Functional Diversification of lecA and lecB Lectin-Coding Regions Impacting the Efficacy of Glycomimetics Directed against Pseudomonas aeruginosa

    Science.gov (United States)

    Boukerb, Amine M.; Decor, Aude; Ribun, Sébastien; Tabaroni, Rachel; Rousset, Audric; Commin, Loris; Buff, Samuel; Doléans-Jordheim, Anne; Vidal, Sébastien; Varrot, Annabelle; Imberty, Anne; Cournoyer, Benoit

    2016-01-01

    LecA and LecB tetrameric lectins take part in oligosaccharide-mediated adhesion-processes of Pseudomonas aeruginosa. Glycomimetics have been designed to block these interactions. The great versatility of P. aeruginosa suggests that the range of application of these glycomimetics could be restricted to genotypes with particular lectin types. The likelihood of having genomic and genetic changes impacting LecA and LecB interactions with glycomimetics such as galactosylated and fucosylated calix[4]arene was investigated over a collection of strains from the main clades of P. aeruginosa. Lectin types were defined, and their ligand specificities were inferred. These analyses showed a loss of lecA among the PA7 clade. Genomic changes impacting lec loci were thus assessed using strains of this clade, and by making comparisons with the PAO1 genome. The lecA regions were found challenged by phage attacks and PAGI-2 (genomic island) integrations. A prophage was linked to the loss of lecA. The lecB regions were found less impacted by such rearrangements but greater lecB than lecA genetic divergences were recorded. Sixteen combinations of LecA and LecB types were observed. Amino acid variations were mapped on PAO1 crystal structures. Most significant changes were observed on LecBPA7, and found close to the fucose binding site. Glycan array analyses were performed with purified LecBPA7. LecBPA7 was found less specific for fucosylated oligosaccharides than LecBPAO1, with a preference for H type 2 rather than type 1, and Lewisa rather than Lewisx. Comparison of the crystal structures of LecBPA7 and LecBPAO1 in complex with Lewisa showed these changes in specificity to have resulted from a modification of the water network between the lectin, galactose and GlcNAc residues. Incidence of these modifications on the interactions with calix[4]arene glycomimetics at the cell level was investigated. An aggregation test was used to establish the efficacy of these ligands. Great variations

  9. Genomic Rearrangements and Functional Diversification of lecA and lecB Lectin-Coding Regions Impacting the Efficacy of Glycomimetics Directed against Pseudomonas aeruginosa.

    Science.gov (United States)

    Boukerb, Amine M; Decor, Aude; Ribun, Sébastien; Tabaroni, Rachel; Rousset, Audric; Commin, Loris; Buff, Samuel; Doléans-Jordheim, Anne; Vidal, Sébastien; Varrot, Annabelle; Imberty, Anne; Cournoyer, Benoit

    2016-01-01

    LecA and LecB tetrameric lectins take part in oligosaccharide-mediated adhesion-processes of Pseudomonas aeruginosa. Glycomimetics have been designed to block these interactions. The great versatility of P. aeruginosa suggests that the range of application of these glycomimetics could be restricted to genotypes with particular lectin types. The likelihood of having genomic and genetic changes impacting LecA and LecB interactions with glycomimetics such as galactosylated and fucosylated calix[4]arene was investigated over a collection of strains from the main clades of P. aeruginosa. Lectin types were defined, and their ligand specificities were inferred. These analyses showed a loss of lecA among the PA7 clade. Genomic changes impacting lec loci were thus assessed using strains of this clade, and by making comparisons with the PAO1 genome. The lecA regions were found challenged by phage attacks and PAGI-2 (genomic island) integrations. A prophage was linked to the loss of lecA. The lecB regions were found less impacted by such rearrangements but greater lecB than lecA genetic divergences were recorded. Sixteen combinations of LecA and LecB types were observed. Amino acid variations were mapped on PAO1 crystal structures. Most significant changes were observed on LecBPA7, and found close to the fucose binding site. Glycan array analyses were performed with purified LecBPA7. LecBPA7 was found less specific for fucosylated oligosaccharides than LecBPAO1, with a preference for H type 2 rather than type 1, and Lewis(a) rather than Lewis(x). Comparison of the crystal structures of LecBPA7 and LecBPAO1 in complex with Lewis(a) showed these changes in specificity to have resulted from a modification of the water network between the lectin, galactose and GlcNAc residues. Incidence of these modifications on the interactions with calix[4]arene glycomimetics at the cell level was investigated. An aggregation test was used to establish the efficacy of these ligands. Great

  10. Sparse Coding for Alpha Matting

    OpenAIRE

    Johnson, Jubin; Varnousfaderani, Ehsan Shahrian; Cholakkal, Hisham; Rajan, Deepu

    2016-01-01

    Existing color sampling based alpha matting methods use the compositing equation to estimate alpha at a pixel from pairs of foreground (F) and background (B) samples. The quality of the matte depends on the selected (F,B) pairs. In this paper, the matting problem is reinterpreted as a sparse coding of pixel features, wherein the sum of the codes gives the estimate of the alpha matte from a set of unpaired F and B samples. A non-parametric probabilistic segmentation provides a certainty measur...

  11. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing in...

  12. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  13. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  14. Quantum coding theory with realistic physical constraints

    CERN Document Server

    Yoshida, Beni

    2010-01-01

    The following open problems, which concern a fundamental limit on coding properties of quantum codes with realistic physical constraints, are analyzed and partially answered here: (a) the upper bound on code distances of quantum error-correcting codes with geometrically local generators, (b) the feasibility of a self-correcting quantum memory. To investigate these problems, we study stabilizer codes supported by local interaction terms with translation and scale symmetries on a $D$-dimensional lattice. Our analysis uses the notion of topology emerging in geometric shapes of logical operators, which sheds a surprising new light on theory of quantum codes with physical constraints.

  15. Validation expérimentale d'un code de modélisation thermique de bâtiments (CODYRUN). Une application en climat tropical humide.

    OpenAIRE

    Garde, François; Garde, Francois; Boyer, Harry; Brau, Jean; Gatina, Jean-Claude

    1995-01-01

    CODYRUN, fruit d'une recherche commune entre L'INSA de Lyon et l'Université de la Réunion, est un logiciel multizone et multimodèle de simulation le comportement thermo-aéraulique de bâtiments. Parmi les différentes méthodes de validation, seule une validation expérimentale conduite suivant un protocole rigoureux conduit à une qualification indiscutable des modèles et du logiciel dans sa globalité. C'est cette approche, appliquée au cas de la thermique des bâtiments que détaille cet article. ...

  16. Diversity of Sarcocystis spp shed by opossums in Brazil inferred with phylogenetic analysis of DNA coding ITS1, cytochrome B, and surface antigens.

    Science.gov (United States)

    Valadas, Samantha Y O B; da Silva, Juliana I G; Lopes, Estela Gallucci; Keid, Lara B; Zwarg, Ticiana; de Oliveira, Alice S; Sanches, Thaís C; Joppert, Adriana M; Pena, Hilda F J; Oliveira, Tricia M F S; Ferreira, Helena L; Soares, Rodrigo M

    2016-05-01

    Although few species of Sarcocystis are known to use marsupials of the genus Didelphis as definitive host, an extensive diversity of alleles of surface antigen genes (sag2, sag3, and sag4) has been described in samples of didelphid opossums in Brazil. In this work, we studied 25 samples of Sarcocystis derived from gastrointestinal tract of opossums of the genus Didelphis by accessing the variability of sag2, sag3, sag4, gene encoding cytochrome b (cytB) and first internal transcribed spacer (ITS1). Reference samples of Sarcocystis neurona (SN138) and Sarcocystis falcatula (SF1) maintained in cell culture were also analyzed. We found four allele variants of cytB, seven allele variants of ITS1, 10 allele variants of sag2, 13 allele variants of sag3, and 6 allele variants of sag4. None of the sporocyst-derived sequences obtained from Brazilian opossums revealed 100% identity to SN138 at cytB gene, nor to SN138 or SF1 at ITS1 locus. In addition, none of the sag alleles were found identical to either SF1 or SN138 homologous sequences, and a high number of new sag allele types were found other than those previously described in Brazil. Out of ten sag2 alleles, four are novel, while eight out of 13 sag3 alleles are novel and one out of six sag4 alleles is novel. Further studies are needed to clarify if such a vast repertoire of allele variants of Sarcocystis is the consequence of re-assortments driven by sexual exchange, in order to form individuals with highly diverse characteristics, such as pathogenicity, host spectrum, among others or if it only represents allele variants of different species with different biological traits. PMID:26905780

  17. Quantum Convolutional BCH Codes

    CERN Document Server

    Aly, S A; Klappenecker, A; Roetteler, M; Sarvepalli, P K; Aly, Salah A.; Grassl, Markus; Klappenecker, Andreas; Roetteler, Martin; Sarvepalli, Pradeep Kiran

    2007-01-01

    Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular convolutional BCH codes. These codes have the property that they contain their Euclidean, respectively Hermitian, dual codes. Hence, they can be used to define quantum convolutional codes by the stabilizer code construction. We compute BCH-like bounds on the free distances which can be controlled as in the case of block codes, and establish that the codes have non-catastrophic encoders.

  18. Psacoin level 1B intercomparison: An International code intercomparison exercise on a hypothetical safety assessment case study for radioactive waste disposal systems

    International Nuclear Information System (INIS)

    This report focuses on the biosphere modelling aspects of the assessment of the radiological impact of the disposal of radioactive waste in greater detail. Seven exposure pathways are modelled: drinking water, freshwater fish, meat, milk and grain consumption as well as external gamma irradiation and contaminated dust inhalation. The accumulation of radionuclides, released in groundwaters, in the upper soil is also modelled. The objectives of this Level 1b exercise can be summarized as follows: 1 to gain experience in the application of probabilistic systems assessment methodology to transport and radiological exposure sub-models for the biosphere and hence to methods of estimating the total risk to individuals or groups of individuals; 2 to contribute to the verification of biosphere transport and exposure sub-models; 3 to investigate the effects of parameter uncertainty in the biosphere transport and exposure sub-models on the estimate of mean dose to individuals exposed via several exposure pathways

  19. Concatenated Conjugate Codes

    CERN Document Server

    Hamada, M

    2006-01-01

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  20. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  1. Scaled experiments for support of code modeling of main steam-line break phenomena in a B ampersand W [Babcock and Wilcox]-type once-through steam generator

    International Nuclear Information System (INIS)

    This paper describes and aspect of ongoing research to provide information on the performance of once-through steam generators (OTSGs) commonly used in the Babcock and Wilcox (B ampersand W) nuclear steam supply system. This program is funded by the U.S. Nuclear Regulatory Commission and is being conducted in part at the U.S. Department of Energy's Idaho National Engineering Laboratory. The objectives of the program are to develop an experimental data base that can be used to assess existing models and to develop improved models for characterizing the behavior of an OTSG during various off-normal operating conditions and accident scenarios. The models are then implemented in the nuclear reactor safety codes RELAP5 and TRAC

  2. Department of Transportation -- Exemption for using the Transuranic Package Transporter-I (TRUPACT-I) at the Idaho National Engineering Laboratory (Code of Federal Regulations, Title 49, Part 107, Subpart B -- Exemptions, 107-103 Application for Exemption)

    International Nuclear Information System (INIS)

    Exemption from specific regulations is being sought for the Transuranic Package Transporter Model I (TRUPACT-I) container. The design has successfully undergone extensive testing of a quarter-scale model and a full-scale prototype of the container. Results from the analysis and testing are in the TRUPACT-1 Safely Analysis Report for Packaging (SARP), GA-Al8695/SAND 87-7104 (TTC0735), April 1987 (see Attachment 1). The container was never certified or used because of questions raised during the certification process. Two features of the container design failed to satisfy the regulations for Type B packaging. First, the design utilizes a venting system to control internal and external pressures; this venting system is not allowed by the Code of Federal Regulations, Title 10, Parts 71(h) and 71.51(b) [10 CFR 71.(h) and 71.51(b)]. Second, the maximum quantity fissile material proposed to be hauled in TRUPACT-I exceeded the limits in 10 CFR 71.63(b) for a single-containment container. To correct these design deficiencies, the vents would be plugged during transport, and the maximum quantity of fissile material would be limited to the allowables for a single-containment container. An engineering analysis showed that the container could safely transport radioactive material within the boundaries of the Idaho National Engineering Laboratory (INEL) with the vent system plugged (see Attachment 2). However, some of the requirements for determining pressure on a container need to be changed (i.e., exempted) to reflect conditions unique to the INEL. The following are the requirements needing to be changed for INEL conditions, variances being sought, and justifications for the variances

  3. Computer controlled data measurement and analysis system used for measuring switching parameters of semiconductors. [Employs HP 2114B minicomputer; reports contain all applicable coding in assembly language

    Energy Technology Data Exchange (ETDEWEB)

    Culp, C.H.; Eckels, D.E.

    1976-01-01

    A computer-controlled data acquisition system which was employed to measure the threshold switching parameters of amorphous semiconductors is described. This system is capable of measuring the delay time required for a sample to switch, the electrical energy put into a sample and the charge passing through it during the delay time, and its ambient temperature. With this equipment an experimenter is able to control the magnitude and maximum duration of the voltage applied to a sample, the time interval between applications of voltage, and the load resistor in series with a sample. An HP 2114B minicomputer provides control and analysis capabilities for this system. Basically, this apparatus is a constant voltage pulse generator and signal processor. Major modules of this system are a transistorized high voltage switch, a digitally controlled high voltage resistor and power supply, a low-thermal-noise input-scanner, a precision timer, and two analog integrators. The amplitude of a voltage pulse can be varied from 0V to 1 kV and the maximum duration can be varied from 10 ..mu..s to 300 s. During the voltage pulse, a signal which represents the current through a sample is processed by analog integrators and signal multipliers. If the sample switches to a low-resistance state during a voltage pulse, this equipment automatically detects the event and removes the voltage from the sample to prevent sample deterioration. Following the voltage pulse, a teletypewriter prints the raw data from the integrators, power supply, and timer and the calculated values of the charge and energy input. 44 figures, 2 tables. (auth)

  4. Irradiation test of bar code label

    International Nuclear Information System (INIS)

    The irradiation test of bar code label tagged on radioactive waste container was done to determine the effect of radiation. Low and medium radioactive waste is that below total activity of 4,000Bq/g according to the Korean nuclear law. The irradiation amount to radiate bar code label tagged on radioactive waste container was calculated by MCNP-4b computer code. The nuclide such as Co-60 and Cs-137 was assumed to contribute 50 % of total activity. Real irradiation amount for bar code label was finally calculated by the dimensions of the container and the bar code label. The identification of post and the physical deflection of irradiated bar code label was tested by the bar code reader. The coated bar code label was suitable to use on low and medium radioactive waste container

  5. Twisted Permutation Codes

    OpenAIRE

    Gillespie, Neil I.; Praeger, Cheryl E.; Spiga, Pablo

    2014-01-01

    We introduce twisted permutation codes, which are frequency permutation arrays analogous to repetition permutation codes, namely, codes obtained from the repetition construction applied to a permutation code. In particular, we show that a lower bound for the minimum distance of a twisted permutation code is the minimum distance of a repetition permutation code. We give examples where this bound is tight, but more importantly, we give examples of twisted permutation codes with minimum distance...

  6. Transitive nonpropelinear perfect codes

    OpenAIRE

    Mogilnykh, I. Yu.; Solov'eva, F. I.

    2014-01-01

    A code is called transitive if its automorphism group (the isometry group) of the code acts transitively on its codewords. If there is a subgroup of the automorphism group acting regularly on the code, the code is called propelinear. Using Magma software package we establish that among 201 equivalence classes of transitive perfect codes of length 15 from \\cite{ost} there is a unique nonpropelinear code. We solve the existence problem for transitive nonpropelinear perfect codes for any admissi...

  7. Codes CONV45 and CONV56 for a PC

    International Nuclear Information System (INIS)

    The codes CONV45 and CONV56 convert data files from ENDF/B-4 to ENDF/B-5 and from ENDF/B-5 to ENDF/B-6 format respectively. The codes which were received from US National Nuclear Data Center were implemented at the IAEA Nuclear Data Section for use on personal computers. (author). 2 refs, 3 tabs

  8. Pressure vessel and piping codes

    International Nuclear Information System (INIS)

    Section III of the ASME Boiler and Pressure Vessel Code contains simplified design formulas for placing bounds on the plastic deformations in nuclear power plant piping systems. For Class 1 piping a simple equation is given in terms of primary load stress indices (B1 and B2) and nominal pressure and bending stresses. The B1 and B2 stress indices reflect the capacities of various piping products to carry load without gross plastic deformation. In this paper, the significance of the indices, nominal stresses, and limits given in the Code for Class 1 piping and corresponding requirements for Class 2 and Class 3 piping are discussed. Motivation behind recent (1978-1981) changes in the indices and in the associated stress limits is presented

  9. Homological stabilizer codes

    International Nuclear Information System (INIS)

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev’s toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev’s toric code or to the topological color codes. - Highlights: ► We show that Kitaev’s toric codes are equivalent to homological stabilizer codes on 4-valent graphs. ► We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. ► We find and classify all 2D homological stabilizer codes. ► We find optimal codes among the homological stabilizer codes.

  10. 论合同法对B to C点击合同的规制%On Restriction of Regulation to the B to C Click-Wrap Contract in the Chinese Contract Code

    Institute of Scientific and Technical Information of China (English)

    李明星

    2004-01-01

    B to C点击合同是企业与消费者之间的电子商务合同.应当从点击合同订立和修改、合同解释、"合理线"、格式条款效力等六个方面对其全面系统地规制,既维护企业与消费者的利益平衡,保障消费者的合法权益,又体现合同法律的公平正义.

  11. Ultrasound imaging using coded signals

    DEFF Research Database (Denmark)

    Misaridis, Athanasios

    Modulated (or coded) excitation signals can potentially improve the quality and increase the frame rate in medical ultrasound scanners. The aim of this dissertation is to investigate systematically the applicability of modulated signals in medical ultrasound imaging and to suggest appropriate...... excitation signal. Although a gain in signal-to-noise ratio of about 20 dB is theoretically possible for the time-bandwidth product available in ultrasound, it is shown that the effects of transducer weighting and tissue attenuation reduce the maximum gain at 10 dB for robust compression with low sidelobes...... described. Application of coded excitation in array imaging is evaluated through simulations in Field II. The low degree of the orthogonality among coded signals for ultrasound systems is first discussed, and the effect of mismatched filtering in the cross-correlation properties of the signals is evaluated...

  12. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  13. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...... including an outer BCH code correcting a few bit errors....

  14. The 1996 ENDF pre-processing codes

    International Nuclear Information System (INIS)

    The codes are named 'the Pre-processing' codes, because they are designed to pre-process ENDF/B data, for later, further processing for use in applications. This is a modular set of computer codes, each of which reads and writes evaluated nuclear data in the ENDF/B format. Each code performs one or more independent operations on the data, as described below. These codes are designed to be computer independent, and are presently operational on every type of computer from large mainframe computer to small personal computers, such as IBM-PC and Power MAC. The codes are available from the IAEA Nuclear Data Section, free of charge upon request. (author)

  15. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  16. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both the...... coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  17. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  18. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  19. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  20. Coupling CFD code with system code and neutron kinetic code

    Energy Technology Data Exchange (ETDEWEB)

    Vyskocil, Ladislav, E-mail: Ladislav.Vyskocil@ujv.cz; Macek, Jiri

    2014-11-15

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent.

  1. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  2. 'Turbo' coding for deep space applications

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    The performance of the `turbo' coding scheme is measured and an error floor is discovered. These residual errors are corrected with an outer BCH code. The complexity of the system is discussed, and for low data rates a realizable system operating at Eb/N0 below 0.2 dB is presented...

  3. On the dimension of twisted centralizer codes

    OpenAIRE

    Glasby, S. P.; Praeger, Cheryl E.; Alahmadi, Adel

    2016-01-01

    Given a field $F$, a scalar $\\lambda\\in F$ and a matrix $A\\in F^{n\\times n}$, the twisted centralizer code $C_F(A,\\lambda):=\\{B\\in F^{n\\times n}\\mid AB-\\lambda BA=0\\}$ is a linear code of length $n^2$. When $A$ is cyclic and $\\lambda\

  4. Verification of the computer code ATHLET in the framework of the external verification group ATHLET by post test analyses of the PKL III-experiments B4.3 and C6.1. Final report

    International Nuclear Information System (INIS)

    In the framework of the external verification of the thermohydraulic computer code ATHLET, developed by the Gesellschaft fuer Anlagen- und Reaktorsicherheit, post-test analyses of the two experiments B 4.3 and C 6.1 were carried out, which were performed at the PKL III test facility. In both experiments the effects of nitrogen injections into the primary coolant were investigated with respect to plant behaviour and heat transfer in the steam generators at the transition phase to low pressure (10 bar). In experiment B 4.3 nitrogen was injected in 6 single cycles into the primary system at reflux condenser-conditions. For hot- and cold-leg injections with small nitrogen masses the relevant physical phenomena were simulated; the results show a good to sufficient agreement between experiment and calculation considering steam generator hehaviour with respect to water level, fluid temperature and heat transfer. Discrepancies occurred especially in plant behaviour at hot-leg injections with large nitrogen masses, but there was at least a qualitative sufficient agreement with reference to nitrogen- and temperature-distribution in steam generator heating tubes. In experiment C 6.1 a small break LOCA was investigated with nitrogen injection of two accumulators and other aggravated boundary conditions. In total there is a good agreement between experiment and calculation with respect to simulation of integral behaviour and also of single phenomena. Especially the safety-relevant experimental result was verified by the analysis, i.e. a shutdown of the plant and transition to low pressure is even possible in cases of injection of noncondensable gas of two accumulators and other aggravated boundary conditions. (orig.)

  5. DAMD code for producing nuclear data library of fission products

    International Nuclear Information System (INIS)

    Computer codes DAMD, TACA and TREE have been developed. The code DAMD produces a nuclear data library from ENDF/B format library for the computer code DCHAIN which analyzes buildup and decay of fission products. The code TACA punches out and prints out the contents of the nuclear data library for DCHAIN. The code TREE prints out the decay schemes of the nuclides contained in the library. (auth.)

  6. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  7. Decentralized Network Coding

    OpenAIRE

    Fragouli, C.; Soljanin, E.

    2004-01-01

    This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.

  8. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic: in the...

  9. Remote-Handled Transuranic Content Codes

    International Nuclear Information System (INIS)

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document represents the development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specific identification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing description for each content code and compiles this information for all DOE sites. Compliance with waste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The content code gives an overall description of the RH-TRU waste material in terms of processes and packaging, as well as the generation location. This helps to provide cradle-to-grave traceability of the waste material so that the various actions required to assess its qualification as payload for the 72-B cask can be performed. The content codes also impose restrictions and requirements on the manner in which a payload can be assembled. The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7 of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures applicable for the qualification of waste as payload for the 72-B cask. The logic for this classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON, RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. Each content code uniquely

  10. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  11. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  12. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  13. Simulator qualification using engineering codes

    International Nuclear Information System (INIS)

    Recent revision to US Nuclear Regulatory Commission (NRC) regulations 10CFR55,45 requires that each utility must use an NRC-approved simulation facility for part of the operating portion of the license examination. Approval for use of a plant-referenced simulator in general requires adherence to regulatory guide 1.149 and to the ANSI/ANS 3.5-1985 standard. The Electric Power Research Institute (EPRI) anticipated the utilities' need for guidance by developing and demonstrating a methodology that uses engineering code(s) to validate the performance of a training simulator. The EPRI program on simulator qualification has clearly demonstrated the usefulness of engineering codes to (a) ensure a training simulator is capable of meeting the requirements of the training program and (b) document the simulator's compliance with the applicable regulatory requirements

  14. Simulation of the fault transitory of the feedwater controller in a Boiling water reactor with the Ramona-3B code; Simulacion del transitorio de falla del controlador de agua de alimentacion en un reactor de agua en ebullicion con el codigo RAMONA-3B

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez M, J.L.; Ortiz V, J. [ININ, 52045 Ocoyoacac, Estado de Mexico (Mexico)

    2005-07-01

    The obtained results when carrying out the simulation of the fault transitory of the feedwater controller (FCAA) with the Ramona-3B code, happened in the Unit 2 of the Laguna Verde power plant (CNLV), in September of the year 2000 are presented. The transitory originates as consequence of the controller's fault of speed of a turbo pump of feedwater. The work includes a short description of the event, the suppositions considered for the simulation and the obtained results. Also, a discussion of the impact of the transitory event is presented on aspects of reactor safety. Although the carried out simulation is limited by the capacities of the code and for the lack of available information, it was found that even in a conservative situation, the power was incremented only in 12% above the nominal value, while that the thermal limit determined by the minimum reason of the critical power, MCPR, always stayed above the limit values of operation and safety. (Author)

  15. Computer code conversion using HISTORIAN

    International Nuclear Information System (INIS)

    When a computer program written for a computer A is converted for a computer B, in general, the A version source program is rewritten for B version. However, in this way of program conversion, the following inconvenient problems arise. 1) The original statements to be rewritten for B version are lost. 2) If the original statements of the A version rewritten for B version would remain as comment lines, the B version source program becomes quite large. 3) When update directives of the program are mailed from the organization which developed the program or when some modifications are needed for the program, it is difficult to point out the part to be updated or modified in the B version source program. To solve these problems, the conversion method using the general-purpose software management aid system, HISTORIAN, has been introduced. This conversion method makes a large computer code a easy-to-use program for use to update, modify or improve after the conversion. This report describes the planning and procedures of the conversion method and the MELPROG-PWR/MOD1 code conversion from the CRAY version to the JAERI FACOM version as an example. This report would provide useful information for those who develop or introduce large programs. (author)

  16. Zebra: An advanced PWR lattice code

    Energy Technology Data Exchange (ETDEWEB)

    Cao, L.; Wu, H.; Zheng, Y. [School of Nuclear Science and Technology, Xi' an Jiaotong Univ., No. 28, Xianning West Road, Xi' an, ShannXi, 710049 (China)

    2012-07-01

    This paper presents an overview of an advanced PWR lattice code ZEBRA developed at NECP laboratory in Xi'an Jiaotong Univ.. The multi-group cross-section library is generated from the ENDF/B-VII library by NJOY and the 361-group SHEM structure is employed. The resonance calculation module is developed based on sub-group method. The transport solver is Auto-MOC code, which is a self-developed code based on the Method of Characteristic and the customization of AutoCAD software. The whole code is well organized in a modular software structure. Some numerical results during the validation of the code demonstrate that this code has a good precision and a high efficiency. (authors)

  17. Zebra: An advanced PWR lattice code

    International Nuclear Information System (INIS)

    This paper presents an overview of an advanced PWR lattice code ZEBRA developed at NECP laboratory in Xi'an Jiaotong Univ.. The multi-group cross-section library is generated from the ENDF/B-VII library by NJOY and the 361-group SHEM structure is employed. The resonance calculation module is developed based on sub-group method. The transport solver is Auto-MOC code, which is a self-developed code based on the Method of Characteristic and the customization of AutoCAD software. The whole code is well organized in a modular software structure. Some numerical results during the validation of the code demonstrate that this code has a good precision and a high efficiency. (authors)

  18. Comparison of sodium aerosol codes

    International Nuclear Information System (INIS)

    Although hypothetical fast reactor accidents leading to severe core damage are very low probability events, their consequences are to be assessed. During such accidents, one can envisage the ejection of sodium, mixed with fuel and fission products, from the primary circuit into the secondary containment. Aerosols can be formed either by mechanical dispersion of the molten material or as a result of combustion of the sodium in the mixture. Therefore considerable effort has been devoted to study the different sodium aerosol phenomena. To ensure that the problems of describing the physical behaviour of sodium aerosols were adequately understood, a comparison of the codes being developed to describe their behaviour was undertaken. The comparison consists of two parts. The first is a comparative study of the computer codes used to predict aerosol behaviour during a hypothetical accident. It is a critical review of documentation available. The second part is an exercise in which code users have run their own codes with a pre-arranged input. For the critical comparative review of the computer models, documentation has been made available on the following codes: AEROSIM (UK), MAEROS (USA), HAARM-3 (USA), AEROSOLS/A2 (France), AEROSOLS/B1 (France), and PARDISEKO-IIIb (FRG)

  19. Remote-Handled Transuranic Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions

    2001-08-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document representsthe development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specificidentification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing|description for each content code and compiles this information for all DOE sites. Compliance withwaste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The contentcode gives an overall description of the RH-TRU waste material in terms of processes and|packaging, as well as the generation location. This helps to provide cradle-to-grave traceability ofthe waste material so that the various actions required to assess its qualification as payload for the72-B cask can be performed. The content codes also impose restrictions and requirements on themanner in which a payload can be assembled.The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures|applicable for the qualification of waste as payload for the 72-B cask. The logic for this|classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON,|RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and|justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. |Each content code uniquely

  20. Extended calculations of OECD/NEA phase II-C burnup credit criticality benchmark problem for PWR spent fuel transport cask by using MCNP-4B2 code and JENDL-3.2 library

    International Nuclear Information System (INIS)

    The reactivity effect of the asymmetry of axial burnup profile in burnup credit criticality safety is studied for a realistic PWR spent fuel transport cask proposed in the current OECD/NEA Phase II-C benchmark problem. The axial burnup profiles are simulated in 21 material zones based on in-core flux measurements varying from strong asymmetry to more or less no asymmetry. Criticality calculations in a 3-D model have been performed using the continuous energy Monte Carlo code MCNP-4B2 and the nuclear data library JENDL-3.2. Calculation conditions are determined with consideration of the axial fission source convergence. Calculations are carried out not only for cases proposed in the benchmark but also for additional cases assuming symmetric burnup profile. The actinide-only approach supposed for first domestic introduction of burnup credit into criticality evaluation is also considered in addition to the actinide plus fission product approach adopted in the benchmark. The calculated results show that keff and the end effect increase almost linearly with increasing burnup axial offset that is defined as one of typical parameters showing the intensity of axial burnup asymmetry. The end effect is more sensitive to the asymmetry of burnup profile for the higher burnup. For an axially distributed burnup, the axial fission source distribution becomes strongly asymmetric as its peak shifts toward the top end of the fuel's active zone where the local burnup is less than that of the bottom end. The peak of fission source distribution becomes higher with the increase of either the asymmetry of burnup profile or the assembly-averaged burnup. The conservatism of the assumption of uniform axial burnup based on the actinide-only approach is estimated quantitatively in comparison with the keff result calculated with experiment-based strongest asymmetric axial burnup profile with the actinide plus fission product approach. (author)

  1. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  2. Improved FEC Code Based on Concatenated Code for Optical Transmission Systems

    Institute of Scientific and Technical Information of China (English)

    YUAN Jian-guo; JIANG Ze; MAO You-ju

    2006-01-01

    The improved three novel schemes of the super forward error correction(super-FEC) concatenated codes are proposed after the development trend of long-haul optical transmission systems and the defects of the existing FEC codes have been analyzed. The performance simulation of the Reed-Solomon(RS)+Bose-Chaudhuri-Hocguenghem(BCH) inner-outer serial concatenated code is implemented and the conceptions of encoding/decoding the parallel-concatenated code are presented. Furthermore,the simulation results for the RS(255,239)+RS(255,239) code and the RS(255,239)+RS(255,223) code show that the two consecutive concatenated codes are a superior coding scheme with such advantages as the better error correction,moderate redundancy and easy realization compared to the classic RS(255,239) code and other codes,and their signal to noise ratio gains are respectively 2~3 dB more than that of the RS(255,239)code at the bit error rate of 1×10-13. Finally,the frame structure of the novel consecutive concatenated code is arranged to lay a firm foundation in designing its hardware.

  3. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  4. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  5. Balanced Permutation Codes

    OpenAIRE

    Gabrys, Ryan; Milenkovic, Olgica

    2016-01-01

    Motivated by charge balancing constraints for rank modulation schemes, we introduce the notion of balanced permutations and derive the capacity of balanced permutation codes. We also describe simple interleaving methods for permutation code constructions and show that they approach capacity

  6. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  7. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  8. Linear codes on solid bursts and random errors

    Directory of Open Access Journals (Sweden)

    Pankaj Kumar Das

    2015-06-01

    Full Text Available The paper presents lower and upper bounds on the number of parity check digits required for a linear code that detects solid bursts of length $b$ or less and simultaneously any $e$ or less random errors. An example of such a code is also provided. Further, codes capable of detecting and simultaneously correcting such errors have also been dealt with.

  9. Simplex Codes Over the Ring \\sumn=0sun F2

    OpenAIRE

    AL-ASHKER, Mohammed M.

    2005-01-01

    In this paper, we introduce simplex linear codes over the ring \\sumn=0n=sun F2 of types a and b, where us+1=0. And we determine their properties. These codes are an extension and generalization of simplex codes over the ring Z2s.

  10. RELAP5/MOD2 code assessment

    International Nuclear Information System (INIS)

    Babcock and Wilcox (B and W) has been working with the code developers at EG and G and the US Nuclear Regulatory Commission in assessing the RELAP5/MOD2 computer code for the past year by simulating selected separate-effects tests. The purpose of this assessment has been to evaluate the code for use in MIST (Ref. 2) and OTIS integral system tests simulations and in the prediction of pressurized water reactor transients. B and W evaluated various versions of the code and made recommendations to improve code performance. As a result, the currently released version (cycle 36.1) has been improved considerably over earlier versions. However, further refinements to some of the constitutive models may still be needed to further improve the predictive capability of RELAP5/MOD2. The following versions of the code were evaluated. (1) RELAP/MOD2/Cycle 22 - first released version; (2) YELAP5/Cycle 32 - EG and G test version of RELAP5/MOD2/Cycle 32; (3) RELAP5/MOD2/Cycle 36 - frozen cycle for international code assessment; (4) updates to cycle 36 based on recommendations developed by B and W during the simulation of a Massachusetts Institute of Technology (MIT) pressurizer test; and (5) cycle 36.1 updates received from EG and G

  11. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  12. Informal Control code logic

    OpenAIRE

    Bergstra, Jan A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  13. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  14. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  15. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  16. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  17. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  18. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important to...... understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  19. Codes from difference sets

    CERN Document Server

    Ding, Cunsheng

    2014-01-01

    This is the first monograph on codebooks and linear codes from difference sets and almost difference sets. It aims at providing a survey of constructions of difference sets and almost difference sets as well as an in-depth treatment of codebooks and linear codes from difference sets and almost difference sets. To be self-contained, this monograph covers necessary mathematical foundations and the basics of coding theory. It also contains tables of best BCH codes and best cyclic codes over GF(2) and GF(3) up to length 125 and 79, respectively. This repository of tables can be used to benchmark

  20. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  1. XSOR codes users manual

    International Nuclear Information System (INIS)

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  2. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  3. Permutation codes for sources.

    Science.gov (United States)

    Berger, T.; Jelinek, F.; Wolf, J. K.

    1972-01-01

    Source encoding techniques based on permutation codes are investigated. For a broad class of distortion measures it is shown that optimum encoding of a source permutation code is easy to instrument even for very long block lengths. Also, the nonparametric nature of permutation encoding is well suited to situations involving unknown source statistics. For the squared-error distortion measure a procedure for generating good permutation codes of a given rate and block length is described. The performance of such codes for a memoryless Gaussian source is compared both with the rate-distortion function bound and with the performance of various quantization schemes. The comparison reveals that permutation codes are asymptotically ideal for small rates and perform as well as the best entropy-coded quantizers presently known for intermediate rates. They can be made to compare favorably at high rates, too, provided the coding delay associated with extremely long block lengths is tolerable.

  4. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  5. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  6. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  7. Light-water-reactor coupled neutronic and thermal-hydraulic codes

    International Nuclear Information System (INIS)

    An overview is presented of computer codes that model light water reactor cores with coupled neutronics and thermal-hydraulics. This includes codes for transient analysis and codes for steady state analysis which include fuel depletion and fission product buildup. Applications in nuclear design, reactor operations and safety analysis are given and the major codes in use in the USA are identified. The neutronic and thermal-hydraulic methodologies and other code features are outlined for three steady state codes (PDQ7, NODE-P/B and SIMULATE) and four dynamic codes (BNL-TWIGL, MEKIN, RAMONA-3B, RETRAN-02). Speculation as to future trends with such codes is also presented

  8. A Theoretical Method for Estimating Performance of Reed-Solomon Codes Concatenated with Orthogonal Space-Time Block Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Based on the studies of Reed-Solomon codes and orthogonal space-time block codes over Rayleigh fading channel, a theoretical method for estimating performance of Reed-Solomon codes concatenated with orthogonal space-time block codes is presented in this paper. And an upper bound of the bit error rate is also obtained. It is shown through computer simulations that the signal-to-noise ratio reduces about 15 dB or more after orthogonal space-time block codes are concatenate with Reed-Solomon (15,6) codes over Rayleigh fading channel, when the bit error rate is 10-4.

  9. Uncertainty analysis of minimum vessel liquid inventory during a small-break LOCA in a B ampersand W Plant: An application of the CSAU methodology using the RELAP5/MOD3 computer code

    International Nuclear Information System (INIS)

    The Nuclear Regulatory Commission (NRC) revised the emergency core cooling system licensing rule to allow the use of best estimate computer codes, provided the uncertainty of the calculations are quantified and used in the licensing and regulation process. The NRC developed a generic methodology called Code Scaling, Applicability, and Uncertainty (CSAU) to evaluate best estimate code uncertainties. The objective of this work was to adapt and demonstrate the CSAU methodology for a small-break loss-of-coolant accident (SBLOCA) in a Pressurized Water Reactor of Babcock ampersand Wilcox Company lowered loop design using RELAP5/MOD3 as the simulation tool. The CSAU methodology was successfully demonstrated for the new set of variants defined in this project (scenario, plant design, code). However, the robustness of the reactor design to this SBLOCA scenario limits the applicability of the specific results to other plants or scenarios. Several aspects of the code were not exercised because the conditions of the transient never reached enough severity. The plant operator proved to be a determining factor in the course of the transient scenario, and steps were taken to include the operator in the model, simulation, and analyses

  10. Intracoin - International Nuclide Transport Code Intercomparison Study

    International Nuclear Information System (INIS)

    The purpose of the project is to obtain improved knowledge of the influence of various strategies for radionuclide transport modelling for the safety assessment of final repositories for nuclear waste. This is a report of the first phase of the project which was devoted to a comparison of the numerical accuracy of the computer codes used in the study. The codes can be divided into five groups, namely advection-dispersion models, models including matrix diffusion and chemical effects and finally combined models. The results are presented as comparisons of calculations since the objective of level 1 was code verification. (G.B.)

  11. The HELIOS-2 lattice physics code

    International Nuclear Information System (INIS)

    Major advances have been made in the HELIOS code, resulting in the impending release of a new version, HELIOS-2. The new code includes a method of characteristics (MOC) transport solver to supplement the existing collision probabilities (CP) solver. A 177-group, ENDF/B-VII nuclear data library has been developed for inclusion with the new code package. Computational tests have been performed to verify the performance of the MOC solver against the CP solver, and validation testing against computational and measured benchmarks is underway. Results to-date of the verification and validation testing are presented, demonstrating the excellent performance of the new transport solver and nuclear data library. (Author)

  12. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  13. CONSTRUCTION OF REGULAR LDPC LIKE CODES BASED ON FULL RANK CODES AND THEIR ITERATIVE DECODING USING A PARITY CHECK TREE

    Directory of Open Access Journals (Sweden)

    H. Prashantha Kumar

    2011-09-01

    Full Text Available Low density parity check (LDPC codes are capacity-approaching codes, which means that practical constructions exist that allow the noise threshold to be set very close to the theoretical Shannon limit for a memory less channel. LDPC codes are finding increasing use in applications like LTE-Networks, digital television, high density data storage systems, deep space communication systems etc. Several algebraic and combinatorial methods are available for constructing LDPC codes. In this paper we discuss a novel low complexity algebraic method for constructing regular LDPC like codes derived from full rank codes. We demonstrate that by employing these codes over AWGN channels, coding gains in excess of 2dB over un-coded systems can be realized when soft iterative decoding using a parity check tree is employed.

  14. Neutron cross section library production code system for continuous energy Monte Carlo code MVP. LICEM

    International Nuclear Information System (INIS)

    A code system has been developed to produce neutron cross section libraries for the MVP continuous energy Monte Carlo code from an evaluated nuclear data library in the ENDF format. The code system consists of 9 computer codes, and can process nuclear data in the latest ENDF-6 format. By using the present system, MVP neutron cross section libraries for important nuclides in reactor core analyses, shielding and fusion neutronics calculations have been prepared from JENDL-3.1, JENDL-3.2, JENDL-FUSION file and ENDF/B-VI data bases. This report describes the format of MVP neutron cross section library, the details of each code in the code system and how to use them. (author)

  15. Improved decoding for a concatenated coding system

    DEFF Research Database (Denmark)

    Paaske, Erik

    1990-01-01

    The concatenated coding system recommended by CCSDS (Consultative Committee for Space Data Systems) uses an outer (255,233) Reed-Solomon (RS) code based on 8-b symbols, followed by the block interleaver and an inner rate 1/2 convolutional code with memory 6. Viterbi decoding is assumed. Two new...... decoding procedures based on repeated decoding trials and exchange of information between the two decoders and the deinterleaver are proposed. In the first one, where the improvement is 0.3-0.4 dB, only the RS decoder performs repeated trials. In the second one, where the improvement is 0.5-0.6 dB, both...... decoders perform repeated decoding trials and decoding information is exchanged between them...

  16. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  17. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  18. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  19. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  20. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  1. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

  2. Locally Repairable Codes

    OpenAIRE

    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G.

    2012-01-01

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data reliability. A main limitation of off-the-shelf erasure codes is their high-repair cost during single node failure events. A major open problem in this area has been the design of codes that {\\it i)} are repair efficient and {\\it ii)} achieve arbitrarily high data rates. In this paper, we explore the r...

  3. FPGA Design and Implementation of Convolution Code and Viterbi Decoder in Std 802.11b%802.11b中卷积码和Viterbi译码的FPGA设计实现

    Institute of Scientific and Technical Information of China (English)

    元锋刚; 许海涛

    2012-01-01

    Convolutional coding is one of the important channel error-correction coding methods, and usually its error-correction performance is superior to the block code. At present, (2,1,6) convolutional code is widely applied in wireless communication systems. Viterbi algorithm could achieve the best decoding performance of convolutional codes. The encoding and decoding methods of convolution codes in Std 802. llh are explained. Then, the design of encoder and decoder are presented and implemented in FPGA by the use of Verilog HDL. With a logical analyzer, the debugging of the design is conducted on the EP2CST144C8 chip.%卷积码是一种重要的信道纠错编码方式,其纠错性能通常优于分组码,目前(2,1,6)卷积码已广泛应用于无线通信系统中,Viterbi译码算法能最大限度地发挥卷积码的纠错性能。阐述了802.11b中卷积码的编码及其Viterbi译码方法,给出了编译码器的设计方法,并利用Verilog HDL硬件描述语言完成编译码器的FPGA实现。使用逻辑分析仪,在EP2C5T144C8芯片上完成了编译码器的硬件调试。

  4. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  5. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  6. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  7. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  8. CBP Phase I Code Integration

    International Nuclear Information System (INIS)

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown and Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown and Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface

  9. CBP PHASE I CODE INTEGRATION

    Energy Technology Data Exchange (ETDEWEB)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  10. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  11. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven...

  12. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  13. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  14. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  15. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  16. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  17. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  18. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  19. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model. The...... model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  20. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. PMID:21546315

  1. SYMTRAN - A Time-dependent Symmetric Tandem Mirror Transport Code

    International Nuclear Information System (INIS)

    A time-dependent version of the steady-state radial transport model in symmetric tandem mirrors in Ref. [1] has been coded up and first tests performed. Our code, named SYMTRAN, is an adaptation of the earlier SPHERE code for spheromaks, now modified for tandem mirror physics. Motivated by Post's new concept of kinetic stabilization of symmetric mirrors, it is an extension of the earlier TAMRAC rate-equation code omitting radial transport [2], which successfully accounted for experimental results in TMX. The SYMTRAN code differs from the earlier tandem mirror radial transport code TMT in that our code is focused on axisymmetric tandem mirrors and classical diffusion, whereas TMT emphasized non-ambipolar transport in TMX and MFTF-B due to yin-yang plugs and non-symmetric transitions between the plugs and axisymmetric center cell. Both codes exhibit interesting but different non-linear behavior

  2. Upgrades to the WIMS-ANL code

    International Nuclear Information System (INIS)

    The dusty old source code in WIMS-D4M has been completely rewritten to conform more closely with current FORTRAN coding practices. The revised code contains many improvements in appearance, error checking and in control of the output. The output is now tabulated to fit the typical 80 column window or terminal screen. The Segev method for resonance integral interpolation is now an option. Most of the dimension limitations have been removed and replaced with variable dimensions within a compile-time fixed container. The library is no longer restricted to the 69 energy group structure, and two new libraries have been generated for use with the code. The new libraries are both based on ENDF/B-VI data with one having the original 69 energy group structure and the second with a 172 group structure. The common source code can be used with PCs using both Windows 95 and NT, with a Linux based operating system and with UNIX based workstations. Comparisons of this version of the code to earlier evaluations with ENDF/B-V are provided, as well as, comparisons with the new libraries

  3. Upgrades to the WIMS-ANL code

    International Nuclear Information System (INIS)

    The dusty old source code in WIMS-D4M has been completely rewritten to conform more closely with current FORTRAN coding practices. The revised code contains many improvements in appearance, error checking and in control of the output. The output is now tabulated to fit the typical 80 column window or terminal screen. The Segev method for resonance integral interpolation is now an option. Most of the dimension limitations have been removed and replaced with variable dimensions within a compile-time fixed container. The library is no longer restricted to the 69 energy group structure, and two new libraries have been generated for use with the code. The new libraries are both based on ENDF/B-VI data with one having the original 69 energy group structure and the second with a 172 group structure. The common source code can be used with PCs using both Windows 95 and NT, with a Linux based operating system and with UNIX based workstations. Comparisons of this version of the code to earlier evaluations with ENDF/B-V are provided, as well as, comparisons with the new libraries. (author)

  4. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  5. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  6. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  7. Analysis of the CREOLE experiment on the reactivity temperature coefficient using the MCNP5 code with ENDF/B-VII and JEFF3.1 neutron cross section evaluations

    International Nuclear Information System (INIS)

    In the present work, we have analyzed the CREOLE experiment on the reactivity temperature coefficient (RTC) by using the MCNP code with the recently updated nuclear data evaluations. In this experiment performed in the EOLE critical facility located at CEA/Cadarache, the RTC has been measured in both UO2 and UO2-PuO2 PWR type lattices covering the whole temperature range from 20 deg. C to 300 deg. C. An accurate model of the EOLE reactor was developed by using the three-dimensional continuous energy code MCNP5. This Monte Carlo code guarantees a high level of fidelity in the description of the reactor core components at all temperatures taking into account their consequence on neutron cross sections data and all thermal expansion effects. In this case, the remaining discrepancy between calculation and experiment will be awarded mainly to uncertainties on nuclear data. The cross section libraries were generated by using NJOY-99.259 code with point-wise cross sections based on ENDF-BVII and JEFF3.1 evaluation files. The calculation-experiment discrepancies of the RTC were analyzed and the results have shown that the JEFF3.1 evaluation gives more consistent values than those obtained by ENDF-BVII. By using the JEFF3.1 evaluation, it may be pointed out that for UO2 clean lattices; the discrepancy is generally less than 0.17 pcm/ deg. C whereas for the UO2-PuO2 lattices it is less than 0,23 pcm/deg. C. These results confirm those previously published and show that the error on RTC in the MOX lattices case is greater than that obtained in the case of UOX clean lattices, particularly at room temperature range. (author)

  8. The new SOLPS-ITER code package

    Energy Technology Data Exchange (ETDEWEB)

    Wiesen, S., E-mail: s.wiesen@fz-juelich.de [Institut für Energie- und Klimaforschung IEK-4, FZJ, TEC, 52425 Jülich (Germany); Reiter, D.; Kotov, V. [Institut für Energie- und Klimaforschung IEK-4, FZJ, TEC, 52425 Jülich (Germany); Baelmans, M.; Dekeyser, W. [KU Leuven, Department of Mechanical Engineering, Celestijnenlaan 300, 3001 Leuven (Belgium); Kukushkin, A.S.; Lisgo, S.W.; Pitts, R.A. [ITER Organization, CS 90 046, 13067 St Paul Lez Durance Cedex (France); Rozhansky, V. [St. Petersburg State Polytechnical University, Polytechnicheskaya 29, 195251 St. Petersburg (Russian Federation); Saibene, G. [Fusion for Energy Joint Undertaking, Josep Pla No. 2 – T B3 7/01, Barcelona 08019 (Spain); Veselova, I.; Voskoboynikov, S. [St. Petersburg State Polytechnical University, Polytechnicheskaya 29, 195251 St. Petersburg (Russian Federation)

    2015-08-15

    The SOLPS-ITER package represents a renewed coupling of the up-to-date parallelized EIRENE Monte-Carlo code and the B2.5 edge plasma solver. Each part of the fluid-kinetic code system has been dismantled and analysed. For SOLPS-ITER, full backwards compatibility with previous SOLPS4.3 ITER reference simulations is critical. We present the results of the ongoing comprehensive benchmark activity and discuss how SOLPS-ITER can be tuned to reproduce ITER simulations performed with SOLPS4.3. In particular in SOLPS-ITER a quantitative “metric” to measure the level of code convergence has been implemented, with corresponding code diagnostics carried over from SOLPS4.3, allowing code run times to be accurately compared. Good agreement is found between the two codes in the tests so far. Remaining discrepancies in the solution in front of the divertor targets are likely related to different formulations of the equations and the different discretization schemes used by the codes.

  9. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  10. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  11. Speaking In Code

    OpenAIRE

    Croxall, Brian

    2014-01-01

    Brian Croxall Emory University Over the last five years, there have been countless articles written about the digital humanities. It’s been called both the savior and the death knell of scholarship in the twenty-first century. But what do we mean when we say “digital humanities”? How “digital” and how “humanities” need we be? Why is so much faith being placed in code and code words? In this presentation, Brian Croxall argues that digital humanists need to speak in code less frequently and tha...

  12. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  13. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  14. Enigma fuel performance code

    International Nuclear Information System (INIS)

    The Enigma fuel performance code has been developed jointly by BNFL and the CEGB's Berkeley Nuclear Laboratories. Its development arose from the need for a code capable of analysing all aspects of light water reactor (LWR) fuel behaviour which would also provide a suitable framework for future submodel development. The submodels incorporated into Enigma reflect the significant progress which has been made in recent years in modelling the important physical processes which determine fuel behaviour. The Enigma code has been subjected to an extensive programme of validation which has demonstrated its suitability for LWR performance analysis. (author)

  15. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  16. Differential modulation based on space-time block codes

    Institute of Scientific and Technical Information of China (English)

    李正权; 胡光锐

    2004-01-01

    A differential modulation scheme using space-time block codes is put forward. Compared with other schemes,our scheme has lower computational complexity and has a simpler decoder. In the case of three or four transmitter antennas, our scheme has a higher rate a higher coding gain and a lower bit error rate for a given rate. Then we made simulations for space-time block codes as well as group codes in the case of two, three, four and five transmit antennas. The simulations prove that using two transmit antennas, one receive antenna and code rate of 4 bits/s/Hz, the differential STBC method outperform the differential group codes method by 4 dB. Useing three, four and five transmit antennas,one receive antenna, and code rate of 3 bits/s/Hz are adopted, the differential STBC method outperform the differential group codes method by 5 dB, 6.5 dB and 7 dB, respectively. In other words, the differential modulation scheme based on space-time block code is better than the corresponding differential modulation scheme

  17. Forward error correcting codes in fiber-optic synchronous code-division multiple access networks

    Science.gov (United States)

    Srivastava, Anand; Kar, Subrat; Jain, V. K.

    2002-02-01

    In optical code-division multiple access (OCDMA) networks, the performance is limited by optical multiple access interference (OMAI), amplified spontaneous emission (ASE) noise and receiver noise. To reduce OMAI and noise effects, use of forward error correcting (FEC) (18880, 18865) and (2370, 2358) Hamming codes are explored for STM-1 (155 Mbps) bit stream. The encoding is carried out at the multiplex-section layer. The check bits are embedded in the unused bytes of multiplex section overhead (MSOH). The expression for probability of error is derived taking into consideration OMAI, various sources of noise and effect of group velocity dispersion (GVD). It is observed that for a BER of 10 -9, use of FEC gives a coding gain of 1.4-2.1 dB depending upon the type of coding scheme used. It is also seen that there is a sensitivity improvement of about 3 dB if the source is suitably pre-chirped.

  18. FORTRAN code-evaluation system

    Science.gov (United States)

    Capps, J. D.; Kleir, R.

    1977-01-01

    Automated code evaluation system can be used to detect coding errors and unsound coding practices in any ANSI FORTRAN IV source code before they can cause execution-time malfunctions. System concentrates on acceptable FORTRAN code features which are likely to produce undesirable results.

  19. No More Perfect Codes: Classification of Perfect Quantum Codes

    OpenAIRE

    Li, Zhuo; Xing, Lijuan

    2009-01-01

    We solve the problem of the classification of perfect quantum codes. We prove that the only nontrivial perfect quantum codes are those with the parameters . There exist no other nontrivial perfect quantum codes.

  20. Heavy ion elastic scattering of code : OPTHI

    International Nuclear Information System (INIS)

    A computer code, OPTHI has been designed to calculate nuclear optical model elastic cross sections for the scattering of heavy ions. The program has been designed to be utilitarian rather than capable of giving an exact description of elastic scattering. Input format is described and the program listing is given. (M.G.B.)

  1. Irregular and regular LDPC codes with high spectrum efficiency modulation in image transmission over fading channel

    Institute of Scientific and Technical Information of China (English)

    Ma Piming; Yuan Dongfeng

    2005-01-01

    If the degree distribution is chosen carefully, the irregular low-density parity-check (LDPC) codes can outperform the regular ones. An image transmission system is proposed by combining regular and irregular LDPC codes with 16QAM/64QAM modulation to improve both efficiency and reliability. Simulaton results show that LDPC codes are good coding schemes over fading channel in image communication with lower system complexity. More over, irregular codes can obtain a code gain of about 0.7 dB compared with regular ones when BER is 10-4. So the irregular LDPC codes are more suitable for image transmission than the regular codes.

  2. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  3. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  4. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  5. Induction technology optimization code

    International Nuclear Information System (INIS)

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  7. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  8. The moment code BEDLAM

    Energy Technology Data Exchange (ETDEWEB)

    Channell, P.J.; Healy, L.M.; Lysenko, W.P.

    1985-10-01

    This paper describes the status of BEDLAM and presents the results of some tests. We simulated a section of radio-frequency quadrupole (RFQ) linac, neglecting space charge, to test the new code. Agreement with a Particle-In-Cell (PIC) simulation was excellent. We also verified that the fourth-order solution is more accurate than the second-order solution, which indicates the convergence of the method. We believe these results justify the continued development of moment simulation codes.

  9. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  10. Towards advanced code simulators

    International Nuclear Information System (INIS)

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  11. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  12. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  13. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  14. Computer codes in particle transport physics

    International Nuclear Information System (INIS)

    Simulation of transport and interaction of various particles in complex media and wide energy range (from 1 MeV up to 1 TeV) is very complicated problem that requires valid model of a real process in nature and appropriate solving tool - computer code and data library. A brief overview of computer codes based on Monte Carlo techniques for simulation of transport and interaction of hadrons and ions in wide energy range in three dimensional (3D) geometry is shown. Firstly, a short attention is paid to underline the approach to the solution of the problem - process in nature - by selection of the appropriate 3D model and corresponding tools - computer codes and cross sections data libraries. Process of data collection and evaluation from experimental measurements and theoretical approach to establishing reliable libraries of evaluated cross sections data is Ion g, difficult and not straightforward activity. For this reason, world reference data centers and specialized ones are acknowledged, together with the currently available, state of art evaluated nuclear data libraries, as the ENDF/B-VI, JEF, JENDL, CENDL, BROND, etc. Codes for experimental and theoretical data evaluations (e.g., SAMMY and GNASH) together with the codes for data processing (e.g., NJOY, PREPRO and GRUCON) are briefly described. Examples of data evaluation and data processing to generate computer usable data libraries are shown. Among numerous and various computer codes developed in transport physics of particles, the most general ones are described only: MCNPX, FLUKA and SHIELD. A short overview of basic application of these codes, physical models implemented with their limitations, energy ranges of particles and types of interactions, is given. General information about the codes covers also programming language, operation system, calculation speed and the code availability. An example of increasing computation speed of running MCNPX code using a MPI cluster compared to the code sequential option

  15. PEAR code review

    International Nuclear Information System (INIS)

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  16. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  17. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  18. cDNA cloning and transient expression of the Epstein-Barr virus-determined nuclear antigen EBNA3B in human cells and identification of novel transcripts from its coding region.

    OpenAIRE

    Kerdiles, B; Walls, D; Triki, H.; Perricaudet, M; Joab, I

    1990-01-01

    Recombinant plasmids containing sequences from the BamHI-E rightward reading frames 2a and 2b (BERF2a and 2b) of the Epstein-Barr virus (EBV) genome were isolated from a library of cDNA clones which had been previously made from the EBV B95-8 lymphoblastoid cell line (M. Bodescot, O. Brison, and M. Perricaudet, Nucleic Acids Res. 14:7103-7114, 1986). The characterization of these clones in combination with RNase mapping experiments led to the identification of one leftward and several rightwa...

  19. Staircase Codes: FEC for 100 Gb/s OTN

    CERN Document Server

    Smith, Benjamin P; Hunt, Andrew; Kschischang, Frank R; Lodge, John

    2012-01-01

    Staircase codes, a new class of forward-error-correction (FEC) codes suitable for high-speed optical communications, are introduced. An ITU-T G.709-compatible staircase code with rate R=239/255 is proposed, and FPGA-based simulation results are presented, exhibiting a net coding gain (NCG) of 9.41 dB at an output error rate of 1E-15, an improvement of 0.42 dB relative to the best code from the ITU-T G.975.1 recommendation. An error floor analysis technique is presented, and the proposed code is shown to have an error floor at 4.0E-21.

  20. SRAC2006: A comprehensive neutronics calculation code system

    International Nuclear Information System (INIS)

    The SRAC is a code system applicable to neutronics analysis of a variety of reactor types. Since the publication of the second version of the users manual (JAERI-1302) in 1986 for the SRAC system, a number of additions and modifications to the functions and the library data have been made to establish a comprehensive neutronics code system. The current system includes major neutron data libraries (JENDL-3.3, JENDL-3.2, ENDF/B-VII, ENDF/B-VI.8, JEFF-3.1, JEF-2.2, etc.), and integrates five elementary codes for neutron transport and diffusion calculation; PIJ based on the collision probability method applicable to 16 kind of lattice models, SN transport codes ANISN(1D) and TWOTRN(2D), diffusion codes TUD(1D) and CITATION(multi-D). The system also includes an auxiliary code COREBN for multi-dimensional core burn-up calculation. (author)

  1. BASS Code Development

    Science.gov (United States)

    Sawyer, Scott

    2004-01-01

    The BASS computational aeroacoustic code solves the fully nonlinear Euler equations in the time domain in two-dimensions. The acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The spatial mode generation, propagation and decay characteristics are predicted by assuming the acoustic field away from the stator can be represented as a uniform flow with small harmonic perturbations superimposed. The computed field is then decomposed using a joint temporal-spatial transform to determine the wave amplitudes as a function of rotor harmonic and spatial mode order. This report details the following technical aspects of the computations and analysis. 1) the BASS computational technique; 2) the application of periodic time shifted boundary conditions; 3) the linear theory aspects unique to rotor-stator interactions; and 4) the joint spatial-temporal transform. The computational results presented herein are twofold. In each case, the acoustic response of the stator is determined simultaneously for the first three harmonics of the convected vortical gust of the rotor. The fan under consideration here like modern fans is cut-off at +, and propagating acoustic waves are only expected at 2BPF and 3BPF. In the first case, the computations showed excellent agreement with linear theory predictions. The frequency and spatial mode order of acoustic field was computed and found consistent with linear theory. Further, the propagation of the generated modes was also correctly predicted. The upstream going waves propagated from the domain without reflection from the in ow boundary. However, reflections from the out ow boundary were noticed. The amplitude of the reflected wave was approximately 5% of the incident wave. The second set of computations were used to determine the influence of steady loading on the generated noise. Toward this end, the acoustic response was determined with three steady loading

  2. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  3. The EGS5 Code System

    Energy Technology Data Exchange (ETDEWEB)

    Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

    2005-12-20

    , a deliberate attempt was made to present example problems in order to help the user ''get started'', and we follow that spirit in this report. A series of elementary tutorial user codes are presented in Chapter 3, with more sophisticated sample user codes described in Chapter 4. Novice EGS users will find it helpful to read through the initial sections of the EGS5 User Manual (provided in Appendix B of this report), proceeding then to work through the tutorials in Chapter 3. The User Manuals and other materials found in the appendices contain detailed flow charts, variable lists, and subprogram descriptions of EGS5 and PEGS. Included are step-by-step instructions for developing basic EGS5 user codes and for accessing all of the physics options available in EGS5 and PEGS. Once acquainted with the basic structure of EGS5, users should find the appendices the most frequently consulted sections of this report.

  4. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  5. Mixed Burst Error Correcting Codes

    OpenAIRE

    Sethi, Amita

    2015-01-01

    In this paper, we construct codes which are an improvement on the previously known block wise burst error correcting codes in terms of their error correcting capabilities. Along with different bursts in different sub-blocks, the given codes also correct overlapping bursts of a given length in two consecutive sub-blocks of a code word. Such codes are called mixed burst correcting (mbc) codes.

  6. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  7. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  8. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  9. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  10. The TESS [Tandem Experiment Simulation Studies] computer code user's manual

    International Nuclear Information System (INIS)

    TESS (Tandem Experiment Simulation Studies) is a one-dimensional, bounded particle-in-cell (PIC) simulation code designed to investigate the confinement and transport of plasma in a magnetic mirror device, including tandem mirror configurations. Mirror plasmas may be modeled in a system which includes an applied magnetic field and/or a self-consistent or applied electrostatic potential. The PIC code TESS is similar to the PIC code DIPSI (Direct Implicit Plasma Surface Interactions) which is designed to study plasma transport to and interaction with a solid surface. The codes TESS and DIPSI are direct descendants of the PIC code ES1 that was created by A. B. Langdon. This document provides the user with a brief description of the methods used in the code and a tutorial on the use of the code. 10 refs., 2 tabs

  11. WAVELET-BASED FINE GRANULARITY SCALABLE VIDEO CODING

    Institute of Scientific and Technical Information of China (English)

    Zhang Jiangshan; Zhu Guangxi

    2003-01-01

    This letter proposes an efficient wavelet-based Fine Granularity Scalable (FGS)coding scheme, where the base layer is encoded with a newly designed wavelet-based coder, and the enhancement layer is encoded with Progressive Fine Granularity Scalable (PFGS) coding.This algorithm involves multi-frame motion compensation, rate-distortion optimizing strategy with Lagrangian cost function and context-based adaptive arithmetic coding. In order to improve efficiency of the enhancement layer coding, an improved motion estimation scheme that uses both information from the base layer and the enhancement layer is also proposed in this letter. The wavelet-based coder significantly improves the coding efficiency of the base layer compared with MPEG-4 ASP (Advanced Simple Profile) and H.26L TML9. The PFGS coding is a significant improvement over MPEG-4 FGS coding at the enhancement layer. Experiments show that single layer coding efficiency gain of the proposed scheme is about 2.0-3.0dB and 0.3-1.0dB higher than that of MPEG-4 ASP and H.26L TML9, respectively. The overall coding efficiency gain of the proposed scheme is about 4.0-5.0dB higher than that of MPEG-4 FGS.

  12. The Aster code

    International Nuclear Information System (INIS)

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  13. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  14. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  15. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  16. Code-Mixing as a Bilingual Instructional Strategy

    Science.gov (United States)

    Jiang, Yih-Lin Belinda; García, Georgia Earnest; Willis, Arlette Ingram

    2014-01-01

    This study investigated code-mixing practices, specifically the use of L2 (English) in an L1 (Chinese) class in a U.S. bilingual program. Our findings indicate that the code-mixing practices made and prompted by the teacher served five pedagogical functions: (a) to enhance students' bilingualism and bilingual learning, (b) to review and…

  17. B2B marketing

    OpenAIRE

    Pospíšilová, Lucie

    2010-01-01

    The main goal of this bachelor thesis is to apply theoretical knowledge in B2B marketing to the example of marketing processes in a particular company, to evaluate the current situation of its activities with regard to B2B principles and to suggest relevant recommendations. The theoretical part focuses on specific characteristics of B2B marketing, describes its differences from marketing on consumer markets, deals with buying behaviour of organizations and specifies particular features of mar...

  18. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  19. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  20. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as...... waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of...

  1. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  2. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  3. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  4. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    , that is, the productivity code of the 21st century, is dissolved. Today, organizations are pressured for operational efficiency, often in terms of productivity, due to increased global competition, demographical changes, and use of natural resources. Taylor’s principles for rationalization founded...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period....... The improvement system consists of five elements: The improvement process, participants, management, organization, and technology. The improvement system is not an organizational structure but rather a capability and readiness to organize the right improvement activities for a given challenge, i...

  5. Scalability of the plasma physics code GEM

    OpenAIRE

    Scott, Bruce D.; Weinberg, Volker; Hoenen, Olivier; Karmakar, Anupam; Fazendeiro, Luis

    2013-01-01

    We discuss a detailed weak scaling analysis of GEM, a 3D MPI-parallelised gyrofluid code used in theoretical plasma physics at the Max Planck Institute of Plasma Physics, IPP at Garching b. M\\"unchen, Germany. Within a PRACE Preparatory Access Project various versions of the code have been analysed on the HPC systems SuperMUC at LRZ and JUQUEEN at J\\"ulich Supercomputing Centre (JSC) to improve the parallel scalability of the application. The diagnostic tool Scalasca has been used to filter o...

  6. Digital color acquisition, perception, coding and rendering

    CERN Document Server

    Fernandez-Maloigne, Christine; Macaire, Ludovic

    2013-01-01

    In this book the authors identify the basic concepts and recent advances in the acquisition, perception, coding and rendering of color. The fundamental aspects related to the science of colorimetry in relation to physiology (the human visual system) are addressed, as are constancy and color appearance. It also addresses the more technical aspects related to sensors and the color management screen. Particular attention is paid to the notion of color rendering in computer graphics. Beyond color, the authors also look at coding, compression, protection and quality of color images and videos.<b

  7. A modular code supervisor

    International Nuclear Information System (INIS)

    Large industrial computer CEA codes in the field of scientific computing, mechanics, thermohydraulics, and neutronics, are decomposed in sets of separate modules. Each module performs a well-defined task and all information exchanged by the modules are contained in data structures, taken as input or given as output. The advantage of this structure is the great flexibility offered to experienced user to solve a large number of different problems, but to choose, order, monitor large sequences of modules and understand what each module requires as input and output is out of the interest of the common user. The aim is to conserve entirely this flexibility in dealing with knowledge relevant from scientific or technical fields and not from the code itself. The first part of this paper describes the three main steps of the software: specification phase, generating algorithm, translation in code command language. The second part describes how the authors obtain explanations from the modelization of operators and from a particular representation of the internal structure of the generated particular representation of the internal structure of the generated plan (triangular table) that lead to a generalization allowing synthesis of sequences of operators or the transformations of the total order of the generated plan in a partial one. The software is the first part of the modular codes supervisor. It was applied to CRONOS, neutronic reactor core code, which has the command language GIBIANE. It will be extended to the reactor calculations supervisor, SAGA, using the ensemble of the codes developed by CEA/DMT/SERMA

  8. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  9. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  10. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well as...

  11. CONCEPT computer code

    International Nuclear Information System (INIS)

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  12. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  13. Extended quantum color coding

    International Nuclear Information System (INIS)

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only ∼2√(N) quantum colors to order N objects in large N limit, whereas ∼N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix

  14. CPM: Masking code pointers to prevent code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2013-01-01

    Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. This paper reports on two prototype implementations on very distinct processor architec...

  15. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  16. Higher-order CIS codes

    OpenAIRE

    Carlet, Claude; Freibert, Finley; Guilley, Sylvain; Kiermaier, Michael; Kim, Jon-Lark; Solé, Patrick

    2014-01-01

    We introduce {\\bf complementary information set codes} of higher-order. A binary linear code of length $tk$ and dimension $k$ is called a complementary information set code of order $t$ ($t$-CIS code for short) if it has $t$ pairwise disjoint information sets. The duals of such codes permit to reduce the cost of masking cryptographic algorithms against side-channel attacks. As in the case of codes for error correction, given the length and the dimension of a $t$-CIS code, we look for the high...

  17. Veronese subspace codes

    OpenAIRE

    Cossidente, Antonio; Pavese, Francesco

    2015-01-01

    Using the correspondence between quadrics of ${\\rm PG}(2,q)$ and points of ${\\rm PG}(5,q)$, a family of $(6,q^3(q^2-1)(q-1)/3+(q^2+1)(q^2+q+1),4;3)_q$ constant dimension subspace codes is constructed.

  18. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  19. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  20. Analysis of the optimality of the standard genetic code.

    Science.gov (United States)

    Kumar, Balaji; Saini, Supreet

    2016-07-19

    Many theories have been proposed attempting to explain the origin of the genetic code. While strong reasons remain to believe that the genetic code evolved as a frozen accident, at least for the first few amino acids, other theories remain viable. In this work, we test the optimality of the standard genetic code against approximately 17 million genetic codes, and locate 29 which outperform the standard genetic code at the following three criteria: (a) robustness to point mutation; (b) robustness to frameshift mutation; and (c) ability to encode additional information in the coding region. We use a genetic algorithm to generate and score codes from different parts of the associated landscape, which are, as a result, presumably more representative of the entire landscape. Our results show that while the genetic code is sub-optimal for robustness to frameshift mutation and the ability to encode additional information in the coding region, it is very strongly selected for robustness to point mutation. This coupled with the observation that the different performance indicator scores for a particular genetic code are negatively correlated makes the standard genetic code nearly optimal for the three criteria tested in this work. PMID:27327359

  1. Recent developments in the CONTAIN-LMR code

    International Nuclear Information System (INIS)

    Through an international collaborative effort, a special version of the CONTAIN code is being developed for integrated mechanistic analysis of the conditions in liquid metal reactor (LMR) containments during severe accidents. The capabilities of the most recent code version, CONTAIN LMR/1B-Mod.1, are discussed. These include new models for the treatment of two condensables, sodium condensation on aerosols, chemical reactions, hygroscopic aerosols, and concrete outgassing. This code version also incorporates all of the previously released LMR model enhancements. The results of an integral demonstration calculation of a sever core-melt accident scenario are given to illustrate the features of this code version. 11 refs., 7 figs., 1 tab

  2. Relationship between various pressure vessel and piping codes

    International Nuclear Information System (INIS)

    Section VIII of the ASME Code provides stress allowable values for material specifications that are provided in Section II Parts A and B. Since the adoption of the ASME Code over 60 years ago the incidence of failure has been greatly reduced. The Codes are currently based on strength criteria and advancements in the technology of fracture toughness and fracture mechanics should permit an even greater degree of reliability and safety. This lecture discusses the various Sections of the Code. It describes the basis for the establishment of design stress allowables and promotes the idea of the use of fracture mechanics

  3. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  4. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound for...

  5. Present state of the SOURCES computer code

    Energy Technology Data Exchange (ETDEWEB)

    Shores, E. F. (Erik F.)

    2002-01-01

    In various stages of development for over two decades, the SOURCES computer code continues to calculate neutron production rates and spectra from four types of problems: homogeneous media, two-region interfaces, three-region interfaces and that of a monoenergetic alpha particle beam incident on a slab of target material. Graduate work at the University of Missouri - Rolla, in addition to user feedback from a tutorial course, provided the impetus for a variety of code improvements. Recently upgraded to version 4B, initial modifications to SOURCES focused on updates to the 'tape5' decay data library. Shortly thereafter, efforts focused on development of a graphical user interface for the code. This paper documents the Los Alamos SOURCES Tape1 Creator and Library Link (LASTCALL) and describes additional library modifications in more detail. Minor improvements and planned enhancements are discussed.

  6. Development of Tritium Permeation Analysis Code (TPAC)

    Energy Technology Data Exchange (ETDEWEB)

    Eung S. Kim; Chang H. Oh; Mike Patterson

    2010-10-01

    Idaho National Laboratory developed the Tritium Permeation Analysis Code (TPAC) for tritium permeation in the Very High Temperature Gas Cooled Reactor (VHTR). All the component models in the VHTR were developed and were embedded into the MATHLAB SIMULINK package with a Graphic User Interface. The governing equations of the nuclear ternary reaction and thermal neutron capture reactions from impurities in helium and graphite core, reflector, and control rods were implemented. The TPAC code was verified using analytical solutions for the tritium birth rate from the ternary fission, the birth rate from 3He, and the birth rate from 10B. This paper also provides comparisons of the TPAC with the existing other codes. A VHTR reference design was selected for tritium permeation study from the reference design to the nuclear-assisted hydrogen production plant and some sensitivity study results are presented based on the HTGR outlet temperature of 750 degrees C.

  7. Co-ordinated research programme on benchmark study for the seismic analysis and testing of WWER-type nuclear power plants. V. 2B. General material: codes, standards, criteria. Working material

    International Nuclear Information System (INIS)

    In August 1991, following the SMiRT-11 Conference in Tokyo, a Technical Committee Meeting was held on the 'Seismic safety issues relating to existing NPPs'. The Proceedings of this TCM was subsequently compiled in an IAEA Working Material. One of the main recommendations of this TCM, called for the harmonization of criteria and methods used in Member States in seismic reassessment and upgrading of existing NPPs. Twenty four institutions from thirteen countries participated in the CRP named 'Benchmark study for the seismic analysis and testing of WWER type NPPs'. Two types of WWER reactors (WWER-1000 and WWER-440/213) selected for benchmarking. Kozloduy NPP Units 5/6 and Paks NPP represented these respectively as prototypes. Consistent with the recommendations of the TCM and the working paper prepared by the subsequent Consultants' Meeting, the focal activity of the CRP was the benchmarking exercises. A similar methodology was followed both for Paks NPP and Kozloduy NPP Unit 5. Firstly, the NPP (mainly the reactor building) was tested using a blast loading generated by a series of explosions from buried TNT charges. Records from this test were obtained at several free field locations (both downhole and surface), foundation mat, various elevations of structures as well as some tanks and the stack. Then the benchmark participants were provided with structural drawings, soil data and the free field record of the blast experiment. Their task was to make a blind prediction of the response at preselected locations. The analytical results from these participants were then compared with the results from the test. Although the benchmarking exercises constituted the focus of the CRP, there were many other interesting problems related to the seismic safety of WWER type NPPs which were addressed by the participants. These involved generic studies, i.e. codes and standards used in original WWER designs and their comparison with current international practice; seismic analysis

  8. Lossy Joint Source-Channel Coding Using Raptor Codes

    Directory of Open Access Journals (Sweden)

    H. V. Poor

    2008-09-01

    Full Text Available The straightforward application of Shannon's separation principle may entail a significant suboptimality in practical systems with limited coding delay and complexity. This is particularly evident when the lossy source code is based on entropy-coded quantization. In fact, it is well known that entropy coding is not robust to residual channel errors. In this paper, a joint source-channel coding scheme is advocated that combines the advantages and simplicity of entropy-coded quantization with the robustness of linear codes. The idea is to combine entropy coding and channel coding into a single linear encoding stage. If the channel is symmetric, the scheme can asymptotically achieve the optimal rate-distortion limit. However, its advantages are more clearly evident under finite coding delay and complexity. The sequence of quantization indices is decomposed into bitplanes, and each bitplane is independently mapped onto a sequence of channel coded symbols. The coding rate of each bitplane is chosen according to the bitplane conditional entropy rate. The use of systematic raptor encoders is proposed, in order to obtain a continuum of coding rates with a single basic encoding algorithm. Simulations show that the proposed scheme can outperform the separated baseline scheme for finite coding length and comparable complexity and, as expected, it is much more robust to channel errors in the case of channel capacity mismatch.

  9. Software verification and validation plan for the GWSCREEN code

    International Nuclear Information System (INIS)

    The purpose of this Software Verification and Validation Plan (SVVP) is to prescribe steps necessary to verify and validate the GWSCREEN code, version 2.0 to Quality Level B standards. GWSCREEN output is to be verified and validated by comparison with hand calculations, and by output from other Quality Level B computer codes. Verification and validation will also entail performing static and dynamic tests on the code using several analysis tools. This approach is consistent with guidance in the ANSI/ANS-10.4-1987, open-quotes Guidelines for Verification and Validation of Scientific and Engineering Computer Programs for the Nuclear Industry.close quotes

  10. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  11. A novel construction method of QC-LDPC codes based on CRT for optical communications

    Science.gov (United States)

    Yuan, Jian-guo; Liang, Meng-qi; Wang, Yong; Lin, Jin-zhao; Pang, Yu

    2016-05-01

    A novel construction method of quasi-cyclic low-density parity-check (QC-LDPC) codes is proposed based on Chinese remainder theory (CRT). The method can not only increase the code length without reducing the girth, but also greatly enhance the code rate, so it is easy to construct a high-rate code. The simulation results show that at the bit error rate ( BER) of 10-7, the net coding gain ( NCG) of the regular QC-LDPC(4 851, 4 546) code is respectively 2.06 dB, 1.36 dB, 0.53 dB and 0.31 dB more than those of the classic RS(255, 239) code in ITU-T G.975, the LDPC(32 640, 30 592) code in ITU-T G.975.1, the QC-LDPC(3 664, 3 436) code constructed by the improved combining construction method based on CRT and the irregular QC-LDPC(3 843, 3 603) code constructed by the construction method based on the Galois field ( GF( q)) multiplicative group. Furthermore, all these five codes have the same code rate of 0.937. Therefore, the regular QC-LDPC(4 851, 4 546) code constructed by the proposed construction method has excellent error-correction performance, and can be more suitable for optical transmission systems.

  12. Full-core pin-power calculations using Monte Carlo codes

    International Nuclear Information System (INIS)

    Pin wise calculations of core power distribution have been performed for a criticality mock up installation that models a WWER-1000 reactor. Two Monte Carlo codes have been applied for solving of this problem: the MCNP4B code and the KENO-VI code from the SCALE 4.4 system. The codes use different kinds of neutron cross section data: pointwise continuous-energy ENDF/B-VI data and multigroup ENDF/B-V data. Comparisons of calculated results show that the MCNP4B and KENO-VI results are in good agreement. (authors)

  13. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  14. You know the Science. Do you know your Code?

    CERN Document Server

    CERN. Geneva

    2014-01-01

    This talk is about automated code analysis and transformation tools to support scientific computing. Code bases are difficult to manage because of size, age, or safety requirements. Tools can help scientists and IT engineers understand their code, locate problems, improve quality. Tools can also help transform the code, by implementing complex refactorings, replatforming, or migration to a modern language. Such tools are themselves difficult to build. This talk describes DMS, a meta-tool for building software analysis tools. DMS is a kind of generalized compiler, and can be configured to process arbitrary programming languages, to carry out arbitrary analyses, and to convert specifications into running code. It has been used for a variety of purposes, including converting embedded mission software in the US B-2 Stealth Bomber, providing the US Social Security Administration with a deep view how their 200 millions lines of COBOL are connected, and reverse-engineering legacy factory process control code i...

  15. Intermediate energy nuclear data: models and codes

    International Nuclear Information System (INIS)

    This specialists' meeting was organised as a follow-up to the recent report by the NEA Nuclear Science Committee entitled International Code Comparison for Intermediate Energy Nuclear Data, which addresses the subject the of codes and models used to calculate nuclear reaction processes from 20 to 1600 MeV. This effort is part of the programme of work of the Agency in the area of partitioning and transmutation of radioactive waste from the nuclear industry. Two benchmark exercises had been organised by the NEA. The results of the first one on microscopic nuclear reaction calculations (thin target) were published prior to the meeting. The second exercise, on transport calculations (thick target), is still in progress. The objective of the study is to help determine the predictive capacity of current nuclear reaction and transport codes for future design concepts for transmutation as well as for other application areas, such as radiation oncology, accelerator shielding, astrophysics, radiation during space travel, etc. The purpose of the meeting was to bring together the participants in the intercomparison exercises to: (a) discuss the relative merits and deficiencies encountered in the use of various codes and models throughout the world, (b) issue recommendations for future developments in codes and identify intermediate energy data needs, both experimental and evaluated

  16. Transfer reaction code with nonlocal interactions

    CERN Document Server

    Titus, L J; Nunes, F M

    2016-01-01

    We present a suite of codes (NLAT for nonlocal adiabatic transfer) to calculate the transfer cross section for single-nucleon transfer reactions, $(d,N)$ or $(N,d)$, including nonlocal nucleon-target interactions, within the adiabatic distorted wave approximation. For this purpose, we implement an iterative method for solving the second order nonlocal differential equation, for both scattering and bound states. The final observables that can be obtained with NLAT are differential angular distributions for the cross sections of $A(d,N)B$ or $B(N,d)A$. Details on the implementation of the T-matrix to obtain the final cross sections within the adiabatic distorted wave approximation method are also provided. This code is suitable to be applied for deuteron induced reactions in the range of $E_d=10-70$ MeV, and provides cross sections with $4\\%$ accuracy.

  17. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  18. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  19. Assessment of TRACE Code for MIT Pressurizer Tests to Review Industrial Code

    International Nuclear Information System (INIS)

    Korea Institute of Nuclear Safety (KINS) has initiated to review the industrial code for safety analysis of nuclear power plant, in which MARS-KS and TRACE codes are being used to support the understanding of specific phenomena and code prediction. For this aspect, the TRACE code was assessed for the MIT pressurizer test. The TRACE code has been developed continuously, and NRC released the TRACE code version 5.0 patch 4 recently. This updated version has some improvement from version 5.0 patch 3. In this paper, TRACE code calculations with version 5.0 patch 3 and patch 4 for 3 cases of MIT pressurizer tests have been performed to assess the applicability of the TRACE code for verification of industrial codes. The MIT pressurizer test is one of the fundamental separate effect tests and frequently simulated to verify safety analysis codes. Predictability of the system code for the behavior of pressurizer in the plant is very important because it has an effect on the progress of accidents such as loss of coolant, control rod withdrawal, and loss of feedwater flow, etc. In the reactor protection system, the high pressurizer pressure trip signal provides an assurance of the integrity of the RCS boundary for AOOs that could lead to an over pressurization of the RCS. Also, the low pressurizer pressure trip signal provides an assistance for the ESF during the system pressure reduction events and a LOCA. According to the results, node effect was significantly reduced at patch 4 compared with patch 3 of TRACE version 5.0. Based on the prediction of Test ST4 and Test A, at least 20 cells are needed to predict pressurizer insurge behavior reasonably. However, the results of patch 4 show that 10 cells are enough to simulate the transient behavior of pressurizer. For outsurge case B, there was no major difference between patch 3 and patch 4 even though it was not shown in this paper. Overall, the results of the TRACE code version 5.0 patch 4 fit well with those of experiments

  20. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  1. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  2. Computer code FIT

    International Nuclear Information System (INIS)

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.)

  3. Dynamic Frameproof Codes

    OpenAIRE

    Paterson, Maura

    2006-01-01

    There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes, which prevent traitorous users from colluding to frame an innocent user, and traitor-tracing schemes, which enable the identification of users involved in piracy. The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, wh...

  4. Efficient Block Truncation Coding

    Directory of Open Access Journals (Sweden)

    K.Somasundaram,

    2010-09-01

    Full Text Available Block Truncation Coding (BTC is one of the lossy image compression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is exploited to further reduce the requirement of bits to store a block. The proposed method gives very good performance in terms of bit-rate and PSNR values when compared to the conventional BTC.

  5. Tokamak simulation code manual

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs.

  6. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  7. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. PMID:24461230

  8. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  9. OACoder: Postcode Coding Tool

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2013-10-01

    Full Text Available Geodemographic classifications are small area classifications of social, economic and demographic characteristics. The Output Area Classification (OAC is a free geodemographic classification. It is an Office of National Statistics validated measure that summarises neighbourhood conditions at the Output Area Level across the United Kingdom. Linkage of these valuable statistics has been problematic for users more used to address records that are georeferenced using unit postcodes. OACoder resolves this problem by allowing users to link corresponding OAC codes to each of the postcode addresses. OACoder is an open source software, and it is developed and tested to work on different versions of windows operating systems.  It is stored in Figshare. The source code of the OACoder is stored in SourceForge. As open source software, OACoder has reuse potential across a range of applications. The functionality of OACoder can be extended to work with the new version of OAC (2011 OAC. It is also possible to reuse the source code and extend the functionality to work on different operating systems other than Windows. Different components of the software can be reused for the purpose of reading/writing CSV files and handling large data sets.

  10. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  11. DIANE multiparticle transport code

    International Nuclear Information System (INIS)

    DIANE is a three-dimensional multigroup Monte Carlo code that performs coupled neutron-photon-electron and light charged particle Monte Carlo transport on a fixed geometry and/or an imploding material (for example an Inertial-Confinement- Fusion plasma target). DIANE's multigroup data are provided by the nuclear data code ZADIG. ZADIG groups cross sections from international data libraries in ENDF7 format. In order to better account for resonances, a specific multigroup treatment, called 'mini-group' has been implemented. For photons, photo-atomic interactions are considered as well as photonuclear reactions. Coherent scattering may include anomalous scattering factors. Incoherent scattering include scattering function from EPDL97. We also account for fluorescence X-rays and Auger electrons. For neutrons, all the reaction channels relevant are processed by ZADIG. The ZADIG code integrates the Secondary Source Bremsstrahlung (SSB) model that simulates electron-photon cascade from electron slowing down. For light ions, DIANE solves the Boltzmann-Fokker-Planck equation. The continuous effect of Coulomb interaction with the background plasma can be treated by three Fokker- Planck terms (slowing-down, energy straggling and angular deflection). The effect of electric and magnetic fields through the Lorentz force can also be taken into account

  12. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  13. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  14. Poisson/Superfish codes for personal computers

    International Nuclear Information System (INIS)

    The Poisson/Superfish codes calculate static E or B fields in two-dimensions and electromagnetic fields in resonant structures. New versions for 386/486 PCs and Macintosh computers have capabilities that exceed the mainframe versions. Notable improvements are interactive graphical post-processors, improved field calculation routines, and a new program for charged particle orbit tracking. (author). 4 refs., 1 tab., figs

  15. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  16. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  17. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  18. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  19. To be or not B2B?

    CERN Document Server

    Symons, L J

    2001-01-01

    La question du commerce électronique interentreprises par le web (Business to Business, B2B) est posée actuellement par les grands groupes industriels impliqués dans le commerce mondial. Les prévisions sont imposantes, le B2B atteindra le C.A. de 3000 milliards de dollars en 2003. Les conditions d'accès, la façon de procéder des deux organisateurs (ARIBA et COMMERCE ONE) des plus grandes places de marchés actuelles, sont décrites. La base de l'énorme pyramide est le catalogue électronique multilingue UNSPSC (United Nations Standard Products and Services Classification) et l'organisation ECCMA (Electronic Commerce Code Management Association) qui gère le développement des UNSPSC codes en 8 langues. Dans ce contexte, l'auteur (re)-déclare qu'un des efforts principaux à fournir par le CERN est la création de son propre catalogue électronique. Dans la Division ST, une aide partielle à ce vaste programme pourrait être apportée par la normalisation des codes et désignations des pièces de maint...

  20. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  1. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  2. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  3. Improvements in the BCG code

    International Nuclear Information System (INIS)

    Some improvements introduced in the BCG code with the objective of making the code faster in execution are reported. The impact of these improvements in terms of CPU time saving is discussed for a sample problem. (author)

  4. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  5. The Source Term Code Package

    International Nuclear Information System (INIS)

    The Source Term Code Package (STCP) is a set of computer codes which allows analyses of nuclear reactor accidents to produce predictions of fission product release to the environment as a function of reactor design and specifications for the assumed accident. The codes are basically those used in the analyses performed for the BMI-2104 report but they have been combined, improved and streamlined for easier use. The objective in preparing this code package was to make the calculations more direct, traceable and user-independent, with documentation for release to the public. It is important to note that the STCP is not intended to be a research tool but a code for general use in making source term predictions that has a sound and definable basis and produces reasonably accurate results in comparison with more detailed codes. The STCP has four major elements. The overall thermal-hydraulics is provided by the MARCH-3 code which combines the previously separate codes MARCH2, CORCON Mod 2 and CORSORM. Release of fission products and aerosols during core/concrete interactions is predicted with the VANESA code. Detailed thermal-hydraulics and fission product transport in the reactor coolant system are provided by the TRAPMELT3 code formed by combining the previously separate TRAPMELT and MERGE codes. Finally, fission product transport in the containment is predicted by the NAUA-4 code as modified to include fission product removal by pressure suppression pools (SPARC code) and within ice compartments (ICEDF code). The fission product and aerosol groups being tracked in the code package are noble gases, iodine, caesium, tellurium, barium, strontium, ruthenium, lanthanum and cerium groups. Additionally, in-vessel-produced aerosols and ex-vessel-produced aerosols are tracked. The code package produces time-dependent locational distributions, physical forms and transport rates for these groups throughout the course of the accident. (author)

  6. Cross-Domain Sparse Coding

    OpenAIRE

    Wang, Jim Jing-Yan

    2013-01-01

    Sparse coding has shown its power as an effective data representation method. However, up to now, all the sparse coding approaches are limited within the single domain learning problem. In this paper, we extend the sparse coding to cross domain learning problem, which tries to learn from a source domain to a target domain with significant different distribution. We impose the Maximum Mean Discrepancy (MMD) criterion to reduce the cross-domain distribution difference of sparse codes, and also ...

  7. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  8. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  9. Development of neutron coincidence counting simulation code based on open-source simulation code

    International Nuclear Information System (INIS)

    Nuclear Material Control Center has used the open-source simulation code called MCNP (A General Monte Carlo N-Particle Transport Code) version 4B, which is developed by Los Alamos National Laboratory, to develop NDA detectors based on coincidence neutron counting and to have an initial estimation for their performance. However, the MCNP does not have the function to simulate coincidence neutrons because the code can not generate several number of neutron particles associated with a fission event, and also it can not simulate neutrons emitted with Poisson distribution like behavior in nature. For these reasons, new functions were added to the code to result in output of detection point, detection time, incident direction, and neutron energy detected. And also a calculation program was developed to estimate coincidence counts from these outputs. Simulation results with the developed code were compared with actual results to adjust bias. In the paper, new functions added to the code and comparison of calculation data with actual measurement data are presented. (author)

  10. Study on New Concatenated Code in WDM Optical Transmission Systems

    Institute of Scientific and Technical Information of China (English)

    YUAN Jian-guo; JIANG Ze; MAO You-ju; YE Wen-wei

    2007-01-01

    A new concatenated code of RS(255,239)+BCH(2 040,1 930) code to be suitable for WDM optical transmission systems is proposed.The simulation results show that this new concatenated code,compared with the RS(255,239)+CSOC(k0/n0=6/7,J=8) code in ITU-T G.75.1,has a lower redundancy and better error-correction performance,furthermore,its net coding gain(NCG) is respectively 0.46 dB,0.43 dB more than that of RS(255,239)+CSOC(k0/n0 =6/7,J=8) code and BCH(3 860,3 824)+BCH(2 040,1 930) code in ITU-T G.75.1 at the third iteration for the bit error rate(BER) of 10-12.Therefore,the new super forward error correction(Super-FEC) concatenated code can be better used in ultra long-haul,ultra large-capacity and ultra high-speed WDM optical communication systems.

  11. Ethical Codes in the Professions.

    Science.gov (United States)

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  12. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  13. Fresnel zone plate coded imaging

    International Nuclear Information System (INIS)

    The author introduced the principle of the Fresnel-zone-plate coded imaging, and design a Fresnel zone plate coded image camera with high spatial resolution. A experimental simulation with two-aperture visible light source is made. The result shows that this coded image camera can reveal the source distribution truly

  14. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics at the...

  15. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  16. Direct construction of code loops

    OpenAIRE

    Nagy, Gabor P.

    2004-01-01

    Code loops were introduced by R. L. Griess. R.L. Griess and T. Hsu gave methods to construct the corresponding code loop from any given doubly even binary code; both these methods used some kind of induction. In this paper, we present a global construction of the loop, where we apply the correspondance between the concepts of Moufang loops and groups with triality.

  17. From Skew-Cyclic Codes to Asymmetric Quantum Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick; Yemen, Olfa

    2010-01-01

    We introduce an additive but not $\\F_{4}$-linear map $S$ from $\\F_{4}^{n}$ to $\\F_{4}^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $\\theta$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.

  18. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  19. Correct Code Containing Containers

    OpenAIRE

    Dross, Claire; Filliâtre, Jean-Christophe; Moy, Yannick

    2011-01-01

    For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers. In this paper, we present a definition of containers whose aim is to facilitate their use in certified software, using modern proof technology and novel s...

  20. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...... the impact of interference from other transmissions. Unlike these conventional studies, in this paper, we apply PLNC to a large-scale cellular network in the presence of intercell interference (ICI). In cellular networks, a terminal and a Base Station (BS) have different transmission power, which causes...

  1. TWEED Code Book

    OpenAIRE

    Engene, Jan Oskar

    2006-01-01

    The TWEED data set contains information on more than 11.000 events related to internal (or domestic) terrorism in 18 West European countries for the 1950 through 2004 period. The code book describes the structure of the data set, the countries covered, and the variables included and functions as a user’s guide to the data set. The data set is available at: http://www.uib.no/people/sspje/tweed.htm The data set Terrorism in Western Europe: Events Data, TWEED, contains information on events r...

  2. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  3. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  4. The JAERI code system for evaluation of BWR ECCS performance

    International Nuclear Information System (INIS)

    Development of respective computer code system of BWR and PWR for evaluation of ECCS has been conducted since 1973 considering the differences of the reactor cooling system, core structure and ECCS. The first version of the BWR code system, of which developmental work started earlier than that of the PWR, has been completed. The BWR code system is designed to provide computational tools to analyze all phases of LOCAs and to evaluate the performance of the ECCS including an ''Evaluation Model (EM)'' feature in compliance with the requirements of the current Japanese Evaluation Guideline of ECCS. The BWR code system could be used for licensing purpose, i.e. for ECCS performance evaluation or audit calculations to cross-examine the methods and results of applicants or vendors. The BWR code system presented in this report comprises several computer codes, each of which analyzes a particular phase of a LOCA or a system blowdown depending on a range of LOCAs, i.e. large and small breaks in a variety of locations in the reactor system. The system includes ALARM-B1, HYDY-B1 and THYDE-B1 for analysis of the system blowdown for various break sizes, THYDE-B-REFLOOD for analysis of the reflood phase and SCORCH-B2 for the calculation of the fuel assembl hot plane temperature. When the multiple codes are used to analyze a broad range of LOCA as stated above, it is very important to evaluate the adequacy and consistency between the codes used to cover an entire break spectrum. The system consistency together with the system performance are discussed for a large commercial BWR. (author)

  5. B Vitamins

    Science.gov (United States)

    The B vitamins are B1 (thiamine) B2 (riboflavin) B3 (niacin) B5 (pantothenic acid) B6 B7 (biotin) B12 Folic acid ... help form red blood cells. You can get B vitamins from proteins such as fish, poultry, meat, ...

  6. RETRAN/MINET composite code documentation

    International Nuclear Information System (INIS)

    The RETRAN/MINET Composite Code, based on RETRAN O2 MOD 4 and MINET Version 1.10, is described. The objective in developing RETRAN/MINET was to extend the degree to which complex thermal-hydraulic systems can be analyzed, while providing the capability to use detailed RETRAN modeling of the reactor and other components, where needed. The MINET Code was originally developed for the analysis of complex balance of plant (BOP) thermal-hydraulic systems and already serves that purpose in support of RAMONA-3B for BWR analyses and SSC for LMR analyses. The project was sponsored by the Empire State Electric Energy Research Corporation (ESEERCO), with computer and engineering support provided by the New York Power Authority (NYPA). A ''modular'' interfacing technique was utilized, in that there is very little change in the programming of either individual code, except that the MINET driver program is discarded and major sub-drivers are called from the appropriate locations within RETRAN. One new common block was added to act as a buffer between the data structures for each code. During execution, boundary conditions at the interface are exchanged via this buffer, and each code sees only the ''normal'' boundary conditions -- although some of the user's boundary conditions are overwritten at interface boundaries. A major advantage of this approach is that the interface is very localized, which is helpful for testing and makes upgrading to newer versions of RETRAN and MINET relatively straightforward. Information regarding composite code modeling, programming and utilization is provided. Sample input and output are also included. 19 figs., 7 tabs

  7. MCOR - Monte Carlo depletion code for reference LWR calculations

    International Nuclear Information System (INIS)

    Research highlights: → Introduction of a reference Monte Carlo based depletion code with extended capabilities. → Verification and validation results for MCOR. → Utilization of MCOR for benchmarking deterministic lattice physics (spectral) codes. - Abstract: The MCOR (MCnp-kORigen) code system is a Monte Carlo based depletion system for reference fuel assembly and core calculations. The MCOR code is designed as an interfacing code that provides depletion capability to the LANL Monte Carlo code by coupling two codes: MCNP5 with the AREVA NP depletion code, KORIGEN. The physical quality of both codes is unchanged. The MCOR code system has been maintained and continuously enhanced since it was initially developed and validated. The verification of the coupling was made by evaluating the MCOR code against similar sophisticated code systems like MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN. After its validation, the MCOR code has been further improved with important features. The MCOR code presents several valuable capabilities such as: (a) a predictor-corrector depletion algorithm, (b) utilization of KORIGEN as the depletion module, (c) individual depletion calculation of each burnup zone (no burnup zone grouping is required, which is particularly important for the modeling of gadolinium rings), and (d) on-line burnup cross-section generation by the Monte Carlo calculation for 88 isotopes and usage of the KORIGEN libraries for PWR and BWR typical spectra for the remaining isotopes. Besides the just mentioned capabilities, the MCOR code newest enhancements focus on the possibility of executing the MCNP5 calculation in sequential or parallel mode, a user-friendly automatic re-start capability, a modification of the burnup step size evaluation, and a post-processor and test-matrix, just to name the most important. The article describes the capabilities of the MCOR code system; from its design and development to its latest improvements and further ameliorations

  8. MCOR - Monte Carlo depletion code for reference LWR calculations

    Energy Technology Data Exchange (ETDEWEB)

    Puente Espel, Federico, E-mail: fup104@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Tippayakul, Chanatip, E-mail: cut110@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Ivanov, Kostadin, E-mail: kni1@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Misu, Stefan, E-mail: Stefan.Misu@areva.com [AREVA, AREVA NP GmbH, Erlangen (Germany)

    2011-04-15

    Research highlights: > Introduction of a reference Monte Carlo based depletion code with extended capabilities. > Verification and validation results for MCOR. > Utilization of MCOR for benchmarking deterministic lattice physics (spectral) codes. - Abstract: The MCOR (MCnp-kORigen) code system is a Monte Carlo based depletion system for reference fuel assembly and core calculations. The MCOR code is designed as an interfacing code that provides depletion capability to the LANL Monte Carlo code by coupling two codes: MCNP5 with the AREVA NP depletion code, KORIGEN. The physical quality of both codes is unchanged. The MCOR code system has been maintained and continuously enhanced since it was initially developed and validated. The verification of the coupling was made by evaluating the MCOR code against similar sophisticated code systems like MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN. After its validation, the MCOR code has been further improved with important features. The MCOR code presents several valuable capabilities such as: (a) a predictor-corrector depletion algorithm, (b) utilization of KORIGEN as the depletion module, (c) individual depletion calculation of each burnup zone (no burnup zone grouping is required, which is particularly important for the modeling of gadolinium rings), and (d) on-line burnup cross-section generation by the Monte Carlo calculation for 88 isotopes and usage of the KORIGEN libraries for PWR and BWR typical spectra for the remaining isotopes. Besides the just mentioned capabilities, the MCOR code newest enhancements focus on the possibility of executing the MCNP5 calculation in sequential or parallel mode, a user-friendly automatic re-start capability, a modification of the burnup step size evaluation, and a post-processor and test-matrix, just to name the most important. The article describes the capabilities of the MCOR code system; from its design and development to its latest improvements and further ameliorations. Additionally

  9. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  10. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  11. Survey of source term codes

    International Nuclear Information System (INIS)

    The type, scope and role of current source term codes is reviewed. Issues and problems that are generic to most or all such codes are identified. These include numerical problems, fundamental physical and chemical databases, uncertainties in fuel degradation and thermal-hydraulics calculations, how to benchmark systems application codes against mechanistic codes and weaknesses in phenomenological modelling. It is concluded that further code development to address these issues is justified. This should be tightly coupled to experimental work within an internationally agreed framework. (Author)

  12. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  13. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  14. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  15. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  16. dc-free coset codes

    Science.gov (United States)

    Deng, Robert H.; Herro, Mark A.

    1988-01-01

    A class of block coset codes with disparity and run-length constraints are studied. They are particularly well suited for high-speed optical fiber links and similar channels, where dc-free pulse formats, channel error control, and low-complexity encoder-decoder implementations are required. The codes are derived by partitioning linear block codes. The encoder and decoder structures are the same as those of linear block codes with only slight modifications. A special class of dc-free coset block codes are derived from BCH codes with specified bounds on minimum distance, disparity, and run length. The codes have low disparity levels (a small running digital sum) and good error-correcting capabilities.

  17. Finite-Length Analysis of BATS Codes

    OpenAIRE

    Yang, Shenghao; Ng, Tsz-Ching; Yeung, Raymond W.

    2013-01-01

    BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propagation (BP) decoding and inactivation decoding. Our results enable us to evaluate efficiently the...

  18. On homogeneous nontransitive binary perfect code

    OpenAIRE

    Mogilnykh, I. Yu.; Solov'eva, F. I.

    2014-01-01

    Studying binary perfect codes we show the existence of homogeneous nontransitive codes. Thus, as far as perfect codes are concerned, the propelinear codes are strictly contained in transitive codes, wheresas homogeneous codes form a strict subclass of transitive codes. In the work we deduce a necessary and sufficient condition for transitivity of perfect binary codes of rank one more than that of Hamming code. The paper is in Russian.

  19. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  20. CH-TRU Waste Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions LLC

    2008-01-16

    The CH-TRU Waste Content Codes (CH-TRUCON) document describes the inventory of the U.S. Department of Energy (DOE) CH-TRU waste within the transportation parameters specified by the Contact-Handled Transuranic Waste Authorized Methods for Payload Control (CH-TRAMPAC). The CH-TRAMPAC defines the allowable payload for the Transuranic Package Transporter-II (TRUPACT-II) and HalfPACT packagings. This document is a catalog of TRUPACT-II and HalfPACT authorized contents and a description of the methods utilized to demonstrate compliance with the CH-TRAMPAC. A summary of currently approved content codes by site is presented in Table 1. The CH-TRAMPAC describes "shipping categories" that are assigned to each payload container. Multiple shipping categories may be assigned to a single content code. A summary of approved content codes and corresponding shipping categories is provided in Table 2, which consists of Tables 2A, 2B, and 2C. Table 2A provides a summary of approved content codes and corresponding shipping categories for the "General Case," which reflects the assumption of a 60-day shipping period as described in the CH-TRAMPAC and Appendix 3.4 of the CH-TRU Payload Appendices. For shipments to be completed within an approximately 1,000-mile radius, a shorter shipping period of 20 days is applicable as described in the CH-TRAMPAC and Appendix 3.5 of the CH-TRU Payload Appendices. For shipments to WIPP from Los Alamos National Laboratory (LANL), Nevada Test Site, and Rocky Flats Environmental Technology Site, a 20-day shipping period is applicable. Table 2B provides a summary of approved content codes and corresponding shipping categories for "Close-Proximity Shipments" (20-day shipping period). For shipments implementing the controls specified in the CH-TRAMPAC and Appendix 3.6 of the CH-TRU Payload Appendices, a 10-day shipping period is applicable. Table 2C provides a summary of approved content codes and corresponding shipping categories for "Controlled Shipments

  1. A study for the replacement of blowdown loads analysis code of Korea standard nuclear plants

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, B. T.; Hwang, S. T.; Choi, D. S.; Cho, C. S. [Korea Nuclear Fuel Company, Taejon (Korea, Republic of)

    2002-10-01

    The purpose of this study is to investigate the possibility to replace the CEFLASH-4B code used in the blowdown loads analysis of Korea Standard Nuclear Plants. Since the application of CEFLASH-4B is restricted after 2007 by U.S. Government, an alternative code to CEFLASH-4B is necessary. The SATAN-VI code was selected as an alternative choice to the CEFLASH-4B code since it was widely used in LOCA analyses to Westinghouse plants without any further charge. The SATAN-VI code was evaluated for the application to the blowdown loads analysis. With a few problems fixed and/or improved, SATAN-VI code is reasonably applicable to blowdown loads analysis in KSNP plants.

  2. A study for the replacement of blowdown loads analysis code of Korea standard nuclear plants

    International Nuclear Information System (INIS)

    The purpose of this study is to investigate the possibility to replace the CEFLASH-4B code used in the blowdown loads analysis of Korea Standard Nuclear Plants. Since the application of CEFLASH-4B is restricted after 2007 by U.S. Government, an alternative code to CEFLASH-4B is necessary. The SATAN-VI code was selected as an alternative choice to the CEFLASH-4B code since it was widely used in LOCA analyses to Westinghouse plants without any further charge. The SATAN-VI code was evaluated for the application to the blowdown loads analysis. With a few problems fixed and/or improved, SATAN-VI code is reasonably applicable to blowdown loads analysis in KSNP plants

  3. Raman-based distributed temperature sensor using simplex code and gain controlled EDFA

    Science.gov (United States)

    Bassan, F. R.; Penze, R. S.; Leonardi, A. A.; Fracarolli, J. P. V.; Floridia, C.; Rosolem, J. B.; Fruett, F.

    2015-09-01

    In this work we present a comparison between simplex coded and optical amplified simplex coded Raman based Distributed Temperature Sensing (DTS). An increase in performance is demonstrated using erbium doped fiber amplifier (EDFA) with proper gain control scheme that allows a DTS operates with simplex code. Using 63-bit simplex code and gain controlled EDFA we demonstrated the temperature resolution and dynamic range improvement in 16 °C @ 10 km and 4 dB, respectively.

  4. THE MCNPX MONTE CARLO RADIATION TRANSPORT CODE

    Energy Technology Data Exchange (ETDEWEB)

    WATERS, LAURIE S. [Los Alamos National Laboratory; MCKINNEY, GREGG W. [Los Alamos National Laboratory; DURKEE, JOE W. [Los Alamos National Laboratory; FENSIN, MICHAEL L. [Los Alamos National Laboratory; JAMES, MICHAEL R. [Los Alamos National Laboratory; JOHNS, RUSSELL C. [Los Alamos National Laboratory; PELOWITZ, DENISE B. [Los Alamos National Laboratory

    2007-01-10

    MCNPX (Monte Carlo N-Particle eXtended) is a general-purpose Monte Carlo radiation transport code with three-dimensional geometry and continuous-energy transport of 34 particles and light ions. It contains flexible source and tally options, interactive graphics, and support for both sequential and multi-processing computer platforms. MCNPX is based on MCNP4B, and has been upgraded to most MCNP5 capabilities. MCNP is a highly stable code tracking neutrons, photons and electrons, and using evaluated nuclear data libraries for low-energy interaction probabilities. MCNPX has extended this base to a comprehensive set of particles and light ions, with heavy ion transport in development. Models have been included to calculate interaction probabilities when libraries are not available. Recent additions focus on the time evolution of residual nuclei decay, allowing calculation of transmutation and delayed particle emission. MCNPX is now a code of great dynamic range, and the excellent neutronics capabilities allow new opportunities to simulate devices of interest to experimental particle physics; particularly calorimetry. This paper describes the capabilities of the current MCNPX version 2.6.C, and also discusses ongoing code development.

  5. Direct GPS P-Code Acquisition Method Based on FFT

    Institute of Scientific and Technical Information of China (English)

    LI Hong; LU Mingquan; FENG Zhenming

    2008-01-01

    Recently, direct acquisition of GPS P-code has received considerable attention to enhance the anti-jamming and anti-spoofing capabilities of GPS receivers. This paper describes a P-code acquisition method that uses block searches with large-scale FFT to search code phases and carrier frequency offsets in parallel. To limit memory use, especially when implemented in hardware, only the largest correlation result with its position information was preserved after searching a block of resolution cells in both the time and frequency domains. A second search was used to solve the code phase slip problem induced by the code frequency offset. Simulation results demonstrate that the probability of detection is above 0.99 for carrier-to-noise density ratios in excess of 40 dB- Hz when the predetection integration time is 0.8 ms and 6 non-coherent integrations are used in the analysis.

  6. Self-repairing Homomorphic Codes for Distributed Storage Systems

    CERN Document Server

    Oggier, Frederique

    2010-01-01

    Erasure codes provide a storage efficient alternative to replication based redundancy in (networked) storage systems. They however entail high communication overhead for maintenance, when some of the encoded fragments are lost and need to be replenished. Such overheads arise from the fundamental need to recreate (or keep separately) first a copy of the whole object before any individual encoded fragment can be generated and replenished. There has been recently intense interest to explore alternatives, most prominent ones being regenerating codes (RGC) and hierarchical codes (HC). We propose as an alternative a new family of codes to improve the maintenance process, which we call self-repairing codes (SRC), with the following salient features: (a) encoded fragments can be repaired directly from other subsets of encoded fragments without having to reconstruct first the original data, ensuring that (b) a fragment is repaired from a fixed number of encoded fragments, the number depending only on how many encoded ...

  7. Les codes correcteurs

    OpenAIRE

    Rigo, Michel

    2009-01-01

    Qu'on le veuille ou non, nous vivons dans un monde où les informations et les moyens de communication sont omniprésents. Les exemples où se mêlent informatique et télécommunications sont nombreux. Que ce soit l'Internet, la musique achetée en ligne ou gravée sur CD, les baladeurs de type iPod et autres appareils portables, les supports mémoire de tout type, la photographie numérique, la présence d'ordinateurs de bord sophistiqués dans nos voitures, etc. Sans code correcteur, le CD (implémenta...

  8. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  9. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...... be vanishing when the two-way relaying is considered in a broader context of a larger wireless network....

  10. IMP: A performance code

    Science.gov (United States)

    Dauro, Vincent A., Sr.

    IMP (Integrated Mission Program) is a simulation language and code used to model present and future Earth, Moon, or Mars missions. The profile is user controlled through selection from a large menu of events and maneuvers. A Fehlberg 7/13 Runge-Kutta integrator with error and step size control is used to numerically integrate the differential equations of motion (DEQ) of three spacecraft, a main, a target, and an observer. Through selection, the DEQ's include guided thrust, oblate gravity, atmosphere drag, solar pressure, and Moon gravity effects. Guide parameters for thrust events and performance parameters of velocity changes (Delta-V) and propellant usage (maximum of five systems) are developed as needed. Print, plot, summary, and debug files are output.

  11. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  12. Transionospheric Propagation Code (TIPC)

    Energy Technology Data Exchange (ETDEWEB)

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  13. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  14. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers that...... significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  15. Code Pointer Masking: Hardening applications against code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2011-01-01

    In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application's control flow. We have implemented a prototype of our solution in a C-compiler for Linux. The evaluatio...

  16. Capacity achieving nonbinary LDPC coded non-uniform shaping modulation for adaptive optical communications.

    Science.gov (United States)

    Lin, Changyu; Zou, Ding; Liu, Tao; Djordjevic, Ivan B

    2016-08-01

    A mutual information inspired nonbinary coded modulation design with non-uniform shaping is proposed. Instead of traditional power of two signal constellation sizes, we design 5-QAM, 7-QAM and 9-QAM constellations, which can be used in adaptive optical networks. The non-uniform shaping and LDPC code rate are jointly considered in the design, which results in a better performance scheme for the same SNR values. The matched nonbinary (NB) LDPC code is used for this scheme, which further improves the coding gain and the overall performance. We analyze both coding performance and system SNR performance. We show that the proposed NB LDPC-coded 9-QAM has more than 2dB gain in symbol SNR compared to traditional LDPC-coded star-8-QAM. On the other hand, the proposed NB LDPC-coded 5-QAM and 7-QAM have even better performance than LDPC-coded QPSK. PMID:27505775

  17. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  18. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  19. Improved Intra-coding Methods for H.264/AVC

    Directory of Open Access Journals (Sweden)

    Li Song

    2009-01-01

    Full Text Available The H.264/AVC design adopts a multidirectional spatial prediction model to reduce spatial redundancy, where neighboring pixels are used as a prediction for the samples in a data block to be encoded. In this paper, a recursive prediction scheme and an enhanced (block-matching algorithm BMA prediction scheme are designed and integrated into the state-of-the-art H.264/AVC framework to provide a new intra coding model. Extensive experiments demonstrate that the coding efficiency can be on average increased by 0.27 dB with comparison to the performance of the conventional H.264 coding model.

  20. Vectorization, parallelization and porting of nuclear codes (vectorization and parallelization). Progress report fiscal 1998

    International Nuclear Information System (INIS)

    Several computer codes in the nuclear field have been vectorized, parallelized and transported on the FUJITSU VPP500 system, the AP3000 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 12 codes in fiscal 1998. These results are reported in 3 parts, i.e., the vectorization and parallelization on vector processors part, the parallelization on scalar processors part and the porting part. In this report, we describe the vectorization and parallelization on vector processors. In this vectorization and parallelization on vector processors part, the vectorization of General Tokamak Circuit Simulation Program code GTCSP, the vectorization and parallelization of Molecular Dynamics NTV (n-particle, Temperature and Velocity) Simulation code MSP2, Eddy Current Analysis code EDDYCAL, Thermal Analysis Code for Test of Passive Cooling System by HENDEL T2 code THANPACST2 and MHD Equilibrium code SELENEJ on the VPP500 are described. In the parallelization on scalar processors part, the parallelization of Monte Carlo N-Particle Transport code MCNP4B2, Plasma Hydrodynamics code using Cubic Interpolated Propagation Method PHCIP and Vectorized Monte Carlo code (continuous energy model / multi-group model) MVP/GMVP on the Paragon are described. In the porting part, the porting of Monte Carlo N-Particle Transport code MCNP4B2 and Reactor Safety Analysis code RELAP5 on the AP3000 are described. (author)

  1. Vectorization, parallelization and porting of nuclear codes (vectorization and parallelization). Progress report fiscal 1998

    Energy Technology Data Exchange (ETDEWEB)

    Ishizuki, Shigeru; Kawai, Wataru; Nemoto, Toshiyuki [Fujitsu Ltd., Tokyo (Japan); Ogasawara, Shinobu; Kume, Etsuo; Adachi, Masaaki; Kawasaki, Nobuo [Center for Promotion of Computational Science and Engineering (Tokai Site), Japan Atomic Energy Research Institute, Tokai, Ibaraki (Japan); Yatake, Yo-ichi [Hitachi Ltd., Tokyo (Japan)

    2000-03-01

    Several computer codes in the nuclear field have been vectorized, parallelized and transported on the FUJITSU VPP500 system, the AP3000 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 12 codes in fiscal 1998. These results are reported in 3 parts, i.e., the vectorization and parallelization on vector processors part, the parallelization on scalar processors part and the porting part. In this report, we describe the vectorization and parallelization on vector processors. In this vectorization and parallelization on vector processors part, the vectorization of General Tokamak Circuit Simulation Program code GTCSP, the vectorization and parallelization of Molecular Dynamics NTV (n-particle, Temperature and Velocity) Simulation code MSP2, Eddy Current Analysis code EDDYCAL, Thermal Analysis Code for Test of Passive Cooling System by HENDEL T2 code THANPACST2 and MHD Equilibrium code SELENEJ on the VPP500 are described. In the parallelization on scalar processors part, the parallelization of Monte Carlo N-Particle Transport code MCNP4B2, Plasma Hydrodynamics code using Cubic Interpolated Propagation Method PHCIP and Vectorized Monte Carlo code (continuous energy model / multi-group model) MVP/GMVP on the Paragon are described. In the porting part, the porting of Monte Carlo N-Particle Transport code MCNP4B2 and Reactor Safety Analysis code RELAP5 on the AP3000 are described. (author)

  2. Vectorization, parallelization and porting of nuclear codes (porting). Progress report fiscal 1998

    International Nuclear Information System (INIS)

    Several computer codes in the nuclear field have been vectorized, parallelized and transported on the FUJITSU VPP500 system, the AP3000 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 12 codes in fiscal 1998. These results are reported in 3 parts, i.e., the vectorization and parallelization on vector processors part, the parallelization on scalar processors part and the porting part. In this report, we describe the porting. In this porting part, the porting of Monte Carlo N-Particle Transport code MCNP4B2 and Reactor Safety Analysis code RELAP5 on the AP3000 are described. In the vectorization and parallelization on vector processors part, the vectorization of General Tokamak Circuit Simulation Program code GTCSP, the vectorization and parallelization of Molecular Dynamics Ntv Simulation code MSP2, Eddy Current Analysis code EDDYCAL, Thermal Analysis Code for Test of Passive Cooling System by HENDEL T2 code THANPACST2 and MHD Equilibrium code SELENEJ on the VPP500 are described. In the parallelization on scalar processors part, the parallelization of Monte Carlo N-Particle Transport code MCNP4B2, Plasma Hydrodynamics code using Cubic Interpolated propagation Method PHCIP and Vectorized Monte Carlo code (continuous energy model/multi-group model) MVP/GMVP on the Paragon are described. (author)

  3. Nonlinear, nonbinary cyclic group codes

    Science.gov (United States)

    Solomon, G.

    1992-01-01

    New cyclic group codes of length 2(exp m) - 1 over (m - j)-bit symbols are introduced. These codes can be systematically encoded and decoded algebraically. The code rates are very close to Reed-Solomon (RS) codes and are much better than Bose-Chaudhuri-Hocquenghem (BCH) codes (a former alternative). The binary (m - j)-tuples are identified with a subgroup of the binary m-tuples which represents the field GF(2 exp m). Encoding is systematic and involves a two-stage procedure consisting of the usual linear feedback register (using the division or check polynomial) and a small table lookup. For low rates, a second shift-register encoding operation may be invoked. Decoding uses the RS error-correcting procedures for the m-tuple codes for m = 4, 5, and 6.

  4. Polarization diversity scheme on spectral polarization coding optical code-division multiple-access network

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chang, Yao-Tang; Chen, Bo-Hau

    2010-12-01

    We present an experiment demonstrating the spectral-polarization coding optical code-division multiple-access system introduced with a nonideal state of polarization (SOP) matching conditions. In the proposed system, the encoding and double balanced-detection processes are implemented using a polarization-diversity scheme. Because of the quasiorthogonality of Hadamard codes combining with array waveguide grating routers and a polarization beam splitter, the proposed codec pair can encode-decode multiple code words of Hadamard code while retaining the ability for multiple-access interference cancellation. The experimental results demonstrate that when the system is maintained with an orthogonal SOP for each user, an effective reduction in the phase-induced intensity noise is obtained. The analytical SNR values are found to overstate the experimental results by around 2 dB when the received effective power is large. This is mainly limited by insertion losses of components and a nonflattened optical light source. Furthermore, the matching conditions can be improved by decreasing nonideal influences.

  5. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-01-01

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine. PMID:18998785

  6. Two-Level Fingerprinting Codes

    OpenAIRE

    Anthapadmanabhan, N. Prasanth; Barg, Alexander

    2009-01-01

    We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property: As in traditional (one-level) codes, when given an illegal copy produced by a coalition of users, ...

  7. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  8. More on Combinatorial Batch Codes

    OpenAIRE

    Ruj, Sushmita; Roy, Bimal

    2008-01-01

    Paterson, Stinson and Wei \\cite{PSW} introduced Combinatorial batch codes, which are combinatorial description of Batch code. Batch codes were first presented by Ishai, Kushilevita, Ostrovsky and Sahai \\cite{IKOS} in STOC'04. In this paper we answer some of the questions put forward by Paterson, Stinson and Wei and give some results for the general case $t>1$ which were not studied by the authors.

  9. Generalized PCM coding of Images

    OpenAIRE

    Prades Nebot, José; MORBEE, MARLEEN; DELP, EDWARD

    2012-01-01

    Pulse-code modulation (PCM) with embedded quantization allows the rate of the PCM bitstream to be reduced by simply removing a fixed number of least significant bits from each codeword. Although this source coding technique is extremely simple, it has poor coding efficiency. In this paper, we present a generalized PCM (GPCM) algorithm for images that simply removes bits from each codeword. In contrast to PCM, however, the number and the specific bits that a GPCM encoder removes in each cod...

  10. Rateless codes for AVC models

    OpenAIRE

    Sarwate, Anand D.; Gastpar, Michael

    2007-01-01

    The arbitrarily varying channel (AVC) is a channel model whose state is selected maliciously by an adversary. Fixed-blocklength coding assumes a worst-case bound on the adversary's capabilities, which leads to pessimistic results. This paper defines a variable-length perspective on this problem, for which achievable rates are shown that depend on the realized actions of the adversary. Specifically, rateless codes are constructed which require a limited amount of common randomness. These codes...

  11. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  12. Explosive Formulation Code Naming SOP

    Energy Technology Data Exchange (ETDEWEB)

    Martz, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  13. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  14. Combinatorial aspects of code loops

    OpenAIRE

    Vojtěchovský, Petr

    2007-01-01

    The existence and uniqueness (up to equivalence) of code loops was first established by R. Griess. Nevertheless, the explicit construction of code loops remained open until T. Hsu introduced the notion of symplectic cubic spaces and their Frattini extensions, and pointed out how the construction of code loops followed from the (purely combinatorial) result of O. Chein and E. Goodaire. Within this paper, we focus on their combinatorial construction and prove a more general result using the lan...

  15. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  16. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  17. User manual of UNF code

    International Nuclear Information System (INIS)

    The UNF code (2001 version) written in FORTRAN-90 is developed for calculating fast neutron reaction data of structure materials with incident energies from about 1 Kev up to 20 Mev. The code consists of the spherical optical model, the unified Hauser-Feshbach and exciton model. The man nal of the UNF code is available for users. The format of the input parameter files and the output files, as well as the functions of flag used in UNF code, are introduced in detail, and the examples of the format of input parameters files are given

  18. The FLUKA Code: An Overview

    Science.gov (United States)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M. V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P. R.; Scannicchio, D.; Trovati, S.; Villari, R.; Wilson, T.

    2006-01-01

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  19. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  20. Punctured Turbo Codes for Bandwidth-efficient Transmission

    Directory of Open Access Journals (Sweden)

    Shobha Rekh

    2006-10-01

    Full Text Available Turbo codes are the error-coding schemes applied nowadays in wireless networks. In navalapplications, the information is mostly sent through wireless networks and the data is moreprone to noise. Since very important data has to be communicated, it is necessary to get backthe original data in the receiver. In military applications also, the soldiers wear electronic jacketswhich are connected by wireless networks. In such applications, the data loss is not affordableand there is also a need to utilise the bandwidth efficiently through puncturing by means ofwhich certain bits are deleted before transmission from the output of encoder. By means of thispunctured turbo codes, bandwidth-efficient coding is achieved. Hence, it is necessary to designturbo codes with an efficient puncturing pattern so that the performance of the punctured codeis also improved in spite of deletion of few bits before transmission. This paper deals in choosingthe puncturing patterns that lead to systematic rate-compatible punctured turbo codes (RCPTCswhich also give a reduction in bit-error rate. The design criterion for choosing the best puncturingpatterns is based on the minimum weight of code words and their multiplicities. The best puncturingpattern chosen is tested for its performance by simulating turbo codes for an additive whiteGaussian noise (AWGN channel. Compared with the existing puncturing pattern, the patternproposed is able to achieve a gain of 0.5 dB at a bit-error rate of 10-3.

  1. Distributed Turbo Product Codes with Multiple Vertical Parities

    Science.gov (United States)

    Obiedat, Esam A.; Chen, Guotai; Cao, Lei

    2009-12-01

    We propose a Multiple Vertical Parities Distributed Turbo Product Code (MVP-DTPC) over cooperative network using block Bose Chaudhuri Hochquenghem (BCH) codes as component codes. The source broadcasts extended BCH coded frames to the destination and nearby relays. After decoding the received sequences, each relay constructs a product code by arranging the corrected bit sequences in rows and re-encoding them vertically using BCH as component codes to obtain an Incremental Redundancy (IR) for source's data. To obtain independent vertical parities from each relay in the same code space, we propose a new Circular Interleaver for source's data; different circular interleavers are used to interleave BCH rows before re-encoding vertically. The Maximum A posteriori Probability (MAP) decoding is achieved by applying maximum transfer of extrinsic information between the multiple decoding stages. This is employed in the modified turbo product decoder, which is proposed to cope with multiple parities. The a posteriori output from a vertical decoding stage is used to derive the soft extrinsic information, that are used as a priori input for the next horizontal decoding stage. Simulation results in Additive White Gaussian Noise (AWGN) channel using network scenarios show 0.3-0.5 dB gain improvement in Bit Error Rate (BER) performance over the non-cooperative Turbo Product Codes (TPC).

  2. Construction of wiretap codes from ordinary channel codes

    CERN Document Server

    Hayashi, Masahito

    2010-01-01

    From an arbitrary given channel code over a discrete or Gaussian memoryless channel, we construct a wiretap code with the strong security. Our construction can achieve the wiretap capacity under mild assumptions. The key tool is the new privacy amplification theorem bounding the eavesdropped information in terms of the Gallager function.

  3. Conjugate Codes and Applications to Cryptography

    CERN Document Server

    Hamada, M

    2006-01-01

    A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

  4. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  5. Patched Conic Trajectory Code

    Science.gov (United States)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  6. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  7. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  8. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  9. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four are......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...

  10. Study on ameliorating the FEC coding techniques in current high-rate optical transmission systems

    Science.gov (United States)

    Yuan, Jianguo; Ye, Wenwei; Jiang, Ze; Mao, Youju; Wang, Wei

    2007-01-01

    In this paper, the three ameliorated new coding schemes of the Super-FEC (Forward Error Correction) concatenatedcodes (namely, the inner-outer concatenated-code, the parallel concatenated-code and the successive concatenated-code with interleaving) are proposed after the development trend of high-rate optical transmission systems and the defects of the FEC codes in the current optical transmission systems have been analyzed. The system simulation of the inner-outer concatenated-codes is implemented and the schemes of encoding/decoding the parallel concatenated-codes are proposed. Furthermore, the two successive concatenated-codes with interleaving of the RS(255,239)+RS(255,239) code and the RS(255,239)+RS(255,223) code are simulated, and the analyses for the simulation results show that the two successive concatenated-codes with interleaving, compared with the classic RS (255,239) code and other codes, are a superior code type with the advantages of the better correction error, moderate redundancy and easy realization. And their net coding gains (NCG) are respectively 1.5dB, 2.5dB more than that of the classic RS(255,239) code at the BER (Bit Error Rate) of 10 -12. At last, based on the ITU-T G.709, the frame format of the new concatenated-code on applying in high-rate optical transmission systems is proposed and designed, this lays a firm foundation in order to design its hardware in future and pioneers a direction in its physical application.

  11. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. PMID:25894105

  12. Code of practice for site radiography

    International Nuclear Information System (INIS)

    The Code of Practice is set out in Parts, entitled: introduction, administrative organisation (including organisation for radiological protection, medical supervision, personal monitoring, transfer record, control of sealed sources, equipment tests, site visits); operator competence equipment (including x-ray equipment, gamma ray equipment, pipeline crawler equipment, safety equipment); methods of work; carriage of sources by road; emergency procedures (including sections dealing with (a) x-ray apparatus, (b) radioactive substances in use, and (c) radioactive substances not in use); legal considerations. (U.K.)

  13. Upgrade of FUMACS code package

    International Nuclear Information System (INIS)

    The FUMACS code package (an acronym of FUel MAnagement Code System) was developed at Rudjer Boskovic Institute in year 1991 with the aim to enable in-core fuel management analysis of the NPP Krsko core for nominal (full power) conditions. The modernization and uprating of the NPP Krsko core from 1876 to 1994 MW (th) performed in year 2000 resulted in the change of operating conditions. The old version of the FUMACS code package would not model properly the NPP Krsko core for the new operating conditions. The upgrade of the FUMACS code package to enable the modeling of the NPP Krsko core for uprated conditions and longer cycles required modifications of master files, libraries and codes. In order to make the code package more user friendly, Windows (95/98/NT) compatible version of the code package, with incorporated graphical user interface has been developed. The new version of the code package has been verified and validated for new operating conditions through modeling and comparison of results with referent design of a number of 12-month and 18-month operating cycles.(author)

  14. Using NAEYC's Code of Ethics.

    Science.gov (United States)

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  15. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a...

  16. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego;

    2015-01-01

    positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise...

  17. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  18. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  19. Quantum Convolutional Error Correction Codes

    OpenAIRE

    Chau, H. F.

    1998-01-01

    I report two general methods to construct quantum convolutional codes for quantum registers with internal $N$ states. Using one of these methods, I construct a quantum convolutional code of rate 1/4 which is able to correct one general quantum error for every eight consecutive quantum registers.

  20. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  1. ENSDF ANALYSIS AND UTILITY CODES.

    Energy Technology Data Exchange (ETDEWEB)

    BURROWS, T.

    2005-04-04

    The ENSDF analysis and checking codes are briefly described, along with their uses with various types of ENSDF datasets. For more information on the programs see ''Read Me'' entries and other documentation associated with each code.

  2. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  3. Revised Safety Code A2

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  4. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  5. Mobile Konami Code Source Files

    OpenAIRE

    Boomgaarden, Jacob; Corney, Joshua

    2015-01-01

    An archive file of Android source code projects available for import into Android Studio. These projects were utilized in the research for the following thesis: MOBILE KONAMI CODES: ANALYSIS OF ANDROID MALWARE SERVICES UTILIZING SENSOR AND RESOURCE-BASED STATE CHANGES. This thesis may be found here: http://calhoun.nps.edu/handle/10945/45163

  6. 15 CFR Appendix B to Part 30 - AES Filing Codes

    Science.gov (United States)

    2010-01-01

    ... than or in addition to Anti-Terrorism) C33NLR—No License Required (All others, including Anti-Terrorism...—Trans-Alaska Pipeline Authorization Act C50ENC—Encryption Commodities and Software C51AGR—License... under International Traffic in Arms Regulations, refer to 22 CFR 120-130 of the ITAR for the list...

  7. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  8. Overview of the FLUKA code

    International Nuclear Information System (INIS)

    The FLUKA code is a general purpose Monte Carlo code for the interaction and transport of hadrons, heavy ions, and electromagnetic particles from few keV (or thermal energies for neutrons) to Cosmic Ray energies in arbitrary materials and able to work both in analog and biased mode. The capabilities and physics model implemented inside the FLUKA code are briefly described, with emphasis on hadronic interaction. Examples of the performances of the code are presented including basic (thin target) and complex benchmarks, and radiation detector specific applications. In particular the ability of FLUKA in describing existing calorimeter performances and in predicting those of future ones, as well as the use of the code for neutron and mixed field radiation detectors will be demonstrated with several examples

  9. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani;

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...... in throughput that exceed 10x for TCP traffic while requiring a limited sacrifice in terms of fairness towards other flows on the channel....

  10. Portable code development in C

    Energy Technology Data Exchange (ETDEWEB)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  11. The German pressure vessel code

    International Nuclear Information System (INIS)

    The philosophy and the safety aspects of the German pressure vessel code is summarised. Emphasis is laid upon material selection, design, manufacture and inspection. The AD specifications, which are embedded in the German regulation for the prevention of accidents 'Pressure Vessels' are compiled primarily to give a measure of safety to the average plant. The possible types of failure are discussed in connection with design aspects. It is shown in detail how the AD specifications count for inelastic material behaviour. A comparison is also made between the German code and the ASME boiler and pressure vessel code. Comparatively, the allowable stresses due to the German code are higher, leading to thinner walls in many cases. This is compensated for by rigorous inspection and non-destructive testing during manufacture. Regular examinations round up the system of safety. It is concluded that the German code gives a high degree of safety and flexibility to the manufacturer. (author)

  12. Best practices for code release

    Science.gov (United States)

    Berriman, G. Bruce

    2016-01-01

    In this talk, I want to describe what I think are the best practices for releasing code and having it adopted by end users. Make sure your code is licensed, so users will know how the software can be used and modified, and place your code in a public repository that (and make sure that you follow institutional policies in doing this). Yet licensing and releasing code are not enough: the code must be organized and documented so users can understand what it does, what its limitations are, and how to build and use it. I will describe what I think are best practices in developing the content to support release, including tutorials, design documents, specifications of interfaces and so on. Much of what I have learned on based on ten years of experience in supporting releases of the Montage Image Mosaic Engine.

  13. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  14. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  15. Chooz B; Chooz B

    Energy Technology Data Exchange (ETDEWEB)

    Barillot, Pascale; Baize, Jean-Marc [eds.] [Electricite de France (EDF), 75 - Paris (France)

    1997-11-03

    This EDF press communique give information related to the exploitation of the Chooz B NPP. A calendar of the Chooz B1 and B2 NPPs exploitation is given as well as information about the local economic impact. The exploitation of the PWR reactors of the French nuclear sector corresponds to a accumulated experience of 600 year-reactor. Significant technological evolution has been recorded, namely in the test-control system, the turbo-alternator group 'Arabelle' and in the vapor generators. The reactor safety is based on the high professionalism of the exploitation personnel, on the computer-assisted behaviour allowing the choice of operators and on the conception based upon the experience accumulated by the French nuclear power plants, equivalent to 600 year-reactor operation. EDF operates a system of continual surveillance which allows the monitoring the environmental effects caused by the NPP exploitation. The following issues concerning the environment impact are reported in this document: - The effluent releases in the environment; - Health studies conducted in the NPPs' neighbourhood; - New authorizations for waste release; - Radioactive waste management. The report also mentions the French-Belgian partnership in the PWR construction, the socio-economic regional impact of the EDF activities related with the Chooz NPP operation, and the partnership with the associated service companies. Six appendices are attached to the report containing the following information: - A general layout of Chooz NPP; - Chooz B key figures; Chooz B key data; - Security and public information; - Evolution of PWR system in France; - World's nuclear systems.

  16. A novel method for performance improvement of optical CDMA system using alterable concatenated code

    Science.gov (United States)

    Qiu, Kun; Zhang, Chongfu

    2007-04-01

    A novel method using alterable concatenated code to pre-encode is proposed to reduce the impact of system impairment and multiple access interference (MAI) in optical code division multiple access (OCDMA) system, comprehensive comparisons between different concatenated code type and forward error correcting (FEC) scheme are studied by simulation. In the scheme, we apply concatenated coding to the embedded modulation scheme, and optical orthogonal code (OOC) is employed as address sequence code, an avalanche photodiode (APD) is selected as the system receiver. The bit error rate (BER) performance is derived taking into account the effect of some noises, dispersion power penalty and the MAI. From both theoretical analysis and numerical results, we can show that the proposed system has good performance at a BER of 10 -9 with a gain of 6.4 dB improvement achieved using the concatenated code as the pre-code, and this scheme permits implementation of a cost effective OCDMA system.

  17. SRAC95; general purpose neutronics code system

    Energy Technology Data Exchange (ETDEWEB)

    Okumura, Keisuke; Tsuchihashi, Keichiro [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Kaneko, Kunio

    1996-03-01

    SRAC is a general purpose neutronics code system applicable to core analyses of various types of reactors. Since the publication of JAERI-1302 for the revised SRAC in 1986, a number of additions and modifications have been made for nuclear data libraries and programs. Thus, the new version SRAC95 has been completed. The system consists of six kinds of nuclear data libraries(ENDF/B-IV, -V, -VI, JENDL-2, -3.1, -3.2), five modular codes integrated into SRAC95; collision probability calculation module (PIJ) for 16 types of lattice geometries, Sn transport calculation modules(ANISN, TWOTRAN), diffusion calculation modules(TUD, CITATION) and two optional codes for fuel assembly and core burn-up calculations(newly developed ASMBURN, revised COREBN). In this version, many new functions and data are implemented to support nuclear design studies of advanced reactors, especially for burn-up calculations. SRAC95 is available not only on conventional IBM-compatible computers but also on scalar or vector computers with the UNIX operating system. This report is the SRAC95 users manual which contains general description, contents of revisions, input data requirements, detail information on usage, sample input data and list of available libraries. (author).

  18. SRAC95; general purpose neutronics code system

    International Nuclear Information System (INIS)

    SRAC is a general purpose neutronics code system applicable to core analyses of various types of reactors. Since the publication of JAERI-1302 for the revised SRAC in 1986, a number of additions and modifications have been made for nuclear data libraries and programs. Thus, the new version SRAC95 has been completed. The system consists of six kinds of nuclear data libraries(ENDF/B-IV, -V, -VI, JENDL-2, -3.1, -3.2), five modular codes integrated into SRAC95; collision probability calculation module (PIJ) for 16 types of lattice geometries, Sn transport calculation modules(ANISN, TWOTRAN), diffusion calculation modules(TUD, CITATION) and two optional codes for fuel assembly and core burn-up calculations(newly developed ASMBURN, revised COREBN). In this version, many new functions and data are implemented to support nuclear design studies of advanced reactors, especially for burn-up calculations. SRAC95 is available not only on conventional IBM-compatible computers but also on scalar or vector computers with the UNIX operating system. This report is the SRAC95 users manual which contains general description, contents of revisions, input data requirements, detail information on usage, sample input data and list of available libraries. (author)

  19. HELIAS module development for systems codes

    International Nuclear Information System (INIS)

    In order to study and design next-step fusion devices such as DEMO, comprehensive systems codes are commonly employed. In this work HELIAS-specific models are proposed which are designed to be compatible with systems codes. The subsequently developed models include: a geometry model based on Fourier coefficients which can represent the complex 3-D plasma shape, a basic island divertor model which assumes diffusive cross-field transport and high radiation at the X-point, and a coil model which combines scaling aspects based on the HELIAS 5-B reactor design in combination with analytic inductance and field calculations. In addition, stellarator-specific plasma transport is discussed. A strategy is proposed which employs a predictive confinement time scaling derived from 1-D neoclassical and 3-D turbulence simulations. This paper reports on the progress of the development of the stellarator-specific models while an implementation and verification study within an existing systems code will be presented in a separate work. This approach is investigated to ultimately allow one to conduct stellarator system studies, develop design points of HELIAS burning plasma devices, and to facilitate a direct comparison between tokamak and stellarator DEMO and power plant designs

  20. HELIAS module development for systems codes

    Energy Technology Data Exchange (ETDEWEB)

    Warmer, F., E-mail: Felix.Warmer@ipp.mpg.de; Beidler, C.D.; Dinklage, A.; Egorov, K.; Feng, Y.; Geiger, J.; Schauer, F.; Turkin, Y.; Wolf, R.; Xanthopoulos, P.

    2015-02-15

    In order to study and design next-step fusion devices such as DEMO, comprehensive systems codes are commonly employed. In this work HELIAS-specific models are proposed which are designed to be compatible with systems codes. The subsequently developed models include: a geometry model based on Fourier coefficients which can represent the complex 3-D plasma shape, a basic island divertor model which assumes diffusive cross-field transport and high radiation at the X-point, and a coil model which combines scaling aspects based on the HELIAS 5-B reactor design in combination with analytic inductance and field calculations. In addition, stellarator-specific plasma transport is discussed. A strategy is proposed which employs a predictive confinement time scaling derived from 1-D neoclassical and 3-D turbulence simulations. This paper reports on the progress of the development of the stellarator-specific models while an implementation and verification study within an existing systems code will be presented in a separate work. This approach is investigated to ultimately allow one to conduct stellarator system studies, develop design points of HELIAS burning plasma devices, and to facilitate a direct comparison between tokamak and stellarator DEMO and power plant designs.

  1. Scalability of the plasma physics code GEM

    CERN Document Server

    Scott, Bruce D; Hoenen, Olivier; Karmakar, Anumap; Fazendeiro, Luis

    2013-01-01

    We discuss a detailed weak scaling analysis of GEM, a 3D MPI-parallelised gyrofluid code used in theoretical plasma physics at the Max Planck Institute of Plasma Physics, IPP at Garching b. M\\"unchen, Germany. Within a PRACE Preparatory Access Project various versions of the code have been analysed on the HPC systems SuperMUC at LRZ and JUQUEEN at J\\"ulich Supercomputing Centre (JSC) to improve the parallel scalability of the application. The diagnostic tool Scalasca has been used to filter out suboptimal routines. The code uses the electromagnetic gyrofluid model which is a superset of magnetohydrodynamic and drift-Alfv\\'en microturbulance and also includes several relevant kinetic processes. GEM can be used with different geometries depending on the targeted use case, and has been proven to show good scalability when the computational domain is distributed amongst two dimensions. Such a distribution allows grids with sufficient size to describe small scale tokamak devices. In order to enable simulation of v...

  2. CYCLIC CODES OVER FORMAL POWER SERIES RINGS

    Institute of Scientific and Technical Information of China (English)

    Dougherty Steven T.; Liu Hongwei

    2011-01-01

    In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.

  3. Use of the TRAC/BF1 code in BWR reactors instability studies

    International Nuclear Information System (INIS)

    The RETRAN and TRAC codes are examples of temporary codes that are used to analyze the stability of B.W.R. Although, in many cases, this codes present good results and predict the expected behaviour, they are very sensitive to the variations of core modeling, like for example, variations in the number of cells. This can question seriously the reliability and obviously the acceptability of the analysis done with this temporary codes. In this paper we present a work using the TRAC-BF1 code to simulate the in-phase and out-of-phase oscillations, and the influence of the chose of some parameters. (author)

  4. The discrete dipole approximation code DDscat.C++: features, limitations and plans

    Science.gov (United States)

    Choliy, V. Ya.

    2013-08-01

    We present a new freely available open-source C++ software for numerical solution of the electromagnetic waves absorption and scattering problems within the Discrete Dipole Approximation paradigm. The code is based upon the famous and free Fortan-90 code DDSCAT by B. Draine and P. Flatau. Started as a teaching project, the presented code DDscat.C++ differs from the parent code DDSCAT with a number of features, essential for C++ but quite seldom in Fortran. This article introduces the new code, explains its features, presents timing information and some plans for further development.

  5. ESCADRE and ICARE code systems

    International Nuclear Information System (INIS)

    The French sever accident code development program is following two parallel approaches: the first one is dealing with ''integral codes'' which are designed for giving immediate engineer answers, the second one is following a more mechanistic way in order to have the capability of detailed analysis of experiments, in order to get a better understanding of the scaling problem and reach a better confidence in plant calculations. In the first approach a complete system has been developed and is being used for practical cases: this is the ESCADRE system. In the second approach, a set of codes dealing first with primary circuit is being developed: a mechanistic core degradation code, ICARE, has been issued and is being coupled with the advanced thermalhydraulic code CATHARE. Fission product codes have been also coupled to CATHARE. The ''integral'' ESCADRE system and the mechanistic ICARE and associated codes are described. Their main characteristics are reviewed and the status of their development and assessment given. Future studies are finally discussed. 36 refs, 4 figs, 1 tab

  6. Stability analysis by ERATO code

    International Nuclear Information System (INIS)

    Problems in MHD stability calculations by ERATO code are described; which concern convergence property of results, equilibrium codes, and machine optimization of ERATO code. It is concluded that irregularity on a convergence curve is not due to a fault of the ERATO code itself but due to inappropriate choice of the equilibrium calculation meshes. Also described are a code to calculate an equilibrium as a quasi-inverse problem and a code to calculate an equilibrium as a result of a transport process. Optimization of the code with respect to I/O operations reduced both CPU time and I/O time considerably. With the FACOM230-75 APU/CPU multiprocessor system, the performance is about 6 times as high as with the FACOM230-75 CPU, showing the effectiveness of a vector processing computer for the kind of MHD computations. This report is a summary of the material presented at the ERATO workshop 1979(ORNL), supplemented with some details. (author)

  7. Recent code systems at JAERI

    International Nuclear Information System (INIS)

    Recently several code systems have been developed and utilized at Japan Atomic Energy Research Institute. It is not easy to construct and maintain a code system, but the fact is not well known in the researchers. For this reason, it will be very useful to publish informations about design concepts, characteristics, necessary computer features and amounts of invested manpower for the developments of some recent JAERI code systems. In this report, a general view of required manpower on unification of nuclear codes is discussed and four code systems, i.e., SRAC for thermal reactor analysis, TRITON for Tokamak MHD analysis, SPEEDI for emergent environmental dose prediction and RADHEAT for radiation shielding analysis are presented. They are described from aspects of (1) purpose and schedule of development, (2) outline of system, (3) results of benchmark tests, (4) utilized computer features, (5) invested manpower, and (6) desirable computer features. Finally common aspects of four code systems from viewpoint of necessary computer hardwares and softwares are discussed for future development of code systems. (author)

  8. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  9. Network coding with modular lattices

    CERN Document Server

    Kendziorra, Andreas

    2010-01-01

    In [1], K\\"otter and Kschischang presented a new model for error correcting codes in network coding. The alphabet in this model is the subspace lattice of a given vector space, a code is a subset of this lattice and the used metric on this alphabet is the map d: (U, V) \\longmapsto dim(U + V) - dim(U \\bigcap V). In this paper we generalize this model to arbitrary modular lattices, i.e. we consider codes, which are subsets of modular lattices. The used metric in this general case is the map d: (x, y) \\longmapsto h(x \\bigvee y) - h(x \\bigwedge y), where h is the height function of the lattice. We apply this model to submodule lattices. Moreover, we show a method to compute the size of spheres in certain modular lattices and present a sphere packing bound, a sphere covering bound, and a singleton bound for codes, which are subsets of modular lattices. [1] R. K\\"otter, F.R. Kschischang: Coding for errors and erasures in random network coding, IEEE Trans. Inf. Theory, Vol. 54, No. 8, 2008

  10. Constructions of Rank Modulation Codes

    CERN Document Server

    Mazumdar, Arya; Zémor, Gilles

    2011-01-01

    Rank modulation is a way of encoding information to correct errors in flash memory devices as well as impulse noise in transmission lines. Modeling rank modulation involves construction of packings of the space of permutations equipped with the Kendall tau distance. We present several general constructions of codes in permutations that cover a broad range of code parameters. In particular, we show a number of ways in which conventional error-correcting codes can be modified to correct errors in the Kendall space. Codes that we construct afford simple encoding and decoding algorithms of essentially the same complexity as required to correct errors in the Hamming metric. For instance, from binary BCH codes we obtain codes correcting $t$ Kendall errors in $n$ memory cells that support the order of $n!/(\\log_2n!)^t$ messages, for any constant $t= 1,2,...$ We also construct families of codes that correct a number of errors that grows with $n$ at varying rates, from $\\Theta(n)$ to $\\Theta(n^{2})$. One of our constr...

  11. ETR/ITER systems code

    International Nuclear Information System (INIS)

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs

  12. Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes

    OpenAIRE

    Bacon, Dave; Casaccino, Andrea

    2006-01-01

    The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes diffe...

  13. Block error correction codes for face recognition

    Science.gov (United States)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2011-06-01

    Face recognition is one of the most desirable biometric-based authentication schemes to control access to sensitive information/locations and as a proof of identity to claim entitlement to services. The aim of this paper is to develop block-based mechanisms, to reduce recognition errors that result from varying illumination conditions with emphasis on using error correction codes. We investigate the modelling of error patterns in different parts/blocks of face images as a result of differences in illumination conditions, and we use appropriate error correction codes to deal with the corresponding distortion. We test the performance of our proposed schemes using the Extended Yale-B Face Database, which consists of face images belonging to 5 illumination subsets depending on the direction of light source from the camera. In our experiments each image is divided into three horizontal regions as follows: region1, three rows above the eyebrows, eyebrows and eyes; region2, nose region and region3, mouth and chin region. By estimating statistical parameters for errors in each region we select suitable BCH error correction codes that yield improved recognition accuracy for that particular region in comparison to applying error correction codes to the entire image. Discrete Wavelet Transform (DWT) to a depth of 3 is used for face feature extraction, followed by global/local binarization of coefficients in each subbands. We shall demonstrate that the use of BCH improves separation of the distribution of Hamming distances of client-client samples from the distribution of Hamming distances of imposter-client samples.

  14. System verification and validation report for the TMAD code

    International Nuclear Information System (INIS)

    This document serves as the Verification and Validation Report for the TMAD code system, which includes the TMAD code and the LIBMAKR Code. The TMAD code was commissioned to facilitate the interpretation of moisture probe measurements in the Hanford Site waste tanks. In principle, the code is an interpolation routine that acts over a library of benchmark data based on two independent variables, typically anomaly size and moisture content. Two additional variables, anomaly type and detector type, can also be considered independent variables, but no interpolation is done over them. The dependent variable is detector response. The intent is to provide the code with measured detector responses from two or more detectors. The code will then interrogate (and interpolate upon) the benchmark data library and find the anomaly-type/anomaly-size/moisture-content combination that provides the closest match to the measured data. The primary purpose of this document is to provide the results of the system testing and the conclusions based thereon. The results of the testing process are documented in the body of the report. Appendix A gives the test plan, including test procedures, used in conducting the tests. Appendix B lists the input data required to conduct the tests, and Appendices C and 0 list the numerical results of the tests

  15. Foundational development of an advanced nuclear reactor integrated safety code.

    Energy Technology Data Exchange (ETDEWEB)

    Clarno, Kevin (Oak Ridge National Laboratory, Oak Ridge, TN); Lorber, Alfred Abraham; Pryor, Richard J.; Spotz, William F.; Schmidt, Rodney Cannon; Belcourt, Kenneth (Ktech Corporation, Albuquerque, NM); Hooper, Russell Warren; Humphries, Larry LaRon

    2010-02-01

    This report describes the activities and results of a Sandia LDRD project whose objective was to develop and demonstrate foundational aspects of a next-generation nuclear reactor safety code that leverages advanced computational technology. The project scope was directed towards the systems-level modeling and simulation of an advanced, sodium cooled fast reactor, but the approach developed has a more general applicability. The major accomplishments of the LDRD are centered around the following two activities. (1) The development and testing of LIME, a Lightweight Integrating Multi-physics Environment for coupling codes that is designed to enable both 'legacy' and 'new' physics codes to be combined and strongly coupled using advanced nonlinear solution methods. (2) The development and initial demonstration of BRISC, a prototype next-generation nuclear reactor integrated safety code. BRISC leverages LIME to tightly couple the physics models in several different codes (written in a variety of languages) into one integrated package for simulating accident scenarios in a liquid sodium cooled 'burner' nuclear reactor. Other activities and accomplishments of the LDRD include (a) further development, application and demonstration of the 'non-linear elimination' strategy to enable physics codes that do not provide residuals to be incorporated into LIME, (b) significant extensions of the RIO CFD code capabilities, (c) complex 3D solid modeling and meshing of major fast reactor components and regions, and (d) an approach for multi-physics coupling across non-conformal mesh interfaces.

  16. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  17. Studies on DANESS Code Modeling

    International Nuclear Information System (INIS)

    The DANESS code modeling study has been performed. DANESS code is widely used in a dynamic fuel cycle analysis. Korea Atomic Energy Research Institute (KAERI) has used the DANESS code for the Korean national nuclear fuel cycle scenario analysis. In this report, the important models such as Energy-demand scenario model, New Reactor Capacity Decision Model, Reactor and Fuel Cycle Facility History Model, and Fuel Cycle Model are investigated. And, some models in the interface module are refined and inserted for Korean nuclear fuel cycle model. Some application studies have also been performed for GNEP cases and for US fast reactor scenarios with various conversion ratios

  18. Lightweight Security for Network Coding

    CERN Document Server

    Vilela, Joao P; Barros, Joao

    2008-01-01

    Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows. We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of reduced overhead in comparison to traditional end-to-end encryption of the entire data. Confidentiality is achieved by protecting (or "locking") the source coefficients required to decode the encoded data, without preventing intermediate nodes from running their standard network coding operations. Our scheme can be easily combined with existing techniques that counter active attacks.

  19. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...... requirements between metadata and code should be checked but often are not, so current tools offer surprisingly poor development support. In this paper, we adapt classical data flow analyses to detect inconsistencies and provide better static guarantees. We provide a formalization of the consistency...... significant number of previously undetected consistency errors and have received very positive feedback from the developer community in the case study....

  20. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    Presently, sequential tree coders are the best general purpose bilevel image coders and the best coders of halftoned images. The current ISO standard, Joint Bilevel Image Experts Group (JBIG), is a good example. A sequential tree coder encodes the data by feeding estimates of conditional...... one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...... images such as halftones. By utilizing randomized subsampling in the template selection, the speed becomes acceptable for practical image coding...